Search results for: Means of securing graves
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4600

Search results for: Means of securing graves

4450 Fluorescence Sensing as a Tool to Estimate Palm Oil Quality and Yield

Authors: Norul Husna A. Kasim, Siva K. Balasundram

Abstract:

The gap between ‘actual yield’ and ‘potential yield’ has remained a problem in the Malaysian oil palm industry. Ineffective maturity assessment and untimely harvesting have compounded this problem. Typically, the traditional method of palm oil quality and yield assessment is destructive, costly and laborious. Fluorescence-sensing offers a new means of assessing palm oil quality and yield non-destructively. This work describes the estimation of palm oil quality and yield using a multi-parametric fluorescence sensor (Multiplex®) to quantify the concentration of secondary metabolites, such as anthocyanin and flavonoid, in fresh fruit bunches across three different palm ages (6, 9, and 12 years-old). Results show that fluorescence sensing is an effective means of assessing FFB maturity, in terms of palm oil quality and yield quantifications.

Keywords: anthocyanin, flavonoid fluorescence sensor, palm oil yield and quality

Procedia PDF Downloads 809
4449 Development of new Ecological Cleaning Process of Metal Sheets

Authors: L. M. López López, J. V. Montesdeoca Contreras, A. R. Cuji Fajardo, L. E. Garzón Muñoz, J. I. Fajardo Seminario

Abstract:

In this article a new method of cleaning process of metal sheets for household appliances was developed, using low-pressure cold plasma. In this context, this research consist in analyze the results of metal sheets cleaning process using plasma and compare with pickling process to determinate the efficiency of each process and the level of contamination produced. Surface Cleaning was evaluated by measuring the contact angle with deionized water, diiodo methane and ethylene glycol, for the calculus of the surface free energy by means of the Fowkes theories and Wu. Showing that low-pressure cold plasma is very efficient both in cleaning process how in environment impact.

Keywords: efficient use of plasma, ecological impact of plasma, metal sheets cleaning means, plasma cleaning process.

Procedia PDF Downloads 354
4448 Safety System Design and Overfill Protection for Loading Asphalt onto Trucks

Authors: Wendy Ampadu, Ray Diezmos, Hassan Malik, Jeremy Hyslob

Abstract:

There are several technologies out there for use as high-level switches as part of a system for shutting down flow to a vessel. Given that the asphalt truck loading poses issues such as poor visibility, coating, condensation, and fumes, a solution that is robust enough to last in these conditions is often needed in industries. Furthermore, the design of the loading arm, rack, and process equipment should allow for the safety of workers. The objective of this report includes the redesign of structures for use at loading facilities and selecting an overflow technology protection from hot bitumen. The report is based on loading facilities at a Canadian bitumen production company. The engineering design approach was used to create multiple redesign concepts for the loading dock system. Research on overfill systems was also completed by surveying the existing market for technologies and securing quotes from over 20 Canadian and United States instrumentation companies. A final loading dock redesign and level transmitter for overfill protection solution were chosen.

Keywords: bitumen, reliability engineering, safety system, process safety management, asphalt, loading docks, tanker trucks

Procedia PDF Downloads 155
4447 E-Portfolios as a Means of Perceiving Students’ Listening and Speaking Progress

Authors: Heba Salem

Abstract:

This paper aims to share the researcher’s experience of using e-Portfolios as an assessment tool to follow up on students’ learning experiences and performance throughout the semester. It also aims at highlighting the importance of students’ self-reflection in the process of language learning. The paper begins by introducing the advanced media course, with its focus on listening and speaking skills, and introduces the students’ profiles. Then it explains the students’ role in the e-portfolio process as they are given the option to choose a listening text they studied throughout the semester and to choose a recorded oral production of their collection of artifacts throughout the semester. Students showcase and reflect on their progress in both listening comprehension and speaking. According to the research, re-listening to work given to them and to their production is a means of reflecting on both their progress and achievement. And choosing the work students want to showcase is a means to promote independent learning as well as self-expression. Students are encouraged to go back to the class learning outcomes in the process of choosing the work. In their reflections, students express how they met the specific learning outcome. While giving their presentations, students expressed how useful the experience of returning and going over what they covered to select one and going over their production as well. They also expressed how beneficial it was to listen to themselves and literally see their progress in both listening comprehension and speaking. Students also reported that they grasped more details from the texts than they did when first having it as an assignment, which coincided with one of the class learning outcomes. They also expressed the fact that they had more confidence speaking as well as they were able to use a variety of vocabulary and idiomatic expressions that students have accumulated. For illustration, this paper includes practical samples of students’ tasks and instructions as well as samples of their reflections. The results of students’ reflections coincide with what the research confirms about the effectiveness of the e-portfolios as a means of assessment. The employment of e-Portfolios has two-folded benefits; students are able to measure the achievement of the targeted learning outcomes, and teachers receive constructive feedback on their teaching methods.

Keywords: e-portfolios, assessment, self assessment, listening and speaking progress, foreign language, reflection, learning out comes, sharing experience

Procedia PDF Downloads 97
4446 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions

Authors: Abdulrahman Yarali, Machica McClain

Abstract:

In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.

Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare

Procedia PDF Downloads 21
4445 Marketing and Customer Relationship in Post Consolidation Banking Sector of Nigeria

Authors: Nnedum Obiajuru Anthony Ugochukwu, Ezechukwu Emmanuel Ntomchukwu

Abstract:

The research investigated the importance of marketing and customer relationship management in post-consolidated banks in achieving success and survival in the face of intense competition and global economic meltdown. The problem lies in the fact that during the pre-consolidation era in the banking industry in Nigeria, banks were comfortable transacting their businesses from their armchairs. Little attention was paid to marketing by banks as a veritable means of achieving and consolidating their profit position. This situation, no doubt sustained because banks were more or less currency exchange centers where customers buy and sell foreign exchange which was highly demanded, but in very short supply. Today, deregulation and consolidation of banks in Nigeria have tremendously increased the tempo of activities in the banking industry, and competition has become very severe among banks. The weak link in the success of post-consolidated banks in Nigeria is the utter neglect, and light or unserious consideration of customer relationship marketing by banks. Armchair banking which banks have been practicing has no regard for marketing as a means to survival. However, in order to survive, post-consolidated banks must take relationship marketing and customer relationship management seriously especially in the face of the current global economic crisis. This paper aims at exploring the role of marketing in building and managing customer relationships as a means to survival in post-consolidation banking in Nigeria.

Keywords: marketing, customer relationships, banking sector, Nigeria

Procedia PDF Downloads 300
4444 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 261
4443 Colour Change and melenophores response in ateleost: Balantiochilous melenopterus (Bleeker) with Certain Chemicals and Drugs

Authors: Trapti Pathak

Abstract:

Fishes can change their body colour according to their surroundings by. They do so by either aggregation or dispersion of melanosomes within the skin. These movements can regulate by means of sympathetic nerves with the help of cytoskeleton. Employing the melanophores on isolated scales of the fingerling of teleost fish, it is attempted to characterise the concerned nerves and the receptors located on melenocytes along with implication of microtubules a part of cytoskeleton in the pigmentary translocation in the fish. The scales from dorso-lateral trunk of the fish represented the sympathetic– neuromelanophore preparations which were stimulated by chemical means, such as adrenergic agonist, antagonist and the microtubule-disrupting drugs such as yuhombine, dopamine, colchicine etc. Adrenaline is an adrenergic agonist which is strongly induced the dorse-dependent concentration of pigment in innervated melanophores while Yohimbine is an adrenergic antagonist which is known to block effectively the α2-adrenoceptors inhibited the action of adrenaline. Colchicine effectively interferes with melanosome aggregating action of adrenaline. From these results it is concluded that the chromatic fibres of adrenergic nature innervate the melanophores and these cells do possess α2-adrenoceptors which mediate the melanosome aggregation and the movements of pigment granules through microtubules means of transport within the cell. These movements of pigment are linked to paling or darkening achieved of teleost fish respectively when they approach to their background.

Keywords: melenophores, agonists, antagonist, colour change

Procedia PDF Downloads 77
4442 Standardization of a Methodology for Quantification of Antimicrobials Used for the Treatment of Multi-Resistant Bacteria Using Two Types of Biosensors and Production of Anti-Antimicrobial Antibodies

Authors: Garzon V., Bustos R., Salvador J. P., Marco M. P., Pinacho D. G.

Abstract:

Bacterial resistance to antimicrobial treatment has increased significantly in recent years, making it a public health problem. Large numbers of bacteria are resistant to all or nearly all known antimicrobials, creating the need for the development of new types of antimicrobials or the use of “last line” antimicrobial drug therapies for the treatment of multi-resistant bacteria. Some of the chemical groups of antimicrobials most used for the treatment of infections caused by multiresistant bacteria in the clinic are Glycopeptide (Vancomycin), Polymyxin (Colistin), Lipopeptide (Daptomycin) and Carbapenem (Meropenem). Molecules that require therapeutic drug monitoring (TDM). Due to the above, a methodology based on nanobiotechnology based on an optical and electrochemical biosensor is being developed, which allows the evaluation of the plasmatic levels of some antimicrobials such as glycopeptide, polymyxin, lipopeptide and carbapenem quickly, at a low cost, with a high specificity and sensitivity and that can be implemented in the future in public and private health hospitals. For this, the project was divided into five steps i) Design of specific anti-drug antibodies, produced in rabbits for each of the types of antimicrobials, evaluating the results by means of an immunoassay analysis (ELISA); ii) quantification by means of an electrochemical biosensor that allows quantification with high sensitivity and selectivity of the reference antimicrobials; iii) Comparison of antimicrobial quantification with an optical type biosensor; iv) Validation of the methodologies used with biosensor by means of an immunoassay. Finding as a result that it is possible to quantify antibiotics by means of the optical and electrochemical biosensor at concentrations on average of 1,000ng/mL, the antibodies being sensitive and specific for each of the antibiotic molecules, results that were compared with immunoassays and HPLC chromatography. Thus, contributing to the safe use of these drugs commonly used in clinical practice and new antimicrobial drugs.

Keywords: antibiotics, electrochemical biosensor, optical biosensor, therapeutic drug monitoring

Procedia PDF Downloads 82
4441 Statistical Convergence of the Szasz-Mirakjan-Kantorovich-Type Operators

Authors: Rishikesh Yadav, Ramakanta Meher, Vishnu Narayan Mishra

Abstract:

The main aim of this article is to investigate the statistical convergence of the summation of integral type operators and to obtain the weighted statistical convergence. The rate of statistical convergence by means of modulus of continuity and function belonging to the Lipschitz class are also studied. We discuss the convergence of the defined operators by graphical representation and put a better rate of convergence than the Szasz-Mirakjan-Kantorovich operators. In the last section, we extend said operators into bivariate operators to study about the rate of convergence in sense of modulus of continuity and by means of Lipschitz class by using function of two variables.

Keywords: The Szasz-Mirakjan-Kantorovich operators, statistical convergence, modulus of continuity, Peeters K-functional, weighted modulus of continuity

Procedia PDF Downloads 211
4440 Tunneling Current Switching in the Coupled Quantum Dots by Means of External Field

Authors: Vladimir Mantsevich, Natalya Maslova, Petr Arseyev

Abstract:

We investigated the tunneling current peculiarities in the system of two coupled by means of the external field quantum dots (QDs) weakly connected to the electrodes in the presence of Coulomb correlations between localized electrons by means of Heisenberg equations for pseudo operators with constraint. Special role of multi-electronic states was demonstrated. Various single-electron levels location relative to the sample Fermi level and to the applied bias value in symmetric tunneling contact were investigated. Rabi frequency tuning results in the single-electron energy levels spacing. We revealed the appearance of negative tunneling conductivity and demonstrated multiple switching "on" and "off" of the tunneling current depending on the Coulomb correlations value, Rabi frequency amplitude and energy levels spacing. We proved that Coulomb correlations strongly influence the system behavior. We demonstrated the presence of multi-stability in the coupled QDs with Coulomb correlations when single value of the tunneling current amplitude corresponds to the two values of Rabi frequency in the case when both single-electron energy levels are located slightly above eV and are close to each other. This effect disappears when the single-electron energy levels spacing increases.

Keywords: Coulomb correlations, negative tunneling conductivity, quantum dots, rabi frequency

Procedia PDF Downloads 451
4439 Exploratory Study of Community Interaction Project in Environment Education for Youth

Authors: Archana Vadeyar, Smita Phatak

Abstract:

Nurturing flora and fauna is the crux of Environment Education yet one tends to forget to nurture the human minds. Youth education presently is too academic, exam oriented and lacks all-round development. A project is whole-hearted purposeful activity proceeding in a social environment. Projects at +2 stages have become, just an easier way of securing marks. The purpose of this study was to explore the concept of an experiential environment education (EE) project for youth involving community interaction. Youth were encouraged to plan activities for children-based on EE through General knowledge (GK), language, math, science, fun games, quiz, sports, art and craft, stories. A purposive sample of 73 students was administered a self-prepared and validated questionnaire; supported by content analysis of reports from EE Journals of 21 students and some photos. Responses of students revealed that project was a joyful and motivating experience, with learnings and realizations, developed concern for others, made them feel responsible, happy and contented. Community interaction programs need to be included in the regular schedule to add more meaning to EE projects and cater to the needs of adolescents for diverting youth energy towards positive action.

Keywords: experiential, project, environment education, youth, community interaction

Procedia PDF Downloads 185
4438 Design and Evaluation of a Pneumatic Muscle Actuated Gripper

Authors: Tudor Deaconescu, Andrea Deaconescu

Abstract:

Deployment of pneumatic muscles in various industrial applications is still in its early days, considering the relative newness of these components. The field of robotics holds particular future potential for pneumatic muscles, especially in view of their specific behaviour known as compliance. The paper presents and discusses an innovative constructive solution for a gripper system mountable on an industrial robot, based on actuation by a linear pneumatic muscle and transmission of motion by gear and rack mechanism. The structural, operational and constructive models of the new gripper are presented, along with some of the experimental results obtained subsequently to the testing of a prototype. Further presented are two control variants of the gripper system, one by means of a 3/2-way fast-switching solenoid valve, the other by means of a proportional pressure regulator. Advantages and disadvantages are discussed for both variants.

Keywords: gripper system, pneumatic muscle, structural modelling, robotics

Procedia PDF Downloads 235
4437 Inhibitions in Implementing Green Supply Chain Management at Hospitals

Authors: M. Aruna, Uma Gunasilan

Abstract:

Hospitals play an ample role in securing the health of a country. Nevertheless, they also have an unhealthy side. Ecological issues strengthen ill-health throughout the domain which subsequently puts pressure on hospital supply chains. Medical waste indeed is hazardous for environment and subsequently for human. The hospital waste management is of immense prominence due to its infectious and hazardous nature that can source many effects on human health and the environment. Government regulations and public cognizance regarding hospital waste issues have imposed hospital units to admit these strategies. The innovative technologies and instruments have been developed to handle hospital wastes. Green supply chain management practices are common in the United States. In India, Green Supply Chain management (GSCM) has just started to be recognized and practiced. GSCM are green, integrated and ecologically optimized. In Green supply chain management environmental sustainability is found to be an important driver. Eleven barriers are identified in this work. Interpretive Structural Modeling (ISM) technique is used for ranking the obstructions.

Keywords: green supply chain management (GSCM), hospital waste management (HWM), interpretive structural modeling (ISM), medical waste (MW)

Procedia PDF Downloads 319
4436 On Modeling Data Sets by Means of a Modified Saddlepoint Approximation

Authors: Serge B. Provost, Yishan Zhang

Abstract:

A moment-based adjustment to the saddlepoint approximation is introduced in the context of density estimation. First applied to univariate distributions, this methodology is extended to the bivariate case. It then entails estimating the density function associated with each marginal distribution by means of the saddlepoint approximation and applying a bivariate adjustment to the product of the resulting density estimates. The connection to the distribution of empirical copulas will be pointed out. As well, a novel approach is proposed for estimating the support of distribution. As these results solely rely on sample moments and empirical cumulant-generating functions, they are particularly well suited for modeling massive data sets. Several illustrative applications will be presented.

Keywords: empirical cumulant-generating function, endpoints identification, saddlepoint approximation, sample moments, density estimation

Procedia PDF Downloads 162
4435 Selective Solvent Extraction of Co from Ni and Mn through Outer-Sphere Interactions

Authors: Korban Oosthuizen, Robert C. Luckay

Abstract:

Due to the growing popularity of electric vehicles and the importance of cobalt as part of the cathode material for lithium-ion batteries, demand for this metal is on the rise. Recycling of the cathode materials by means of solvent extraction is an attractive means of recovering cobalt and easing the pressure on limited natural resources. In this study, a series of straight chain and macrocyclic diamine ligands were developed for the selective recovery of cobalt from the solution containing nickel and manganese by means of solvent extraction. This combination of metals is the major cathode material used in electric vehicle batteries. The ligands can be protonated and function as ion-pairing ligands targeting the anionic [CoCl₄]²⁻, a species which is not observed for Ni or Mn. Selectivity for Co was found to be good at very high chloride concentrations and low pH. Longer chains or larger macrocycles were found to enhance selectivity, and linear chains on the amide side groups also resulted in greater selectivity over the branched groups. The cation of the chloride salt used for adjusting chloride concentrations seems to play a major role in extraction through salting-out effects. The ligands developed in this study show good selectivity for Co over Ni and Mn but require very high chloride concentrations to function. This research does, however, open the door for further investigations into using diamines as solvent extraction ligands for the recovery of cobalt from spent lithium-ion batteries.

Keywords: hydrometallurgy, solvent extraction, cobalt, lithium-ion batteries

Procedia PDF Downloads 78
4434 On Confidence Intervals for the Difference between Inverse of Normal Means with Known Coefficients of Variation

Authors: Arunee Wongkhao, Suparat Niwitpong, Sa-aat Niwitpong

Abstract:

In this paper, we propose two new confidence intervals for the difference between the inverse of normal means with known coefficients of variation. One of these two confidence intervals for this problem is constructed based on the generalized confidence interval and the other confidence interval is constructed based on the closed form method of variance estimation. We examine the performance of these confidence intervals in terms of coverage probabilities and expected lengths via Monte Carlo simulation.

Keywords: coverage probability, expected length, inverse of normal mean, coefficient of variation, generalized confidence interval, closed form method of variance estimation

Procedia PDF Downloads 309
4433 Effect of Tissue Preservation Chemicals on Decomposition in Different Soil Types

Authors: Onyekachi Ogbonnaya Iroanya, Taiye Abdullahi Gegele, Frank Tochukwu Egwuatu

Abstract:

Introduction: Forensic taphonomy is a multifaceted area that incorporates decomposition, chemical and biological cadaver exposure in post-mortem event chronology and reconstruction to predict the Post Mortem Interval (PMI). The aim of this study was to evaluate the integrity of DNA extracted from the remains of embalmed decomposed Sus domesticus tissues buried in different soil types. Method: A total of 12 limbs of Sus domesticus weighing between 0.7-1.4 kg were used. Each of the samples across the groups was treated with 10% formaldehyde, absolute methanol and 50% Pine oil for 24 hours before burial except the control samples, which were buried immediately. All samples were buried in shallow simulated Clay, Sandy and Loamy soil graves for 12 months. The DNA for each sample was extracted and quantified with Nanodrop Spectrophotometer (6305 JENWAY spectrometers). The rate of decomposition was examined through the modified qualitative decomposition analysis. Extracted DNA was amplified through PCR and bands visualized via gel electrophoresis. A biochemical enzyme assay was done for each burial grave soil. Result: The limbs in all burial groups had lost weight over the burial period. There was a significant increase in the soil urease level in the samples preserved in formaldehyde across the 3 soil type groups (p≤0.01). Also, the control grave soils recorded significantly higher alkaline phosphatase, dehydrogenase and calcium carbonate values compared to experimental grave soils (p≤0.01). The experimental samples showed a significant decrease in DNA concentration and purity when compared to the control groups (p≤0.01). Obtained findings of the soil biochemical analysis showed the embalming treatment altered the relationship between organic matter decomposition and soil biochemical properties as observed in the fluctuations that were recorded in the soil biochemical parameters. The PCR amplified DNA showed no bands on the gel electrophoresis plates. Conclusion: In criminal investigations, factors such as burial grave soil, grave soil biochemical properties, antemortem exposure to embalming chemicals should be considered in post-mortem interval (PMI) determination.

Keywords: forensic taphonomy, post-mortem interval (PMI), embalmment, decomposition, grave soil

Procedia PDF Downloads 166
4432 Modeling Usage Patterns of Mobile App Service in App Market Using Hidden Markov Model

Authors: Yangrae Cho, Jinseok Kim, Yongtae Park

Abstract:

Mobile app service ecosystem has been abruptly emerged, explosively grown, and dynamically transformed. In contrast with product markets in which product sales directly cause increment in firm’s income, customer’s usage is less visible but more valuable in service market. Especially, the market situation with cutthroat competition in mobile app store makes securing and keeping of users as vital. Although a few service firms try to manage their apps’ usage patterns by fitting on S-curve or applying other forecasting techniques, the time series approaches based on past sequential data are subject to fundamental limitation in the market where customer’s attention is being moved unpredictably and dynamically. We therefore propose a new conceptual approach for detecting usage pattern of mobile app service with Hidden Markov Model (HMM) which is based on the dual stochastic structure and mainly used to clarify unpredictable and dynamic sequential patterns in voice recognition or stock forecasting. Our approach could be practically utilized for app service firms to manage their services’ lifecycles and academically expanded to other markets.

Keywords: mobile app service, usage pattern, Hidden Markov Model, pattern detection

Procedia PDF Downloads 336
4431 Machine Learning Approaches Based on Recency, Frequency, Monetary (RFM) and K-Means for Predicting Electrical Failures and Voltage Reliability in Smart Cities

Authors: Panaya Sudta, Wanchalerm Patanacharoenwong, Prachya Bumrungkun

Abstract:

As With the evolution of smart grids, ensuring the reliability and efficiency of electrical systems in smart cities has become crucial. This paper proposes a distinct approach that combines advanced machine learning techniques to accurately predict electrical failures and address voltage reliability issues. This approach aims to improve the accuracy and efficiency of reliability evaluations in smart cities. The aim of this research is to develop a comprehensive predictive model that accurately predicts electrical failures and voltage reliability in smart cities. This model integrates RFM analysis, K-means clustering, and LSTM networks to achieve this objective. The research utilizes RFM analysis, traditionally used in customer value assessment, to categorize and analyze electrical components based on their failure recency, frequency, and monetary impact. K-means clustering is employed to segment electrical components into distinct groups with similar characteristics and failure patterns. LSTM networks are used to capture the temporal dependencies and patterns in customer data. This integration of RFM, K-means, and LSTM results in a robust predictive tool for electrical failures and voltage reliability. The proposed model has been tested and validated on diverse electrical utility datasets. The results show a significant improvement in prediction accuracy and reliability compared to traditional methods, achieving an accuracy of 92.78% and an F1-score of 0.83. This research contributes to the proactive maintenance and optimization of electrical infrastructures in smart cities. It also enhances overall energy management and sustainability. The integration of advanced machine learning techniques in the predictive model demonstrates the potential for transforming the landscape of electrical system management within smart cities. The research utilizes diverse electrical utility datasets to develop and validate the predictive model. RFM analysis, K-means clustering, and LSTM networks are applied to these datasets to analyze and predict electrical failures and voltage reliability. The research addresses the question of how accurately electrical failures and voltage reliability can be predicted in smart cities. It also investigates the effectiveness of integrating RFM analysis, K-means clustering, and LSTM networks in achieving this goal. The proposed approach presents a distinct, efficient, and effective solution for predicting and mitigating electrical failures and voltage issues in smart cities. It significantly improves prediction accuracy and reliability compared to traditional methods. This advancement contributes to the proactive maintenance and optimization of electrical infrastructures, overall energy management, and sustainability in smart cities.

Keywords: electrical state prediction, smart grids, data-driven method, long short-term memory, RFM, k-means, machine learning

Procedia PDF Downloads 56
4430 Hyperthyroidism in a Private Medical Services Center, Addis Ababa: A 5-Year Experience

Authors: Ersumo Tessema, Bogale Girmaye Tamrat, Mohammed Burka

Abstract:

Background: Hyperthyroidism is a common thyroid disorder especially in women and characterized by increased thyroid hormone synthesis and secretion. The disorder manifests predominantly as Graves’ disease in iodine-sufficient areas and has increasing prevalence in iodine-deficient countries in patients with nodular thyroid disease and following iodine fortification. In Ethiopia, the magnitude of the disorder is unknown and, in Africa, due to scarcity of resources, its management remains suboptimal. Objective: The aim of this study was to analyze the pattern and management of patients with hyperthyroidism at the United Vision Medical Services Center, Addis Ababa between August 30, 2013, and February 1, 2018. Patients and methods: The study was a retrospective analysis of medical records of all patients with hyperthyroidism at the United Vision Private Medical Services Center, Addis Ababa. A questionnaire was filled out; the collected data entered into a computer and statistically analyzed using the SPSS package. The results were tabulated and discussed with literature review. Results: A total of 589 patients were included in this study. The median age was 40 years, and the male to female ratio was 1.0:7.9. Most patients (93%) presented with goiter and the associated features of toxic goiter except weight loss, sweating and tachycardia were uncommon. Majority of patients presented more than two years after the onset of their presenting symptoms. The most common physical finding (91%), as well as diagnosis, was toxic nodular goiter. The most frequent (83%) derangement in the thyroid function tests was a low thyroid-stimulating hormone, and the most commonly (94%) used antithyroid drug was a propylthiouracil. The most common (96%) surgical procedure in 213 patients was a near-total thyroidectomy with a postoperative course without incident in 92% of all the patients. Conclusion: The incidence and prevalence of hyperthyroidism are apparently on the increase in Addis Ababa, which may be related to the existing severe iodine-deficiency and or the salt iodation program (iodine-induced hyperthyroidism). Hyperthyroidism predominantly affects women and, in surgical services, toxic nodular goiter is more common than diffuse goiter, and the treatment of choice in experienced hands is a near-total thyroidectomy.

Keywords: Ethiopia, grave’s disease, hyperthyroidism, toxic nodular goiter

Procedia PDF Downloads 176
4429 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 131
4428 A Novel Image Steganography Scheme Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

Growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC) and Image Fidelity (IF) over the previous techniques.

Keywords: fractal image, information hiding, Mandelbrot et fractal, steganography

Procedia PDF Downloads 539
4427 Modelling the Yield Stress of Magnetorheological Fluids

Authors: Hesam Khajehsaeid, Naeimeh Alagheband

Abstract:

Magnetorheological fluids (MRF) are a category of smart materials. They exhibit a reversible change from a Newtonian-like fluid to a semi-solid state upon application of an external magnetic field. In contrast to ordinary fluids, MRFs can tolerate shear stresses up to a threshold value called yield stress which strongly depends on the strength of the magnetic field, magnetic particles volume fraction and temperature. Even beyond the yield, a magnetic field can increase MR fluid viscosity up to several orders. As yield stress is an important parameter in the design of MR devices, in this work, the effects of magnetic field intensity and magnetic particle concentration on the yield stress of MRFs are investigated. Four MRF samples with different particle concentrations are developed and tested through flow-ramp analysis to obtain the flow curves at a range of magnetic field intensity as well as shear rate. The viscosity of the fluids is determined by means of the flow curves. The results are then used to determine the yield stresses by means of the steady stress sweep method. The yield stresses are then determined by means of a modified form of the dipole model as well as empirical models. The exponential distribution function is used to describe the orientation of particle chains in the dipole model under the action of the external magnetic field. Moreover, the modified dipole model results in a reasonable distribution of chains compared to previous similar models.

Keywords: magnetorheological fluids, yield stress, particles concentration, dipole model

Procedia PDF Downloads 179
4426 Fiber-Based 3D Cellular Reinforcing Structures for Mineral-Bonded Composites with Enhanced Structural Impact Tolerance

Authors: Duy M. P. Vo, Cornelia Sennewald, Gerald Hoffmann, Chokri Cherif

Abstract:

The development of solutions to improve the resistance of buildings to short-term dynamic loads, particularly impact load, is driven by the urgent demand worldwide on securing human life and critical infrastructures. The research training group GRK 2250/1 aims to develop mineral-bonded composites that allow the fabrication of thin-layered strengthening layers providing available concrete members with enhanced impact resistance. This paper presents the development of 3D woven wire cellular structures that can be used as innovative reinforcement for targeted composites. 3D woven wire cellular structures are truss-like architectures that can be fabricated in an automatized process with a great customization possibility. The specific architecture allows this kind of structures to have good load bearing capability and forming behavior, which is of great potential to give strength against impact loading. An appropriate combination of topology and material enables an optimal use of thin-layered reinforcement in concrete constructions.

Keywords: 3D woven cellular structures, ductile behavior, energy absorption, fiber-based reinforced concrete, impact resistant

Procedia PDF Downloads 298
4425 A Geoprocessing Tool for Early Civil Work Notification to Optimize Fiber Optic Cable Installation Cost

Authors: Hussain Adnan Alsalman, Khalid Alhajri, Humoud Alrashidi, Abdulkareem Almakrami, Badie Alguwaisem, Said Alshahrani, Abdullah Alrowaished

Abstract:

Most of the cost of installing a new fiber optic cable is attributed to civil work-trenching-cost. In many cases, information technology departments receive project proposals in their eReview system, but not all projects are visible to everyone. Additionally, if there was no IT scope in the proposed project, it is not likely to be visible to IT. Sometimes it is too late to add IT scope after project budgets have been finalized. Finally, the eReview system is a repository of PDF files for each project, which commits the reviewer to manual work and limits automation potential. This paper details a solution to address the late notification of the eReview system by integrating IT Sites GIS data-sites locations-with land use permit (LUP) data-civil work activity, which is the first step before securing the required land usage authorizations and means no detailed designs for any relevant project before an approved LUP request. To address the manual nature of eReview system, both the LUP System and IT data are using ArcGIS Desktop, which enables the creation of a geoprocessing tool with either Python or Model Builder to automate finding and evaluating potentially usable LUP requests to reduce trenching between two sites in need of a new FOC. To achieve this, a weekly dump was taken from LUP system production data and loaded manually onto ArcMap Desktop. Then a custom tool was developed in model builder, which consisted of a table of two columns containing all the pairs of sites in need of new fiber connectivity. The tool then iterates all rows of this table, taking the sites’ pair one at a time and finding potential LUPs between them, which satisfies the provided search radius. If a group of LUPs was found, an iterator would go through each LUP to find the required civil work between the two sites and the LUP Polyline feature and the distance through the line, which would be counted as cost avoidance if an IT scope had been added. Finally, the tool will export an Excel file named with sites pair, and it will contain as many rows as the number of LUPs, which met the search radius containing trenching and pulling information and cost. As a result, multiple projects have been identified – historical, missed opportunity, and proposed projects. For the proposed project, the savings were about 75% ($750,000) to install a new fiber with the Euclidean distance between Abqaiq GOSP2 and GOSP3 DCOs. In conclusion, the current tool setup identifies opportunities to bundle civil work on single projects at a time and between two sites. More work is needed to allow the bundling of multiple projects between two sites to achieve even more cost avoidance in both capital cost and carbon footprint.

Keywords: GIS, fiber optic cable installation optimization, eliminate redundant civil work, reduce carbon footprint for fiber optic cable installation

Procedia PDF Downloads 219
4424 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 618
4423 Securing Online Voting With Blockchain and Smart Contracts

Authors: Anant Mehrotra, Krish Phagwani

Abstract:

Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems.

Keywords: electronic voting, smart contracts, blockchain nased voting, security

Procedia PDF Downloads 9
4422 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 259
4421 The Analogy of Visual Arts and Visual Literacy

Authors: Lindelwa Pepu

Abstract:

Visual Arts and Visual Literacy are defined with distinction from one another. Visual Arts are known for art forms such as drawing, painting, and photography, just to name a few. At the same time, Visual Literacy is known for learning through images. The Visual Literacy phenomenon may be attributed to the use of images was first established for creating memories and enjoyment. As time evolved, images became the center and essential means of making contact between people. Gradually, images became a means for interpreting and understanding words through visuals, that being Visual Arts. The purpose of this study is to present the analogy of the two terms Visual Arts and Visual Literacy, which are defined and compared through early practicing visual artists as well as relevant researchers to reveal how they interrelate with one another. This is a qualitative study that uses an interpretive approach as it seeks to understand and explain the interest of the study. The results reveal correspondence of the analogy between the two terms through various writers of early and recent years. This study recommends the significance of the two terms and the role they play in relation to other fields of study.

Keywords: visual arts, visual literacy, pictures, images

Procedia PDF Downloads 166