Search results for: writing DNA code from scratch
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2204

Search results for: writing DNA code from scratch

764 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques

Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar

Abstract:

This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.

Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI

Procedia PDF Downloads 85
763 Analysis of the Interventions Performed in Pediatric Cardiology Unit Based on Nursing Interventions Classification (NIC-6th): A Pilot Study

Authors: Ji Wen Sun, Nan Ping Shen, Yi Bei Wu

Abstract:

This study used Nursing Interventions Classification (NIC-6th) to identify the interventions performed in a pediatric cardiology unit, and then to analysis its frequency, time and difficulty, so as to give a brief review on what our nurses have done. The research team selected a 35 beds pediatric cardiology unit, and drawn all the nursing interventions in the nursing record from our hospital information system (HIS) from 1 October 2015 to 30 November 2015, using NIC-6th to do the matching and then counting their frequencies. Then giving each intervention its own time and difficulty code according to NIC-6th. The results showed that nurses in pediatric cardiology unit performed totally 43 interventions from 5394 statements, and most of them were in RN(basic) education level needed and less than 15 minutes time needed. There still had some interventions just needed by a nursing assistant but done by nurses, which should call for nurse managers to think about the suitable staffing. Thus, counting the summary of the product of frequency, time and difficulty for each intervention of each nurse can know one's performance. Acknowledgement Clinical Management Optimization Project of Shanghai Shen Kang Hospital Development Center (SHDC2014615); Hundred-Talent Program of Construction of Nursing Plateau Discipline (hlgy16073qnhb).

Keywords: nursing interventions, nursing interventions classification, nursing record, pediatric cardiology

Procedia PDF Downloads 358
762 Shear Strengthening of RC T-Beams by Means of CFRP Sheets

Authors: Omar A. Farghal

Abstract:

This research aimed to experimentally and analytically investigate the contribution of bonded web carbon fiber reinforced polymer (CFRP) sheets to the shear strength of reinforced concrete (RC) T-beams. Two strengthening techniques using CFRP strips were applied along the shear-span zone: the first one is vertical U-jacket and the later is vertical strips bonded to the beam sides only. Fibers of both U-jacket and side sheets were vertically oriented (θ = 90°). Test results showed that the strengthening technique with U-jacket CFRP sheets improved the shear strength particularly. Three mechanisms of failure were recognized for the tested beams depending upon the end condition of the bonded CFRP sheet. Although the failure mode for the different beams was a brittle one, the strengthened beams provided with U-jacket CFRP sheets showed more or less a ductile behavior at a higher loading level up to a load level just before failure. As a consequence, these beams approved an acceptable enhancement in the structural ductility. Moreover, the obtained results concerning both the strains induced in the CFRP sheets and the maximum loads are used to study the applicability of the analytical models proposed in this study (ACI code) to predict: the nominal shear strength of the strengthened beams.

Keywords: carbon fiber reinforced polymer, wrapping, ductility, shear strengthening

Procedia PDF Downloads 250
761 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach

Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh

Abstract:

Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system.  This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.

Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition

Procedia PDF Downloads 377
760 Integrating Flipped Instruction to Enhance Second Language Acquisition

Authors: Borja Ruiz de Arbulo Alonso

Abstract:

This paper analyzes the impact of flipped instruction in adult learners of Spanish as a second language in a face-to-face course at Boston University. Given the limited amount of contact hours devoted to studying world languages in the American higher education system, implementing strategies to free up classroom time for communicative language practice is key to ensure student success in their learning process. In an effort to improve the way adult learners acquire a second language, this paper examines the role that regular pre-class and web-based exposure to Spanish grammar plays in student performance at the end of the academic term. It outlines different types of web-based pre-class activities and compares this approach to more traditional classroom practice. To do so, this study works for three months with two similar groups of adult learners in an intermediate-level Spanish class. Both groups use the same course program and have the same previous language experience, but one receives an additional set of instructor-made online materials containing a variety of grammar explanations and online activities that need to be reviewed before attending class. Since the online activities cover material and concepts that have not yet been studied in class, students' oral and written production in both groups is measured by means of a writing activity and an audio recording at the end of the three-month period. These assessments will ascertain the effects of exposing the control group to the grammar of the target language prior to each lecture throughout and demonstrate where flipped instruction helps adult learners of Spanish achieve higher performance, but also identify potential problems.

Keywords: educational technology, flipped classroom, second language acquisition, student success

Procedia PDF Downloads 116
759 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination

Authors: Nusret Mesut Sahin

Abstract:

Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.

Keywords: Hrant Dink, Armenian, journalist, assassination

Procedia PDF Downloads 149
758 A Study of Binding Methods and Techniques in Safavid Era Emphasizing on Iran Shahnamehs (16-18th Century AD/10-12th Century AH)

Authors: Ashrafosadat Mousavi Laer, Elaheh Moravej

Abstract:

The art of binding was simple and elementary at the beginning of Islam. This art thrived gradually and continued its development as an independent art. Identification of the binding techniques and used materials in covers and investigation of the arrays give us indexes for the better identification of different doctrines and methods of that time. The catalogers of the manuscripts usually pay attention to four items: gender, color, art elegances, injury, and exquisiteness of the cover. The criterion for classification of the covers is their art nature and gender. 15th century AD (9th century AH) was the period of the binding art development in which the most beautiful covers were produced by the so-called method of ‘burning’. At 16th century AD (10th century AH), in Safavid era, art changed completely and a fundamental evolution occurred in the technique and method of binding. The greatest change in this art was the extensive use of stamp that was made mostly of steel and copper. Theses stamps were presses against leather. These covers were called ‘beat’. In this paper, writing and bookbinding of about 32 Shahnamehs of Safavid era available in the Iranian libraries and museums are studied. An analytical-statistical study shows that four methods have been used including beat, burning, mosaic, and oily. 69 percent of the covers of these copies are cardboards with a leathery coating (goatskin) and have been produced by burning and beat methods. Its reasons are that these two methods have been common methods in Safavid era and performing them was only feasible on leather and the most desirable and commonly used leather of that time was goatskin which was the best option for cover legend durability and preserving the book and it was more durable because it had been made of goat skin. In addition, it had prepared a suitable opportunity for the binding artist’s creativity and innovation.

Keywords: Shahnameh, Safavid era, bookbinding, beat cover, burning cover

Procedia PDF Downloads 233
757 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security

Authors: James Andrew Fitzjohn

Abstract:

This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.

Keywords: quantum computing, encryption, RSA, roadmap, real world

Procedia PDF Downloads 121
756 Analysis of Cyber Activities of Potential Business Customers Using Neo4j Graph Databases

Authors: Suglo Tohari Luri

Abstract:

Data analysis is an important aspect of business performance. With the application of artificial intelligence within databases, selecting a suitable database engine for an application design is also very crucial for business data analysis. The application of business intelligence (BI) software into some relational databases such as Neo4j has proved highly effective in terms of customer data analysis. Yet what remains of great concern is the fact that not all business organizations have the neo4j business intelligence software applications to implement for customer data analysis. Further, those with the BI software lack personnel with the requisite expertise to use it effectively with the neo4j database. The purpose of this research is to demonstrate how the Neo4j program code alone can be applied for the analysis of e-commerce website customer visits. As the neo4j database engine is optimized for handling and managing data relationships with the capability of building high performance and scalable systems to handle connected data nodes, it will ensure that business owners who advertise their products at websites using neo4j as a database are able to determine the number of visitors so as to know which products are visited at routine intervals for the necessary decision making. It will also help in knowing the best customer segments in relation to specific goods so as to place more emphasis on their advertisement on the said websites.

Keywords: data, engine, intelligence, customer, neo4j, database

Procedia PDF Downloads 189
755 Chromite Exploration Using Electrical Resistivity Tomography in Ingessana Hill, Blue Nile State, Sudan

Authors: Mohamed A. Mohamed-Ali, Jannis Simos, Khalid M. Kheiralla

Abstract:

The Ingessana hills in the southern Blue Nile of Sudan are part of the southern sector of the NE-SW trending ophiolithic belt of the Arab-Nubian Shield with mid-neoproterozoic age. The rocks are mainly serpentinized and in parts highly silicified dunites especially towards the contact with the intruding Bau granite. A promising chromite mineralization zones in the area tend to be generally associated with NE-SW trending shear-zones. A detailed geophysical survey employing electrical resistivity tomography (ERT) at 34 lines were carried out over a zone of a known chromite mineralization to test feasibility of detecting and delineating the ore (if exist) and accordingly facilitate the positioning of exploratory drill holes. ERT sections were inverted with smooth constraints inversion code where the contacts between the granite and the ultramafics are showing up clearly. The continuity of mineralization along the contact is not well confirmed. However, the low-resistivity anomalies are probably recognized as potential chromite mineralization zones. These anomalies represent prime targets for further exploration by drilling, trenching or shallow pits. If the results of the drilling or excavations are positive, small open pit exploitations may produce important tonnages of chromite.

Keywords: chromite exploration, ERT, Ingessana Hills, inversion

Procedia PDF Downloads 380
754 The Model Establishment and Analysis of TRACE/FRAPTRAN for Chinshan Nuclear Power Plant Spent Fuel Pool

Authors: J. R. Wang, H. T. Lin, Y. S. Tseng, W. Y. Li, H. C. Chen, S. W. Chen, C. Shih

Abstract:

TRACE is developed by U.S. NRC for the nuclear power plants (NPPs) safety analysis. We focus on the establishment and application of TRACE/FRAPTRAN/SNAP models for Chinshan NPP (BWR/4) spent fuel pool in this research. The geometry is 12.17 m × 7.87 m × 11.61 m for the spent fuel pool. In this study, there are three TRACE/SNAP models: one-channel, two-channel, and multi-channel TRACE/SNAP model. Additionally, the cooling system failure of the spent fuel pool was simulated and analyzed by using the above models. According to the analysis results, the peak cladding temperature response was more accurate in the multi-channel TRACE/SNAP model. The results depicted that the uncovered of the fuels occurred at 2.7 day after the cooling system failed. In order to estimate the detailed fuel rods performance, FRAPTRAN code was used in this research. According to the results of FRAPTRAN, the highest cladding temperature located on the node 21 of the fuel rod (the highest node at node 23) and the cladding burst roughly after 3.7 day.

Keywords: TRACE, FRAPTRAN, BWR, spent fuel pool

Procedia PDF Downloads 351
753 A Study for the Effect of Fire Initiated Location on Evacuation Success Rate

Authors: Jin A Ryu, Hee Sun Kim

Abstract:

As the number of fire accidents is gradually raising, many studies have been reported on evacuation. Previous studies have mostly focused on evaluating the safety of evacuation and the risk of fire in particular buildings. However, studies on effects of various parameters on evacuation have not been nearly done. Therefore, this paper aims at observing evacuation time under the effect of fire initiated location. In this study, evacuation simulations are performed on a 5-floor building located in Seoul, South Korea using the commercial program, Fire Dynamics Simulator with Evacuation (FDS+EVAC). Only the fourth and fifth floors are modeled with an assumption that fire starts in a room located on the fourth floor. The parameter for evacuation simulations is location of fire initiation to observe the evacuation time and safety. Results show that the location of fire initiation is closer to exit, the more time is taken to evacuate. The case having the nearest location of fire initiation to exit has the lowest ratio of successful occupants to the total occupants. In addition, for safety evaluation, the evacuation time calculated from computer simulation model is compared with the tolerable evacuation time according to code in Japan. As a result, all cases are completed within the tolerable evacuation time. This study allows predicting evacuation time under various conditions of fire and can be used to evaluate evacuation appropriateness and fire safety of building.

Keywords: fire simulation, evacuation simulation, temperature, evacuation safety

Procedia PDF Downloads 343
752 Gender, Language and Body: Literary Representations in Popular Culture Narratives

Authors: Eirini Arvanitaki

Abstract:

Romance has incrementally grown in popularity over the last century. The first Mills & Boon romance novel was published in 1909 and since then romance has not only survived but it has become a long standing genre. There are several reasons behind its durability and success. First, its ability to please and appeal to a mass audience. Romance novels are products of commercial success situated in large scale production, especially if one takes into account the high volume of romance novels published, translated and distributed all around the world every month. Second, what has also contributed to keeping the romance genre alive is the content of the books and their effect on the reader. These are stories of two heterosexual individuals who meet, fall in love, face obstacles and successfully overcome them. Through the love plots, the books address anxieties, concerns and everyday troubles that the average reader can identify with. Additionally, the romance novel is a means of escapism from everyday life and responsibilities as well as a short-lived opportunity to enjoy personal time/space and focus on one’s self. Third, the genre’s ability to adapt to the periods and societies in which it is published has also assisted in prolonging its longevity. This paper discusses the ways in which popular romance authors write and engage with the body. Despite the claim that popular romance narratives adjust their contents in accordance with different time periods and social phenomena, the paper highlights the dissimilarities between writing the female and male body and suggests that women romance writers are yet to break free from phallogocentric law. The examination of the projections of the body and the language used to describe it indicates that these narratives are flexible enough to adjust to twenty-first century but only within the limits of their own conventionality.

Keywords: body, gender, language, literary representations, popular romance narratives, taboo

Procedia PDF Downloads 106
751 A Study of Adaptive Fault Detection Method for GNSS Applications

Authors: Je Young Lee, Hee Sung Kim, Kwang Ho Choi, Joonhoo Lim, Sebum Chun, Hyung Keun Lee

Abstract:

A purpose of this study is to develop efficient detection method for Global Navigation Satellite Systems (GNSS) applications based on adaptive estimation. Due to dependence of radio frequency signals, GNSS measurements are dominated by systematic errors in receiver’s operating environment. Thus, to utilize GNSS for aerospace or ground vehicles requiring high level of safety, unhealthy measurements should be considered seriously. For the reason, this paper proposes adaptive fault detection method to deal with unhealthy measurements in various harsh environments. By the proposed method, the test statistics for fault detection is generated by estimated measurement noise. Pseudorange and carrier-phase measurement noise are obtained at time propagations and measurement updates in process of Carrier-Smoothed Code (CSC) filtering, respectively. Performance of the proposed method was evaluated by field-collected GNSS measurements. To evaluate the fault detection capability, intentional faults were added to measurements. The experimental result shows that the proposed detection method is efficient in detecting unhealthy measurements and improves the accuracy of GNSS positioning under fault occurrence.

Keywords: adaptive estimation, fault detection, GNSS, residual

Procedia PDF Downloads 565
750 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 399
749 Machine Learning Approach for Mutation Testing

Authors: Michael Stewart

Abstract:

Mutation testing is a type of software testing proposed in the 1970s where program statements are deliberately changed to introduce simple errors so that test cases can be validated to determine if they can detect the errors. Test cases are executed against the mutant code to determine if one fails, detects the error and ensures the program is correct. One major issue with this type of testing was it became intensive computationally to generate and test all possible mutations for complex programs. This paper used reinforcement learning and parallel processing within the context of mutation testing for the selection of mutation operators and test cases that reduced the computational cost of testing and improved test suite effectiveness. Experiments were conducted using sample programs to determine how well the reinforcement learning-based algorithm performed with one live mutation, multiple live mutations and no live mutations. The experiments, measured by mutation score, were used to update the algorithm and improved accuracy for predictions. The performance was then evaluated on multiple processor computers. With reinforcement learning, the mutation operators utilized were reduced by 50 – 100%.

Keywords: automated-testing, machine learning, mutation testing, parallel processing, reinforcement learning, software engineering, software testing

Procedia PDF Downloads 192
748 Geotechnical Investigation of Soil Foundation for Ramps of Dawar El-Tawheed Bridge in Jizan City, Kingdom of Saudi Arabia

Authors: Ali H. Mahfouz, Hossam E. M. Sallam, Abdulwali Wazir, Hamod H. Kharezi

Abstract:

The soil profile at site of the bridge project includes soft fine grained soil layer located between 5.0 m to 11.0 m in depth, it has high water content, low SPT no., and low bearing capacity. The clay layer induces high settlement due to surcharge application of earth embankment at ramp T1, ramp T2, and ramp T3 especially at heights from 9m right 3m. Calculated settlement for embankment heights less than 3m may be accepted regarding Saudi Code for soil and foundation. The soil and groundwater at the project site comprise high contents of sulfates and chlorides of high aggressively on concrete and steel bars, respectively. Regarding results of the study, it has been recommended to use stone column piles or new technology named PCC piles as soil improvement to improve the bearing capacity of the weak layer. The new technology is cast in-situ thin wall concrete pipe piles (PCC piles), it has economically advantageous and high workability. The technology can save time of implementation and cost of application is almost 30% of other types of piles.

Keywords: soft foundation soil, bearing capacity, bridge ramps, soil improvement, geogrid, PCC piles

Procedia PDF Downloads 389
747 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 409
746 Fake News During COVID-19 Pandemic: An Overview from A Legal Perspective

Authors: Ida Shafinaz Mohamed Kamil, Mohd Dahlan Abdul Malek

Abstract:

Today, the whole world is facing a catastrophe called the novel coronavirus disease known as COVID-19. As of October 2021, it has been reported that more than 248 million cases and 5 million deaths have been recorded worldwide. In Malaysia, 2,466,663 cases were reported, with 28,876 deaths recorded on 30 October 2021. Unfortunately, the world is not only facing the COVID-19 pandemic but the COVID-19 infodemic as well, where fake news about COVID-19 disease is spreading faster and more widely than from the virus itself. The spread of fake news is amplified through various social media platforms, which is causing concern among the community. The uncertainty in understanding what fake news really is has caused difficulties and challenges in providing a solution to the hazards that it creates. This article discusses what constitutes fake news and examines the current legal framework put in place to combat fake news in Malaysia. Employing a doctrinal research methodology, this article thoroughly analyzes the relevant legal provisions under the Communications and Multimedia Act 1998, the Penal Code and the Emergency (Essential Powers) Ordinance (No.2) 2021, which came into force on 12 March 2021 as well as related case laws, for offenses and punishments with regards to fake news. The findings from the analysis indicate that there is still room for improvement in regulating fake news, in particular concerning COVID-19.

Keywords: fake news, legal pespective, covid 19, pendemic

Procedia PDF Downloads 78
745 Numerical Study of Steel Structures Responses to External Explosions

Authors: Mohammad Abdallah

Abstract:

Due to the constant increase in terrorist attacks, the research and engineering communities have given significant attention to building performance under explosions. This paper presents a methodology for studying and simulating the dynamic responses of steel structures during external detonations, particularly for accurately investigating the impact of incrementing charge weight on the members total behavior, resistance and failure. Prediction damage method was introduced to evaluate the damage level of the steel members based on five scenarios of explosions. Johnson–Cook strength and failure model have been used as well as ABAQUS finite element code to simulate the explicit dynamic analysis, and antecedent field tests were used to verify the acceptance and accuracy of the proposed material strength and failure model. Based on the structural response, evaluation criteria such as deflection, vertical displacement, drift index, and damage level; the obtained results show the vulnerability of steel columns and un-braced steel frames which are designed and optimized to carry dead and live load to resist and endure blast loading.

Keywords: steel structure, blast load, terrorist attacks, charge weight, damage level

Procedia PDF Downloads 359
744 Qualitative Case Studies in Reading Specialist Education

Authors: Carol Leroy

Abstract:

This presentation focuses on the analysis qualitative case studies in the graduate education of reading specialists. The presentation describes the development and application of an integrated conceptual framework for reading specialist education, drawing on Robert Stake’s work on case study research, Kenneth Zeichner’s work on professional learning, and various tools for reading assessment (e.g. the Qualitative Reading Inventory). Social constructivist theory is used to provide intersecting links between the various influences on the processes used to assess and teaching reading within the case study framework. Illustrative examples are described to show the application of the framework in reading specialist education in a teaching clinic at a large urban university. Central to education of reading specialists in this teaching clinic is the collection, analysis and interpretation of data for the design and implementation of reading and writing programs for struggling readers and writers. The case study process involves the integrated interpretation of data, which is central to qualitative case study inquiry. An emerging theme in this approach to graduate education is the ambiguity and uncertainty that governs work with the adults and children who attend the clinic for assistance. Tensions and contradictions are explored insofar as they reveal overlapping but intersecting frameworks for case study analysis in the area of literacy education. An additional theme is the interplay of multiple layers of data with a resulting depth that goes beyond the practical need of the client and toward the deeper pedagogical growth of the reading specialist. The presentation makes a case for the value of qualitative case studies in reading specialist education. Further, the use of social constructivism as a unifying paradigm provides a robustness to the conceptual framework as a tool for understanding the pedagogy that is involved.

Keywords: assessment, case study, professional education, reading

Procedia PDF Downloads 450
743 Assessment of Causes of Building Collapse in Nigeria

Authors: Olufemi Oyedele

Abstract:

Building collapse (BC) in Nigeria is becoming a regular occurrence, each recording great casualties in the number of lives and materials lost. Building collapse is a situation where building which has been completed and occupied, completed but not occupied or under construction, collapses on its own due to action or inaction of man or due to natural event like earthquake, storm, flooding, tsunami or wildfire. It is different from building demolition. There are various causes of building collapse and each case requires expert judgment to decide the cause of its collapse. Rate of building collapse is a reflection of the level of organization and control of building activities and degree of sophistication of the construction professionals in a country. This study explored the use of case study by examining the causes of six (6) collapsed buildings (CB) across Nigeria. Samples of materials from the sites of the collapsed buildings were taken for testing and analysis, while critical observations were made at the sites to note the conditions of the ground (building base). The study found out that majority of the building collapses in Nigeria were due to poor workmanship, sub-standard building materials, followed by bad building base and poor design. The National Building Code 2006 is not effective due to lack of enforcement and the Physical Development Departments of states and Federal Capital Territory are just mere agents of corruption allowing all types of construction without building approvals.

Keywords: building collapse, concrete tests, differential settlement, integrity test, quality control

Procedia PDF Downloads 525
742 One-Dimensional Performance Improvement of a Single-Stage Transonic Compressor

Authors: A. Shahsavari, M. Nili-Ahmadabadi

Abstract:

This paper presents an innovative one-dimensional optimization of a transonic compressor based on the radial equilibrium theory by means of increasing blade loading. Firstly, the rotor blade of the transonic compressor is redesigned based on the constant span-wise deHaller number and diffusion. The code is applied to extract compressor meridional plane and blade to blade geometry containing rotor and stator in order to design blade three-dimensional view. A structured grid is generated for the numerical domain of fluid. Finer grids are used for regions near walls to capture boundary layer effects and behavior. RANS equations are solved by finite volume method for rotating zones (rotor) and stationary zones (stator). The experimental data, available for the performance map of NASA Rotor67, is used to validate the results of simulations. Then, the capability of the design method is validated by CFD that is capable of predicting the performance map. The numerical results of new geometry show about 19% increase in pressure ratio and 11% improvement in overall efficiency of the transonic stage; however, the design point mass flow rate of the new compressor is 5.7% less than that of the original compressor.

Keywords: deHaller number, one dimensional design, radial equilibrium, transonic compressor

Procedia PDF Downloads 334
741 Using Sandplay Therapy to Assess Psychological Resilience

Authors: Dan Wang

Abstract:

Sandplay therapy is a Jungian psychological therapy developed by Dora Kalff in 1956. In sandplay therapy, the client first makes a sandtray with various miniatures and then has a communication with the therapist based on the sandtray. The special method makes sandplay therapy has great assessment potential. With regarding that the core treatment hypothesis of sandplay therapy - the self-healing power, is very similar to resilience. This study tries to use sandplay to evaluate psychological resilience. Participants are 107 undergraduates recruited from three public universities in China who were required to make an initial sandtray and to complete the Ego-Resiliency Scale (ER89) respectively. First, a 28- category General Sandtray Coding Manual (GSCM) was developed based on literature on sandplay therapy. Next, using GSCM to code the 107 initial sandtrays and conducted correlation analysis and regression analysis between all GSCM categories and ER89. Results show three categories (i.e., vitality, water types, and relationships) of sandplay account for 36.6% of the variance of ego-resilience and form the four-point Likert-type Sandtray Projective Test of Resilience (SPTR). Finally, it is found that SPTR dimensions and total score all have good inter-rater reliability, ranging from 0.89 to 0.93. This study provides an alternative approach to measure psychological resilience and can help to guide clinical social work.

Keywords: sandplay therapy, psychological resilience, measurement, college students

Procedia PDF Downloads 249
740 Exergetic Analysis of Steam Turbine Power Plant Operated in Chemical Industry

Authors: F. Hafdhi, T. Khir, A. Ben Yahia, A. Ben Brahim

Abstract:

An Energetic and exergetic analysis is conducted on a Steam Turbine Power Plant of an existing Phosphoric Acid Factory. The heat recovery systems used in different parts of the plant are also considered in the analysis. Mass, thermal and exergy balances are established on the main compounds of the factory. A numerical code is established using EES software to perform the calculations required for the thermal and exergy plant analysis. The effects of the key operating parameters such as steam pressure and temperature, mass flow rate as well as seawater temperature, on the cycle performances are investigated. A maximum Exergy Loss Rate of about 72% is obtained for the melters, followed by the condensers, heat exchangers and the pumps. The heat exchangers used in the phosphoric acid unit present exergetic efficiencies around 33% while 60% to 72% are obtained for steam turbines and blower. For the explored ranges of HP steam temperature and pressure, the exergy efficiencies of steam turbine generators STGI and STGII increase of about 2.5% and 5.4% respectively. In the same way, optimum HP steam flow rate values, leading to the maximum exergy efficiencies are defined.

Keywords: steam turbine generator, energy efficiency, exergy efficiency, phosphoric acid plant

Procedia PDF Downloads 303
739 Evaluation of Digital Marketing Strategies by Behavioral Economics

Authors: Sajjad Esmaeili Aghdam

Abstract:

Economics typically conceptualizes individual behavior as the consequence of external states, for example, budgets and prices (or respective beliefs) and choices. As the main goal, we focus on the influence of a range of Behavioral Economics factors on Strategies of Digital Marketing, evaluation of strategies and deformation of it into highly prospective marketing strategies. The different forms of behavioral prospects all lead to the succeeding two main results. First, the steadiness of the economic dynamics in a currency union be contingent fatefully on the level of economic incorporation. More economic incorporation leads to more steady economic dynamics. Electronic word-of-mouth (eWOM) is “all casual communications focused at consumers through Internet-based technology connected to the usage or characteristics of specific properties and services or their venders.” eWOM can take many methods, the most significant one being online analyses. Writing this paper, 72 articles have been gathered, focusing on the title and the aim of the article from research search engines like Google Scholar, Web of Science, and PubMed. Recent research in strategic management and marketing proposes that markets should not be viewed as a given and deterministic setting, exogenous to the firm. Instead, firms are progressively abstracted as dynamic inventors of market prospects. The use of new technologies touches all spheres of the modern lifestyle. Social and economic life becomes unbearable without fast, applicable, first-class and fitting material. Psychology and economics (together known as behavioral economics) are two protruding disciplines underlying many theories in marketing. The wide marketing works papers consumers’ none balanced behavior even though behavioral biases might not continuously be steadily called or officially labeled.

Keywords: behavioral economics, digital marketing, marketing strategy, high impact strategies

Procedia PDF Downloads 175
738 Evaluation of Response Modification Factor and Behavior of Seismic Base-Isolated RC Structures

Authors: Mohammad Parsaeimaram, Fang Congqi

Abstract:

In this paper, one of the significant seismic design parameter as response modification factor in reinforced concrete (RC) buildings with base isolation system was evaluated. The seismic isolation system is a capable approach to absorbing seismic energy at the base and transfer to the substructure with lower response modification factor as compared to non-isolated structures. A response spectrum method and static nonlinear pushover analysis in according to Uniform Building Code (UBC-97), have been performed on building models involve 5, 8, 12 and 15 stories building with fixed and isolated bases consist of identical moment resisting configurations. The isolation system is composed of lead rubber bearing (LRB) was designed with help UBC-97 parameters. The force-deformation behavior of isolators was modeled as bi-linear hysteretic behavior which can be effectively used to create the isolation systems. The obtained analytical results highlight the response modification factor of considered base isolation system with higher values than recommended in the codes. The response modification factor is used in modern seismic codes to scale down the elastic response of structures.

Keywords: response modification factor, base isolation system, pushover analysis, lead rubber bearing, bi-linear hysteretic

Procedia PDF Downloads 317
737 Discrete Element Method Simulation of Crushable Pumice Sand

Authors: Sayed Hessam Bahmani, Rolsndo P. Orense

Abstract:

From an engineering point of view, pumice particles are problematic because of their crushability and compressibility due to their vesicular nature. Currently, information on the geotechnical characteristics of pumice sands is limited. While extensive empirical and laboratory tests can be implemented to characterize their behavior, these are generally time-consuming and expensive. These drawbacks have motivated attempts to study the effects of particle breakage of pumice sand through the Discrete Element Method (DEM). This method provides insights into the behavior of crushable granular material at both the micro and macro-level. In this paper, the results of single-particle crushing tests conducted in the laboratory are simulated using DEM through the open-source code YADE. This is done to better understand the parameters necessary to represent the pumice microstructure that governs its crushing features, and to examine how the resulting microstructure evolution affects a particle’s properties. The DEM particle model is then used to simulate the behavior of pumice sand during consolidated drained triaxial tests. The results indicate the importance of incorporating particle porosity and unique surface textures in the material characterization and show that interlocking between the crushed particles significantly influences the drained behavior of the pumice specimen.

Keywords: pumice sand, triaxial compression, simulation, particle breakage

Procedia PDF Downloads 237
736 Towards the Use of Software Product Metrics as an Indicator for Measuring Mobile Applications Power Consumption

Authors: Ching Kin Keong, Koh Tieng Wei, Abdul Azim Abd. Ghani, Khaironi Yatim Sharif

Abstract:

Maintaining factory default battery endurance rate over time in supporting huge amount of running applications on energy-restricted mobile devices has created a new challenge for mobile applications developer. While delivering customers’ unlimited expectations, developers are barely aware of efficient use of energy from the application itself. Thus developers need a set of valid energy consumption indicators in assisting them to develop energy saving applications. In this paper, we present a few software product metrics that can be used as an indicator to measure energy consumption of Android-based mobile applications in the early of design stage. In particular, Trepn Profiler (Power profiling tool for Qualcomm processor) has used to collect the data of mobile application power consumption, and then analyzed for the 23 software metrics in this preliminary study. The results show that McCabe cyclomatic complexity, number of parameters, nested block depth, number of methods, weighted methods per class, number of classes, total lines of code and method lines have direct relationship with power consumption of mobile application.

Keywords: battery endurance, software metrics, mobile application, power consumption

Procedia PDF Downloads 390
735 Investigation of the Possible Beneficial and Protective Effects of an Ethanolic Extract from Sarcopoterium spinosum Fruits

Authors: Hawraa Zbeeb, Hala Khalifeh, Mohamad Khalil, Francesca Storace, Francesca Baldini, Giulio Lupidi, Laura Vergani

Abstract:

Sarcopoterium spinosum, a widely distributed spiny shrub belonging to the Rosaceae family, is rich in essential and beneficial constituents. In fact, S. spinosum fruits and roots are traditionally used as herbal medicine in the eastern Mediterranean landscape, and this shrub is mentioned as a medicinal plant in a large number of ethnobotanical surveys. Aqueous root extracts from S. spinosum are used by traditional medicinal practitioners for weight loss treatment of diabetes and pain. Moreover, the anti-diabetic activity of S. spinosum root extract has been reported in different studies, but the beneficial effects of aerial parts, especially fruits, have not been elucidated yet. The aim of the present study was to investigate the in vitro antioxidant and lipid-lowering properties of an ethanolic extract from S. spinosum fruits using both hepatic (FaO) and endothelial (HECV) cells in an attempt to evaluate its possible employment as a nutraceutical supplement. First of all, in vitro spectrophotometric assays were employed to characterize the extract. The total phenol content (TPC) was evaluated by Folin–Ciocalteu spectrophotometric method and the radical scavenging activity was tested by 2,2-diphenyl-1-picrylhydrazyl (DPPH) and 2, 2'-azino-bis-3-ethylbenzothiazoline-6-sulfonic acid (ABTS) assays. After that, the beneficial effects of the extract were tested on cells. FaO cells treated for 3 hours with 0.75 mM oleate/palmitate mix (1:2 molar ratio) mimic in vitro a moderate hepato-steatosis. HECV cells exposed for 1 hour to 100 µM H₂O₂ mimic an oxidative insult leading to oxidative stress conditions. After the metabolic and oxidative insult, both cell lines were treated with increasing concentrations of the S. spinosum extract (1, 10, 25 µg/mL) for 24 hours. The results showed the S. spinosum ethanolic extract is rather rich in phenols (TPC of 18.6 mgGAE/g dry extracts). Moreover, the extract showed a good scavenging ability in vitro (IC₅₀ 15.9 µg/ml and 10.9 µg/ml measured by DPPH and ABTS assays, respectively). When the extract was tested on cells, the results showed that it could ameliorate some markers of cell dysfunction. The three concentrations of the extract led to a significant decrease in the intracellular triglyceride (TG) content in steatotic FaO cells measured by spectrophotometric assay. On the other hand, HECV cells treated with increasing concentrations of the extract did not result in a significant decrease in both lipid peroxidation measured by the Thiobarbituric Acid Reactive Substances (TBARS) assay, and in reactive oxygen species (ROS) production measured by fluorometric analysis after DCF staining. Interestingly, the ethanolic extract was able to accelerate the wound repair of confluent HECV cells with respect to H₂O₂-insulted cells as measured by T-scratch assay. Taken together, these results seem to indicate that the ethanol extract from S. spinosum fruits is rich in phenol compounds and plays considerable lipid-lowering activity in vitro on steatotic hepatocytes and accelerates wound healing repair on endothelial cells. In light of that, the ethanolic extract from S. spinosum fruits could be a potential candidate for nutraceutical applications.

Keywords: antioxidant activity, ethanolic extract, lipid-lowering activity, phenolic compounds, Sarcopoterium spinosum fruits

Procedia PDF Downloads 172