Search results for: activation code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2373

Search results for: activation code

2253 Rh(III)-Catalyzed Cross-Coupling Reaction of 8-Methylquinolines with Maleimides

Authors: Sangil Han, In Su Kim

Abstract:

Transition-metal-catalyzed C–H bond activation and its subsequent functionalization has been one of the most attractive topics in organic synthesis because of its remarkable potential for atom economy and environmental sustainability. In this addition, a variety of C(sp2)–H functionalization has been developed under metal catalysis in the past decade. Recently, much attention has been moved towards the C(sp3)–H functionalization events, which continue to be a challenging issue. In this area, directing group assisted sp3 C–H functionalization has been explored by use of amides, carboxylic acids, oximes, N-heterocycles, and etc. In particular, 8-methylquinolines have been found as good substrates for sp3 C–H functionalization due to its ability to form cyclometalated complexes. Succinimides have been recognized as privileged structural cores found in a number of bioactive natural products, pharmaceuticals, and functional materials. Furthermore, the reduced derivatives such as pyrrolidines and γ-lactams have been also found in a large number of pharmaceutical relevant molecules, thus making them one of the most important and promising compounds. We herein describe the first C(sp3)–H activation of 8-methylquinolines and subsequent functionalization with maleimides to afford various succinimide derivatives.

Keywords: C(sp3)–H activation, 8-methylquinolines, maleimides, succinimides

Procedia PDF Downloads 222
2252 Determination of Natural Logarithm of Diffusion Coefficient and Activation Energy of Thin Layer Drying Process of Ginger Rhizome Slices

Authors: Austin Ikechukwu Gbasouzor, Sam Nna Omenyi, Sabuj Malli

Abstract:

This study is an extension of the previous work done with ARS-680 Environmental Chamber. Drying is a complex operation that demands much energy and time. Drying is essentially important for preservation of ginger rhizome. Drying of ginger was modeled, and then the effective diffusion coefficient and activation energy where determined. For this purpose, the experiments were done at six levels of varied temperature ranging from (10, 20, 30, 40, 50, 60°C). The average effective diffusion coefficient for their studies samples for temperature range of 40°C to 70°C was 4.48 x10-10m²/s, 4.96 x10-10m²/s, and 5.31 x10-10m²/s for 0.8, 1.5 and 3m/s drying air velocity respectively. These values closely agreed with the values of effective diffusion coefficients obtained in these studies for the variously treated ginger rhizomes and test conducted.

Keywords: activation energy, diffusion coefficients, drying model, drying time, ginger rhizomes, moisture ratio, thin layer

Procedia PDF Downloads 166
2251 Activation of Caspase 3 by Terpenoids and Flavonoids in Cancer Cell Lines

Authors: Nusrat Masood, Vijaya Dubey, Suaib Luqman

Abstract:

Caspase 3, a member of cysteine-aspartic acid protease family, is an imperative indicator for cell death particularly when substantiating apoptosis. Thus, caspase 3 is an interesting target for the discovery and development of anticancer agent. We adopted a four level assessment of both terpenoids and flavonoids and thus experimentally performed the enzymatic assay in cell free system as well as in cancer cell line which was validated through real time expression and molecular interaction studies. A significant difference was observed with both the class of natural products indicating terpenoids as better activators of caspase 3 compared to flavonoids both in the cell free system as well as in cell lines. The expression analysis, activation constant and binding energy also correlate well with the enzyme activity. Overall, terpenoids had an unswerving effect on caspase 3 in all the tested system while flavonoids indirectly affect enzyme activity.

Keywords: Caspase 3, terpenoids, flavonoids, activation constant, binding energy

Procedia PDF Downloads 238
2250 Time Temperature Indicator for Monitoring Freshness of Packed Pasteurized Milk

Authors: Rajeshwar S. Matche, Subhash V. Pawde, Suraj P, Sachin R. Chaudhari

Abstract:

Time Temperature Indicator’s (TTI) are trending approach in a food packaging that will be insightful to have safe and hygienic food products. Currently, available TTI in the market are mostly a product specific and sometime even difficult to handle especially in supply chain as these are pre-activated and require specific storage conditions. In the present study, research focus is on the development of a cost-effective lactic acid based TTI that can work over a wide range of temperature and can be activated at time of packaging or on demand. The correlation between activation energies of colour change of the developed indicator and packed pasteurized milk spoilage with respect to time and temperature was established. Developed lactic acid based TTI strips have range of activation energy from 10.13 to 24.20 KJ/mol. We found that the developed TTI strip’s with activation energy 12.42, and 14.41KJ/mol can be correlated with spoilage activation energy of packed pasteurized milk which was 25.71 KJ/mol with factor of 2 at storage temperature 4°C. The implementation of these TTI on packed pasteurized milk allow us see visual colour change during the storage and can be fruitful to monitoring quality of the milk and understand its freshness especially in a cold supply chain, viz distributor and road vendor etc.

Keywords: pasteurised packed milk, time temperature indicator, spoilage, freshness

Procedia PDF Downloads 110
2249 Synthesis of Biologically Active Heterocyclic Compounds via C-H Bond Activation

Authors: Neeraj Kumar Mishra, In Su Kim

Abstract:

The isoindoline, indazole and indole heterocycles are ubiquitous structural motif found in heterocyclic compounds as they exhibit biological and medicinal applications. For example, isoindoline motif is present in molecules that act as endothelin-A receptor antagonists and dipeptidyl peptidase inhibitors. Moreover, isoindoline derivatives are very crucial constituents in the field of materials science as attractive candidates for organic light-emitting devices. However, compounds containing the indazole motif are known to exhibit to a variety of biological activities, such as estrogen receptor, HIV protease inhibition and anti-tumor activity. The prevalence of indazoles and indoles has led to the development of many useful methods for their preparation. Thus, isoindoline, indazole and indole heterocycles can be new candidates for the next generation of pharmaceuticals. Therefore, the development of highly efficient strategies for the formation of these heterocyclic architectures is an area of great interest in organic synthesis. The past years, transition-metal-catalyzed C−H activation followed by annulation reaction has been frequently used as a powerful tool to construct various heterocycles. Herein, we describe our recent achievements about the transition-metal-catalyzed tandem cyclization reactions of N-benzyltriflamides, 1,2-disubstituted arylhydrazines, acetanilides, etc. via C−H bond activation to access the corresponding bioactive heterocylic scaffolds.

Keywords: biologically active, C-H activation, heterocyclic compounds, transition-metal catalysts

Procedia PDF Downloads 309
2248 Trends of Code-Mixing in a Bilingual Nigerian Child: An Investigation of a Three-Year-Old Child

Authors: Salamatu Sani

Abstract:

This study is an investigation of how code-mixing manifests in the language development of a Nigerian child, especially in the Hausa speaking environment. It is hinged on the fact that the environment influences the first language acquired by a child regardless of the cultural and/or linguistic background of the parents. The child under investigation has been subjected to close monitoring on her speech hitherto. It is a longitudinal study covering a period of twelve months (January 2018 to December 2018); that was when the subject was between twenty-four and thirty months of age. The speeches have been recorded by means of a tape recorder, video, and a diary. The study employs as a theoretical framework, emergentism, which is an eclectic of the behaviourist and the mentalist theories to the study of language development, for analysis. This is in agreement with the positions of Skinner and Watson. Sequel to this investigation, it was discovered the environment is a major factor that influences the exposure of a child to a language more than the other factors and that, if a child is exposed to more than one language, there is a great tendency for such a child to code-mix and code-switch in her speech production. The child under investigation, in spite of the linguistic background of her parents, speaks the Hausa Language much better than the other languages around her though with remarkable code-mixing with other languages around her such as English and Ebira languages. The study concludes that although a child is born with the innate ability to acquire a particular language, the environment plays a key role to trigger the innate ability and consequently, the child is exposed to the acquisition of the dominant language around her at a particular given time.

Keywords: bilingual, code-mixing, emergentism, environment, Hausa

Procedia PDF Downloads 161
2247 BodeACD: Buffer Overflow Vulnerabilities Detecting Based on Abstract Syntax Tree, Control Flow Graph, and Data Dependency Graph

Authors: Xinghang Lv, Tao Peng, Jia Chen, Junping Liu, Xinrong Hu, Ruhan He, Minghua Jiang, Wenli Cao

Abstract:

As one of the most dangerous vulnerabilities, effective detection of buffer overflow vulnerabilities is extremely necessary. Traditional detection methods are not accurate enough and consume more resources to meet complex and enormous code environment at present. In order to resolve the above problems, we propose the method for Buffer overflow detection based on Abstract syntax tree, Control flow graph, and Data dependency graph (BodeACD) in C/C++ programs with source code. Firstly, BodeACD constructs the function samples of buffer overflow that are available on Github, then represents them as code representation sequences, which fuse control flow, data dependency, and syntax structure of source code to reduce information loss during code representation. Finally, BodeACD learns vulnerability patterns for vulnerability detection through deep learning. The results of the experiments show that BodeACD has increased the precision and recall by 6.3% and 8.5% respectively compared with the latest methods, which can effectively improve vulnerability detection and reduce False-positive rate and False-negative rate.

Keywords: vulnerability detection, abstract syntax tree, control flow graph, data dependency graph, code representation, deep learning

Procedia PDF Downloads 170
2246 Cross Section Measurement for Formation of Metastable State of ¹¹¹ᵐCd through ¹¹¹Cd (γ, γ`) ¹¹¹ᵐCd Reaction Induced by Bremsstrahlung Generated through 6 MeV Electrons

Authors: Vishal D. Bharud, B. J. Patil, S. S. Dahiwale, V. N. Bhoraskar, S. D. Dhole

Abstract:

Photon induced average reaction cross section of ¹¹¹Cd (γ, γ`) ¹¹¹ᵐCd reaction was experimentally determined for the bremsstrahlung energy spectrum of 6 MeV by utilizing the activation and offline γ-ray spectrometric techniques. The 6 MeV electron accelerator Racetrack Microtron of Savitribai Phule Pune University, Pune was used for the experimental work. The bremsstrahlung spectrum generated by bombarding 6 MeV electrons on lead target was theoretically estimated by FLUKA code. Bremsstrahlung radiation can have energies exceeding the threshold of the particle emission, which is normally above 6 MeV. Photons of energies below the particle emission threshold undergo absorption into discrete energy levels, with possibility of exciting nuclei to excited state including metastable state. The ¹¹¹Cd (γ, γ`) ¹¹¹ᵐCd reaction cross sections were calculated at different energies of bombarding Photon by using the TALYS 1.8 computer code with a default parameter. The focus of the present work was to study the (γ,γ’) reaction for exciting ¹¹¹Cd nuclei to metastable states which have threshold energy below 3 MeV. The flux weighted average cross section was obtained from the theoretical values of TALYS 1.8 and TENDL 2017 and is found to be in good agreement with the present experimental cross section.

Keywords: bremsstrahlung, cross section, FLUKA, TALYS-1.8

Procedia PDF Downloads 173
2245 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 401
2244 The Evaluation Model for the Quality of Software Based on Open Source Code

Authors: Li Donghong, Peng Fuyang, Yang Guanghua, Su Xiaoyan

Abstract:

Using open source code is a popular method of software development. How to evaluate the quality of software becomes more important. This paper introduces an evaluation model. The model evaluates the quality from four dimensions: technology, production, management, and development. Each dimension includes many indicators. The weight of indicator can be modified according to the purpose of evaluation. The paper also introduces a method of using the model. The evaluating result can provide good advice for evaluating or purchasing the software.

Keywords: evaluation model, software quality, open source code, evaluation indicator

Procedia PDF Downloads 390
2243 Fusion Neutron Generator Dosimetry and Applications for Medical, Security, and Industry

Authors: Kaouther Bergaui, Nafaa Reguigui, Charles Gary

Abstract:

Characterization and the applications of deuterium-deuterium (DD) neutron generator developed by Adelphie technology and acquired by the National Centre of Nuclear Science and Technology (NCNST) were presented in this work. We study the performance of the neutron generator in terms of neutron yield, production efficiency, and the ionic current as a function of the acceleration voltage at various RF powers. We provide the design and optimization of the PGNAA chamber and thus give insight into the capabilities of the planned PGNAA facility. Additional non-destructive techniques were studied employing the DD neutron generator, such as PGNAA and neutron radiography: The PGNAA is used for determining the concentration of 10B in Si and SiO2 matrices by using a germanium detector HPGe and the results obtained are compared with PGNAA system using a Sodium Iodide detector (NaI (Tl)); Neutron radiography facility was tested and simulated, using a camera device CCD and simulated by the Monte Carlo code; and the explosive detection system (EDS) also simulated using the Monte Carlo code. The study allows us to show that the new models of DD neutron generators are feasible and that superior-quality neutron beams could be produced and used for various applications. The feasibility of Boron neutron capture therapy (BNCT) for cancer treatment using a neutron generator was assessed by optimizing Beam Shaping Assembly (BSA) on a phantom using Monte-Carlo (MCNP6) simulations.

Keywords: neutron generator deuterium-deuterium, Monte Carlo method, radiation, neutron flux, neutron activation analysis, born, neutron radiography, explosive detection, BNCT

Procedia PDF Downloads 197
2242 The Effect of Program Type on Mutation Testing: Comparative Study

Authors: B. Falah, N. E. Abakouy

Abstract:

Due to its high computational cost, mutation testing has been neglected by researchers. Recently, many cost and mutants’ reduction techniques have been developed, improved, and experimented, but few of them has relied the possibility of reducing the cost of mutation testing on the program type of the application under test. This paper is a comparative study between four operators’ selection techniques (mutants sampling, class level operators, method level operators, and all operators’ selection) based on the program code type of each application under test. It aims at finding an alternative approach to reveal the effect of code type on mutation testing score. The result of our experiment shows that the program code type can affect the mutation score and that the programs using polymorphism are best suited to be tested with mutation testing.

Keywords: equivalent mutant, killed mutant, mutation score, mutation testing, program code type, software testing

Procedia PDF Downloads 556
2241 Constructions of Linear and Robust Codes Based on Wavelet Decompositions

Authors: Alla Levina, Sergey Taranov

Abstract:

The classical approach to the providing noise immunity and integrity of information that process in computing devices and communication channels is to use linear codes. Linear codes have fast and efficient algorithms of encoding and decoding information, but this codes concentrate their detect and correct abilities in certain error configurations. To protect against any configuration of errors at predetermined probability can robust codes. This is accomplished by the use of perfect nonlinear and almost perfect nonlinear functions to calculate the code redundancy. The paper presents the error-correcting coding scheme using biorthogonal wavelet transform. Wavelet transform applied in various fields of science. Some of the wavelet applications are cleaning of signal from noise, data compression, spectral analysis of the signal components. The article suggests methods for constructing linear codes based on wavelet decomposition. For developed constructions we build generator and check matrix that contain the scaling function coefficients of wavelet. Based on linear wavelet codes we develop robust codes that provide uniform protection against all errors. In article we propose two constructions of robust code. The first class of robust code is based on multiplicative inverse in finite field. In the second robust code construction the redundancy part is a cube of information part. Also, this paper investigates the characteristics of proposed robust and linear codes.

Keywords: robust code, linear code, wavelet decomposition, scaling function, error masking probability

Procedia PDF Downloads 491
2240 Selection Criteria in the Spanish Secondary Education Content and Language Integrated Learning (CLIL) Programmes and Their Effect on Code-Switching in CLIL Methodology

Authors: Dembele Dembele, Philippe

Abstract:

Several Second Language Acquisition (SLA) studies have stressed the benefits of Content and Language Integrated Learning (CLIL) and shown how CLIL students outperformed their non-CLIL counterparts in many L2 skills. However, numerous experimental CLIL programs seem to have mainly targeted above-average and rather highly motivated language learners. The need to understand the impact of the student’s language proficiency on code-switching in CLIL instruction motivated this study. Therefore, determining the implications of the students’ low-language proficiency for CLIL methodology, as well as the frequency with which CLIL teachers use the main pedagogical functions of code-switching, seemed crucial for a Spanish CLIL instruction on a large scale. In the mixed-method approach adopted, ten face-to-face interviews were conducted in nine Valencian public secondary education schools, while over 30 CLIL teachers also contributed with their experience in two online survey questionnaires. The results showed the crucial role language proficiency plays in the Valencian CLIL/Plurilingual selection criteria. The presence of a substantial number of low-language proficient students in CLIL groups, which in turn implied important methodological consequences, was another finding of the study. Indeed, though the pedagogical use of L1 was confirmed as an extended practice among CLIL teachers, more than half of the participants perceived that code-switching impaired attaining their CLIL lesson objectives. Therein, the dissertation highlights the need for more extensive empirical research on how code-switching could prove beneficial in CLIL instruction involving low-language proficient students while maintaining the maximum possible exposure to the target language.

Keywords: CLIL methodology, low language proficiency, code switching, selection criteria, code-switching functions

Procedia PDF Downloads 83
2239 The Role of P2X7 Cytoplasmic Anchor in Inflammation

Authors: Federico Cevoli

Abstract:

Purinergic P2X7 receptors (P2X7R) are ligand-gated non-selective cation channels involved in several physiological and pathological processes. They are particularly promising pharmacological targets as they are present in an increasing number of different cells types. P2X7R activation is triggered following elevated concentrations of extracellular ATP, similarly to those observed in tissues injury, chronic inflammation and T-cell activation, as well as in the scrambling of phospholipids leading to membrane blebbing and apoptosis. Another hallmark of P2X7 is cell permeabilization, commonly known as “macropore” formation allowing the passage of nanometer-sized molecules up to 900Da. Recently, full-length P2X7 Cryo-EM structures revealed unique functional sites, including two cytoplasmic domains - the cytoplasmic "anchor" and "ballast". To date, the molecular units/complex by which P2X7R exerts its pathophysiological functions are unknown. Using custom-made cell-penetrating HIV-1 TAT peptides, we show for the first-time potential implications of P2X7 cytoplasmic anchor in the regulation of caspase3/7 activation as well as TNFα regulation.

Keywords: P2X7R, immunology, TAT-peptide, cell death

Procedia PDF Downloads 137
2238 Calpain-Mediated, Cisplain-Induced Apoptosis in Breast Cancer Cells

Authors: Shadia Al-Bahlani, Khadija Al-Bulushi, Zuweina Al-Hadidi, Buthaina Al-Dhahl, Nadia Al-Abri

Abstract:

Breast cancer is the most common cancer in women worldwide. Triple-Negative Breast Cancer (TNBC) is an aggressive type of breast cancer, which is defined by the absence of Estrogen (ER), Progesterone (PR) and human epidermal growth factor (Her-2) receptors. The calpain system plays an important role in many cellular processes including apoptosis, necrosis, cell signaling and proliferation. However, the role of calpain in cisplatin (CDDP)-induced apoptosis in TNBC cells is not fully understood. Here, TNBC (MDA-MB231) cells were treated with different concentration of CDDP (0, 20 & 40 µM) and calpain activation and apoptosis were measured by western blot and Hoechst Stain respectively. In addition, calpain modulation by either activation and/or inhibition and its effect on CDDP-induced apoptosis were assessed by the same above approaches. Our findings showed that CDDP induced endoplasmic reticulum stress and thus Calcium release and subsequently activate calpain α-fodrin cleavage indicated by the increase in GRP78 and Calmodulin protein expression and respectively in MDA-MB231 cells. It also induced apoptosis as measured by Hoechst stain and caspase-12 cleavage. Calpain activation by both Cyclopiazonic acid and Thapsigargin showed similar effect and enhanced the sensitivity of these cells to CDDP treatment. On the other hand, calpain inhibition by either specific siRNA and/or exogenous inhibitor (Calpeptin) had an adverse effect where it attenuated calpain activation and thus CDDP- induced apoptosis in these cells. Altogether, these findings suggested that calpain activation play an essential role in sensitizing the TNBC cells to CDDP-induced apoptosis. This might lead to the discovery of novel treatment to over this aggressive type of breast cancer.

Keywords: calpain, cisplatin, apoptosis, breast cancer

Procedia PDF Downloads 345
2237 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 146
2236 New Result for Optical OFDM in Code Division Multiple Access Systems Using Direct Detection

Authors: Cherifi Abdelhamid

Abstract:

In optical communication systems, OFDM has received increased attention as a means to overcome various limitations of optical transmission systems such as modal dispersion, relative intensity noise, chromatic dispersion, polarization mode dispersion and self-phase modulation. The multipath dispersion limits the maximum transmission data rates. In this paper we investigate OFDM system where multipath induced intersymbol interference (ISI) is reduced and we increase the number of users by combining OFDM system with OCDMA system using direct detection Incorporate OOC (orthogonal optical code) for minimize a bit error rate.

Keywords: OFDM, OCDMA, OOC (orthogonal optical code), (ISI), prim codes (Pc)

Procedia PDF Downloads 652
2235 Catalytic Effect of Graphene Oxide on the Oxidation of Paraffin-Based Fuels

Authors: Lin-Lin Liu, Song-Qi Hu, Yin Wang

Abstract:

Paraffin-based fuels are regarded to be a promising fuel of hybrid rocked motor because of the high regression rate, low price, and environmental friendliness. Graphene Oxide (GO) is an attractive energetic material which is expected to be widely used in propellants, explosives, and some high energy fuels. Paraffin-based fuels with paraffin and GO as raw materials were prepared, and the oxidation process of the samples was investigated by thermogravimetric analysis differential scanning calorimetry (TG/DSC) under oxygen (O₂) and nitrous oxide (N₂O) atmospheres. The oxidation reaction kinetics of the fuels was estimated through the non-isothermal measurements and model-free isoconversional methods based on the experimental results of TGA. The results show that paraffin-based fuels are easier oxidized under O₂ rather than N₂O with atmospheres due to the lower activation energy; GO plays a catalytic role for the oxidation of paraffin-based fuels under the both atmospheres, and the activation energy of the oxidation process decreases with the increase of GO; catalytic effect of GO on the oxidation of paraffin-based fuels are more obvious under O₂ atmospheres than under N₂O atmospheres.

Keywords: graphene oxide, paraffin-based fuels, oxidation, activation energy, TGA

Procedia PDF Downloads 402
2234 Thin-Layer Drying Characteristics and Modelling of Instant Coffee Solution

Authors: Apolinar Picado, Ronald Solís, Rafael Gamero

Abstract:

The thin-layer drying characteristics of instant coffee solution were investigated in a laboratory tunnel dryer. Drying experiments were carried out at three temperatures (80, 100 and 120 °C) and an air velocity of 1.2 m/s. Drying experimental data obtained are fitted to six (6) thin-layer drying models using the non-linear least squares regression analysis. The acceptability of the thin-layer drying model has been based on a value of the correlation coefficient that should be close to one, and low values for root mean square error (RMSE) and chi-square (x²). According to this evaluation, the most suitable model for describing drying process of thin-layer instant coffee solution is the Page model. Further, the effective moisture diffusivity and the activation energy were computed employing the drying experimental data. The effective moisture diffusivity values varied from 1.6133 × 10⁻⁹ to 1.6224 × 10⁻⁹ m²/s over the temperature range studied and the activation energy was estimated to be 162.62 J/mol.

Keywords: activation energy, diffusivity, instant coffee, thin-layer models

Procedia PDF Downloads 262
2233 Significance of Bike-Frame Geometric Factors for Cycling Efficiency and Muscle Activation

Authors: Luen Chow Chan

Abstract:

With the advocacy of green transportation and green traveling, cycling has become increasingly popular nowadays. Physiology and bike design are key factors for the influence of cycling efficiency. Therefore, this study aimed to investigate the significance of bike-frame geometric factors on cycling efficiency and muscle activation for different body sizes of non-professional Asian male cyclists. Participants who represented various body sizes, as measured by leg and back lengths, carried out cycling tests using a tailor-assembled road bike with different ergonomic design configurations including seat-height adjustments (i.e., 96%, 100%, and 104% of trochanteric height) and bike frame sizes (i.e., small and medium frames) for an assessable distance of 1 km. A specific power meter and self-developed adaptable surface electromyography (sEMG) were used to measure average pedaling power and cadence generated and muscle activation, respectively. The results showed that changing the seat height was far more significant than the body and bike frame sizes. The sEMG data evidently provided a better understanding of muscle activation as a function of different seat heights. Therefore, the interpretation of this study is that the major bike ergonomic design factor dominating the cycling efficiency of Asian participants with different body sizes was the seat height.

Keywords: bike frame sizes, cadence rate, pedaling power, seat height

Procedia PDF Downloads 120
2232 Design of Seismically Resistant Tree-Branching Steel Frames Using Theory and Design Guides for Eccentrically Braced Frames

Authors: R. Gary Black, Abolhassan Astaneh-Asl

Abstract:

The International Building Code (IBC) and the California Building Code (CBC) both recognize four basic types of steel seismic resistant frames; moment frames, concentrically braced frames, shear walls and eccentrically braced frames. Based on specified geometries and detailing, the seismic performance of these steel frames is well understood. In 2011, the authors designed an innovative steel braced frame system with tapering members in the general shape of a branching tree as a seismic retrofit solution to an existing four story “lift-slab” building. Located in the seismically active San Francisco Bay Area of California, a frame of this configuration, not covered by the governing codes, would typically require model or full scale testing to obtain jurisdiction approval. This paper describes how the theories, protocols, and code requirements of eccentrically braced frames (EBFs) were employed to satisfy the 2009 International Building Code (IBC) and the 2010 California Building Code (CBC) for seismically resistant steel frames and permit construction of these nonconforming geometries.

Keywords: eccentrically braced frame, lift slab construction, seismic retrofit, shear link, steel design

Procedia PDF Downloads 472
2231 Transmission Loss Analysis for Panels Laminated with Felt and Film

Authors: Yoshio Kurosawa

Abstract:

To reduce the interior noise of cars in high-frequency region, sound proof materials are laminated with the body panels and the interior trims. Therefore, sound proof properties of the laminates play an important role for the efficient acoustical design. A program code which predicts both sound absorption properties and sound insulation properties of the laminates are developed. This program code is used for transfer matrix method by Biot theory. This report described the outline of this program code, and the calculation results almost agreed with the experimental results.

Keywords: porous media, transmission loss, Biot theory, transfer matrix method

Procedia PDF Downloads 274
2230 Writing Style in a Thousand Splendid Suns

Authors: Maroof Sakhi

Abstract:

This article studies writing style in A Thousand Splendid Suns. It mainly discusses code-switching and usage of Persian words in the novel. Hosseini mainly writes in English; however, constantly he applies Persian words, phrases and syntax. Code-switching is used for different purposes in A Thousand Splendid Suns. It gives a voice to a character from Afghanistan. It is also used to mark a difference between the American and Afghanistan cultures and languages. Furthermore, representation of Persian language can be interpreted as valorization of the author’s mother tongue. In short, the writing style in A Thousand Splendid Suns represents Hosseini’s identity, culture and linguistic background.

Keywords: code-switching, hybridity, identity, linguistic background, Persian literature

Procedia PDF Downloads 98
2229 Profiling Risky Code Using Machine Learning

Authors: Zunaira Zaman, David Bohannon

Abstract:

This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.

Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties

Procedia PDF Downloads 109
2228 Reliability-Based Codified Design of Concrete Structures

Authors: Naser Alenezi, Ibrahim Alsakkaf, Osama Eid

Abstract:

The main objective of this study is to develop an independent reliability based code for reinforced concrete (R/C) structural components and elements solely for the State of Kuwait and its neighboring countries. The proposed code will take into account the harsh Kuwait’s harsh environment, loading conditions and material strengths. The method for developing such a code is based on structural reliability theory that takes into accounts the specific geographical and the various prescribed societal environment of the Kuwait region. These methods were developed according to the following four components: (1) loads, (2) structural strength, (3) reliability analysis, and (4) achieving target reliability levels (reliability index ’s ). The final product from this study will be a design code for R/C structural elements that include beams and columns, and some other structural members. This reliability-based LRFD design code will provide appropriate, easy, fast, and economical approach for designing R/C structural elements such as, beams and columns, for both houses and bridges, and other concrete structures. In addition, this reliability-based codified design of R/C beams, columns, and, possibly, concrete slabs will improve the design and serviceability of R/C bridge and building systems in Kuwait and neighboring GCC countries. Also, it has the potential to reduce the cost of new concrete structures, as fewer materials are used with more design efficiency.

Keywords: live laod, design, evaluation, structural building

Procedia PDF Downloads 347
2227 Analyzing Students' Writing in an English Code-Mixing Context in Nepali: An Ecological and Systematic Functional Approach

Authors: Binod Duwadi

Abstract:

This article examines the language and literacy practices of English Code-mixing in Nepalese Classroom. Situating the study within an ecological framework, a systematic functional linguistic (SFL) approach was used to analyze students writing in two Neplease schools. Data collection included interviews with teachers, classroom observations, instructional materials, and focal students’ writing samples. Data analyses revealed vastly different language ecologies between the schools owing to sharp socioeconomic stratification, the structural organization of schools, and the pervasiveness of standard language ideology, with stigmatizes English code mixing (ECM) and privileges Standard English in schools. Functional analysis of students’ writing showed that the nature of the writing tasks at the schools created different affordances for exploiting lexicogrammatically choices for meaning making-enhancing them in the case of one school but severely restricting them in the case of another- perpetuating the academic disadvantage for code mixing speakers. Recommendations for structural and attitudinal changes through teacher training and implementation of approaches that engage students’ bidialectal competence for learning are made as important first steps towards addressing educational inequities in Nepalese schools.

Keywords: code-mixing, ecological perspective, systematic functional approach, language and identity

Procedia PDF Downloads 124
2226 The Concentration Analysis of CO2 Using ALOHA Code for Kuosheng Nuclear Power Plant

Authors: W. S. Hsu, Y. Chiang, H. C. Chen, J. R. Wang, S. W. Chen, J. H. Yang, C. Shih

Abstract:

Not only radiation materials, but also the normal chemical material stored in the power plant can cause a risk to the residents. In this research, the ALOHA code was used to perform the concentration analysis under the CO2 storage burst or leakage conditions for Kuosheng nuclear power plant (NPP). The Final Safety Analysis Report (FSAR) and data were used in this study. Additionally, the analysis results of ALOHA code were compared with the R.G. 1.78 failure criteria in order to confirm the control room habitability. The comparison results show that the ALOHA result for burst case was 0.923 g/m3 which was below the criteria. However, the ALOHA results for leakage case was 11.3 g/m3.

Keywords: BWR, ALOHA, habitability, Kuosheng

Procedia PDF Downloads 360
2225 Calculation of Detection Efficiency of Horizontal Large Volume Source Using Exvol Code

Authors: M. Y. Kang, Euntaek Yoon, H. D. Choi

Abstract:

To calculate the full energy (FE) absorption peak efficiency for arbitrary volume sample, we developed and verified the EXVol (Efficiency calculator for EXtended Voluminous source) code which is based on effective solid angle method. EXVol is possible to describe the source area as a non-uniform three-dimensional (x, y, z) source. And decompose and set it into several sets of volume units. Users can equally divide (x, y, z) coordinate system to calculate the detection efficiency at a specific position of a cylindrical volume source. By determining the detection efficiency for differential volume units, the total radiative absolute distribution and the correction factor of the detection efficiency can be obtained from the nondestructive measurement of the source. In order to check the performance of the EXVol code, Si ingot of 20 cm in diameter and 50 cm in height were used as a source. The detector was moved at the collimation geometry to calculate the detection efficiency at a specific position and compared with the experimental values. In this study, the performance of the EXVol code was extended to obtain the detection efficiency distribution at a specific position in a large volume source.

Keywords: attenuation, EXVol, detection efficiency, volume source

Procedia PDF Downloads 185
2224 Production Radionuclide Therapy 161-Terbium Using by Talys1.6 and Empire 3.2 Codes in Reactions Cyclotron

Authors: Shohreh Rahimi Lascokalayeh, Hasan Yousefnia, Mojtaba Tajik, Samaneh Zolghadri, Bentehoda Abdolhosseini

Abstract:

In this study, the production of terbium-161 as new therapeutic radionuclide was investigated using TALYS1.6& EMPIRE 3.2 codes. For this purpose, cross section for the reactions reactor to produce 161Tb were extracted by mean of this code In the following step, stopping power of the reactions reactor was calculated by SRIM code. The best reaction in the production of 161Tb is160 Gd(d,n)161Tb Production yield of the 161Tb was obtained by utilization of MATLAB calculation code and based on the charged particle reaction formalism.The results showed that Production yield of the 161Tb was obtained 0.8 (mci/ A*h).

Keywords: terbium161, TALYS1.6, EMPIRE3.2, yield, cross-section

Procedia PDF Downloads 454