Search results for: delay tolerant network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5623

Search results for: delay tolerant network

5473 Statistical Analysis of the Main Causes of Delay Factors of Infrastructure Projects

Authors: Seyed Ali Mohammadiborna, Mehdi Ravanshadnia

Abstract:

Project delays usually detrimentally affect perceptions of project success and can in some instances, result in increased costs and other time-related damages to project stakeholders. One of the realities in the national infrastructure projects is that since the primary stakeholders are state-affiliated, the delay factors of the projects have not been seriously taken into account despite the importance of on-time completion of projects. Project postponement has different economic and social consequences and leads to the technical and economic infeasibility of the infrastructure projects in the form of reduced productivity and exploitation capacity. The present study aimed at investigating delay factors of Iranian national infrastructure projects according to regulatory reports of the Plan and Budget Organization (BPO) of Iran. The present study scrutinized the influence of each of the factors that caused delays in national Iranian infrastructure projects according to the supervision reports of the planning and budget organization in 8 years. For this purpose, the study analyzed the information regarding the impact of 12 key delay factors causing delays in average 4867 projects per year in all provinces. The said factors were classified into the three groups of executive, credit, and financial and environmental-procurement factors.

Keywords: delays, infrastructure, projects, regulatory

Procedia PDF Downloads 135
5472 Mobility Management via Software Defined Networks (SDN) in Vehicular Ad Hoc Networks (VANETs)

Authors: Bilal Haider, Farhan Aadil

Abstract:

A Vehicular Ad hoc Network (VANET) provides various services to end-users traveling on the road at high speeds. However, this high-speed mobility of mobile nodes can cause frequent service disruptions. Various mobility management protocols exist for managing node mobility, but due to their centralized nature, they tend to suffer in the VANET environment. In this research, we proposed a distributed mobility management protocol using software-defined networks (SDN) for VANETs. Instead of relying on a centralized mobility anchor, the mobility functionality is distributed at multiple infrastructural nodes. The protocol is based on the classical Proxy Mobile IP version 6 (PMIPv6). It is evident from simulation results that this work has improved the network performance with respect to nodes throughput, delay, and packet loss.

Keywords: SDN, VANET, mobility management, optimization

Procedia PDF Downloads 169
5471 Multi-Path Signal Synchronization Model with Phase Length Constraints

Authors: Tzu-Jung Huang, Hsun-Jung Cho, Chien-Chia Liäm Huang

Abstract:

To improve the level of service (LoS) of urban arterial systems containing a series of signalized intersections, a proper design of offsets for all intersections associated is of great importance. The MAXBAND model has been the most common approach for this purpose. In this paper, we propose a MAXBAND model with phase constraints so that the lengths of the phases in a cycle are variable. In other words, the length of a cycle is also variable in our setting. We conduct experiments on a real-world traffic network, having several major paths, in Taiwan for numerical evaluations. Actual traffic data were collected through on-site experiments. Numerical evidences suggest that the improvements are around 32%, on average, in terms of total delay of the entire network.

Keywords: arterial progression, MAXBAND, signal control, offset

Procedia PDF Downloads 357
5470 Routing and Energy Efficiency through Data Coupled Clustering in Large Scale Wireless Sensor Networks (WSNs)

Authors: Jainendra Singh, Zaheeruddin

Abstract:

A typical wireless sensor networks (WSNs) consists of several tiny and low-power sensors which use radio frequency to perform distributed sensing tasks. The longevity of wireless sensor networks (WSNs) is a major issue that impacts the application of such networks. While routing protocols are striving to save energy by acting on sensor nodes, recent studies show that network lifetime can be enhanced by further involving sink mobility. A common approach for energy efficiency is partitioning the network into clusters with correlated data, where the representative nodes simply transmit or average measurements inside the cluster. In this paper, we propose an energy- efficient homogenous clustering (EHC) technique. In this technique, the decision of each sensor is based on their residual energy and an estimate of how many of its neighboring cluster heads (CHs) will benefit from it being a CH. We, also explore the routing algorithm in clustered WSNs. We show that the proposed schemes significantly outperform current approaches in terms of packet delay, hop count and energy consumption of WSNs.

Keywords: wireless sensor network, energy efficiency, clustering, routing

Procedia PDF Downloads 264
5469 Fault Tolerant (n,k)-star Power Network Topology for Multi-Agent Communication in Automated Power Distribution Systems

Authors: Ning Gong, Michael Korostelev, Qiangguo Ren, Li Bai, Saroj K. Biswas, Frank Ferrese

Abstract:

This paper investigates the joint effect of the interconnected (n,k)-star network topology and Multi-Agent automated control on restoration and reconfiguration of power systems. With the increasing trend in development in Multi-Agent control technologies applied to power system reconfiguration in presence of faulty components or nodes. Fault tolerance is becoming an important challenge in the design processes of the distributed power system topology. Since the reconfiguration of a power system is performed by agent communication, the (n,k)-star interconnected network topology is studied and modeled in this paper to optimize the process of power reconfiguration. In this paper, we discuss the recently proposed (n,k)-star topology and examine its properties and advantages as compared to the traditional multi-bus power topologies. We design and simulate the topology model for distributed power system test cases. A related lemma based on the fault tolerance and conditional diagnosability properties is presented and proved both theoretically and practically. The conclusion is reached that (n,k)-star topology model has measurable advantages compared to standard bus power systems while exhibiting fault tolerance properties in power restoration, as well as showing efficiency when applied to power system route discovery.

Keywords: (n, k)-star topology, fault tolerance, conditional diagnosability, multi-agent system, automated power system

Procedia PDF Downloads 511
5468 Fault Tolerant (n, k)-Star Power Network Topology for Multi-Agent Communication in Automated Power Distribution Systems

Authors: Ning Gong, Michael Korostelev, Qiangguo Ren, Li Bai, Saroj Biswas, Frank Ferrese

Abstract:

This paper investigates the joint effect of the interconnected (n,k)-star network topology and Multi-Agent automated control on restoration and reconfiguration of power systems. With the increasing trend in development in Multi-Agent control technologies applied to power system reconfiguration in presence of faulty components or nodes. Fault tolerance is becoming an important challenge in the design processes of the distributed power system topology. Since the reconfiguration of a power system is performed by agent communication, the (n,k)-star interconnected network topology is studied and modeled in this paper to optimize the process of power reconfiguration. In this paper, we discuss the recently proposed (n,k)-star topology and examine its properties and advantages as compared to the traditional multi-bus power topologies. We design and simulate the topology model for distributed power system test cases. A related lemma based on the fault tolerance and conditional diagnosability properties is presented and proved both theoretically and practically. The conclusion is reached that (n,k)-star topology model has measurable advantages compared to standard bus power systems while exhibiting fault tolerance properties in power restoration, as well as showing efficiency when applied to power system route discovery.

Keywords: (n, k)-star topology, fault tolerance, conditional diagnosability, multi-agent system, automated power system

Procedia PDF Downloads 461
5467 An Approach to Analyze Testing of Nano On-Chip Networks

Authors: Farnaz Fotovvatikhah, Javad Akbari

Abstract:

Test time of a test architecture is an important factor which depends on the architecture's delay and test patterns. Here a new architecture to store the test results based on network on chip is presented. In addition, simple analytical model is proposed to calculate link test time for built in self-tester (BIST) and external tester (Ext) in multiprocessor systems. The results extracted from the model are verified using FPGA implementation and experimental measurements. Systems consisting 16, 25, and 36 processors are implemented and simulated and test time is calculated. In addition, BIST and Ext are compared in terms of test time at different conditions such as at different number of test patterns and nodes. Using the model the maximum frequency of testing could be calculated and the test structure could be optimized for high speed testing.

Keywords: test, nano on-chip network, JTAG, modelling

Procedia PDF Downloads 486
5466 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 642
5465 New Results on Exponential Stability of Hybrid Systems

Authors: Grienggrai Rajchakit

Abstract:

This paper is concerned with the exponential stability of switched linear systems with interval time-varying delays. The time delay is any continuous function belonging to a given interval, in which the lower bound of delay is not restricted to zero. By constructing a suitable augmented Lyapunov-Krasovskii functional combined with Leibniz-Newton's formula, a switching rule for the exponential stability of switched linear systems with interval time-varying delays and new delay-dependent sufficient conditions for the exponential stability of the systems are first established in terms of LMIs. Finally, some examples are exploited to illustrate the effectiveness of the proposed schemes.

Keywords: exponential stability, hybrid systems, time-varying delays, lyapunov-krasovskii functional, leibniz-newton's formula

Procedia PDF Downloads 543
5464 The Importance of Development Evaluation to Preterm Children in Remote Area

Authors: Chung-Yuan Wang, Min Hsu, Bo-Ya Juan, Hsiv Ching Lin, Hsveh Min Lin, Hsiu-Fang Yeh

Abstract:

The success of Taiwan's National Health Insurance (NHI) system attracts widespread praise from the international society. However, the availability of medical care in a emote area is limited. Without the convenient public transportation system and mature social welfare policy, these people are difficult to regain their health and prevent disability. Preterm children have more risk to get development delay. Preterm children in a remote area have the human right to get rehabilitation resources as those in the city area. Therefore, the aim of this study was to show the importance of development screening to preterm children in a remote area and a tract the government to notice the issue. In Pingtung, children who are suspected development delay would be suggested to take a skillful screening evaluation in our hospital. Those preterm children (within 1-year-old) visited our pediatric clinic would also be referred to take the development evaluation. After the physiatrist’s systemic evaluation, the subjects would be scheduled to take the development evaluation. Gross motor, fine motor, speech comprehension/expression and mental study were included. The evaluation was in-charged by a physical therapist, occupational therapy, speech therapist and pediatric psychologist. The tools were Peabody developmental scale, Bayley Scales of Infant and Toddler Development (Bayley-III) and Wechsler Preschool & Primary Scale of Intelligence-Revised (WPPSI-R). In 2013, 459 children received the service in our hospital. Among these children, fifty-seven were noted with preterm baby history (gestation within 37 weeks). Thirty-six of these preterm children, who had never receive development evaluation, were included in this study. Thirty-six subjects (twenty-six male and ten female) were included. Nineteen subjects were found development delay. Six subjects were found suspected development delay. In gross motor, six subjects were development delay and eight were suspected development delay. In fine motor, five subjects were development delay and three were suspected development delay. In speech, sixteen subjects were development delay and six were suspected development delay. In our study, through the provision of development evaluation service, 72.2% preterm baby were found their development delay or suspected delay. They need further early intervention rehabilitation service. We made their parents realize that when development delay was recognized at the early stage, they are often reversible. No only the patients but also their families were improved their health status. The number of the subjects was limited in our study. Further study might be needed. Compared with 770 physical therapist (PT) and 370 occupational therapy (OT) in Taipei, there are only 108 PT and 54 OT in Pingtung. Further, there are much fewer therapists working on the field of pediatric rehabilitation. Living healthy is a human's right, no matter where does he live. For those development delay children in remote area, particularly preterm children, early detection, and early intervention rehabilitation service could play an important role in decreasing their disability and improving their quality of life. Through this study, we suggest the government to add more national resources on the development evaluation to preterm children in a remote area.

Keywords: development, early intervention, preterm children, rehabilitation

Procedia PDF Downloads 438
5463 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network

Authors: Kimaya Subhash Gaikwad, S. B. Waykar

Abstract:

The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.

Keywords: communication, MANET, OLSR, QoS

Procedia PDF Downloads 450
5462 A Social Network Analysis of the Palestinian Feminist Network Tal3at

Authors: Maath M. Musleh

Abstract:

This research aims to study recent trends in the Palestinian feminist movement through the case study of Tal3at. The study uses social network analysis as its primary method to analyze Twitter data. It attempts to interpret results through the lens of network theories and Parson’s AGIL paradigm. The study reveals major structural weaknesses in the Tal3at network. Our findings suggest that the movement will decline soon as sentiments of alienation amongst Palestinian women increases. These findings were validated by a couple of central actors in the network. This study contributes an SNA approach to the understanding of the understudied Palestinian feminism.

Keywords: feminism, Palestine, social network analysis, Tal3at

Procedia PDF Downloads 263
5461 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 319
5460 Genome Analysis of Lactobacillus Plantarum and Lactobacillus Brevis Isolated From Traditionally Fermented Ethiopian Kocho and Their Probiotic Properties

Authors: Guesh Mulaw, Haile Beruhulay, Anteneh Tesfaye, Tesfaye Sisay Diriba Muleta

Abstract:

Probiotics are live microorganisms that, when administered in adequate amounts, promote the health of a consumer. The present work aims to study the whole genome sequence of probiotic strains of lactic acid bacteria (LAB) isolated from traditional Ethiopian fermented kocho for bacteriocin production and to evaluate their probiotic properties. LAB were isolated from traditionally fermented kocho samples and characterized following standard methods. Accordingly, a total of 150 LAB were isolated, of which 7 (4.67%) isolates showed 50.52-74.05% and 33.33-62.40% survival rates at pH 2 for 3 and 6 h, respectively. The 7 acid-tolerant isolates were also tolerated 0.3% bile salt for 24 h with 88.96 to 98.10% survival. The acid and bile salt-tolerant LAB isolates also inhibited some reference foodborne pathogenic bacteria to varying degrees. All 7 acid- and bile salt-tolerant isolates were susceptible to ampicillin, tetracycline and erythromycin. However, the potent isolates showed remarkable resistance to kanamycin. Likewise, four of the 7 isolates were resistant to streptomycin, but three of the 7 isolates were sensitive to streptomycin. The identification of the seven selected probiotic LAB isolates and their genetic relatedness was performed based on whole-genome sequence comparisons. Consequently, these isolates belonged to Lactobacillus species, including 6 Lb. plantarum, 1 Lb. brevis. Among the 7 potential probiotic LAB strains, BAGEL predicted 2 bacteriocin for class II in the genome of 7 strains. The 7 Lactobacillus strains were found to be potentially useful for producing functional products and could be suitable probiotic candidates for food processing industries

Keywords: ferneted foods, kocho, probiotics, lactic acid bacteria

Procedia PDF Downloads 29
5459 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 438
5458 Monitoring and Prediction of Intra-Crosstalk in All-Optical Network

Authors: Ahmed Jedidi, Mesfer Mohammed Alshamrani, Alwi Mohammad A. Bamhdi

Abstract:

Optical performance monitoring and optical network management are essential in building a reliable, high-capacity, and service-differentiation enabled all-optical network. One of the serious problems in this network is the fact that optical crosstalk is additive, and thus the aggregate effect of crosstalk over a whole AON may be more nefarious than a single point of crosstalk. As results, we note a huge degradation of the Quality of Service (QoS) in our network. For that, it is necessary to identify and monitor the impairments in whole network. In this way, this paper presents new system to identify and monitor crosstalk in AONs in real-time fashion. particular, it proposes a new technique to manage intra-crosstalk in objective to relax QoS of the network.

Keywords: all-optical networks, optical crosstalk, optical cross-connect, crosstalk, monitoring crosstalk

Procedia PDF Downloads 462
5457 Salinity Response of Some Cowpea Genotypes in Germination of Periods

Authors: Meryem Aydin, Serdar Karadas, Ercan Ceyhan

Abstract:

The research was conducted to determine effects of salt concentrations on emergence of cowpea genotypes. Trials were performed during the year of 2014 on the laboratory of Agricultural Faculty, Selcuk University. Emergency trial was set up according to “Randomized Plots Design” by two factors and four replications with three replications. Samandag, Akkiz-86, Karnikara and Sarigobek cowpea genotypes have been used as trial material in this study. Effects of the five doses of salt concentrations (control, 30 mM, 60 mM, 90 mM and 120 mM) on the ratio of emergency, speed of emergency, average time for emergency, index of sensibility were evaluated. Responses of the cowpea genotypes for salt concentrations were found different. Comparing to the control, all of the investigated characteristics on the cowpea genotypes showed significant reduction by depending on the increasing salt application. According to the effects of salt application, the cowpea genotypes Samandag and Karnikara were the most tolerant in respect to index of sensibility while the Sarigobek genotypes was the most sensitive.

Keywords: cowpea, Vigna sinensis, emergence, salt tolerant

Procedia PDF Downloads 267
5456 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 732
5455 Extended Multi-Modulus Divider for Open Loop Fractional Dividers and Fractional Multiplying Delay Locked Loops

Authors: Muhammad Swilam

Abstract:

Solutions for the wrong division problem of the Extended Multi-Modulus Divider (EMMD) that occurs during modulus extension (i.e. switching the modulus value between two different ranges of division ratios), in open loop fractional dividers and fractional multiplying delay locked loop, is proposed. A detailed study for the MMD with Sigma-Delta is also presented. Moreover, extensive simulations for the divider are presented to ensure and verify its functionality and compared with the conventional dividers.

Keywords: extended multi-modulus divider (EMMD), fractional multiplying delay locked loop, open loop fractional divider, sigma delta modulator

Procedia PDF Downloads 484
5454 Air Cargo Network Structure Characteristics and Robustness Analysis under the Belt and Road Area

Authors: Feng-jie Xie, Jian-hong Yan

Abstract:

Based on the complex network theory, we construct the air cargo network of the Belt and Road area, analyze its regional distribution and structural characteristics, measure the robustness of the network. The regional distribution results show that Southeast Asia and China have the most prominent development in the air cargo network of the Belt and Road area, Central Asia is the least developed. The structure characteristics found that the air cargo network has obvious small-world characteristics; the degree distribution has single-scale property; it shows a significant rich-club phenomenon simultaneously. The network robustness is measured by two attack strategies of degree and betweenness, but the betweenness of network nodes has a greater impact on network connectivity. And identified 24 key cities that have a large impact on the robustness of the network under the two attack strategies. Based on these results, recommendations are given to maintain the air cargo network connectivity in the Belt and Road area.

Keywords: air cargo, complex network, robustness, structure properties, The Belt and Road

Procedia PDF Downloads 196
5453 An Intelligent Cloud Radio Access Network (RAN) Architecture for Future 5G Heterogeneous Wireless Network

Authors: Jin Xu

Abstract:

5G network developers need to satisfy the necessary requirements of additional capacity from massive users and spectrally efficient wireless technologies. Therefore, the significant amount of underutilized spectrum in network is motivating operators to combine long-term evolution (LTE) with intelligent spectrum management technology. This new LTE intelligent spectrum management in unlicensed band (LTE-U) has the physical layer topology to access spectrum, specifically the 5-GHz band. We proposed a new intelligent cloud RAN for 5G.

Keywords: cloud radio access network, wireless network, cloud computing, multi-agent

Procedia PDF Downloads 423
5452 Hemispheric Locus and Gender Predict the Delay between the Moment of Stroke and Hospitalization

Authors: D. Anderlini, G. Wallis

Abstract:

Background: The number of people experiencing stroke is steadily increasing due to changes in diet and lifestyle, to longer life expectancy resulting in older population, to higher survival rates as a consequence of improvements during the acute phase. This study considers what risk factors might contribute to delayed entry to hospital for treatment. Methods: We analyzed data from 2472 patients admitted to the Stroke Unit of the Royal Brisbane Women's Hospital, Australia, between 2002 to 2011. Results: Previous studies have reported that factors which can contribute to delay include the patient’s age, the time of day, physical location, visit the GP instead of going to the emergency, means of transport, severity of symptoms and type of stroke. Contrary to findings of other studies, we found a strong correlation between side of lesion and delay in admission: patients with right hemisphere lesions had an average delay of 3.78 days, while patients with left hemisphere lesions had an average delay of 1.49 days. Damage to the right hemisphere generally ends in motor impairment in the non-dominant hand and no speech impediment. In contrast, left hemisphere lesions can result in deficit to; dominant hand function and aphasia which will be noticed even if their impact on performance is relatively minor. A finding which goes against many previous studies, is the fact that women get to the hospital much sooner than men, showing an average delay of 0.92 days in women vs. 3.36 days in men. Conclusion: Acute surgical-pharmacological therapies are most effective if applied immediately after stroke. Hence delays to admission can be crucial to the degree of recovery. The tendency of patients to overlook symptoms of right hemisphere lesion should be the target of information campaigns both for the general public and GPs. Why do men go to hospital so late? We don't know yet! Nevertheless an awareness plan specifically direct to male population should be on the agenda of Health Departments.

Keywords: gender, admission delay, stroke location, bioinformatics, biomedicine

Procedia PDF Downloads 229
5451 Network Automation in Lab Deployment Using Ansible and Python

Authors: V. Andal Priyadharshini, Anumalasetty Yashwanth Nath

Abstract:

Network automation has evolved into a solution that ensures efficiency in all areas. The age-old technique to configure common software-defined networking protocols is inefficient as it requires a box-by-box approach that needs to be repeated often and is prone to manual errors. Network automation assists network administrators in automating and verifying the protocol configuration to ensure consistent configurations. This paper implemented network automation using Python and Ansible to configure different protocols and configurations in the container lab virtual environment. Ansible can help network administrators minimize human mistakes, reduce time consumption, and enable device visibility across the network environment.

Keywords: Python network automation, Ansible configuration, container lab deployment, software-defined networking, networking lab

Procedia PDF Downloads 163
5450 Production of Organic Solvent Tolerant Hydrolytic Enzymes (Amylase and Protease) by Bacteria Isolated from Soil of a Dairy Farm

Authors: Alok Kumar, Hari Ram, Lebin Thomas, Ved Pal Singh

Abstract:

Organic solvent tolerant amylases and proteases of microbial origin are in great demand for their application in transglycosylation of water-insoluble flavanoids and in peptide synthesizing reaction in organic media. Most of the amylases and proteases are unstable in presence of organic solvent. In the present work two different bacterial strains M-11 and VP-07 were isolated from the soil sample of a dairy farm in Delhi, India, for the efficient production of extracellular amylase and protease through their screening on starch agar (SA) and skimmed milk agar (SMA) plates, respectively. Both the strains (M-11 and VP-07) were identified based on morphological, biochemical and 16S rRNA gene sequencing methods. After analysis through Ez-Taxon software, the strains M-11 and VP-07 were found to have maximum pairwise similarity of 98.63% and 100% with Bacillus subtilis subsp. inaquosorum BGSC 3A28 and Bacillus anthracis ATCC 14578 and were therefore identified as Bacillus sp. UKS1 and Bacillus sp. UKS2, respectively. Time course study of enzyme activity and bacterial growth has shown that both strains exhibited typical sigmoid growth behavior and maximum production of amylase (180 U/ml) and protease (78 U/ml) by these strains (UKS1 and UKS2) was commenced during stationary phase of growth at 24 and 20 h, respectively. Thereafter, both amylase and protease were tested for their tolerance towards organic solvents and were found to be active as well stable in p-xylene (130% and 115%), chloroform (110% and 112%), isooctane (119% and 107%), benzene (121% and 104%), n-hexane (116% and 103%) and toluene (112% and 101%, respectively). Owing to such properties, these enzymes can be exploited for their potential application in industries for organic synthesis.

Keywords: amylase, enzyme activity, industrial applications, organic solvent tolerant, protease

Procedia PDF Downloads 342
5449 Quantum Decision Making with Small Sample for Network Monitoring and Control

Authors: Tatsuya Otoshi, Masayuki Murata

Abstract:

With the development and diversification of applications on the Internet, applications that require high responsiveness, such as video streaming, are becoming mainstream. Application responsiveness is not only a matter of communication delay but also a matter of time required to grasp changes in network conditions. The tradeoff between accuracy and measurement time is a challenge in network control. We people make countless decisions all the time, and our decisions seem to resolve tradeoffs between time and accuracy. When making decisions, people are known to make appropriate choices based on relatively small samples. Although there have been various studies on models of human decision-making, a model that integrates various cognitive biases, called ”quantum decision-making,” has recently attracted much attention. However, the modeling of small samples has not been examined much so far. In this paper, we extend the model of quantum decision-making to model decision-making with a small sample. In the proposed model, the state is updated by value-based probability amplitude amplification. By analytically obtaining a lower bound on the number of samples required for decision-making, we show that decision-making with a small number of samples is feasible.

Keywords: quantum decision making, small sample, MPEG-DASH, Grover's algorithm

Procedia PDF Downloads 78
5448 Genomic and Proteomic Variability in Glycine Max Genotypes in Response to Salt Stress

Authors: Faheema Khan

Abstract:

To investigate the ability of sensitive and tolerant genotype of Glycine max to adapt to a saline environment in a field, we examined the growth performance, water relation and activities of antioxidant enzymes in relation to photosynthetic rate, chlorophyll a fluorescence, photosynthetic pigment concentration, protein and proline in plants exposed to salt stress. Ten soybean genotypes (Pusa-20, Pusa-40, Pusa-37, Pusa-16, Pusa-24, Pusa-22, BRAGG, PK-416, PK-1042, and DS-9712) were selected and grown hydroponically. After 3 days of proper germination, the seedlings were transferred to Hoagland’s solution (Hoagland and Arnon 1950). The growth chamber was maintained at a photosynthetic photon flux density of 430 μmol m−2 s−1, 14 h of light, 10 h of dark and a relative humidity of 60%. The nutrient solution was bubbled with sterile air and changed on alternate days. Ten-day-old seedlings were given seven levels of salt in the form of NaCl viz., T1 = 0 mM NaCl, T2=25 mM NaCl, T3=50 mM NaCl, T4=75 mM NaCl, T5=100 mM NaCl, T6=125 mM NaCl, T7=150 mM NaCl. The investigation showed that genotype Pusa-24, PK-416 and Pusa-20 appeared to be the most salt-sensitive. genotypes as inferred from their significantly reduced length, fresh weight and dry weight in response to the NaCl exposure. Pusa-37 appeared to be the most tolerant genotype since no significant effect of NaCl treatment on growth was found. We observed a greater decline in the photosynthetic variables like photosynthetic rate, chlorophyll fluorescence and chlorophyll content, in salt-sensitive (Pusa-24) genotype than in salt-tolerant Pusa-37 under high salinity. Numerous primers were verified on ten soybean genotypes obtained from Operon technologies among which 30 RAPD primers shown high polymorphism and genetic variation. The Jaccard’s similarity coefficient values for each pairwise comparison between cultivars were calculated and similarity coefficient matrix was constructed. The closer varieties in the cluster behaved similar in their response to salinity tolerance. Intra-clustering within the two clusters precisely grouped the 10 genotypes in sub-cluster as expected from their physiological findings.Salt tolerant genotype Pusa-37, was further analysed by 2-Dimensional gel electrophoresis to analyse the differential expression of proteins at high salt stress. In the Present study, 173 protein spots were identified. Of these, 40 proteins responsive to salinity were either up- or down-regulated in Pusa-37. Proteomic analysis in salt-tolerant genotype (Pusa-37) led to the detection of proteins involved in a variety of biological processes, such as protein synthesis (12 %), redox regulation (19 %), primary and secondary metabolism (25 %), or disease- and defence-related processes (32 %). In conclusion, the soybean plants in our study responded to salt stress by changing their protein expression pattern. The photosynthetic, biochemical and molecular study showed that there is variability in salt tolerance behaviour in soybean genotypes. Pusa-24 is the salt-sensitive and Pusa-37 is the salt-tolerant genotype. Moreover this study gives new insights into the salt-stress response in soybean and demonstrates the power of genomic and proteomic approach in plant biology studies which finally could help us in identifying the possible regulatory switches (gene/s) controlling the salt tolerant genotype of the crop plants and their possible role in defence mechanism.

Keywords: glycine max, salt stress, RAPD, genomic and proteomic variability

Procedia PDF Downloads 420
5447 Assessing the Legacy Effects of Wildfire on Eucalypt Canopy Structure of South Eastern Australia

Authors: Yogendra K. Karna, Lauren T. Bennett

Abstract:

Fire-tolerant eucalypt forests are one of the major forest ecosystems of south-eastern Australia and thought to be highly resistant to frequent high severity wildfires. However, the impact of different severity wildfires on the canopy structure of fire-tolerant forest type is under-studied, and there are significant knowledge gaps in relation to the assessment of tree and stand level canopy structural dynamics and recovery after fire. Assessment of canopy structure is a complex task involving accurate measurements of the horizontal and vertical arrangement of the canopy in space and time. This study examined the utility of multitemporal, small-footprint lidar data to describe the changes in the horizontal and vertical canopy structure of fire-tolerant eucalypt forests seven years after wildfire of different severities from the tree to stand level. Extensive ground measurements were carried out in four severity classes to describe and validate canopy cover and height metrics as they change after wildfire. Several metrics such as crown height and width, crown base height and clumpiness of crown were assessed at tree and stand level using several individual tree top detection and measurement algorithm. Persistent effects of high severity fire 8 years after both on tree crowns and stand canopy were observed. High severity fire increased the crown depth but decreased the crown projective cover leading to more open canopy.

Keywords: canopy gaps, canopy structure, crown architecture, crown projective cover, multi-temporal lidar, wildfire severity

Procedia PDF Downloads 174
5446 Stability of Hybrid Stochastic Systems

Authors: Manlika Ratchagit

Abstract:

This paper is concerned with robust mean square stability of uncertain stochastic switched discrete time-delay systems. The system to be considered is subject to interval time-varying delays, which allows the delay to be a fast time-varying function and the lower bound is not restricted to zero. Based on the discrete Lyapunov functional, a switching rule for the robust mean square stability for the uncertain stochastic discrete time-delay system is designed via linear matrix inequalities. Finally, some examples are exploited to illustrate the effectiveness of the proposed schemes.

Keywords: robust mean square stability, discrete-time stochastic systems, hybrid systems, interval time-varying delays, Lyapunov functional, linear matrix inequalities

Procedia PDF Downloads 483
5445 New Results on Stability of Hybrid Stochastic Systems

Authors: Manlika Rajchakit

Abstract:

This paper is concerned with robust mean square stability of uncertain stochastic switched discrete time-delay systems. The system to be considered is subject to interval time-varying delays, which allows the delay to be a fast time-varying function and the lower bound is not restricted to zero. Based on the discrete Lyapunov functional, a switching rule for the robust mean square stability for the uncertain stochastic discrete time-delay system is designed via linear matrix inequalities. Finally, some examples are exploited to illustrate the effectiveness of the proposed schemes.

Keywords: robust mean square stability, discrete-time stochastic systems, hybrid systems, interval time-varying delays, lyapunov functional, linear matrix inequalities

Procedia PDF Downloads 428
5444 Delay in Induction of Labour at Two Hospitals in Southeast Scotland: Outcomes

Authors: Bernard Ewuoso

Abstract:

Introduction: Induction of labor (IOL) usually involves the patient moving between antenatal, labor, and postnatal wards. Delay in IOL has been defined as delay in the time it takes a woman to wait for induction after her cervix is assessed to be favorable. Opinions vary on the acceptable time the patient is allowed to wait for once the cervix is adjudged ripe for induction. What has been considered a benchmark is a delay of up to 12 hours. There is evidence that delay in IOL is associated with adverse outcomes. Aim: To determine the number of women experiencing delay in induction of labor and their outcomes. Method: This audit was retrospective and observational. It included women who had induction of labor in the month of October 2023 in two hospitals. Clinical data was collected from electronic medical records into an Excel sheet for analysis. Women had cervical ripening as inpatient or outpatient. The primary objective was to determine the number of women experiencing delay in induction of labor, while the secondary objective was to outcome these women. Result: 136 women had IOL. The least percentage of data retrieved for any parameter was 80%. The mean gestational age at IOL was 278.26 days. The mean waiting time was 905.34mins. Seventy-five women had their IOL at the Royal Infirmary of Edinburgh (RIE), fifty-seven at St. John’s Hospital (SJH), and three women were transferred from RIE to SJH. The preferred method of cervical ripening was balloon closely followed by prostaglandin. Twenty-seven women did not require cervical ripening and had their process started with amniotomy. Prostaglandin was the method of choice of cervical ripening at RIE, while balloon was preferred in SJH. Of the thirty-five women found to be suitable for outpatient cervical ripening, thirteen had outpatient ripening. There was a significant increase in the number of women undergoing outpatient cervical ripening at RIE from 10.5% in April 2022 to 42.9%. The preferred method for outpatient cervical ripening at the RIE was balloon, while it was prostaglandin for SJH. These were contradictory to the preferred method of inpatient cervical ripening at both centers. The average waiting time for IOL at RIE, 1166.92mins, is more than double that of SJH, 442.93mins, and far exceed 12hours, which is the proposed benchmark. The waiting time tends to be shorter with prostaglandin. Out of the women that had outpatient cervical ripening 63.6% had to wait for more than 12hrs before being induced while it was 36.1% for women that had inpatient cervical ripening. Overall, 38.5% women waited for more than 12 hours before having their induction. A lesser proportion of the women who waited for more than 12 hours had caesarean section, assisted vaginal delivery, and postpartum hemorrhage, whereas a greater proportion had spontaneous vaginal delivery and intrapartum or postpartum infection. Conclusion: A significant number of the women included in the study experienced delay in their induction process, and this was associated with an increased occurrence of intrapartum or postpartum infection. Outpatient cervical ripening contributed to delay.

Keywords: delay in induction of labor, inpatient, outpatient, intrapartum, postpartum, infection

Procedia PDF Downloads 22