Search results for: parallel mechanisms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3580

Search results for: parallel mechanisms

2200 Genetic Algorithms for Feature Generation in the Context of Audio Classification

Authors: José A. Menezes, Giordano Cabral, Bruno T. Gomes

Abstract:

Choosing good features is an essential part of machine learning. Recent techniques aim to automate this process. For instance, feature learning intends to learn the transformation of raw data into a useful representation to machine learning tasks. In automatic audio classification tasks, this is interesting since the audio, usually complex information, needs to be transformed into a computationally convenient input to process. Another technique tries to generate features by searching a feature space. Genetic algorithms, for instance, have being used to generate audio features by combining or modifying them. We find this approach particularly interesting and, despite the undeniable advances of feature learning approaches, we wanted to take a step forward in the use of genetic algorithms to find audio features, combining them with more conventional methods, like PCA, and inserting search control mechanisms, such as constraints over a confusion matrix. This work presents the results obtained on particular audio classification problems.

Keywords: feature generation, feature learning, genetic algorithm, music information retrieval

Procedia PDF Downloads 427
2199 Islam-Oriented Movements' Recruiting Strategies in Morocco

Authors: Driss Bouyahya

Abstract:

During the late 1960s, Islam-oriented social movements have encroached to reach the Moroccan public spheres and mobilize huge waves of people from different walks of life under the banners of a rhetoric that resonates with the Muslim way of life away from Modernity and globalization tenets. In this respect, the present study investigates and explores some of the ways utilized by the Movement for Unity and Reform in Morocco as an Islam-oriented movement to recruit students massively at universities. The significance of this study lies in demystifying the recruitment strategies and mechanisms, considered essential for the Islam-oriented social movements to mobilize. This research paper uses a quantitative method to collect and analyze data through two different structured questionnaires. One of the major findings is that this Islam-oriented movement uses different techniques to recruit students, namely social networks, its websites and You-tube as three main modern and sophisticated means of communication. In a nutshell, this paper´s findings fill some of the gaps in the literature in regard to Islam-oriented movements ‘mobilization strategies.

Keywords: changing, ideology, Islam, party

Procedia PDF Downloads 212
2198 The Evaluation of Transformational Leadership Characteristics and Behaviors in Air Forces

Authors: Cuma Şimşek

Abstract:

Nowadays our globalized world is in a very rapid and sophisticated change. In the information age, notion of ‘information’ has begun to spread faster than ever also in this age, changes and transformation has gained tremendous momentum with technology boom. This continuous change and transformation, increased the competition between existing organizations and corporations. Besides, the organizations which show resistance to change has been put out of action in this competitive environment. It is not possible to sustain the existence of organizations without adapting to change and transformation by isolating itself from developments. As a consequence of improved communication and dialog possibilities by means of increasing knowledge level, there has been made a change of scene in administrative mentality, style and activation, especially in 21th century. Leaders emerge as the most important factor in this process of perception and success. At the same time it is not enough to adapt the alteration with conventional leadership abilities and behaviors. In parallel with alteration, new types of leadership are coming up. The optimal leadership type for our era and a trending topic "Transformational Leadership" is in great demand now. In this research, current situation of the Air Forces which use high-technology weapons efficiently, operates in an environment full of threats and is analyzed. It is evaluated that in order to be ready for war continuously and adjusting itself to changing terms of warfare atmosphere , Air Forces need ‘transformational leaders’ who are innovative, foreseeing and having a vision so that they can develop new methods and strategies for complex problems. Because it is the Air Force which is responsible for being the deterrent force of its country.

Keywords: transformational, change, air force, leadership

Procedia PDF Downloads 437
2197 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources

Authors: Leandro Moura da Silva

Abstract:

The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.

Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA

Procedia PDF Downloads 496
2196 Developing an Audit Quality Model for an Emerging Market

Authors: Bita Mashayekhi, Azadeh Maddahi, Arash Tahriri

Abstract:

The purpose of this paper is developing a model for audit quality, with regard to the contextual and environmental attributes of the audit profession in Iran. For this purpose, using an exploratory approach, and because of the special attributes of the auditing profession in Iran in terms of the legal environment, regulatory and supervisory mechanisms, audit firms size, and etc., we used grounded theory approach as a qualitative research method. Therefore, we got the opinions of the experts in the auditing and capital market areas through unstructured interviews. As a result, the authors revealed the determinants of audit quality, and by using these determinants, developed an Integrated Audit Quality Model, including causal conditions, intervening conditions, context, as well as action strategies related to AQ and their consequences. In this research, audit quality is studied using a systemic approach. According to this approach, the quality of inputs, processes, and outputs of auditing determines the quality of auditing, therefore, the quality of all different parts of this system is considered.

Keywords: audit quality, integrated audit quality model, demand for audit service, supply of audit, grounded theory

Procedia PDF Downloads 269
2195 Stress Reduction Techniques for First Responders: Scientifically Proven Methods

Authors: Esther Ranero Carrazana, Maria Karla Ramirez Valdes

Abstract:

First responders, including firefighters, police officers, and emergency medical personnel, are frequently exposed to high-stress scenarios that significantly increase their risk of mental health issues such as depression, anxiety, and post-traumatic stress disorder (PTSD). Their work involves life-threatening situations, witnessing suffering, and making critical decisions under pressure, all contributing to psychological strain. The objectives of this research on "Stress Reduction Techniques for First Responders: Scientifically Proven Methods" are as follows. One of them is to evaluate the effectiveness of stress reduction techniques. The primary objective is to assess the efficacy of various scientifically proven stress reduction techniques explicitly tailored for first responders. Heart Rate Variability (HRV) Training, Interoception and Exteroception, Sensory Integration, and Body Perception Awareness are scrutinized for their ability to mitigate stress-related symptoms. Furthermore, we evaluate and enhance the understanding of stress mechanisms in first responders by exploring how different techniques influence the physiological and psychological responses to stress. The study aims to deepen the understanding of stress mechanisms in high-risk professions. Additionally, the study promotes psychological resilience by seeking to identify and recommend methods that can significantly enhance the psychological resilience of first responders, thereby supporting their mental health and operational efficiency in high-stress environments. Guide training and policy development is an additional objective to provide evidence-based recommendations that can be used to guide training programs and policy development aimed at improving the mental health and well-being of first responders. Lastly, the study aims to contribute valuable insights to the existing body of knowledge in stress management, specifically tailored to the unique needs of first responders. This study involved a comprehensive literature review assessing the effectiveness of various stress reduction techniques tailored for first responders. Techniques evaluated include Heart Rate Variability (HRV) Training, Interoception and Exteroception, Sensory Integration, and Body Perception Awareness, focusing on their ability to alleviate stress-related symptoms. The review indicates promising results for several stress reduction methods. HRV Training demonstrates the potential to reflect stress vulnerability and enhance physiological and behavioral flexibility. Interoception and Exteroception help modulate the stress response by enhancing awareness of the body's internal state and its interaction with the environment. Sensory integration plays a crucial role in adaptive responses to stress by focusing on individual senses and their integration. Therefore, body perception awareness addresses stress and anxiety through enhanced body perception and mindfulness. The evaluated techniques show significant potential in reducing stress and improving the mental health of first responders. Implementing these scientifically supported methods into routine training could significantly enhance their psychological resilience and operational effectiveness in high-stress environments.

Keywords: first responders, HRV training, mental health, sensory integration, stress reduction

Procedia PDF Downloads 26
2194 Electric Arc Furnaces as a Source of Voltage Fluctuations in the Power System

Authors: Zbigniew Olczykowski

Abstract:

The paper presents the impact of work on the electric arc furnace power grid. The arc furnace operating will be modeled at different power conditions of steelworks. The paper will describe how to determine the increase in voltage fluctuations caused by working in parallel arc furnaces. The analysis of indicators characterizing the quality of electricity recorded during several cycles of measurement made at the same time at three points grid, with different power and different short-circuit rated voltage, will be carried out. The measurements analysis presented in this paper were conducted in the mains of one of the Polish steel. The indicators characterizing the quality of electricity was recorded during several cycles of measurement while making measurements at three points of different power network short-circuit power and various voltage ratings. Measurements of power quality indices included the one-week measurement cycles in accordance with the EN-50160. Data analysis will include the results obtained during the simultaneous measurement of three-point grid. This will determine the actual propagation of interference generated by the device. Based on the model studies and measurements of quality indices of electricity we will establish the effect of a specific arc on the mains. The short-circuit power network’s minimum value will also be estimated, this is necessary to limit the voltage fluctuations generated by arc furnaces.

Keywords: arc furnaces, long-term flicker, measurement and modeling of power quality, voltage fluctuations

Procedia PDF Downloads 282
2193 Measuring the Quality of Business Education: Employment Readiness Assessment

Authors: Gulbakhyt Sultanova

Abstract:

Business education institutions assess the progress of their students by giving them grades for courses completed and calculating a Grade Point Average (GPA). Whether the participation in these courses has led to the development of competences enabling graduates to successfully compete in the labor market should be measured using a new index: Employment Readiness Assessment (ERA). The higher the ERA, the higher the quality of education at a business school. This is applied, empirical research conducted by using a method of linear optimization. The aim of research is to identify factors which lead to the minimization of the deviation of GPA from ERA as well as to the maximization of ERA. ERA is composed of three components resulting from testing proficiency in Business English, testing work and personal skills, and job interview simulation. The quality of education is improving if GPA approximates ERA and ERA increases. Factors which have had a positive effect on quality enhancement are academic mobility of students and staff, practical-oriented courses taught by staff with work experience, and research-based courses taught by staff with research experience. ERA is a better index to measure the quality of business education than traditional indexes such as GPA due to its greater accuracy in assessing the level of graduates’ competences demanded in the labor market. Optimizing the educational process in pursuit of quality enhancement, ERA has to be used in parallel with GPA to find out which changes worked and resulted in improvement.

Keywords: assessment and evaluation, competence evaluation, education quality, employment readiness

Procedia PDF Downloads 441
2192 Improving the Run Times of Existing and Historical Demand Models Using Simple Python Scripting

Authors: Abhijeet Ostawal, Parmjit Lall

Abstract:

The run times for a large strategic model that we were managing had become too long leading to delays in project delivery, increased costs and loss in productivity. Software developers are continuously working towards developing more efficient tools by changing their algorithms and processes. The issue faced by our team was how do you apply the latest technologies on validated existing models which are based on much older versions of software that do not have the latest software capabilities. The multi-model transport model that we had could only be run in sequential assignment order. Recent upgrades to the software now allowed the assignment to be run in parallel, a concept called parallelization. Parallelization is a Python script working only within the latest version of the software. A full model transfer to the latest version was not possible due to time, budget and the potential changes in trip assignment. This article is to show the method to adapt and update the Python script in such a way that it can be used in older software versions by calling the latest version and then recalling the old version for assignment model without affecting the results. Through a process of trial-and-error run time savings of up to 30-40% have been achieved. Assignment results were maintained within the older version and through this learning process we’ve applied this methodology to other even older versions of the software resulting in huge time savings, more productivity and efficiency for both client and consultant.

Keywords: model run time, demand model, parallelisation, python scripting

Procedia PDF Downloads 111
2191 The Relation between the Organizational Trust Level and Organizational Justice Perceptions of Staff in Konya Municipality: A Theoretical and Empirical Study

Authors: Handan Ertaş

Abstract:

The aim of the study is to determine the relationship between organizational trust level and organizational justice of Municipality officials. Correlational method has been used via descriptive survey model and Organizational Justice Perception Scale, Organizational Trust Inventory and Interpersonal Trust Scale have been applied to 353 participants who work in Konya Metropolitan Municipality and central district municipalities in the study. Frequency as statistical method, Independent Samples t test for binary groups, One Way-ANOVA analyses for multi-groups and Pearson Correlation analysis have been used to determine the relation in the data analysis process. It has been determined in the outcomes of the study that participants have high level of organizational trust, “Interpersonal Trust” is in the first place and there is a significant difference in the favor of male officials in terms of Trust on the Organization Itself and Interpersonal Trust. It has also been understood that officials in district municipalities have higher perception level in all dimensions, there is a significant difference in Trust on the Organization sub-dimension and work status is an important factor on organizational trust perception. Moreover, the study has shown that organizational justice implementations are important in raising trust of official on the organization, administrator and colleagues, and there is a parallel relation between Organizational Trust components and Organizational Trust dimensions.

Keywords: organizational trust level, organizational justice perceptions, staff, Konya

Procedia PDF Downloads 340
2190 Experimental Study on the Variation of Young's Modulus of Hollow Clay Brick Obtained from Static and Dynamic Tests

Authors: M. Aboudalle, Le Btth, M. Sari, F. Meftah

Abstract:

In parallel with the appearance of new materials, brick masonry had and still has an essential part of the construction market today, with new technical challenges in designing bricks to meet additional requirements. Being used in structural applications, predicting the performance of clay brick masonry allows a significant cost reduction, in terms of practical experimentation. The behavior of masonry walls depends on the behavior of their elementary components, such as bricks, joints, and coatings. Therefore, it is necessary to consider it at different scales (from the scale of the intrinsic material to the real scale of the wall) and then to develop appropriate models, using numerical simulations. The work presented in this paper focuses on the mechanical characterization of the terracotta material at ambient temperature. As a result, the static Young’s modulus obtained from the flexural test shows different values in comparison with the compression test, as well as with the dynamic Young’s modulus obtained from the Impulse excitation of vibration test. Moreover, the Young's modulus varies according to the direction in which samples are extracted, where the values in the extrusion direction diverge from the ones in the orthogonal directions. Based on these results, hollow bricks can be considered as transversely isotropic bimodulus material.

Keywords: bimodulus material, hollow clay brick, ımpulse excitation of vibration, transversely isotropic material, young’s modulus

Procedia PDF Downloads 191
2189 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 351
2188 Electrodynamic Principles for Generation and Wireless Transfer of Energy

Authors: Steven D. P. Moore

Abstract:

An electrical discharge in the air induces an electromagnetic (EM) wave capable of wireless transfer, reception, and conversion back into electrical discharge at a distant location. Following Norton’s ground wave principles, EM wave radiation (EMR) runs parallel to the Earth’s surface. Energy in an EMR wave can move through the air and be focused to create a spark at a distant location, focused by a receiver to generate a local electrical discharge. This local discharge can be amplified and stored but also has the propensity to initiate another EMR wave. In addition to typical EM waves, lightning is also associated with atmospheric events, trans-ionospheric pulse pairs, the most powerful natural EMR signal on the planet. With each lightning strike, regardless of global position, it generates naturally occurring pulse-pairs that are emitted towards space within a narrow cone. An EMR wave can self-propagate, travel at the speed of light, and, if polarized, contain vector properties. If this reflective pulse could be directed by design through structures that have increased probabilities for lighting strikes, it could theoretically travel near the surface of the Earth at light speed towards a selected receiver for local transformation into electrical energy. Through research, there are several influencing parameters that could be modified to model, test, and increase the potential for adopting this technology towards the goal of developing a global grid that utilizes natural sources of energy.

Keywords: electricity, sparkgap, wireless, electromagnetic

Procedia PDF Downloads 182
2187 Machine Learning Automatic Detection on Twitter Cyberbullying

Authors: Raghad A. Altowairgi

Abstract:

With the wide spread of social media platforms, young people tend to use them extensively as the first means of communication due to their ease and modernity. But these platforms often create a fertile ground for bullies to practice their aggressive behavior against their victims. Platform usage cannot be reduced, but intelligent mechanisms can be implemented to reduce the abuse. This is where machine learning comes in. Understanding and classifying text can be helpful in order to minimize the act of cyberbullying. Artificial intelligence techniques have expanded to formulate an applied tool to address the phenomenon of cyberbullying. In this research, machine learning models are built to classify text into two classes; cyberbullying and non-cyberbullying. After preprocessing the data in 4 stages; removing characters that do not provide meaningful information to the models, tokenization, removing stop words, and lowering text. BoW and TF-IDF are used as the main features for the five classifiers, which are; logistic regression, Naïve Bayes, Random Forest, XGboost, and Catboost classifiers. Each of them scores 92%, 90%, 92%, 91%, 86% respectively.

Keywords: cyberbullying, machine learning, Bag-of-Words, term frequency-inverse document frequency, natural language processing, Catboost

Procedia PDF Downloads 124
2186 Mirrors and Lenses: Multiple Views on Recognition in Holocaust Literature

Authors: Kirsten A. Bartels

Abstract:

There are a number of similarities between survivor literature and Holocaust fiction for children and young adults. The paper explores three facets of the parallels of recognition found specifically between Livia Bitton-Jackson’s memoir of her experience during the Holocaust as an inmate in Auschwitz, I Have Lived a Thousand Years (1999) and Morris Glietzman series of Holocaust fiction. While Bitton-Jackson reflects on her past and Glietzman designs a fictive character, both are judicious with what they are willing to impart, only providing information about their appearance or themselves when it impacts others or when it serves a necessary purpose to the story. Another similarity lies in another critical aspect of many works of Holocaust literature – the idea of being ‘representatively Jewish’. The authors come to this idea from different angles, perhaps best explained as the difference between showing and telling, for Bitton-Jackson provides personal details, and Gleitzman constructed Felix arguably with this idea in mind. Interwoven through their journeys is a shift in perspectives on being recognized -- from wanting to be seen as individuals to being seen as Jew. With this, being Jewish takes on different meaning, both youths struggle with being labeled as something they do not truly understand, and may have not truly identified with, from a label, to a death warrant. With survivor literature viewed as the most credible and worthwhile type of Holocaust literature and Holocaust fiction is often seen as the least (with children’s and young-adult being the lowest form) the similarities in approaches to telling the stories may go overlooked or be undervalued. This paper serves as an exploration in the some of parallel messages shared between the two.

Keywords: holocaust fiction, Holocaust literature, representatively Jewish, survivor literature

Procedia PDF Downloads 159
2185 Geometric Intuition and Formalism in Passing from Indivisibles to Infinitesimals: Pascal and Leibniz

Authors: Remus Titiriga

Abstract:

The paper focuses on Pascal's indivisibles evolving to Leibniz's infinitesimals. It starts with parallel developments by the two savants in Combinatorics (triangular numbers for Pascal and harmonic triangles for Leibniz) and their implication in determining the sum of mathematical series. It follows with a focus on the geometrical contributions of Pascal. He considered the cycloid and other mechanical curves the epitome of geometric comprehensibility in a series of challenging problems he posed to the mathematical world. Pascal provided the solutions in 1658, in a volume published under the pseudonym of Dettonville, using indivisibles and ratios between curved and straight lines. In the third part, the research follows the impact of this volume on Leibniz as the initial impetus for the elaboration of modern calculus as an algorithmic method disjoint of geometrical intuition. Then paper analyses the further steps and proves that Leibniz's developments relate to his philosophical frame (the search for a characteristic Universalis, the consideration of principle of continuity or the rule of sufficient reason) different from Pascal's and impacting mathematical problems and their solutions. At this stage in Leibniz's evolution, the infinitesimals replaced the indivisibles proper. The last part of the paper starts with speculation around "What if?". Could Pascal, if he lived more, accomplish the same feat? The document uses Pascal's reconstructed philosophical frame to formulate a positive answer. It also proposes to teach calculus with indivisibles and infinitesimals mimicking Pascal and Leibniz's achievements.

Keywords: indivisibles, infinitesimals, characteristic triangle, the principle of continuity

Procedia PDF Downloads 127
2184 A Quasi Z-Source Based Full Bridge Isolated DC-DC Converter as a Power Module for PV System Connected to HVDC Grid

Authors: Xinke Huang, Huan Wang, Lidong Guo, Changbin Ju, Runbiao Liu, Guoen Cao, Yibo Wang, Honghua Xu

Abstract:

Grid connected photovoltaic (PV) power system is to be developed in the direction of large-scale, clustering. Large-scale PV generation systems connected to HVDC grid have many advantages compared to its counterpart of AC grid, and DC connection is the tendency. DC/DC converter as the most important device in the system, has become one of the hot spots recently. The paper proposes a Quasi Z-Source(QZS) based Boost Full Bridge Isolated DC/DC Converter(BFBIC) topology as a basis power module and combination through input parallel output series(IPOS) method to improve power capacity and output voltage to match with the HVDC grid. The topology has both traditional voltage source and current source advantages, it permit the H-bridge short through and open circuit, which adopt utility duty cycle control and achieved input current and output voltage balancing through input current sharing control strategy. A ±10kV/200kW system model is built in MATLAB/SIMULINK to verify the proposed topology and control strategy.

Keywords: PV Generation System, Cascaded DC/DC converter, HVDC, Quasi Z Source Converter

Procedia PDF Downloads 385
2183 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review

Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie

Abstract:

The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.

Keywords: privacy paradox, self-disclosure, privacy attitude, privacy behavior, social networking sites

Procedia PDF Downloads 148
2182 The Analgesic Effect of Electroacupuncture in a Murine Fibromyalgia Model

Authors: Bernice Jeanne Lottering, Yi-Wen Lin

Abstract:

Introduction: Chronic pain has a definitive lack of objective parameters in the measurement and treatment efficacy of diseases such as Fibromyalgia (FM). Persistent widespread pain and generalized tenderness are the characteristic symptoms affecting a large majority of the global population, particularly females. This disease has indicated a refractory tendency to conventional treatment ventures, largely resultant from a lack of etiological and pathogenic understanding of the disease development. Emerging evidence indicates that the central nervous system (CNS) plays a critical role in the amplification of pain signals and the neurotransmitters associated therewith. Various stimuli have been found to activate the channels existent on nociceptor terminals, thereby actuating nociceptive impulses along the pain pathways. The transient receptor potential vanalloid 1 (TRPV1) channel functions as a molecular integrator for numerous sensory inputs, such as nociception, and was explored in the current study. Current intervention approaches face a multitude challenges, ranging from effective therapeutic interventions to the limitation of pathognomonic criteria resultant from incomplete understanding and partial evidence on the mechanisms of action of FM. It remains unclear whether electroacupuncture (EA) plays an integral role in the functioning of the TRPV1 pathway, and whether or not it can reduce the chronic pain induced by FM. Aims: The aim of this study was to explore the mechanisms underlying the activation and modulation of the TRPV1 channel pathway in a cold stress model of FM applied to a murine model. Furthermore, the effect of EA in the treatment of mechanical and thermal pain, as expressed in FM was also to be investigated. Methods: 18 C57BL/6 wild type and 6 TRPV1 knockout (KO) mice, aged 8-12 weeks, were exposed to an intermittent cold stress-induced fibromyalgia-like pain model, with or without EA treatment at ZusanLi ST36 (2Hz/20min) on day 3 to 5. Von Frey and Hargreaves behaviour tests were implemented in order to analyze the mechanical and thermal pain thresholds on day 0, 3 and 5 in control group (C), FM group (FM), FM mice with EA treated group (FM + EA) and FM in KO group. Results: An increase in mechanical and thermal hyperalgesia was observed in the FM, EA and KO groups when compared to the control group. This initial increase was reduced in the EA group, which directs focus at the treatment efficacy of EA in nociceptive sensitization, and the analgesic effect EA has attenuating FM associated pain. Discussion: An increase in the nociceptive sensitization was observed through higher withdrawal thresholds in the von Frey mechanical test and the Hargreaves thermal test. TRPV1 function in mice has been scientifically associated with these nociceptive conduits, and the increased behaviour test results suggest that TRPV1 upregulation is central to the FM induced hyperalgesia. This data was supported by the decrease in sensitivity observed in results of the TRPV1 KO group. Moreover, the treatment of EA showed a decrease in this FM induced nociceptive sensitization, suggesting TRPV1 upregulation and overexpression can be attenuated by EA at bilateral ST36. This evidence compellingly implies that the analgesic effect of EA is associated with TRPV1 downregulation.

Keywords: fibromyalgia, electroacupuncture, TRPV1, nociception

Procedia PDF Downloads 135
2181 Biofilm Formation Due to the Proteome Changes Of Enterococcus Faecium in Response to Sub-Mic of Gentamicin

Authors: Amin Abbasi, Mahdi Asghari Ozma

Abstract:

Background and Objective:Enterococcus faecium is a normal flora of the human gastrointestinal tract that causes infection in the host body under conditions such as biofilm formation, in which the use of antibiotics causes changes in these pathogenic mechanisms. In this study, we aimed to evaluate comprehensively the changes in E.faecium when exposed to sub-MIC of the gentamicin,especiallythe biofilm formation rate. Materials and Methods: For this study, the keywords "Enterococcus faecium ", "Biofilm", and "Gentamicin" in the databases PubMed, Google Scholar, Sid, and MagIran between 2015 and 2021 were searched, and 14 articles were chosen, studied, and analyzed. Results: Gentamicin significantly had increased biofilm formation in most of the isolates in the studies. Increased expression of the genes (efaA and esp) and proteins involved in biofilm formation and decreased expression of the genes (gelE and cylA) involved in spreading and proteins involved in metabolism and cell division in E.faecium were the most significant cause of the biofilm formation, which were increased in sub-MIC gentamicin-treated situation. Conclusion: Inadequate use of gentamicin intensify biofilm formation of E.faecium, which can make the treatment of infections caused by this bacterium difficult.

Keywords: biofilm, enterococcus faecium, gentamicin, proteome

Procedia PDF Downloads 105
2180 [Keynote Talk]: Software Reliability Assessment and Fault Tolerance: Issues and Challenges

Authors: T. Gayen

Abstract:

Although, there are several software reliability models existing today there does not exist any versatile model even today which can be used for the reliability assessment of software. Complex software has a large number of states (unlike the hardware) so it becomes practically difficult to completely test the software. Irrespective of the amount of testing one does, sometimes it becomes extremely difficult to assure that the final software product is fault free. The Black Box Software Reliability models are found be quite uncertain for the reliability assessment of various systems. As mission critical applications need to be highly reliable and since it is not always possible to ensure the development of highly reliable system. Hence, in order to achieve fault-free operation of software one develops some mechanism to handle faults remaining in the system even after the development. Although, several such techniques are currently in use to achieve fault tolerance, yet these mechanisms may not always be very suitable for various systems. Hence, this discussion is focused on analyzing the issues and challenges faced with the existing techniques for reliability assessment and fault tolerance of various software systems.

Keywords: black box, fault tolerance, failure, software reliability

Procedia PDF Downloads 422
2179 Paradigms of Assessment, Valuation and Quantification to Trade Ecosystem Services: A Review Focusing on Mangroves and Wetlands

Authors: Rama Seth, Luise Noring, Pratim Majumdar

Abstract:

Based on an extensive literature review, this paper presents distinct approaches to value, quantify and trade ecosystem services, with particular emphasis on services provided by mangroves and wetlands. Building on diverse monetary and market-based systems for the improved allocation of natural resources, such trading and exchange-based methods can help tackle the degradation of ecosystem services in a more targeted and structured manner than achievable with stand-alone policy and administrative regulations. Using various threads of literature, the paper proposes a platform that serves as the skeletal foundation for developing an efficient global market for ecosystem services trading. The paper bridges a significant research and practice gap by recommending how to establish an equilibrium in the biosphere via trading mechanisms while also discovering other research gaps and future research potential in the domain of ecosystem valuation.

Keywords: environment, economics, mangroves, wetlands, markets, ESG, global capital, climate investments, valuation, ecosystem services

Procedia PDF Downloads 238
2178 The Obstacles of Applying Electronic Administration at the University of Tabuk from Its Academic Leaders' Perspectives

Authors: Saud Eid Alanazi

Abstract:

The study aimed at recognizing the obstacles of applying of Electronic Administration (e-administration), which refers to any of a number of mechanisms which convert what in a traditional office are paper processes into electronic processes, with the goal being to create a paperless office and improve productivity and performance at the University of Tabuk from its Academic Leaders' Perspectives. The sample of the study consisted of (98) members from deans, vice deans and head of departments from different specialization, gender and position. For achieving the aim of the study, a questionnaire was developed including (45) items distributed into three domains (administrative, human and technical obstacles) . By using appropriate statistical methods to analyze the information, the results indicated that the administrative obstacles domain came in the first rank with a high degree, and the human and technical obstacles came at the second rank with a moderate degree. The study also showed that there were no statistically significant differences attributed to the variables of the members (specialization, gender and position).

Keywords: administration, electronic administration, obstacles, technology, universities

Procedia PDF Downloads 378
2177 Design of an Ensemble Learning Behavior Anomaly Detection Framework

Authors: Abdoulaye Diop, Nahid Emad, Thierry Winter, Mohamed Hilia

Abstract:

Data assets protection is a crucial issue in the cybersecurity field. Companies use logical access control tools to vault their information assets and protect them against external threats, but they lack solutions to counter insider threats. Nowadays, insider threats are the most significant concern of security analysts. They are mainly individuals with legitimate access to companies information systems, which use their rights with malicious intents. In several fields, behavior anomaly detection is the method used by cyber specialists to counter the threats of user malicious activities effectively. In this paper, we present the step toward the construction of a user and entity behavior analysis framework by proposing a behavior anomaly detection model. This model combines machine learning classification techniques and graph-based methods, relying on linear algebra and parallel computing techniques. We show the utility of an ensemble learning approach in this context. We present some detection methods tests results on an representative access control dataset. The use of some explored classifiers gives results up to 99% of accuracy.

Keywords: cybersecurity, data protection, access control, insider threat, user behavior analysis, ensemble learning, high performance computing

Procedia PDF Downloads 118
2176 Classification of Land Cover Usage from Satellite Images Using Deep Learning Algorithms

Authors: Shaik Ayesha Fathima, Shaik Noor Jahan, Duvvada Rajeswara Rao

Abstract:

Earth's environment and its evolution can be seen through satellite images in near real-time. Through satellite imagery, remote sensing data provide crucial information that can be used for a variety of applications, including image fusion, change detection, land cover classification, agriculture, mining, disaster mitigation, and monitoring climate change. The objective of this project is to propose a method for classifying satellite images according to multiple predefined land cover classes. The proposed approach involves collecting data in image format. The data is then pre-processed using data pre-processing techniques. The processed data is fed into the proposed algorithm and the obtained result is analyzed. Some of the algorithms used in satellite imagery classification are U-Net, Random Forest, Deep Labv3, CNN, ANN, Resnet etc. In this project, we are using the DeepLabv3 (Atrous convolution) algorithm for land cover classification. The dataset used is the deep globe land cover classification dataset. DeepLabv3 is a semantic segmentation system that uses atrous convolution to capture multi-scale context by adopting multiple atrous rates in cascade or in parallel to determine the scale of segments.

Keywords: area calculation, atrous convolution, deep globe land cover classification, deepLabv3, land cover classification, resnet 50

Procedia PDF Downloads 135
2175 Influence of Cucurbitacin-Containing Phytonematicides on Growth of Rough Lemon (Citrus jambhiri)

Authors: Raisibe V. Mathabatha, Phatu W. Mashela, Nehemiah M. Mokgalong

Abstract:

Occasional incidence of phytotoxicity in Nemarioc-BL and Nemafric-AL phytonematicides to crops raises credibility challenges that could negate their registration as commercial products. Responses of plants to phytonematicides are characterized by the existence of stimulation, neutral and inhibition phases, with the mid-point of the former being referred to as the Mean Concentration Stimulation Point (MSCP = Dm + Rh/2). The objective of this study was to determine the MCSP and the overall sensitivity (∑k) of Nemarioc-AL and Nemafric-BL phytonematicides to rough lemon seedling rootstocks using the Curve-fitting Allelochemical Response Dosage (CARD) computer-based model. Two parallel greenhouse experiments were initiated, with seven dilutions of each phytonematicide arranged in a randomised complete block design, replicated nine times. Six-month-old rough lemon seedlings were transplanted into 20-cm-diameter plastic pots, filled with steam-pasteurised river sand (300°C for 3 h) and Hygromix-T growing mixture. Treatments at 0, 2, 4, 8, 16, 32 and 164% dilutions were applied weekly at 300 ml/plant. At 84 days after the treatments, analysis of variance-significant plant variables was subjected to the CARD model to generate appropriate biological indices. Computed MCSP values for Nemarioc-AL and Nemafric-BL phytonematicides on rough lemon were 29 and 38%, respectively, whereas ∑k values were 1 and 0, respectively. At the applied concentrations, rough lemon seedlings were highly sensitive to Nemarioc-AL and Nemafric-BL phytonematicides.

Keywords: crude extracts, cucurbitacins, effective microbes, fruit extracts

Procedia PDF Downloads 141
2174 Thermal Performance of Plate-Fin Heat Sink with Lateral Perforation

Authors: Sakkarin Chingulpitak, Somchai Wongwises

Abstract:

Over the past several decades, the development of electronic devices has led to higher performance. Therefore, an electronic cooling system is important for the electronic device. A heat sink which is a part of the electronic cooling system is continuously studied in the research field to enhance the heat transfer. To author’s best knowledge, there have been only a few articles which reported the thermal performance of plate-fin heat sink with perforation. This research aims to study on the flow and heat transfer characteristics of the solid-fin heat sink (SFHS) and laterally perforated plate-fin heat sink (LAP-PFHS). The SFHS and LAP-PFHSs are investigated on the same fin dimensions. The LAP-PFHSs are performed with a 27 perforation number and two different diameters of circular perforation (3 mm and 5 mm). The experimental study is conducted under various Reynolds numbers from 900 to 2,000 and the heat input of 50W. The experimental results show that the LAP-PFHS with perforation diameter of 5 mm gives the minimum thermal resistance about 25% lower than SFHS. The thermal performance factor which takes into account the ratio of the Nusselt number and ratio of friction factor is used to find the suitable design parameters. The experimental results show that the LAP-PFHS with the perforation diameter of 3 mm provides the thermal performance of 15% greater than SFHS. In addition, the simulation study is presented to investigate the effect of the air flow behavior inside the perforation on the thermal performance of LAP-PFHS.

Keywords: heat sink, parallel flow, circular perforation, non-bypass flow

Procedia PDF Downloads 144
2173 Fault Detection and Isolation in Sensors and Actuators of Wind Turbines

Authors: Shahrokh Barati, Reza Ramezani

Abstract:

Due to the countries growing attention to the renewable energy producing, the demand for energy from renewable energy has gone up among the renewable energy sources; wind energy is the fastest growth in recent years. In this regard, in order to increase the availability of wind turbines, using of Fault Detection and Isolation (FDI) system is necessary. Wind turbines include of various faults such as sensors fault, actuator faults, network connection fault, mechanical faults and faults in the generator subsystem. Although, sensors and actuators have a large number of faults in wind turbine but have discussed fewer in the literature. Therefore, in this work, we focus our attention to design a sensor and actuator fault detection and isolation algorithm and Fault-tolerant control systems (FTCS) for Wind Turbine. The aim of this research is to propose a comprehensive fault detection and isolation system for sensors and actuators of wind turbine based on data-driven approaches. To achieve this goal, the features of measurable signals in real wind turbine extract in any condition. The next step is the feature selection among the extract in any condition. The next step is the feature selection among the extracted features. Features are selected that led to maximum separation networks that implemented in parallel and results of classifiers fused together. In order to maximize the reliability of decision on fault, the property of fault repeatability is used.

Keywords: FDI, wind turbines, sensors and actuators faults, renewable energy

Procedia PDF Downloads 395
2172 Effect Mechanisms of Aromatic Plants: Effects on Intestinal Health and Broiler Feeding

Authors: Ozlem Durna Aydin, Gultekin Yildiz

Abstract:

Antibiotics are microbial metabolites with low molecular weight produced by fungi and algae, inhibiting the development of other microorganisms even in low growth. Antibiotics have been used as growth factors in animal feeds for many years. They prohibited; because of increased residue problem and increased resistance to antibiotics in bacteria due to prolonged use. Aromatic plants and extracts have attracted the attention of scientists nowadays due to positive reasons such as confidence of the community to the products those are coming from nature, desire to consume, and no residue problems. Plant extracts are obtained from aromatic plants, and they come forward with antifungal, antibacterial, antiviral, antioxidant and antilipidemic properties. It has been stated that intestinal histomorphology and microbiosis are positively affected by the use of plant extract in feeds. In the present day, aromatic plants and extracts are a remarkable research field with intriguing unknowns in the field of animal nutrition, and they continue to exist in the journal in vitro and in vivo studies.

Keywords: aromatic plant, broilers, extract mechanism of action, intestinal health

Procedia PDF Downloads 160
2171 Relay Mining: Verifiable Multi-Tenant Distributed Rate Limiting

Authors: Daniel Olshansky, Ramiro Rodrıguez Colmeiro

Abstract:

Relay Mining presents a scalable solution employing probabilistic mechanisms and crypto-economic incentives to estimate RPC volume usage, facilitating decentralized multitenant rate limiting. Network traffic from individual applications can be concurrently serviced by multiple RPC service providers, with costs, rewards, and rate limiting governed by a native cryptocurrency on a distributed ledger. Building upon established research in token bucket algorithms and distributed rate-limiting penalty models, our approach harnesses a feedback loop control mechanism to adjust the difficulty of mining relay rewards, dynamically scaling with network usage growth. By leveraging crypto-economic incentives, we reduce coordination overhead costs and introduce a mechanism for providing RPC services that are both geopolitically and geographically distributed.

Keywords: remote procedure call, crypto-economic, commit-reveal, decentralization, scalability, blockchain, rate limiting, token bucket

Procedia PDF Downloads 50