Search results for: HIV transmission risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3696

Search results for: HIV transmission risks

1956 CFD Analysis of Flow Regimes of Non-Newtonian Liquids in Chemical Reactor

Authors: Nenashev Yaroslav, Russkin Oleg

Abstract:

The mixing process is one of the most important and critical stages in many industrial sectors, such as chemistry, pharmaceuticals, and the food industry. When designing equipment with mixing impellers, technology developers often encounter working environments with complex physical properties and rheology. In such cases, the use of computational fluid dynamics tools is an excellent solution to mitigate risks and ensure the stable operation of the equipment. The research focuses on one of the designed reactors with mixing impellers intended for polymer synthesis. The study describes an approach to modeling reactors of similar configurations, taking into account the complex properties of the mixed liquids using the computational fluid dynamics (CFD) method. To achieve this goal, a complex 3D model was created, accurately replicating the functionality of chemical equipment. The model allows for the assessment of the hydrodynamic behavior of the reaction mixture inside the reactor, consideration of heat release due to the reaction, and the heat exchange between the reaction mixture and the cooling medium. The results indicate that the choice of the type and size of the mixing device significantly affects the efficiency of the mixing process inside the chemical reactor.

Keywords: CFD, mixing, blending, chemical reactor, non-Newton liquids, polymers

Procedia PDF Downloads 35
1955 Duplicated Common Bile Duct: A Recipe for Injury

Authors: David Armany, Matthew Allaway, Preet Gosal, Senarath Edirimanne

Abstract:

A potentially devastating complication of routine laparoscopic cholecystectomy includes iatrogenic bile duct injuries, which represent a stable incidence rate of 0.3% over the past three decades. Whilst related to several relative risks such as surgeon experience and patient factors (older age, male sex), misinterpretation of biliary tree anatomy remains the most common cause, accounting for 80% of iatrogenic Common Bile Duct injuries. Whilst extremely rare, a duplicate common bile duct anomaly remains a potential variation to encounter during biliary surgery, with 30 recognised cases in the worldwide literature, of which type Vb accounts for 4. We report the case of a rare type Vb variation encountered during intra-operative laparoscopic cholecystectomy and confirmed on cholangiogram. To our knowledge, this is the first documented Type Vb case encountered in an Australian population. Given these anomalies are asymptomatic and can perpetuate iatrogenic common bile duct injuries, awareness of all subtypes is crucial. Irrevocably, preoperative Magnetic Resonance Cholangiopancreatography can help recognise these anomalies before the operating theatre; however, their widespread adoption is limited by expensive and availability.

Keywords: duplicated common bile duct, type Vb, cholecystitis, MRCP, cholangiogram, iatrogenic CBD

Procedia PDF Downloads 90
1954 InP/ZnS Core-Shell and InP/ZnS/ZnS Core-Multishell Quantum Dots for Improved luminescence Efficiency

Authors: Imen Harabi, Hanae Toura, Safa Jemai, Bernabe Mari Soucase

Abstract:

A promising alternative to traditional Quantum Dots QD materials, which contain toxic heavy elements such as lead and cadmium, sheds light on indium phosphide quantum dots (InP QDs) Owing to improve the quantum yields of photoluminescence and other properties. InP, InP/ZnS core/shell and InP/ZnS/ZnS core/shell/shell Quantum Dots (QDs) were synthetized by the hot injection method. The optical and structural properties of the core InP QDs, InP/ZnS QDs, and InP/ZnS/ZnS QDs have being considered by several techniques such as X-ray diffraction, transmission electron microscopy, optical spectroscopy, and photoluminescence. The average diameter of InP, InP/ZnS, and InP/ZnS/ZnS Quantum Dots (QDs) was varying between 10 nm, 5.4 nm, and 4.10 nm. This experience revealed that the surface morphology of the Quantum Dots has a more regular spherical form with color variation of the QDs in solution. The emission peak of colloidal InP Quantum Dots was around 530 nm, while in InP/ZnS, the emission peak is displayed and located at 598 nm. whilst for InP/ZnS/ZnS is placed at 610 nm. Furthermore, an enhanced PL emission due to a passivation effect in the ZnS-covered InP QDs was obtained. Add the XRD information FWHM of the principal peak of InP QDs was 63 nm, while for InP/ZnS was 41 nm and InP/ZnS/ZnS was 33 nm. The effect of the Zinc stearate precursor concentration on the optical, structural, surface chemical of InP and InP/ZnS and InP/ZnS/ZnS QDs will be discussed.

Keywords: indium phosphide, quantum dot, nanoparticle, core-shell, multishell, luminescence

Procedia PDF Downloads 165
1953 Development and Emerging Risks in the Derivative Market: A Comparison of Impact of Futures Trading on Spot Price Volatility and a Case of Developed, Emerging and Less Developed Economies

Authors: Rancy Chepchirchir Kosgey, John Olukuru

Abstract:

This study examines the impact of introduction of futures trading on the spot price volatility in the commodity market. The paper considers the United States of America, South Africa and Ethiopian economies. Three commodities i.e. coffee, maize and wheat from New York Merchantile Exchange, South African Futures Exchange and Ethiopian Commodity Exchange are analyzed. ARCH LM test is used to check for heteroskedasticity and GARCH and EGARCH are used to check for the behavior of volatility between the pre- and post-futures periods. For all the three economies, the results indicate presence of the ARCH effect in the log returns. For conditional and unconditional variances; spot price volatility for coffee has decreased after futures trading in all the economies and the EGARCH has also shown reduction in persistence of volatility in the post-futures period in the three economies; while that of maize has reduced for the Ethiopian economy while there has been an increase in both the US and South African economies. For wheat, the conditional variance has been found to rise in the post-futures period in all the three economies.

Keywords: derivatives, futures exchange, agricultural commodities, spot price volatility

Procedia PDF Downloads 426
1952 Barrier Properties of Starch-Ethylene Vinyl Alcohol Nanocomposites

Authors: Farid Amidi Fazli

Abstract:

Replacement of plastics used in the food industry seems to be a serious issue to overcome mainly the environmental problems in recent years. This study investigates the hydrophilicity and permeability properties of starch biopolymer which ethylene vinyl alcohol (EVOH) (0-10%) and nanocrystalline cellulose (NCC) (1 -15%) were used to enhance its properties. Starch -EVOH nanocomposites were prepared by casting method in different formulations. NCC production by acid hydrolysis was confirmed by scanning electron microscopy. Solubility, water vapor permeability, water vapor transmission rate and moisture absorbance were measured on each of the nanocomposites. The results were analyzed by SAS software. The lowest moisture absorbance was measured in pure starch nanocomposite containing 8% NCC. The lowest permeability to water vapor belongs to starch nanocomposite containing 8% NCC and the sample containing 7.8% EVOH and 13% NCC. Also, the lowest solubility was observed in the composite contains the highest amount of EVOH. Applied Process resulted in production of bio films which have good resistance to water vapor permeability and solubility in water. The use of NCC and EVOH leads to reduced moisture absorbance property of the biofilms.

Keywords: starch, EVOH, nanocrystalline cellulose, hydrophilicity

Procedia PDF Downloads 411
1951 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 569
1950 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 365
1949 Combined Safety and Cybersecurity Risk Assessment for Intelligent Distributed Grids

Authors: Anders Thorsén, Behrooz Sangchoolie, Peter Folkesson, Ted Strandberg

Abstract:

As more parts of the power grid become connected to the internet, the risk of cyberattacks increases. To identify the cybersecurity threats and subsequently reduce vulnerabilities, the common practice is to carry out a cybersecurity risk assessment. For safety classified systems and products, there is also a need for safety risk assessments in addition to the cybersecurity risk assessment in order to identify and reduce safety risks. These two risk assessments are usually done separately, but since cybersecurity and functional safety are often related, a more comprehensive method covering both aspects is needed. Some work addressing this has been done for specific domains like the automotive domain, but more general methods suitable for, e.g., intelligent distributed grids, are still missing. One such method from the automotive domain is the Security-Aware Hazard Analysis and Risk Assessment (SAHARA) method that combines safety and cybersecurity risk assessments. This paper presents an approach where the SAHARA method has been modified in order to be more suitable for larger distributed systems. The adapted SAHARA method has a more general risk assessment approach than the original SAHARA. The proposed method has been successfully applied on two use cases of an intelligent distributed grid.

Keywords: intelligent distribution grids, threat analysis, risk assessment, safety, cybersecurity

Procedia PDF Downloads 153
1948 Experimental Studies of the Response of Single Piles Under Torsional and Vertical Combined Loads in Contaminated Sand

Authors: Ahmed Mohamed Nasr, Waseim Ragab Azzam, Nada Osama Ramadan

Abstract:

Contaminated soil can weaken the stability of buildings and infrastructure, posing serious risks to their structural integrity. Therefore, this study aims to understand how oil contamination affects the torsion behavior of model steel piles at different soil densities. This research is crucial for evaluating the structural integrity and stability of piles in oil-contaminated environments. Clean sand samples and heavy motor oil were mixed in amounts ranging from 0 to 6% of the soil's dry weight. The mixture was thoroughly mixed to ensure uniform distribution of the oil throughout the sandy soil for simulating the field conditions. In these investigations, the relative densities (Dr), pile slenderness ratio (Lp/Dp), oil content (O.C%), and contaminated sand layer thickness (LC) were all different. Also, the paper presents an analysis of piles that are loaded both vertically and torsionally. The findings demonstrated that the pre-applied torsion load led to a decrease in the vertical bearing ability of the pile. Also, at Dr = 80%, the ultimate vertical load under combined load at constant torsional load T = (1/3Tu, 2/3Tu, and Tu) in the cases of (Lc/Lp) = 0.5 and (Lp/Dp) =13.3 was found to be reduced by (1.48, 2.78, and 4.15%) less than piles under independent vertical load, respectively so it is crucial to consider the torsion load during pile design.

Keywords: torsion-vertical load, oil-contaminated sand, twist angle, steel pile

Procedia PDF Downloads 72
1947 Reinventing Urban Governance: Sustainable Transport Solutions for Mitigating Climate Risks in Smart Cities

Authors: Jaqueline Nichi, Leila Da Costa Ferreira, Fabiana Barbi Seleguim, Gabriela Marques Di Giulio, Mariana Barbieri

Abstract:

The transport sector is responsible for approximately 55% of global greenhouse gas (GHG) emissions, in addition to pollution and other negative externalities, such as road accidents and congestion, that impact the routine of those who live in large cities. The objective of this article is to discuss the application and use of distinct mobility technologies such as climate adaptation and mitigation measures in the context of smart cities in the Global South. The documentary analysis is associated with 22 semi structured interviews with managers who work with mobility technologies in the public and private sectors and in civil society organizations to explore solutions in multilevel governance for smart and low-carbon mobility based on the case study from the city of São Paulo, Brazil. The hypothesis that innovation and technology to mitigate and adapt to climate impacts are not yet sufficient to make mobility more sustainable has been confirmed. The results indicate four relevant aspects for advancing a climate agenda in smart cities: integrated planning, coproduction of knowledge, experiments in governance, and new means of financing to guarantee the sustainable sociotechnical transition of the sector.

Keywords: urban mobility, climate change, smart cities, multilevel governance

Procedia PDF Downloads 55
1946 An Approach to Practical Determination of Fair Premium Rates in Crop Hail Insurance Using Short-Term Insurance Data

Authors: Necati Içer

Abstract:

Crop-hail insurance plays a vital role in managing risks and reducing the financial consequences of hail damage on crop production. Predicting insurance premium rates with short-term data is a major difficulty in numerous nations because of the unique characteristics of hailstorms. This study aims to suggest a feasible approach for establishing equitable premium rates in crop-hail insurance for nations with short-term insurance data. The primary goal of the rate-making process is to determine premium rates for high and zero loss costs of villages and enhance their credibility. To do this, a technique was created using the author's practical knowledge of crop-hail insurance. With this approach, the rate-making method was developed using a range of temporal and spatial factor combinations with both hypothetical and real data, including extreme cases. This article aims to show how to incorporate the temporal and spatial elements into determining fair premium rates using short-term insurance data. The article ends with a suggestion on the ultimate premium rates for insurance contracts.

Keywords: crop-hail insurance, premium rate, short-term insurance data, spatial and temporal parameters

Procedia PDF Downloads 55
1945 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 437
1944 Air Quality Analysis Using Machine Learning Models Under Python Environment

Authors: Salahaeddine Sbai

Abstract:

Air quality analysis using machine learning models is a method employed to assess and predict air pollution levels. This approach leverages the capabilities of machine learning algorithms to analyze vast amounts of air quality data and extract valuable insights. By training these models on historical air quality data, they can learn patterns and relationships between various factors such as weather conditions, pollutant emissions, and geographical features. The trained models can then be used to predict air quality levels in real-time or forecast future pollution levels. This application of machine learning in air quality analysis enables policymakers, environmental agencies, and the general public to make informed decisions regarding health, environmental impact, and mitigation strategies. By understanding the factors influencing air quality, interventions can be implemented to reduce pollution levels, mitigate health risks, and enhance overall air quality management. Climate change is having significant impacts on Morocco, affecting various aspects of the country's environment, economy, and society. In this study, we use some machine learning models under python environment to predict and analysis air quality change over North of Morocco to evaluate the climate change impact on agriculture.

Keywords: air quality, machine learning models, pollution, pollutant emissions

Procedia PDF Downloads 91
1943 A Novel Design in the Use of Planar Transformers for LDMOS Based Amplifiers in Bands II, III, DRM+, DVB-T and DAB+

Authors: Antonis Constantinides, Christos Yiallouras, Christakis Damianou

Abstract:

The coaxial transformer-coupled push-pull circuitry has been used widely in HF and VHF amplifiers for many decades without significant changes in the topology of the transformers. Basic changes over the years concerned the construction and turns ratio of the transformers as has been imposed upon the newer technologies active devices demands. The balun transmission line transformers applied in push-pull amplifiers enable input/output impedance transformation, but are mainly used to convert the balanced output into unbalanced and the input unbalanced into balanced. A simple and affordable alternative solution over the traditional coaxial transformer is the coreless planar balun. A key advantage over the traditional approach lies in the high specifications repeatability; simplifying the amplifier construction requirements as the planar balun constitutes an integrated part of the PCB copper layout. This paper presents the performance analysis of a planar LDMOS MRFE6VP5600 Push-Pull amplifier that enables robust operation in Band III, DVB-T, DVB-T2 standards but functions equally well in Band II, for DRM+ new generation transmitters.

Keywords: amplifier, balun, complex impedance, LDMOS, planar-transformers

Procedia PDF Downloads 440
1942 A Method for Compression of Short Unicode Strings

Authors: Masoud Abedi, Abbas Malekpour, Peter Luksch, Mohammad Reza Mojtabaei

Abstract:

The use of short texts in communication has been greatly increasing in recent years. Applying different languages in short texts has led to compulsory use of Unicode strings. These strings need twice the space of common strings, hence, applying algorithms of compression for the purpose of accelerating transmission and reducing cost is worthwhile. Nevertheless, other compression methods like gzip, bzip2 or PAQ due to high overhead data size are not appropriate. The Huffman algorithm is one of the rare algorithms effective in reducing the size of short Unicode strings. In this paper, an algorithm is proposed for compression of very short Unicode strings. At first, every new character to be sent to a destination is inserted in the proposed mapping table. At the beginning, every character is new. In case the character is repeated for the same destination, it is not considered as a new character. Next, the new characters together with the mapping value of repeated characters are arranged through a specific technique and specially formatted to be transmitted. The results obtained from an assessment made on a set of short Persian and Arabic strings indicate that this proposed algorithm outperforms the Huffman algorithm in size reduction.

Keywords: Algorithms, Data Compression, Decoding, Encoding, Huffman Codes, Text Communication

Procedia PDF Downloads 348
1941 Climate Change Effects on Western Coastal Groundwater in Yemen (1981-2020)

Authors: Afrah S. M. Al-Mahfadi

Abstract:

Climate change is a global issue that has significant impacts on water resources, resulting in environmental, economic, and political consequences. Groundwater reserves, particularly in coastal areas, are facing depletion, leading to serious problems in regions such as Yemen. This study focuses on the western coastal region of Yemen, which already faces risks such as water crises, food insecurity, and widespread poverty. Climate change exacerbates these risks by causing high temperatures, sea level rise, inadequate sea level rise, and inadequate environmental policies. Research Aim: The aim of this research is to provide a comprehensive overview of the impact of climate change on the western coastal region of Yemen. Specifically, the study aims to analyze the relationship between climate change and the loss of fresh groundwater resources in this area. Methodology: The research utilizes a combination of a literature review and three case studies conducted through site visits. Arch-GIS mapping is employed to analyze and visualize the relationship between climate change and the depletion of fresh groundwater resources. Additionally, data on precipitation from 1981 to 2020 and scenarios of projected sea level rise (SLR) are considered. Findings: The study reveals several future issues resulting from climate change. It is projected that the annual temperature will increase while the rainfall rate will decrease. Furthermore, the sea level is expected to rise by approximately 0.30 to 0.72 meters by 2100. These factors contribute to the loss of wetlands, the retreat of shorelines and estuaries, and the intrusion of seawater into the coastal aquifer, rendering drinking water from wells increasingly saline. Data Collection and Analysis Procedures: Data for this research are collected through a literature review, including studies on climate change impacts in coastal areas and the hydrogeology of the study region. Furthermore, three case studies are conducted through site visits. Arch-GIS mapping techniques are utilized to analyze the relationship between climate change and the loss of fresh groundwater resources. Historical precipitation data from 1981 to 2020 and scenarios of projected sea level rise are also analyzed. Questions Addressed: (1) What is the impact of climate change on the western coastal region of Yemen? (2) How does climate change affect the availability of fresh groundwater resources in this area? Conclusion: The study concludes that the western coastal region of Yemen is facing significant challenges due to climate change. The projected increase in temperature, decrease in rainfall, and rise in sea levels have severe implications, such as the loss of wetlands, shorelines, and estuaries. Additionally, the intrusion of seawater into the coastal aquifer further exacerbates the issue of saline drinking water. Urgent measures are needed to address climate change, including improving water management, implementing integrated coastal zone planning, raising awareness among stakeholders, and implementing emergency projects to mitigate the impacts. Recommendations: To mitigate the adverse effects of climate change, several recommendations are provided. These include improving water management practices, developing integrated coastal zone planning strategies, raising awareness among all stakeholders, improving health and education, and implementing emergency projects to combat climate change. These measures aim to enhance adaptive capacity and resilience in the face of future climate change impacts.

Keywords: climate change, groundwater, coastal wetlands, Yemen

Procedia PDF Downloads 65
1940 Rainfall and Temperature Characteristics of the Middle and Lower Awash Areas of Ethiopia

Authors: Melese Tadesse Morebo

Abstract:

Pastoral and agro-pastoral communities in East Africa, particularly in Ethiopia, are vulnerable to climate-related risks. The aim of this study is to characterize the annual, seasonal, and monthly rainfall and temperature of the middle and lower awash areas of Ethiopia. Start of season (SOS), end of season (EOS), length of growing season (LGS), number of rainy days, and probability of dry spell occurrences were analyzed using INSTAT Plus (v3.7) software. Daily rainfall and temperature data for 33 years (1990–2022) from six stations were analyzed. The result of the study revealed that the annual rainfall in the study area as a whole showed an increasing trend, but its trend was statistically non-significant. During the study period, the Kiremt rainfall at Amibara station showed statistically significant increasing trends. The trend analysis of SOS, EOS, and LGS shows up and down trends at all stations. The mean lengths of growing seasons in the study area ranged from 20 to 61 days during the study period. In the study area, the annual mean maximum temperature ranged between 34.1°C and 38.3°C over the last three decades. All stations within the research area during the study period, the annual minimum temperature exhibited a substantial impact.

Keywords: annual rainfall, LGS, minimum temperature, Mann-Kendall test

Procedia PDF Downloads 25
1939 A Review of Literature on Theories of Construction Accident Causation Models

Authors: Samuel Opeyemi Williams, Razali Bin Adul Hamid, M. S. Misnan, Taki Eddine Seghier, D. I. Ajayi

Abstract:

Construction sites are characterized with occupational risks. Review of literature on construction accidents reveals that a lot of theories have been propounded over the years by different theorists, coupled with multifarious models developed by different proponents at different times. Accidents are unplanned events that are prominent in construction sites, involving materials, objects and people with attendant damages, loses and injuries. Models were developed to investigate the causations of accident with the aim of preventing its occurrence. Though, some of these theories were criticized, most especially, the Heinrich Domino theory, being mostly faulted for placing much blame on operatives rather than the management. The purpose of this paper is to unravel the significant construction accident causation theories and models for the benefit of understanding of the theories, and consequently enabling construction stakeholders identify the possible potential hazards on construction sites, as all stakeholders have significant roles to play in preventing accident. Accidents are preventable; hence, understanding the risk factors of accident and the causation theories paves way for its prevention. However, findings reveal that still some gaps missing in the existing models, while it is recommended that further research can be made in order to develop more models in order to maintain zero accident on construction sites.

Keywords: domino theory, construction site, site safety, accident causation model

Procedia PDF Downloads 304
1938 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 410
1937 Antibacterial Activity of Noble Metal Functionalized Magnetic Core-Zeolitic Shell Nanostructures

Authors: Mohsen Padervand

Abstract:

Functionalized magnetic core-zeolitic shell nanostructures were prepared by the hydrothermal and coprecipitation methods. The products were characterized by Vibrating Sample Magnetometer (VSM), X-ray powder diffraction (XRD), Fourier Transform Infrared spectra (FTIR), nitrogen adsorption-desorption isotherms (BET) and Transmission Electron Microscopy (TEM). The growth of mordenite nanoparticles on the surface of silica coated nickel ferrite nanoparticles at the presence of organic templates was well approved. The antibacterial activity of prepared samples was investigated by the inactivation of E.coli as a gram negative bacterium. A new mechanism was proposed to inactivate the bacterium over the prepared samples. Minimum Inhibitory Concentration (MIC) and reuse ability were studied too. TEM images of the destroyed microorganism after the treatment time were applied to illustrate the inactivation mechanism. The interaction of the noble metals with organic components on the surface of nanostructures studied theoretically and the results were used to interpret the experimental results.

Keywords: nickel ferrite nanoparticles, magnetic core-zeolitic shell, antibacterial activity, E. coli

Procedia PDF Downloads 331
1936 Green Synthesis of Silver Nanoparticles from Citrus aurantium Aqueous Pollen Extract and Their Antibacterial Activity

Authors: Mohammad Ali Karimi, Hossein Tavallali, Abdolhamid Hatefi-Mehrjardi

Abstract:

Pollen extract of in vitro plants raised of Citrus aurantium as reducer and stabilizer was assessed for the green synthesis of silver nanoparticles (AgNPs). The synthesis of AgNPs was performed at room temperature assisting in solutions by reduction takes place rapidly for 10 min. Surface plasmon resonance (SPR) peaks in UV–Vis spectra indicated the formation of polydispersive AgNPs. Silver ions concentration, pH, temperature and reaction time were optimized in the synthesis of AgNPs. The nanoparticles obtained were characterized by UV-Vis spectrophotometer, transmission electron microscopy (TEM). X-ray diffraction (XRD) and Fourier transform infrared (FTIR) spectroscopy techniques. The synthesized AgNPs were mostly spherical in shape with an average size of 15 nm. XRD study shows that the AgNPs are crystalline in nature with face-centered cubic (fcc) geometry. It shows the significant antibacterial efficacy against Gram-positive (Staphylococcus aureus) and Gram-negative bacteria (Escherichia coli) by disk diffusion method using Mueller-Hinton Agar.

Keywords: green synthesis, Citrus aurantium, silver nanoparticles, antibacterial activity

Procedia PDF Downloads 287
1935 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information

Authors: A. Preetha Priyadharshini, S. B. M. Priya

Abstract:

In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.

Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information

Procedia PDF Downloads 813
1934 Intelligent Computing with Bayesian Regularization Artificial Neural Networks for a Nonlinear System of COVID-19 Epidemic Model for Future Generation Disease Control

Authors: Tahir Nawaz Cheema, Dumitru Baleanu, Ali Raza

Abstract:

In this research work, we design intelligent computing through Bayesian Regularization artificial neural networks (BRANNs) introduced to solve the mathematical modeling of infectious diseases (Covid-19). The dynamical transmission is due to the interaction of people and its mathematical representation based on the system's nonlinear differential equations. The generation of the dataset of the Covid-19 model is exploited by the power of the explicit Runge Kutta method for different countries of the world like India, Pakistan, Italy, and many more. The generated dataset is approximately used for training, testing, and validation processes for every frequent update in Bayesian Regularization backpropagation for numerical behavior of the dynamics of the Covid-19 model. The performance and effectiveness of designed methodology BRANNs are checked through mean squared error, error histograms, numerical solutions, absolute error, and regression analysis.

Keywords: mathematical models, beysian regularization, bayesian-regularization backpropagation networks, regression analysis, numerical computing

Procedia PDF Downloads 147
1933 Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)

Authors: S. Zenia, L. Bitta, O. Bouhamam, H. Brines, M. Boudriaa, F. Haddadj, F. Marniche, A. Milla, H. Saadi, A. Smai

Abstract:

The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou.

Keywords: diseases, Apis mellifera L., varroa, European foulbrood

Procedia PDF Downloads 161
1932 Stress Analysis of Vertebra Using Photoelastic and Finite Element Methods

Authors: Jamal A. Hassan, Ali Q. Abdulrazzaq, Sadiq J. Abass

Abstract:

In this study, both the photoelastic, as well as the finite element methods, are used to study the stress distribution within human vertebra (L4) under forces similar to those that occur during normal life. Two & three dimensional models of vertebra were created by the software AutoCAD. The coordinates obtained were fed into a computer numerical control (CNC) tensile machine to fabricate the models from photoelastic sheets. Completed models were placed in a transmission polariscope and loaded with static force (up to 1500N). Stresses can be quantified and localized by counting the number of fringes. In both methods the Principle stresses were calculated at different regions. The results noticed that the maximum von-mises stress on the area of the extreme superior vertebral body surface and the facet surface with high normal stress (σ) and shear stress (τ). The facets and other posterior elements have a load-bearing function to help support the weight of the upper body and anything that it carries, and are also acted upon by spinal muscle forces. The numerical FE results have been compared with the experimental method using photoelasticity which shows good agreement between experimental and simulation results.

Keywords: photoelasticity, stress, load, finite element

Procedia PDF Downloads 286
1931 System of Quality Automation for Documents (SQAD)

Authors: R. Babi Saraswathi, K. Divya, A. Habeebur Rahman, D. B. Hari Prakash, S. Jayanth, T. Kumar, N. Vijayarangan

Abstract:

Document automation is the design of systems and workflows, assembling repetitive documents to meet the specific business needs. In any organization or institution, documenting employee’s information is very important for both employees as well as management. It shows an individual’s progress to the management. Many documents of the employee are in the form of papers, so it is very difficult to arrange and for future reference we need to spend more time in getting the exact document. Also, it is very tedious to generate reports according to our needs. The process gets even more difficult on getting approvals and hence lacks its security aspects. This project overcomes the above-stated issues. By storing the details in the database and maintaining the e-documents, the automation system reduces the manual work to a large extent. Then the approval process of some important documents can be done in a much-secured manner by using Digital Signature and encryption techniques. Details are maintained in the database and e-documents are stored in specific folders and generation of various kinds of reports is possible. Moreover, an efficient search method is implemented is used in the database. Automation supporting document maintenance in many aspects is useful for minimize data entry, reduce the time spent on proof-reading, avoids duplication, and reduce the risks associated with the manual error, etc.

Keywords: e-documents, automation, digital signature, encryption

Procedia PDF Downloads 391
1930 Cyber Security Situational Awareness among Students: A Case Study in Malaysia

Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa

Abstract:

This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.

Keywords: cyber security awareness, cyber security education, cyber security, school students

Procedia PDF Downloads 302
1929 Optimal Evaluation of Weather Risk Insurance for Wheat

Authors: Slim Amami

Abstract:

A model is developed to prevent the risks related to climate conditions in the agricultural sector. It will determine the yearly optimum premium to be paid by a farmer in order to reach his required turnover. The model is mainly based on both climatic stability and 'soft' responses of usually grown species to average climate variations at the same place and inside a safety ball which can be determined from past meteorological data. This allows the use of linear regression expression for dependence of production result in terms of driving meteorological parameters, main ones of which are daily average sunlight, rainfall and temperature. By a simple best parameter fit from the expert table drawn with professionals, optimal representation of yearly production is deduced from records of previous years, and yearly payback is evaluated from minimum yearly produced turnover. Optimal premium is then deduced, and gives the producer a useful bound for negotiating an offer by insurance companies to effectively protect their harvest. The application to wheat production in the French Oise department illustrates the reliability of the present model with as low as 6% difference between predicted and real data. The model can be adapted to almost every agricultural field by changing state parameters and calibrating their associated coefficients.

Keywords: agriculture, database, meteorological factors, production model, optimal price

Procedia PDF Downloads 222
1928 Age-Stage, Two-Sex Life Table Characteristics of Aedes albopictus (Skuse) and Aedes aegypti (Linnaeus)) (Diptera: Culicidae) in Penang Island, Malaysia

Authors: A. H. Maimusa, A. Abu Hassan, Nur Faeza A. Kassim

Abstract:

In this study, we report on the main life table developmental attributes of laboratory colonies of wild strains Ae. albopictus and Ae. aegypti. The raw life history data of the two species were analyzed and compared based on the age-stage and two-sex life table. The total pre-adult development times were 9.47 days (Ae. albopictus) and 8.76 days (Ae. aegypti). The adult pre-oviposition periods (APOP) was 1.61 day for Ae. albopictus and 2.02 for Ae. aegypti. The total pre-oviposition period (TPOP) of Ae. albopictus is significantly longer (11.66 days) than (10.75 days) for Ae. aegypti. The mean intrinsic rate of increase (r) was 0.124 days (Ae. albopictus) and 1.151 days (Ae. aegypti) while the mean finite rate of increase (λ) was 1.13 day (Ae. albopictus) and (1.16 d) (Ae. aegypti). The net reproductive rates (Ro) were 8.10 and 10.75 for Ae. albopictus and Ae. aegypti, respectively. The mean generation time (T) for Ae. albopictus and Ae. aegypti, were 16.81 days and 15.77 days respectively. The mean development time for each stage insignificantly correlated with temperature (r = -0.208, p > 0.05) and (r = -0.312, p > 0.05) for Ae. albopictus and Ae. aegypti respectively. The life expectancy was 19.01 and 19.94 days for Ae. albopictus and Ae. aegypti respectively. Mortality occurred mostly during the adult stage and ranged between 0.01 and 0.07%. The population parameters suggest that Ae. albopictus and Ae. aegypti populations are r-strategist characterized by a high r, a large Ro, and short T. This kind of information is crucial in understanding mosquito population dynamics in disease transmission and control.

Keywords: Ae. aegypti, Ae. albopictus, age-stage, life table, two-sex

Procedia PDF Downloads 318
1927 Investigation of Steel-Concrete Composite Bridges under Blasting Loads Based on Slope Reflection

Authors: Yuan Li, Yitao Han, Zhao Zhu

Abstract:

In this paper, the effect of blasting loads on steel-concrete composite bridges has been investigated considering the slope reflection effect. Reasonable values of girder size, plate thickness, stiffening rib, and other design parameters were selected according to design specifications. Modified RHT (Riedel-Hiermaier-Thoma) was used as constitutive relation in analyses. In order to simulate the slope reflection effect, the slope of the bridge was precisely built in the model. Different blasting conditions, including top, middle, and bottom explosions, were simulated. The multi-Euler domain method based on fully coupled Lagrange and Euler models was adopted for the structural analysis of the explosion process using commercial software AUTODYN. The obtained results showed that explosion overpressure was increased by 3006, 879, and 449kPa, corresponding to explosions occurring at the top, middle, and bottom of the slope, respectively. At the same time, due to energy accumulation and transmission dissipation caused by slope reflection, the corresponding yield lengths of steel beams were increased by 8, 0, and 5m, respectively.

Keywords: steel-concrete composite bridge, explosion damage, slope reflection, blasting loads, RHT

Procedia PDF Downloads 96