Search results for: data source
27090 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 50427089 Information Extraction Based on Search Engine Results
Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk
Abstract:
The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.Keywords: search engines, information extraction, agent system
Procedia PDF Downloads 43027088 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 29027087 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India
Authors: Anushtha Saxena
Abstract:
This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.Keywords: data monetization, e-commerce companies, regulatory framework, GDPR
Procedia PDF Downloads 12027086 Wood Energy, Trees outside Forests and Agroforestry Wood Harvesting and Conversion Residues Preparing and Storing
Authors: Adeiza Matthew, Oluwadamilola Abubakar
Abstract:
Wood energy, also known as wood fuel, is a renewable energy source that is derived from woody biomass, which is organic matter that is harvested from forests, woodlands, and other lands. Woody biomass includes trees, branches, twigs, and other woody debris that can be used as fuel. Wood energy can be classified based on its sources, such as trees outside forests, residues from wood harvesting and conversion, and energy plantations. There are several policy frameworks that support the use of wood energy, including participatory forest management and agroforestry. These policies aim to promote the sustainable use of woody biomass as a source of energy while also protecting forests and wildlife habitats. There are several options for using wood as a fuel, including central heating systems, pellet-based systems, wood chip-based systems, log boilers, fireplaces, and stoves. Each of these options has its own benefits and drawbacks, and the most appropriate option will depend on factors such as the availability of woody biomass, the heating needs of the household or facility, and the local climate. In order to use wood as a fuel, it must be harvested and stored properly. Hardwood or softwood can be used as fuel, and the heating value of firewood depends on the species of tree and the degree of moisture content. Proper harvesting and storage of wood can help to minimize environmental impacts and improve wildlife habitats. The use of wood energy has several environmental impacts, including the release of greenhouse gases during combustion and the potential for air pollution from combustion by-products. However, wood energy can also have positive environmental impacts, such as the sequestration of carbon in trees and the reduction of reliance on fossil fuels. The regulation and legislation of wood energy vary by country and region, and there is an ongoing debate about the potential use of wood energy in renewable energy technologies. Wood energy is a renewable energy source that can be used to generate electricity, heat, and transportation fuels. Woody biomass is abundant and widely available, making it a potentially significant source of energy for many countries. The use of wood energy can create local economic and employment opportunities, particularly in rural areas. Wood energy can be used to reduce reliance on fossil fuels and reduce greenhouse gas emissions. Properly managed forests can provide a sustained supply of woody biomass for energy, helping to reduce the risk of deforestation and habitat loss. Wood energy can be produced using a variety of technologies, including direct combustion, co-firing with fossil fuels, and the production of biofuels. The environmental impacts of wood energy can be minimized through the use of best practices in harvesting, transportation, and processing. Wood energy is regulated and legislated at the national and international levels, and there are various standards and certification systems in place to promote sustainable practices. Wood energy has the potential to play a significant role in the transition to a low-carbon economy and the achievement of climate change mitigation goals.Keywords: biomass, timber, charcoal, firewood
Procedia PDF Downloads 10027085 Identification and Characterization of Groundwater Recharge Sites in Kuwait
Authors: Dalal Sadeqi
Abstract:
Groundwater is an important component of Kuwait’s water resources. Although limited in quantity and often poor in quality, the significance of this natural source of water cannot be overemphasized. Recharge of groundwater in Kuwait occurs during periodical storm events, especially in open desert areas. Runoff water dissolves accumulated surficial meteoric salts and subsequently leaches them into the groundwater following a period of evaporative enrichment at or near the soil surface. Geochemical processes governing groundwater recharge vary in time and space. Stable isotope (18O and 2H) and geochemical signatures are commonly used to gain some insight into recharge processes and groundwater salinization mechanisms, particularly in arid and semiarid regions. This article addresses the mechanism used in identifying and characterizing the main water shed areas in Kuwait using stable isotopes in an attempt to determine favorable groundwater recharge sites in the country. Stable isotopes of both rainwater and groundwater were targeted in different hydrogeological settings. Additionally, data and information obtained from subsurface logs in the study area were collected and analyzed to develop a better understanding of the lateral and vertical extent of the groundwater aquifers. Geographic Information System (GIS) and RockWorks 3D modelling software were used to map out the hydrogeomorphology of the study area and the subsurface lithology of the investigated aquifers. The collected data and information, including major ion chemistry, isotopes, subsurface characteristics, and hydrogeomorphology, were integrated in a GIS platform to identify and map out suitable natural recharge areas as part of an integrated water resources management scheme that addresses the challenges of the sustainability of the groundwater reserves in the country.Keywords: scarcity, integrated, recharge, isotope
Procedia PDF Downloads 11527084 Experiments on Weakly-Supervised Learning on Imperfect Data
Authors: Yan Cheng, Yijun Shao, James Rudolph, Charlene R. Weir, Beth Sahlmann, Qing Zeng-Treitler
Abstract:
Supervised predictive models require labeled data for training purposes. Complete and accurate labeled data, i.e., a ‘gold standard’, is not always available, and imperfectly labeled data may need to serve as an alternative. An important question is if the accuracy of the labeled data creates a performance ceiling for the trained model. In this study, we trained several models to recognize the presence of delirium in clinical documents using data with annotations that are not completely accurate (i.e., weakly-supervised learning). In the external evaluation, the support vector machine model with a linear kernel performed best, achieving an area under the curve of 89.3% and accuracy of 88%, surpassing the 80% accuracy of the training sample. We then generated a set of simulated data and carried out a series of experiments which demonstrated that models trained on imperfect data can (but do not always) outperform the accuracy of the training data, e.g., the area under the curve for some models is higher than 80% when trained on the data with an error rate of 40%. Our experiments also showed that the error resistance of linear modeling is associated with larger sample size, error type, and linearity of the data (all p-values < 0.001). In conclusion, this study sheds light on the usefulness of imperfect data in clinical research via weakly-supervised learning.Keywords: weakly-supervised learning, support vector machine, prediction, delirium, simulation
Procedia PDF Downloads 19927083 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 1827082 Kinetics of Growth Rate of Microalga: The Effect of Carbon Dioxide Concentration
Authors: Retno Ambarwati Sigit Lestari
Abstract:
Microalga is one of the organisms that can be considered ideal and potential for raw material of bioenergy production, because the content of lipids in microalga is relatively high. Microalga is an aquatic organism that produces complex organic compounds from inorganic molecules using carbon dioxide as a carbon source, and sunlight for energy supply. Microalga-CO₂ fixation has potential advantages over other carbon captures and storage approaches, such as wide distribution, high photosynthetic rate, good environmental adaptability, and ease of operation. The rates of growth and CO₂ capture of microalga are influenced by CO₂ concentration and light intensity. This study quantitatively investigates the effects of CO₂ concentration on the rates of growth and CO₂ capture of a type of microalga, cultivated in bioreactors. The works include laboratory experiments as well as mathematical modelling. The mathematical models were solved numerically and the accuracy of the model was tested by the experimental data. It turned out that the mathematical model proposed can well quantitatively describe the growth and CO₂ capture of microalga, in which the effects of CO₂ concentration can be observed.Keywords: Microalga, CO2 concentration, photobioreactor, mathematical model
Procedia PDF Downloads 12527081 Development of Intervention Policy Options for Sustainable Fisheries Management of Lake Hawassa, Ethiopia
Authors: Mekonen Hailu, Gashaw Tesfaye, Adamneh Dagne, Hiwot Teshome
Abstract:
Lake Hawassa is one of the most important lakes for Ethiopian fishery. It serves as a source of food and nutrition, income and livelihood for many inhabitants. However, the fishery in Lake Hawassa shows a declining trend, especially for the most valuable species, such as the Nile tilapia (Oreochromis niloticus L.), indicating that the existing management systems are either not fully enforced or inadequate. The aim of this study was therefore to develop management policy options for the sustainable utilization and management of fishery resources in Lake Hawassa. A blend of primary and secondary data was used for the study. Primary data were collected using Participatory Rural Appraisal (PRA) techniques such as focus group discussions with members of fishing co-operatives, co-operative leaders and key informant discussion to understand the current state of the fisheries resources. Then literatures were reviewed to obtain secondary data and develop alternative management policy options. It has been realized that Lake Hawassa is not very species-rich in terms of fish diversity. It contains only six species belonging to four families, of which only three are commercially important, including the Nile tilapia (90 % of catches), the African catfish Clarias gariepinus B. (7 % of catches) and the African large barb Labeobarbus intermedius R. (only 3 % of catches). The production has been declining since 2007. The top six challenges that could be responsible for this decline, identified by about two-thirds of respondents and supported by the literature review, are directly linked to fisheries and fisheries management, with overfishing, irregular monitoring, control, and surveillance (MCS) system and the lack of a fishing licensing system ranking first, second and third respectively. It is, therefore, important to address these and other problems identified in the study. Of the management options analyzed, we suggest adapting the management approach to sustain the fishery in Lake Hawaasa and its socio-economic benefits. We also present important conditions for successfully implementing co-management in this and other lakes in Ethiopia.Keywords: comanagement, community-based management, fishery, overfishing, participatory approach, top-down management
Procedia PDF Downloads 1027080 Operating Speed Models on Tangent Sections of Two-Lane Rural Roads
Authors: Dražen Cvitanić, Biljana Maljković
Abstract:
This paper presents models for predicting operating speeds on tangent sections of two-lane rural roads developed on continuous speed data. The data corresponds to 20 drivers of different ages and driving experiences, driving their own cars along an 18 km long section of a state road. The data were first used for determination of maximum operating speeds on tangents and their comparison with speeds in the middle of tangents i.e. speed data used in most of operating speed studies. Analysis of continuous speed data indicated that the spot speed data are not reliable indicators of relevant speeds. After that, operating speed models for tangent sections were developed. There was no significant difference between models developed using speed data in the middle of tangent sections and models developed using maximum operating speeds on tangent sections. All developed models have higher coefficient of determination then models developed on spot speed data. Thus, it can be concluded that the method of measuring has more significant impact on the quality of operating speed model than the location of measurement.Keywords: operating speed, continuous speed data, tangent sections, spot speed, consistency
Procedia PDF Downloads 45227079 Characterization of Caneberry Juices Enriched by Natural Antioxidants
Authors: Jelena Vulić, Jasna Čanadanović-Brunet, Gordana Ćetković, Sonja Djilas, Vesna Tumbas Šaponjac
Abstract:
Caneberries (raspberries and blackberries) are among the most popular berries in the world, which are consumed as fresh and processed to juice, jams, confitures and other products or as ingredients for different foods. These fruits are known as a rich source of phenolic compounds such as phenolic acids and anthocyanins. Antioxidant activity (AA) of caneberry juices was improved by addition of phenolic compounds which were extracted from two raspberry cultivars (Rubus idaeus, cv. 'Willamette' (RW) and 'Meeker' (RM)) and two blackberry cultivars (Rubus fruticosus, cv. 'Čačanka' (BC) and 'Thornfree' (BT)) pomace, a by-product in juice processing. The total phenolic contents in raspberry and blackberry pomace extracts were determined spectrophotometrically using the Folin-Ciocalteu reagens. The phenolic concentrations in caneberries (RW, RM, BC and BT) pomace extracts were 43.67 ± 2.13 mg GAE/g, 26.25 ± 1.18 mg GAE/g, 46.01 ± 3.26 mg GAE/g and 61.59 ± 1.14 mg GAE/g, respectively. In order to obtain enriched juices, phenolic compounds were applied at concentration of 0.05 mg GAE/ 100 ml. Antioxidant activities of caneberry juices and caneberry enriched juices were measured using stable 1.1-diphenyl-2-picrylhydrazyl (DPPH) radicals. AADPPH of RW, RM, BC and BT juices and enriched juices with addition of 0.01 µg GAE/ml, changed from 37.12% to 93.01%, 23.26% to 91.57%, 53.61% to 95.65% and 52.06% to 93.13%, respectively, while IC50 values of RW, RM, BC and BT juices and enriched juices were diminished 6.33, 19.00, 6.33 and 4.75 times, respectively. Based on the obtained results it can be concluded that phenolic enriched juices were significantly more effective on DPPH radicals. Caneberry juices enriched with waste material are a good source of natural pigments and antioxidants and could be used as functional foods.Keywords: caneberry, enriched juice, phenolic antioxidant, DPPH radical
Procedia PDF Downloads 35327078 A Neural Network Based Clustering Approach for Imputing Multivariate Values in Big Data
Authors: S. Nickolas, Shobha K.
Abstract:
The treatment of incomplete data is an important step in the data pre-processing. Missing values creates a noisy environment in all applications and it is an unavoidable problem in big data management and analysis. Numerous techniques likes discarding rows with missing values, mean imputation, expectation maximization, neural networks with evolutionary algorithms or optimized techniques and hot deck imputation have been introduced by researchers for handling missing data. Among these, imputation techniques plays a positive role in filling missing values when it is necessary to use all records in the data and not to discard records with missing values. In this paper we propose a novel artificial neural network based clustering algorithm, Adaptive Resonance Theory-2(ART2) for imputation of missing values in mixed attribute data sets. The process of ART2 can recognize learned models fast and be adapted to new objects rapidly. It carries out model-based clustering by using competitive learning and self-steady mechanism in dynamic environment without supervision. The proposed approach not only imputes the missing values but also provides information about handling the outliers.Keywords: ART2, data imputation, clustering, missing data, neural network, pre-processing
Procedia PDF Downloads 27427077 Quantification of Soft Tissue Artefacts Using Motion Capture Data and Ultrasound Depth Measurements
Authors: Azadeh Rouhandeh, Chris Joslin, Zhen Qu, Yuu Ono
Abstract:
The centre of rotation of the hip joint is needed for an accurate simulation of the joint performance in many applications such as pre-operative planning simulation, human gait analysis, and hip joint disorders. In human movement analysis, the hip joint center can be estimated using a functional method based on the relative motion of the femur to pelvis measured using reflective markers attached to the skin surface. The principal source of errors in estimation of hip joint centre location using functional methods is soft tissue artefacts due to the relative motion between the markers and bone. One of the main objectives in human movement analysis is the assessment of soft tissue artefact as the accuracy of functional methods depends upon it. Various studies have described the movement of soft tissue artefact invasively, such as intra-cortical pins, external fixators, percutaneous skeletal trackers, and Roentgen photogrammetry. The goal of this study is to present a non-invasive method to assess the displacements of the markers relative to the underlying bone using optical motion capture data and tissue thickness from ultrasound measurements during flexion, extension, and abduction (all with knee extended) of the hip joint. Results show that the artefact skin marker displacements are non-linear and larger in areas closer to the hip joint. Also marker displacements are dependent on the movement type and relatively larger in abduction movement. The quantification of soft tissue artefacts can be used as a basis for a correction procedure for hip joint kinematics.Keywords: hip joint center, motion capture, soft tissue artefact, ultrasound depth measurement
Procedia PDF Downloads 28127076 The Effect That the Data Assimilation of Qinghai-Tibet Plateau Has on a Precipitation Forecast
Authors: Ruixia Liu
Abstract:
Qinghai-Tibet Plateau has an important influence on the precipitation of its lower reaches. Data from remote sensing has itself advantage and numerical prediction model which assimilates RS data will be better than other. We got the assimilation data of MHS and terrestrial and sounding from GSI, and introduced the result into WRF, then got the result of RH and precipitation forecast. We found that assimilating MHS and terrestrial and sounding made the forecast on precipitation, area and the center of the precipitation more accurate by comparing the result of 1h,6h,12h, and 24h. Analyzing the difference of the initial field, we knew that the data assimilating about Qinghai-Tibet Plateau influence its lower reaches forecast by affecting on initial temperature and RH.Keywords: Qinghai-Tibet Plateau, precipitation, data assimilation, GSI
Procedia PDF Downloads 23427075 Viability Study of the Use of Solar Energy for Water Heating in Homes in Brazil
Authors: Elmo Thiago Lins Cöuras Ford, Valentina Alessandra Carvalho do Vale
Abstract:
The sun is an inexhaustible source and harnessing its potential both for heating and for power generation is one of the most promising and necessary alternatives, mainly due to environmental issues. However, it should be noted that this has always been present in the generation of energy on the planet, only indirectly, as it is responsible for virtually all other energy sources, such as: Generates the evaporation source of the water cycle, which allows the impoundment and the consequent generation of electricity (hydroelectricity); Winds are caused by large-scale atmospheric induction caused by solar radiation; Oil, coal and natural gas were generated from waste plants and animals that originally obtained the energy needed for its development of solar radiation. Thus, the idea of using solar energy for practical purposes for the benefit of man is not new, as it accompanies the story since the beginning of time, which means that the sun was always of utmost importance in the design of shelters, or homes is, constructed by taking into consideration the use of sunlight, practicing what was being lost through the centuries, until a time when the buildings started to be designed completely independent of the sun. However, the climatic rigors still needed to be fought, only artificially and today seen as unsustainable, with additional facilities fueled by energy consumption. This paper presents a study on the feasibility of using solar energy for heating water in homes, developing a simplified methodology covering the mode of operation of solar water heaters, solar potential existing alternative systems of Brazil, the international market, and barriers encountered.Keywords: solar energy, solar heating, solar project, water heating
Procedia PDF Downloads 33227074 Positive Affect, Negative Affect, Organizational and Motivational Factor on the Acceptance of Big Data Technologies
Authors: Sook Ching Yee, Angela Siew Hoong Lee
Abstract:
Big data technologies have become a trend to exploit business opportunities and provide valuable business insights through the analysis of big data. However, there are still many organizations that have yet to adopt big data technologies especially small and medium organizations (SME). This study uses the technology acceptance model (TAM) to look into several constructs in the TAM and other additional constructs which are positive affect, negative affect, organizational factor and motivational factor. The conceptual model proposed in the study will be tested on the relationship and influence of positive affect, negative affect, organizational factor and motivational factor towards the intention to use big data technologies to produce an outcome. Empirical research is used in this study by conducting a survey to collect data.Keywords: big data technologies, motivational factor, negative affect, organizational factor, positive affect, technology acceptance model (TAM)
Procedia PDF Downloads 36227073 Big Data Analysis with Rhipe
Authors: Byung Ho Jung, Ji Eun Shin, Dong Hoon Lim
Abstract:
Rhipe that integrates R and Hadoop environment made it possible to process and analyze massive amounts of data using a distributed processing environment. In this paper, we implemented multiple regression analysis using Rhipe with various data sizes of actual data. Experimental results for comparing the performance of our Rhipe with stats and biglm packages available on bigmemory, showed that our Rhipe was more fast than other packages owing to paralleling processing with increasing the number of map tasks as the size of data increases. We also compared the computing speeds of pseudo-distributed and fully-distributed modes for configuring Hadoop cluster. The results showed that fully-distributed mode was faster than pseudo-distributed mode, and computing speeds of fully-distributed mode were faster as the number of data nodes increases.Keywords: big data, Hadoop, Parallel regression analysis, R, Rhipe
Procedia PDF Downloads 49727072 Removal and/or Recovery of Phosphates by Precipitation as Ferric Phosphate from the Effluent of a Municipal Wastewater Treatment Plant
Authors: Kyriaki Kalaitzidou, Athanasia Tolkou, Christina Raptopoulou, Manassis Mitrakas, Anastasios Zouboulis
Abstract:
Phosphate rock is the main source of phosphorous (P) in fertilizers and is essential for high crop yield in agriculture; currently, it is considered as a critical element, phasing scarcity. Chemical precipitation, which is a commonly used method of phosphorous removal from wastewaters, finds its significance in that phosphates may be precipitated in appropriate chemical forms that can be reused-recovered. Most often phosphorous is removed from wastewaters in the form of insoluble phosphate salts, by using salts (coagulants) of multivalent metal ions, most frequently iron, aluminum, calcium, or magnesium. The removal degree is affected by various factors, such as pH, chemical agent dose, temperature, etc. In this study, phosphate precipitation from the secondary (biologically treated) effluent of a municipal wastewater treatment plant is examined. Using chlorosulfate (FeClSO4) it was attempted to either remove and/or recover PO43-. Results showed that the use of Fe3+ can achieve residual concentrations lower than the commonly applied legislation limit of PO43- (i.e. 3 mg PO43-/L) by adding 7.5 mg/L Fe3+ in the secondary effluent with an initial concentration of about 10 mg PO43-/L and at pH range between 6 to 9. In addition, the formed sediment has a percentage of almost 24% PO43- content. Therefore, simultaneous removal and recovery of PO43- as ferric phosphate can be achieved, making it possible for the ferric phosphate to be re-used as a possible (secondary) fertilizer source.Keywords: ferric phosphate, phosphorus recovery, phosphorus removal, wastewater treatment
Procedia PDF Downloads 48427071 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 14427070 Assessment of Milk Quality in Vehari: Evaluation of Public Health Concerns
Authors: Muhammad Farhan Saeed, Waheed Aslam Khan, Muhammad Nadeem, Iftikhar Ahmad, Zakir Ali
Abstract:
Milk is an important and fundamental nutrition source of human diet. In Pakistan, the milk used by the consumer is of low quality and is often contaminated due to the lack of quality controls. Mycotoxins produced from molds which contaminate the agriculture commodities of animal feed. Mycotoxins are poisons which affect the animals when they consume contaminated feeds. Aflatoxin AFM1 is naturally occurring form of mycotoxins in milk which is carcinogenic. To assess public awareness regarding milk Aflatoxin contamination, a population-based survey using a questionnaire was carried out from general public and from farmers of both rural and urban areas. It was revealed from the data that people of rural area were more satisfied about quality of available milk but the awareness level about milk contamination was found lower in both areas. Total 297 samples of milk were collected from rural (n=156) and urban (n=141) areas of district Vehari during June-July 2015. Milk samples were collected from three different point sources; farmer, milkman and milkshop. These point sources had three types of dairy milk including cow milk, buffalo milk and mixed milk. After performing ELISA test 18 samples with positive ELISA results were maintain per source for further analysis for aflatoxin M1 (AFM1) by High Performance Liquid Chromatography (HPLC). Higher percentages of samples were found exceeding the permissible limit for urban area. In rural area about 15% samples and from urban area about 35% samples were exceeded the permissible limit of AFM1 with 0.05µg/kg set by European Union. From urban areas about 55% of buffalo, 33% of cows and 17% of mixed milk samples were exceeded the permissible AFM1 level as compared with 17%, 11% and 17% for milk samples from rural areas respectively. Samples from urban areas 33%, 44% and 28% were exceeded the permissible AFM1 level for farmer, milkman and of milk shop respectively as compared with 28% and 17% of farmer and milkman’s samples from rural areas respectively. The presence of AFM1 in milk samples demands the implementation of strict regulations and also urges the need for continuous monitoring of milk and milk products in order to minimize the health hazards. Regulations regarding aflatoxins contamination and adulteration should be strictly imposed to prevent health problems related to milk quality. Permissible limits for aflatoxin should be enforced strongly in Pakistan so that economic loss due to aflatoxin contamination can be reduced.Keywords: Vehari, aflatoxins AFM1, milk, HPLC
Procedia PDF Downloads 37427069 Learners’ Perceptions of Tertiary Level Teachers’ Code Switching: A Vietnamese Perspective
Authors: Hoa Pham
Abstract:
The literature on language teaching and second language acquisition has been largely driven by monolingual ideology with a common assumption that a second language (L2) is best taught and learned in the L2 only. The current study challenges this assumption by reporting learners' positive perceptions of tertiary level teachers' code switching practices in Vietnam. The findings of this study contribute to our understanding of code switching practices in language classrooms from a learners' perspective. Data were collected from student participants who were working towards a Bachelor degree in English within the English for Business Communication stream through the use of focus group interviews. The literature has documented that this method of interviewing has a number of distinct advantages over individual student interviews. For instance, group interactions generated by focus groups create a more natural environment than that of an individual interview because they include a range of communicative processes in which each individual may influence or be influenced by others - as they are in their real life. The process of interaction provides the opportunity to obtain the meanings and answers to a problem that are "socially constructed rather than individually created" leading to the capture of real-life data. The distinct feature of group interaction offered by this technique makes it a powerful means of obtaining deeper and richer data than those from individual interviews. The data generated through this study were analysed using a constant comparative approach. Overall, the students expressed positive views of this practice indicating that it is a useful teaching strategy. Teacher code switching was seen as a learning resource and a source supporting language output. This practice was perceived to promote student comprehension and to aid the learning of content and target language knowledge. This practice was also believed to scaffold the students' language production in different contexts. However, the students indicated their preference for teacher code switching to be constrained, as extensive use was believed to negatively impact on their L2 learning and trigger cognitive reliance on the L1 for L2 learning. The students also perceived that when the L1 was used to a great extent, their ability to develop as autonomous learners was negatively impacted. This study found that teacher code switching was supported in certain contexts by learners, thus suggesting that there is a need for the widespread assumption about the monolingual teaching approach to be re-considered.Keywords: codeswitching, L1 use, L2 teaching, learners’ perception
Procedia PDF Downloads 32427068 Survival Data with Incomplete Missing Categorical Covariates
Authors: Madaki Umar Yusuf, Mohd Rizam B. Abubakar
Abstract:
The survival censored data with incomplete covariate data is a common occurrence in many studies in which the outcome is survival time. With model when the missing covariates are categorical, a useful technique for obtaining parameter estimates is the EM by the method of weights. The survival outcome for the class of generalized linear model is applied and this method requires the estimation of the parameters of the distribution of the covariates. In this paper, we propose some clinical trials with ve covariates, four of which have some missing values which clearly show that they were fully censored data.Keywords: EM algorithm, incomplete categorical covariates, ignorable missing data, missing at random (MAR), Weibull Distribution
Procedia PDF Downloads 40527067 Lessons Learned from Interlaboratory Noise Modelling in Scope of Environmental Impact Assessments in Slovenia
Abstract:
Noise assessment methods are regularly used in scope of Environmental Impact Assessments for planned projects to assess (predict) the expected noise emissions of these projects. Different noise assessment methods could be used. In recent years, we had an opportunity to collaborate in some noise assessment procedures where noise assessments of different laboratories have been performed simultaneously. We identified some significant differences in noise assessment results between laboratories in Slovenia. We estimate that despite good input Georeferenced Data to set up acoustic model exists in Slovenia; there is no clear consensus on methods for predictive noise methods for planned projects. We analyzed input data, methods and results of predictive noise methods for two planned industrial projects, both were done independently by two laboratories. We also analyzed the data, methods and results of two interlaboratory collaborative noise models for two existing noise sources (railway and motorway). In cases of predictive noise modelling, the validations of acoustic models were performed by noise measurements of surrounding existing noise sources, but in varying durations. The acoustic characteristics of existing buildings were also not described identically. The planned noise sources were described and digitized differently. Differences in noise assessment results between different laboratories have ranged up to 10 dBA, which considerably exceeds the acceptable uncertainty ranged between 3 to 6 dBA. Contrary to predictive noise modelling, in cases of collaborative noise modelling for two existing noise sources the possibility to perform the validation noise measurements of existing noise sources greatly increased the comparability of noise modelling results. In both cases of collaborative noise modelling for existing motorway and railway, the modelling results of different laboratories were comparable. Differences in noise modeling results between different laboratories were below 5 dBA, which was acceptable uncertainty set up by interlaboratory noise modelling organizer. The lessons learned from the study were: 1) Predictive noise calculation using formulae from International standard SIST ISO 9613-2: 1997 is not an appropriate method to predict noise emissions of planned projects since due to complexity of procedure they are not used strictly, 2) The noise measurements are important tools to minimize noise assessment errors of planned projects and should be in cases of predictive noise modelling performed at least for validation of acoustic model, 3) National guidelines should be made on the appropriate data, methods, noise source digitalization, validation of acoustic model etc. in order to unify the predictive noise models and their results in scope of Environmental Impact Assessments for planned projects.Keywords: environmental noise assessment, predictive noise modelling, spatial planning, noise measurements, national guidelines
Procedia PDF Downloads 23427066 A Sociocultural View of Ethnicity of Parents and Children's Language Learning
Authors: Thapanee Musiget
Abstract:
Ethnic minority children’s language learning is believed that it can be developed through school system. However, many cases prove that these kids are left to challenge with multicultural context at school and sometimes decreased the ability to acquire new learning. Consequently, it is significant for ethnicity parents to consider that prompting their children at home before their actual school age can eliminate negative outcome of children's language acquisition. This paper discusses the approach of instructional use of parents and children language learning in the context of minority language group in Thailand. By conducting this investigation, secondary source of data was gathered with the purpose to point out some primary methods for parents and children in ethnicity. The process of language learning is based on the sociocultural theory of Vygotsky, which highlights expressive communication among individuals as the best motivating force in human development and learning. The article also highlights the role of parents as they lead the instruction approach. In the discussion part, the role of ethnic minority parents as a language instructor is offered as mediator.Keywords: ethnic minority, language learning, multicultural context, sociocultural theory
Procedia PDF Downloads 39127065 A Study of Blockchain Oracles
Authors: Abdeljalil Beniiche
Abstract:
The limitation with smart contracts is that they cannot access external data that might be required to control the execution of business logic. Oracles can be used to provide external data to smart contracts. An oracle is an interface that delivers data from external data outside the blockchain to a smart contract to consume. Oracle can deliver different types of data depending on the industry and requirements. In this paper, we study and describe the widely used blockchain oracles. Then, we elaborate on his potential role, technical architecture, and design patterns. Finally, we discuss the human oracle and its key role in solving the truth problem by reaching a consensus about a certain inquiry and tasks.Keywords: blockchain, oracles, oracles design, human oracles
Procedia PDF Downloads 13527064 Crossing Multi-Source Climate Data to Estimate the Effects of Climate Change on Evapotranspiration Data: Application to the French Central Region
Authors: Bensaid A., Mostephaoui T., Nedjai R.
Abstract:
Climatic factors are the subject of considerable research, both methodologically and instrumentally. Under the effect of climate change, the approach to climate parameters with precision remains one of the main objectives of the scientific community. This is from the perspective of assessing climate change and its repercussions on humans and the environment. However, many regions of the world suffer from a severe lack of reliable instruments that can make up for this deficit. Alternatively, the use of empirical methods becomes the only way to assess certain parameters that can act as climate indicators. Several scientific methods are used for the evaluation of evapotranspiration which leads to its evaluation either directly at the level of the climatic stations or by empirical methods. All these methods make a point approach and, in no case, allow the spatial variation of this parameter. We, therefore, propose in this paper the use of three sources of information (network of weather stations of Meteo France, World Databases, and Moodis satellite images) to evaluate spatial evapotranspiration (ETP) using the Turc method. This first step will reflect the degree of relevance of the indirect (satellite) methods and their generalization to sites without stations. The spatial variation representation of this parameter using the geographical information system (GIS) accounts for the heterogeneity of the behaviour of this parameter. This heterogeneity is due to the influence of site morphological factors and will make it possible to appreciate the role of certain topographic and hydrological parameters. A phase of predicting the evolution over the medium and long term of evapotranspiration under the effect of climate change by the application of the Intergovernmental Panel on Climate Change (IPCC) scenarios gives a realistic overview as to the contribution of aquatic systems to the scale of the region.Keywords: climate change, ETP, MODIS, GIEC scenarios
Procedia PDF Downloads 10027063 Description of Reported Foodborne Diseases in Selected Communities within the Greater Accra Region-Ghana: Epidemiological Review of Surveillance Data
Authors: Benjamin Osei-Tutu, Henrietta Awewole Kolson
Abstract:
Background: Acute gastroenteritis is one of the frequently reported Out-Patient Department (OPD) cases. However, the causative pathogens of these cases are rarely identified at the OPD due to delay in laboratory results or failure to obtain specimens before antibiotics is administered. Method: A retrospective review of surveillance data from the Adentan Municipality, Accra, Ghana that were recorded in the National foodborne disease surveillance system of Ghana, was conducted with the main aim of describing the epidemiology and food practice of cases reported from the Adentan Municipality. The study involved a retrospective review of surveillance data kept on patients who visited health facilities that are involved in foodborne disease surveillance in Ghana, from January 2015 to December 2016. Results: A total of 375 cases were reviewed and these were classified as viral hepatitis (hepatitis A and E), cholera (Vibrio cholerae), dysentery (Shigella sp.), typhoid fever (Salmonella sp.) or gastroenteritis. Cases recorded were all suspected case and the average cases recorded per week was 3. Typhoid fever and dysentery were the two main clinically diagnosed foodborne illnesses. The highest number of cases were observed during the late dry season (Feb to April), which marks the end of the dry season and the beginning of the rainy season. Relatively high number of cases was also observed during the late wet seasons (Jul to Oct) when the rainfall is the heaviest. Home-made food and street vended food were the major sources of suspected etiological food, recording 49.01% and 34.87% of the cases respectively. Conclusion: Majority of cases recorded were classified as gastroenteritis due to the absence of laboratory confirmation. Few cases were classified as typhoid fever and dysentery based on clinical symptoms presented. Patients reporting with foodborne diseases were found to consume home meal and street vended foods as their predominant source of food.Keywords: accra, etiologic food, food poisoning, gastroenteritis, illness, surveillance
Procedia PDF Downloads 21727062 An Infinite Mixture Model for Modelling Stutter Ratio in Forensic Data Analysis
Authors: M. A. C. S. Sampath Fernando, James M. Curran, Renate Meyer
Abstract:
Forensic DNA analysis has received much attention over the last three decades, due to its incredible usefulness in human identification. The statistical interpretation of DNA evidence is recognised as one of the most mature fields in forensic science. Peak heights in an Electropherogram (EPG) are approximately proportional to the amount of template DNA in the original sample being tested. A stutter is a minor peak in an EPG, which is not masking as an allele of a potential contributor, and considered as an artefact that is presumed to be arisen due to miscopying or slippage during the PCR. Stutter peaks are mostly analysed in terms of stutter ratio that is calculated relative to the corresponding parent allele height. Analysis of mixture profiles has always been problematic in evidence interpretation, especially with the presence of PCR artefacts like stutters. Unlike binary and semi-continuous models; continuous models assign a probability (as a continuous weight) for each possible genotype combination, and significantly enhances the use of continuous peak height information resulting in more efficient reliable interpretations. Therefore, the presence of a sound methodology to distinguish between stutters and real alleles is essential for the accuracy of the interpretation. Sensibly, any such method has to be able to focus on modelling stutter peaks. Bayesian nonparametric methods provide increased flexibility in applied statistical modelling. Mixture models are frequently employed as fundamental data analysis tools in clustering and classification of data and assume unidentified heterogeneous sources for data. In model-based clustering, each unknown source is reflected by a cluster, and the clusters are modelled using parametric models. Specifying the number of components in finite mixture models, however, is practically difficult even though the calculations are relatively simple. Infinite mixture models, in contrast, do not require the user to specify the number of components. Instead, a Dirichlet process, which is an infinite-dimensional generalization of the Dirichlet distribution, is used to deal with the problem of a number of components. Chinese restaurant process (CRP), Stick-breaking process and Pólya urn scheme are frequently used as Dirichlet priors in Bayesian mixture models. In this study, we illustrate an infinite mixture of simple linear regression models for modelling stutter ratio and introduce some modifications to overcome weaknesses associated with CRP.Keywords: Chinese restaurant process, Dirichlet prior, infinite mixture model, PCR stutter
Procedia PDF Downloads 33027061 Single Cell Oil of Oleaginous Fungi from Lebanese Habitats as a Potential Feed Stock for Biodiesel
Authors: M. El-haj, Z. Olama, H. Holail
Abstract:
Single cell oils (SCOs) accumulated by oleaginous fungi have emerged as a potential alternative feedstock for biodiesel production. Five fungal strains were isolated from the Lebanese environment namely Fusarium oxysporum, Mucor hiemalis, Penicillium citrinum, Aspergillus tamari, and Aspergillus niger that have been selected among 39 oleaginous strains for their potential ability to accumulate lipids (lipid content was more than 40% on dry weight basis). Wide variations were recorded in the environmental factors that lead to maximum lipid production by fungi under test and were cultivated under submerged fermentation on medium containing glucose as a carbon source. The maximum lipid production was attained within 6-8 days, at pH range 6-7, 24 to 48 hours age of seed culture, 4 to 6.107 spores/ml inoculum level and 100 ml culture volume. Eleven culture conditions were examined for their significance on lipid production using Plackett-Burman factorial design. Reducing sugars and nitrogen source were the most significant factors affecting lipid production process. Maximum lipid yield was noticed with 15.62, 14.48, 12.75, 13.68 and 20.41g/l for Fusarium oxysporum, Mucor hiemalis, Penicillium citrinum, Aspergillus tamari, and Aspergillus niger respectively. A verification experiment was carried out to examine model validation and revealed more than 94% validity. The profile of extracted lipids from each fungal isolate was studied using thin layer chromatography (TLC) indicating the presence of monoacylglycerols, diaacylglycerols, free fatty acids, triacylglycerols and sterol esters. The fatty acids profiles were also determined by gas-chromatography coupled with flame ionization detector (GC-FID). Data revealed the presence of significant amount of oleic acid (29-36%), palmitic acid (18-24%), linoleic acid (26.8-35%), and low amount of other fatty acids in the extracted fungal oils which indicate that the fatty acid profiles were quite similar to that of conventional vegetable oil. The cost of lipid production could be further reduced with acid-pretreated lignocellulotic corncob waste, whey and date molasses to be utilized as the raw material for the oleaginous fungi. The results showed that the microbial lipid from the studied fungi was a potential alternative resource for biodiesel production.Keywords: agro-industrial waste products, biodiesel, fatty acid, single cell oil, Lebanese environment, oleaginous fungi
Procedia PDF Downloads 411