Search results for: number of late jobs
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10961

Search results for: number of late jobs

9071 Local and Systemic Complications after Resection of Rectal Cancer in the Department of General and Abdominal Surgery University Clinical Center Maribor between 2004 and 2014

Authors: Nuhi Arslani, Stojan Potrc, Timotej Mikuljan

Abstract:

Background: In Department of Abdominal and General Surgery of University Medical Centre Maribor, we treated 578 patients for rectal cancer between 2004 and 2014. During and after treatment we especially concentrated on monitoring local and systemic complications. Methods: For analysis, we used data gathered from preoperative diagnostic tests, reports gathered during operation, reports from the pathohistologic review, and reports on complications after surgery and follow up. Results: In the case of 573 (out of 578) patients (99.1%) we performed resection. R0 was achieved in 551 patients (96,1%). R1 was achieved in 8 patients (1,4%). R2 was achieved in 14 patients (2,4%). Local complications were reported in 78 (13.5%) patients and systemic complications were reported in 68 (11.7%). We would like to point out the low number of local and systemic complications. Conclusions: With advances in surgical techniques, with a multimodal-multidisciplinary approach and with the use of total mesorectal excision we experienced a significant improvement in reducing the number of local and systemic complications in patients with rectal cancer. However, there still remains the question for truly optimal care for each patient with rectal cancer and his quality of life after surgical treatment.

Keywords: local complications, rectal cancer, resection, systemic complications

Procedia PDF Downloads 145
9070 Collocation Method for Coupled System of Boundary Value Problems with Cubic B-Splines

Authors: K. N. S. Kasi Viswanadham

Abstract:

Coupled system of second order linear and nonlinear boundary value problems occur in various fields of Science and Engineering. In the formulation of the problem, any one of 81 possible types of boundary conditions may occur. These 81 possible boundary conditions are written as a combination of four boundary conditions. To solve a coupled system of boundary value problem with these converted boundary conditions, a collocation method with cubic B-splines as basis functions has been developed. In the collocation method, the mesh points of the space variable domain have been selected as the collocation points. The basis functions have been redefined into a new set of basis functions which in number match with the number of mesh points in the space variable domain. The solution of a non-linear boundary value problem has been obtained as the limit of a sequence of solutions of linear boundary value problems generated by quasilinearization technique. Several linear and nonlinear boundary value problems are presented to test the efficiency of the proposed method and found that numerical results obtained by the present method are in good agreement with the exact solutions available in the literature.

Keywords: collocation method, coupled system, cubic b-splines, mesh points

Procedia PDF Downloads 196
9069 Rotor Concepts for the Counter Flow Heat Recovery Fan

Authors: Christoph Speer

Abstract:

Decentralized ventilation systems should combine a small and economical design with high aerodynamic and thermal efficiency. The Counter Flow Heat Recovery Fan (CHRF) provides the ability to meet these requirements by using only one cross flow fan with a large number of blades to generate both airflows and which simultaneously acts as a regenerative counter flow heat exchanger. The successful development of the first laboratory prototype has shown the potential of this ventilation system. Occurring condensate on the surfaces of the fan blades during the cold and dry season can be recovered through the characteristic mode of operation. Hence the CHRF provides the possibility to avoid the need for frost protection and condensate drain. Through the implementation of system-specific solutions for flow balancing and summer bypass the required functionality is assured. The scalability of the CHRF concept allows the use in renovation as well as in new buildings from single-room devices through to systems for office buildings. High aerodynamic and thermal efficiency and the lower number of required mechatronic components should enable a reduction in investment as well as operating costs. The rotor is the key component of the system, the requirements and possible implementation variants are presented.

Keywords: CHRF, counter flow heat recovery fan, decentralized ventilation system, renovation

Procedia PDF Downloads 342
9068 Flow-Control Effectiveness of Convergent Surface Indentations on an Aerofoil at Low Reynolds Numbers

Authors: Neel K. Shah

Abstract:

Passive flow control on aerofoils has largely been achieved through the use of protrusions such as vane-type vortex generators. Consequently, innovative flow-control concepts should be explored in an effort to improve current component performance. Therefore, experimental research has been performed at The University of Manchester to evaluate the flow-control effectiveness of a vortex generator made in the form of a surface indentation. The surface indentation has a trapezoidal planform. A spanwise array of indentations has been applied in a convergent orientation around the maximum-thickness location of the upper surface of a NACA-0015 aerofoil. The aerofoil has been tested in a two-dimensional set-up in a low-speed wind tunnel at an angle of attack (AoA) of 3° and a chord-based Reynolds number (Re) of ~2.7 x 105. The baseline model has been found to suffer from a laminar separation bubble at low AoA. The application of the indentations at 3° AoA has considerably shortened the separation bubble. The indentations achieve this by shedding up-flow pairs of streamwise vortices. Despite the considerable reduction in bubble length, the increase in leading-edge suction due to the shorter bubble is limited by the removal of surface curvature and blockage (increase in surface pressure) caused locally by the convergent indentations. Furthermore, the up-flow region of the vortices, which locally weakens the pressure recovery around the trailing edge of the aerofoil by thickening the boundary layer, also contributes to this limitation. Due to the conflicting effects of the indentations, the changes in the pressure-lift and pressure-drag coefficients, i.e., cl,p and cd,p, are small. Nevertheless, the indentations have improved cl,p and cd,p beyond the uncertainty range, i.e., by ~1.30% and ~0.30%, respectively, at 3° AoA. The wake measurements show that turbulence intensity and Reynolds stresses have considerably increased in the indented case, thus implying that the indentations increase the viscous drag on the model. In summary, the convergent indentations are able to reduce the size of the laminar separation bubble, but conversely, they are not highly effective in reducing cd,p at the tested Reynolds number.

Keywords: aerofoil flow control, laminar separation bubbles, low Reynolds-number flows, surface indentations

Procedia PDF Downloads 217
9067 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 141
9066 Influence of Shield Positions on Thermo/Fluid Performance of Pin Fin Heat Sink

Authors: Ramy H. Mohammed

Abstract:

In heat sinks, the flow within the core exhibits separation and hence does not lend itself to simple analytical boundary layer or duct flow analysis of the wall friction. In this paper, I present some findings from an experimental and numerical study aimed to obtain physical insight into the influence of the presence of the shield and its position on the hydraulic and thermal performance of square pin fin heat sink without top by-pass. The variations of the Nusselt number and friction factor are obtained under varied parameters, such as the Reynolds number and the shield position. The numerical code is validated by comparing the numerical results with the available experimental data. It is shown that, there is a good agreement between the temperature predictions based on the model and the experimental data. Results show that, as the presence of the shield, the heat transfer of fin array is enhanced and the flow resistance increased. The surface temperature distribution of the heat sink base is more uniform when the dimensionless shield position equals to 1/3 or 2/3. The comprehensive performance evaluation approach based on identical pumping power criteria is adopted and shows that the optimum shield position is at x/l=0.43 where energy is saved.

Keywords: shield, fin array, performance evaluation, heat transfer, energy

Procedia PDF Downloads 293
9065 Management of Severe Asthma with Omalizumab in United Arab Emirates

Authors: Shanza Akram, Samir Salah, Imran Saleem, Jassim Abdou, Ashraf Al Zaabi

Abstract:

Estimated prevalence of asthma in UAE is around 10% (900,000 people). Patients with persistent symptoms despite using high dose ICS plus a second controller +/- Oral steroids are considered to have severe asthma. Omalizumab (Xolair) is an anti-IgE monoclonal antibody approved as add-on therapy for severe allergic asthma. The objective of our study was to obtain baseline characteristics of our local cohort, to determine the efficacy of omalizumab based on clinical outcomes pre and post 52 weeks of treatment and to assess safety and tolerability. Medical records of patients receiving omalizumab therapy for asthma at Zayed Military Hospital, Abu Dhabi were retrospectively reviewed. Patients fulfilling the criteria for severe allergic asthma as per GINA guidelines were included. Asthma control over 12 months pre and post omalizumab were analyzed by taking into account the number of exacerbations, hospitalizations, maintenance of medication dosages, the need for reliever therapy and PFT’s. 21 patients (5 females) with mean age 41 years were included. The mean duration of therapy was 22 months. 19 (91%) patients had Allergic Rhinitis/Sinusitis. Mean serum total IgE level was 648 IU/ml (65-1859). 11 (52%) patients were on oral maintenance steroids pre-treatment. 7 patients managed to stop steroids on treatment while 4 were able to decrease the dosage. Mean exacerbation rate decreased from 5 per year pre-treatment to 1.36 while on treatment. The number of hospitalizations decreased from a mean of 2 per year to 0.9 per year. Reliever inhaler usage decreased from mean of 40 to 15 puffs per week.2 patients discontinued therapy, 1 due to lack of benefit (2 doses) and 2nd due to severe persistent side effects. Patient compliance was poor in some cases. Treatment with omalizumab reduced the number of exacerbations, hospitalizations, maintenance and reliever medications, and is generally well tolerated. Our results show that there is room for improved documentation in terms of symptom recording and use of rescue medication at our institution. There is also need for better patient education and counseling in order to improve compliance.

Keywords: asthma, exacerbations, omalizumab, IgE

Procedia PDF Downloads 362
9064 Battling with Patriarchy: Political Sexuality and Gender Democracy in Nigeria

Authors: Lenshie, Nsemba Edward

Abstract:

This paper examines political sexuality as an identity construct, which imparts on democratic practices globally. The manifestation of political sexuality reflect on the dynamics of social, economic, cultural and political relations among different gender affecting a number of issues, such as the questions of citizenship, poverty alleviation, property rights, ownership and inheritance, rights to sexual consent, polygamous marriage, governance and representation among other issues. This paper is concerned with the aspect of political participation among different genders in Nigeria. This paper posit that political sexuality is an outcome of ‘sexuality differences’, which seeks to glorify and gratify the superiority of a particular sexuality over another. Political sexuality, therefore, motivate and exacerbate socio-cultural, economic, and political struggles among different sexualities. The paper asserts further that majority of women have been discriminated, sexually harassed, and are often denied certain rights and privileges in Nigeria. A few number of women who have found themselves at the corridors of government have used the Beijing protocol on Women to demand for ‘affirmative action’ to expand their political space. It contends that the ‘affirmative action’ in Nigeria is far from achieving it throughout the country. The paper conclude that women require more than just a ‘self-rediscovery’ to assertively demand for a more and proper inclusion in Nigeria’s democratic process.

Keywords: gender democracy, identity, politics, political sexuality

Procedia PDF Downloads 422
9063 Aggregation of Butanediyl-1,4-Bis(Tetradecyldimethylammonium Bromide) (14–4–14) Gemini Surfactants in Presence of Ethylene Glycol and Propylene Glycol

Authors: P. Ajmal Koya, Tariq Ahmad Wagay, K. Ismail

Abstract:

One of the fundamental property of surfactant molecules are their ability to aggregate in water or binary mixtures of water and organic solvents as an effort to minimize their unfavourable interaction with the medium. In this work, influence two co-solvents (ethylene glycol (EG) and propylene glycol (PG)) on the aggregation properties of a cationic gemini surfactant, butanediyl-1,4-bis(tetradecyldimethylammonium bromide) (14–4–14), has been studied by conductance and steady state fluorescence at 298 K. The weight percentage of two co-solvents varied in between 0 and 50 % at an interval of 5 % up to 20 % and then 10 % up to 50 %. It was found that micellization process is delayed by the inclusion of both the co-solvents; consequently, a progressive increase was observed in critical micelle concentration (cmc) and Gibbs free energy of micellization (∆G0m), whereas a rough increase was observed in the values of degree of counter ion dissociation (α) and a decrease was obtained in values of average aggregation number (Nagg) and Stern-Volmer constant (KSV). At low weight percentage (up to 15 %) of co-solvents, 14–4–14 geminis were found to be almost equally prone to micellization both in EG–water (EG–WR) and in PG–water (PG–WR) mixed media while at high weight percentages they are more prone to micellization in EG–WR than in PG–WR mixed media.

Keywords: aggregation number, gemini surfactant, micellization, non aqueous solvent

Procedia PDF Downloads 307
9062 Development of DNA Fingerprints in Selected Medicinal Plants of India

Authors: V. Verma, Hazi Raja

Abstract:

Conventionally, morphological descriptors are routinely used for establishing the identity of varieties. But these morphological descriptors suffer from many drawbacks such as influence of environment on trait expression, epistatic interactions, pleiotrophic effects etc. Furthermore, the paucity of a sufficient number of these descriptors for unequivocal identification of increasing number of reference collection varieties enforces to look for alternatives. Therefore, DNA based finger-print based techniques were selected to define the systematic position of the selected medicinal plants like Plumbago zeylanica, Desmodium gangeticum, Uraria picta. DNA fingerprinting of herbal plants can be useful in authenticating the various claims of medical uses related to the plants, in germplasm characterization and conservation. In plants it has not only helped in identifying species but also in defining a new realm in plant genomics, plant breeding and in conserving the biodiversity. With world paving way for developments in biotechnology, DNA fingerprinting promises a very powerful tool in our future endeavors. Data will be presented on the development of microsatellite markers (SSR) used to fingerprint, characterize, and assess genetic diversity among 12 accessions of both Plumbago zeylanica, 4 accessions of Desmodium gengaticum, 4 accessions of Uraria Picta.

Keywords: Plumbago zeylanica, Desmodium gangeticum, Uraria picta, microsaetllite markers

Procedia PDF Downloads 206
9061 A Study of the Views of Information Technologies Teachers regarding In-Service Training

Authors: Halit Arslan, Ismail Sahin, Ahmet Oguz Akturk, Ismail Celik

Abstract:

Today, the means of following the developments in the area of science and technology is to keep up with the pace of the advancements in this area. As is in every profession, apart from their personal efforts, the training of teachers in the period after they start their careers is only possible through in-service training. The aim of the present study is to determine the views of Information Technologies (IT) teachers regarding the in-service training courses organized by the Ministry of National Education. In this study, in which quantitative research methods and techniques were employed, the views of 196 IT teachers were collected by using the “Views on In-service Training” questionnaire developed by the authors of the paper. Independent groups t-test was used to determine whether the views of IT teachers regarding in-service training differed depending on gender, age and professional seniority. One-way analysis of variance (ANOVA) was used to investigate whether the views of IT teachers regarding in-service training differed depending on the number of in-service training courses they joined and the type of in-service training course they wanted to take. According to the findings obtained in the study, the views of IT teachers on in-service training did not show a significant difference depending on gender and age, whereas those views differed depending on professional seniority, the number of in-service training courses they joined and the type of in-service training course they wanted to take.

Keywords: in-service training, IT teachers, professional development, personal development

Procedia PDF Downloads 397
9060 Global Analysis of Modern Economic Sanctions

Authors: I. L. Yakushev

Abstract:

Economic sanctions are an integral part of the foreign policy repertoire of States. Increasingly, States and international organizations are resorting to sanctions to address a variety of issues -from fighting corruption to preventing the use of nuclear weapons. Over time, the ways in which economic sanctions have been used have changed, especially over the past two decades. In the late 1990s, the recognition of the humanitarian harm of economic sanctions and the "War on Terrorism" after the events of September 11, 2001, led to serious changes in the structure and mechanisms of their application. Questions about how these coercive tools work, when they are applied, what consequences they have, and when they are successful are still being determined by research conducted in the second half of the 20th century. The conclusions drawn from past cases of sanctions may not be fully applicable to the current sanctions policy. In the second half of the 20th century, most cases of sanctions were related to the United States, and it covered restrictions on international trade. However, over the past two decades, the European Union, the United Nations, and China have also been the main initiators of sanctions. Modern sanctions include targeted and financial restrictions and are applied against individuals, organizations, and companies. Changing the senders, targets, stakeholders, and economic instruments used in the sanctions policy has serious implications for effectiveness and results. The regulatory and bureaucratic infrastructure necessary to implement and comply with modern economic sanctions has become more reliable. This evolution of sanctions has provided the scientific community with an opportunity to study new issues of coercion and return to the old ones. The economic sanctions research program should be developed to be relevant for understanding the application of modern sanctions and their consequences.

Keywords: global analysis, economic sanctions, targeted sanctions, foreign policy, domestic policy, United Nations, European Union, USA, economic pressure

Procedia PDF Downloads 45
9059 NABERS Indoor Environment - a Rating Tool to Benchmark the IEQ of Australian Office Commercial Buildings

Authors: Kazi Hossain

Abstract:

The National Australian Built Environment Rating System (NABERS) is the key industry standard for measuring and benchmarking environmental performance of existing buildings in Australia. Developed and run by the New South Wales government, NABERS measures the operational efficiency of different types of buildings by using a set of tools that provide an easy to understand graphical rating outcome ranged from 0 to 6 stars. This set of tools also include a tool called NABERS IE which enables tenants or building managers to benchmark their buildings indoor environment quality against the national market. Launched in 2009, the number NABERS IE ratings have steadily increased from 10 certified ratings in 2011 to 43 in 2013. However there is a massive uptake of over 50 ratings alone in 2014 making the number of ratings to reach over 100. This paper outlines the methodology used to create this tool, a statistical overview of the tool, and the driving factor that motivates the building owners and managers to use this tool every year to rate their buildings.

Keywords: Acoustic comfort, Indoor air quality, Indoor Environment, NABERS, National Australian Built Environment Rating System, Performance rating, Rating System, Thermal comfort, Ventilation effectiveness, Visual comfort.

Procedia PDF Downloads 542
9058 Improvement of the Q-System Using the Rock Engineering System: A Case Study of Water Conveyor Tunnel of Azad Dam

Authors: Sahand Golmohammadi, Sana Hosseini Shirazi

Abstract:

Because the status and mechanical parameters of discontinuities in the rock mass are included in the calculations, various methods of rock engineering classification are often used as a starting point for the design of different types of structures. The Q-system is one of the most frequently used methods for stability analysis and determination of support systems of underground structures in rock, including tunnel. In this method, six main parameters of the rock mass, namely, the rock quality designation (RQD), joint set number (Jn), joint roughness number (Jr), joint alteration number (Ja), joint water parameter (Jw) and stress reduction factor (SRF) are required. In this regard, in order to achieve a reasonable and optimal design, identifying the effective parameters for the stability of the mentioned structures is one of the most important goals and the most necessary actions in rock engineering. Therefore, it is necessary to study the relationships between the parameters of a system and how they interact with each other and, ultimately, the whole system. In this research, it has attempted to determine the most effective parameters (key parameters) from the six parameters of rock mass in the Q-system using the rock engineering system (RES) method to improve the relationships between the parameters in the calculation of the Q value. The RES system is, in fact, a method by which one can determine the degree of cause and effect of a system's parameters by making an interaction matrix. In this research, the geomechanical data collected from the water conveyor tunnel of Azad Dam were used to make the interaction matrix of the Q-system. For this purpose, instead of using the conventional methods that are always accompanied by defects such as uncertainty, the Q-system interaction matrix is coded using a technique that is actually a statistical analysis of the data and determining the correlation coefficient between them. So, the effect of each parameter on the system is evaluated with greater certainty. The results of this study show that the formed interaction matrix provides a reasonable estimate of the effective parameters in the Q-system. Among the six parameters of the Q-system, the SRF and Jr parameters have the maximum and minimum impact on the system, respectively, and also the RQD and Jw parameters have the maximum and minimum impact on the system, respectively. Therefore, by developing this method, we can obtain a more accurate relation to the rock mass classification by weighting the required parameters in the Q-system.

Keywords: Q-system, rock engineering system, statistical analysis, rock mass, tunnel

Procedia PDF Downloads 55
9057 Induction of Cytotoxicity and Apoptosis in Ovarian Cancer Cell Line (CAOV-3) by an Isoquinoline Alkaloid Isolated from Enicosanthellum pulchrum (King) Heusden

Authors: Noraziah Nordin, Najihah Mohd Hashim, Nazia Abdul Majid, Mashitoh Abdul Rahman, Hamed Karimian, Hapipah Mohd Ali

Abstract:

Enicosanthellum pulchrum belongs to family Annonaceae is also known as family of 'mempisang' in Malaysia. Liriodenine was isolated by prep-HPLC method. This method was first technique used for the isolation of this compound. The structure of the liriodenine was elucidated by 1D and 2D spectroscopy techniques. Liriodenine was tested on ovarian cancer cells line (CAOV-3) for MTT, AO/PI and cytotoxicity 3 assays. The MTT assay was performed to determine the cytotoxicity effect of lirodenine on CAOV-3 cells. The morphological changes on CAOV-3 cells were observed by AO/PI assay for the early and late stage of apoptosis, as well as necrosis. Meanwhile, the measurement of cell loss, nuclear morphology, DNA content, cell membrane permeability, mitochondrial membrane potential changes and cytochrome c release from mitochondria were detected through cytotoxicity 3 assay. The IC50 results showed liriodenine inhibits the growth of CAOV-3 cells after 24 h of treatment at 10.25 ± 1.06 µg/mL. After 48 and 72 h of treatments, the IC50 values were decreased to 7.65 ± 0:07 and 6.35 ± 1.62 µg/mL, respectively. The morphology changes can be seen on CAOV-3 with a production of cell membrane blebbing, cromatin condensation and apoptotic bodies with increasing time of treatment from 24 to 72 h. Evaluation of cytotoxicity 3 on CAOV-3 cells after treated with liriodenine, resulting loss of mitochondrial membrane potential and release of cytochrome c from mitochondria. The results demonstrated the capability of liriodenine as a promising anticancer agent, particularly on human ovarian cancer.

Keywords: Enicosanthellum pulchrum, ovarian cancer, apoptosis, cytotoxicity

Procedia PDF Downloads 426
9056 Re-Stating the Origin of Tetrapod Using Measures of Phylogenetic Support for Phylogenomic Data

Authors: Yunfeng Shan, Xiaoliang Wang, Youjun Zhou

Abstract:

Whole-genome data from two lungfish species, along with other species, present a valuable opportunity to re-investigate the longstanding debate regarding the evolutionary relationships among tetrapods, lungfishes, and coelacanths. However, the use of bootstrap support has become outdated for large-scale phylogenomic data. Without robust phylogenetic support, the phylogenetic trees become meaningless. Therefore, it is necessary to re-evaluate the phylogenies of tetrapods, lungfishes, and coelacanths using novel measures of phylogenetic support specifically designed for phylogenomic data, as the previous phylogenies were based on 100% bootstrap support. Our findings consistently provide strong evidence favoring lungfish as the closest living relative of tetrapods. This conclusion is based on high internode certainty, relative gene support, and high gene concordance factor. The evidence stems from five previous datasets derived from lungfish transcriptomes. These results yield fresh insights into the three hypotheses regarding the phylogenies of tetrapods, lungfishes, and coelacanths. Importantly, these hypotheses are not mere conjectures but are substantiated by a significant number of genes. Analyzing real biological data further demonstrates that the inclusion of additional taxa leads to more diverse tree topologies. Consequently, gene trees and species trees may not be identical even when whole-genome sequencing data is utilized. However, it is worth noting that many gene trees can accurately reflect the species tree if an appropriate number of taxa, typically ranging from six to ten, are sampled. Therefore, it is crucial to carefully select the number of taxa and an appropriate outgroup, such as slow-evolving species, while excluding fast-evolving taxa as outgroups to mitigate the adverse effects of long-branch attraction and achieve an accurate reconstruction of the species tree. This is particularly important as more whole-genome sequencing data becomes available.

Keywords: novel measures of phylogenetic support for phylogenomic data, gene concordance factor confidence, relative gene support, internode certainty, origin of tetrapods

Procedia PDF Downloads 45
9055 Fault Tolerant and Testable Designs of Reversible Sequential Building Blocks

Authors: Vishal Pareek, Shubham Gupta, Sushil Chandra Jain

Abstract:

With increasing high-speed computation demand the power consumption, heat dissipation and chip size issues are posing challenges for logic design with conventional technologies. Recovery of bit loss and bit errors is other issues that require reversibility and fault tolerance in the computation. The reversible computing is emerging as an alternative to conventional technologies to overcome the above problems and helpful in a diverse area such as low-power design, nanotechnology, quantum computing. Bit loss issue can be solved through unique input-output mapping which require reversibility and bit error issue require the capability of fault tolerance in design. In order to incorporate reversibility a number of combinational reversible logic based circuits have been developed. However, very few sequential reversible circuits have been reported in the literature. To make the circuit fault tolerant, a number of fault model and test approaches have been proposed for reversible logic. In this paper, we have attempted to incorporate fault tolerance in sequential reversible building blocks such as D flip-flop, T flip-flop, JK flip-flop, R-S flip-flop, Master-Slave D flip-flop, and double edge triggered D flip-flop by making them parity preserving. The importance of this proposed work lies in the fact that it provides the design of reversible sequential circuits completely testable for any stuck-at fault and single bit fault. In our opinion our design of reversible building blocks is superior to existing designs in term of quantum cost, hardware complexity, constant input, garbage output, number of gates and design of online testable D flip-flop have been proposed for the first time. We hope our work can be extended for building complex reversible sequential circuits.

Keywords: parity preserving gate, quantum computing, fault tolerance, flip-flop, sequential reversible logic

Procedia PDF Downloads 530
9054 CFD simulation of Near Wall Turbulence and Heat Transfer of Molten Salts

Authors: C. S. Sona, Makrand A. Khanwale, Channamallikarjun S. Mathpati

Abstract:

New generation nuclear power plants are currently being developed to be highly economical, to be passive safe, to produce hydrogen. An important feature of these reactors will be the use of coolants at temperature higher than that being used in current nuclear reactors. The molten fluoride salt with a eutectic composition of 46.5% LiF - 11.5% NaF - 42% KF (mol %) commonly known as FLiNaK is a leading candidate for heat transfer coolant for these nuclear reactors. CFD simulations were carried out using large eddy simulations to investigate the flow characteristics of molten FLiNaK at 850°C at a Reynolds number of 10,500 in a cylindrical pipe. Simulation results have been validated with the help of mean velocity profile using direct numerical simulation data. Transient velocity information was used to identify and characterise turbulent structures which are important for transfer of heat across solid-fluid interface. A wavelet transform based methodology called wavelet transform modulus maxima was used to identify and characterise the singularities. This analysis was also used for flow visualisation, and also to calculate the heat transfer coefficient using small eddy model. The predicted Nusselt number showed good agreement with the available experimental data.

Keywords: FLiNaK, heat transfer, molten salt, turbulent structures

Procedia PDF Downloads 438
9053 Describing Cognitive Decline in Alzheimer's Disease via a Picture Description Writing Task

Authors: Marielle Leijten, Catherine Meulemans, Sven De Maeyer, Luuk Van Waes

Abstract:

For the diagnosis of Alzheimer's disease (AD), a large variety of neuropsychological tests are available. In some of these tests, linguistic processing - both oral and written - is an important factor. Language disturbances might serve as a strong indicator for an underlying neurodegenerative disorder like AD. However, the current diagnostic instruments for language assessment mainly focus on product measures, such as text length or number of errors, ignoring the importance of the process that leads to written or spoken language production. In this study, it is our aim to describe and test differences between cognitive and impaired elderly on the basis of a selection of writing process variables (inter- and intrapersonal characteristics). These process variables are mainly related to pause times, because the number, length, and location of pauses have proven to be an important indicator of the cognitive complexity of a process. Method: Participants that were enrolled in our research were chosen on the basis of a number of basic criteria necessary to collect reliable writing process data. Furthermore, we opted to match the thirteen cognitively impaired patients (8 MCI and 5 AD) with thirteen cognitively healthy elderly. At the start of the experiment, participants were each given a number of tests, such as the Mini-Mental State Examination test (MMSE), the Geriatric Depression Scale (GDS), the forward and backward digit span and the Edinburgh Handedness Inventory (EHI). Also, a questionnaire was used to collect socio-demographic information (age, gender, eduction) of the subjects as well as more details on their level of computer literacy. The tests and questionnaire were followed by two typing tasks and two picture description tasks. For the typing tasks participants had to copy (type) characters, words and sentences from a screen, whereas the picture description tasks each consisted of an image they had to describe in a few sentences. Both the typing and the picture description tasks were logged with Inputlog, a keystroke logging tool that allows us to log and time stamp keystroke activity to reconstruct and describe text production processes. The main rationale behind keystroke logging is that writing fluency and flow reveal traces of the underlying cognitive processes. This explains the analytical focus on pause (length, number, distribution, location, etc.) and revision (number, type, operation, embeddedness, location, etc.) characteristics. As in speech, pause times are seen as indexical of cognitive effort. Results. Preliminary analysis already showed some promising results concerning pause times before, within and after words. For all variables, mixed effects models were used that included participants as a random effect and MMSE scores, GDS scores and word categories (such as determiners and nouns) as a fixed effect. For pause times before and after words cognitively impaired patients paused longer than healthy elderly. These variables did not show an interaction effect between the group participants (cognitively impaired or healthy elderly) belonged to and word categories. However, pause times within words did show an interaction effect, which indicates pause times within certain word categories differ significantly between patients and healthy elderly.

Keywords: Alzheimer's disease, keystroke logging, matching, writing process

Procedia PDF Downloads 353
9052 Quadratic Convective Flow of a Micropolar Fluid in a Non-Darcy Porous Medium with Convective Boundary Condition

Authors: Ch. Ramreddy, P. Naveen, D. Srinivasacharya

Abstract:

The objective of the present study is to investigate the effect of nonlinear temperature and concentration on the mixed convective flow of micropolar fluid over an inclined flat plate in a non-Darcy porous medium in the presence of convective boundary condition. In order to analyze all the essential features, the transformed nonlinear conservation equations are worked out numerically by spectral method. By insisting the comparison between vertical, horizontal and inclined plates, the physical quantities of the flow and its characteristics are exhibited graphically and quantitatively with various parameters. An increase in the coupling number and inclination of angle tend to decrease the skin friction, mass transfer rate and the reverse change is there in wall couple stress and heat transfer rate. The nominal effect on the wall couple stress and skin friction is encountered whereas the significant effect on the local heat and mass transfer rates are found for high enough values of Biot number.

Keywords: convective boundary condition, micropolar fluid, non-darcy porous medium, non-linear convection, spectral method

Procedia PDF Downloads 260
9051 Litho-Structural Variations and Gold Mineralization around Wonaka Schist Belt, North West Nigeria

Authors: Umar Sambo Umar, Ahmad Isah Haruna, Abubakar Sadik Maigari, Muhammad Bello Abubakar

Abstract:

Schist belts in Nigeria occur prominently west of longitude 80 E and sporadic to the east, they are upper Proterozioc low-medium grade deformed metasediments and metavolcanics that were intruded by Pan-African granitoids. The Wonaka schist belt, though reportedly distinctive in composition and metamorphism, is the least understood; the host for primary gold were not defined, structures which may control primary enrichment have not been delineated. The aim of this work is to determine the relationship between litho-structures and the gold around Wonaka schist belt through geological field mapping, petrographic studies and structural data analysis via ArcGis 10.2, Surfer 11.0 and Stereopro 2.0. The results show that the major rock types are mica schist and migmatites, muscovites detected during microstructural analysis suggests low-grade metamorphism in the metapelites. The shear zones identified were trending North Northeast – South Southwest (NNE-SSW), fractures trend mostly Northeast-Southwest (NE-SW) perpendicular to planes of gneissic foliations, these conform to the late Pan-African deformational episode. Pegmatite lodes, net self-cross cutting quartz veins as well as the quartz stringers hosted by both migmatites and schist are delineated as targets for primary gold mineralization, while major confluences of the streams serve as zones for secondary (placer) gold targets since the streams are dendritic and intermittent.

Keywords: gold mineralization, Nigeria, migmatites, Wonaka schist belt

Procedia PDF Downloads 178
9050 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications

Procedia PDF Downloads 200
9049 NO2 Exposure Effect on the Occurrence of Pulmonary Dysfunction the Police Traffic in Jakarta

Authors: Bambang Wispriyono, Satria Pratama, Haryoto Kusnoputranto, Faisal Yunus, Meliana Sari

Abstract:

Introduction/objective: The impact of the development of motor vehicles is increasing the number of pollutants in the air. One of the substances that cause serious health problems is NO2. The health impacts arising from exposure to NO2 include pulmonary function impairment. The purpose of this study was to determine the relationship of NO2 exposure on the incidence of pulmonary function impairment. Methods: We are using a cross-sectional study design with 110 traffic police who were divided into two groups: exposed (police officers working on the highway) and the unexposed group (police officers working in the office). Election subject convenient sampling carried out in each group to the minimum number of samples met. Results: The results showed that the average NO2 in the exposed group was 18.72 ppb and unexposed group is 4.14 ppb. Pulmonary dysfunction on exposed and unexposed groups showed that FVC (Forced Vital Capacity) value are 88.68 and 90.27. And FEV1 (Forced Expiratory Volume in One) value are 94.9 and 95.16. Some variables like waist circumference, Body Mass Index, Visceral Fat, and Fat has associated with the incidence of Pulmonary Dysfunction (p < 0.05). Conclusion: Health monitoring is needed to decreasing health risk in Policeman.

Keywords: NO2, pulmonary dysfunction, police traffic, Jakarta

Procedia PDF Downloads 248
9048 Multi-Objective Optimization of Run-of-River Small-Hydropower Plants Considering Both Investment Cost and Annual Energy Generation

Authors: Amèdédjihundé H. J. Hounnou, Frédéric Dubas, François-Xavier Fifatin, Didier Chamagne, Antoine Vianou

Abstract:

This paper presents the techno-economic evaluation of run-of-river small-hydropower plants. In this regard, a multi-objective optimization procedure is proposed for the optimal sizing of the hydropower plants, and NSGAII is employed as the optimization algorithm. Annual generated energy and investment cost are considered as the objective functions, and number of generator units (n) and nominal turbine flow rate (QT) constitute the decision variables. Site of Yeripao in Benin is considered as the case study. We have categorized the river of this site using its environmental characteristics: gross head, and first quartile, median, third quartile and mean of flow. Effects of each decision variable on the objective functions are analysed. The results gave Pareto Front which represents the trade-offs between annual energy generation and the investment cost of hydropower plants, as well as the recommended optimal solutions. We noted that with the increase of the annual energy generation, the investment cost rises. Thus, maximizing energy generation is contradictory with minimizing the investment cost. Moreover, we have noted that the solutions of Pareto Front are grouped according to the number of generator units (n). The results also illustrate that the costs per kWh are grouped according to the n and rise with the increase of the nominal turbine flow rate. The lowest investment costs per kWh are obtained for n equal to one and are between 0.065 and 0.180 €/kWh. Following the values of n (equal to 1, 2, 3 or 4), the investment cost and investment cost per kWh increase almost linearly with increasing the nominal turbine flowrate while annual generated. Energy increases logarithmically with increasing of the nominal turbine flowrate. This study made for the Yeripao river can be applied to other rivers with their own characteristics.

Keywords: hydropower plant, investment cost, multi-objective optimization, number of generator units

Procedia PDF Downloads 146
9047 Experimental Investigation of S822 and S823 Wind Turbine Airfoils Wake

Authors: Amir B. Khoshnevis, Morteza Mirhosseini

Abstract:

The paper deals with a sub-part of an extensive research program on the wake survey method in various Reynolds numbers and angles of attack. This research experimentally investigates the wake flow characteristics behind S823 and S822 airfoils in which designed for small wind turbines. Velocity measurements determined by using hot-wire anemometer. Data acquired in the wake of the airfoil at locations(c is the chord length): 0.01c - 3c. Reynolds number increased due to increase of free stream velocity. Results showed that mean velocity profiles depend on the angle of attack and location of data collections. Data acquired at the low Reynolds numbers (smaller than 10^5). Effects of Reynolds numbers on the mean velocity profiles are more significant in near locations the trailing edge and these effects decrease by taking distance from trailing edge toward downstream. Mean velocity profiles region increased by increasing the angle of attack, except for 7°, and also the maximum velocity deficit (velocity defect) increased. The difference of mean velocity in and out of the wake decreased by taking distance from trailing edge, and mean velocity profile become wider and more uniform.

Keywords: angle of attack, Reynolds number, velocity deficit, separation

Procedia PDF Downloads 363
9046 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm

Authors: Vaibhav Barve

Abstract:

Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.

Keywords: data embedding, decryption, encryption, reversible data hiding, steganography

Procedia PDF Downloads 278
9045 Testing the Impact of the Nature of Services Offered on Travel Sites and Links on Traffic Generated: A Longitudinal Survey

Authors: Rania S. Hussein

Abstract:

Background: This study aims to determine the evolution of service provision by Egyptian travel sites and how these services change in terms of their level of sophistication over the period of the study which is ten years. To the author’s best knowledge, this is the first longitudinal study that focuses on an extended time frame of ten years. Additionally, the study attempts to determine the popularity of these websites through the number of links to these sites. Links maybe viewed as the equivalent of a referral or word of mouth but in an online context. Both popularity and the nature of the services provided by these websites are used to determine the traffic on these sites. In examining the nature of services provided, the website itself is viewed as an overall service offering that is composed of different travel products and services. Method: This study uses content analysis in the form of a small scale survey done on 30 Egyptian travel agents’ websites to examine whether Egyptian travel websites are static or dynamic in terms of the services that they provide and whether they provide simple or sophisticated travel services. To determine the level of sophistication of these travel sites, the nature and composition of products and services offered by these sites were first examined. A framework adapted from Kotler (1997) 'Five levels of a product' was used. The target group for this study consists of companies that do inbound tourism. Four rounds of data collection were conducted over a period of 10 years. Two rounds of data collection were made in 2004 and two rounds were made in 2014. Data from the travel agents’ sites were collected over a two weeks period in each of the four rounds. Besides collecting data on features of websites, data was also collected on the popularity of these websites through a software program called Alexa that showed the traffic rank and number of links of each site. Regression analysis was used to test the effect of links and services on websites as independent variables on traffic as the dependent variable of this study. Findings: Results indicate that as companies moved from having simple websites with basic travel information to being more interactive, the number of visitors illustrated by traffic and the popularity of those sites increase as shown by the number of links. Results also show that travel companies use the web much more for promotion rather than for distribution since most travel agents are using it basically for information provision. The results of this content analysis study taps on an unexplored area and provide useful insights for marketers on how they can generate more traffic to their websites by focusing on developing a distinctive content on these sites and also by focusing on the visibility of their sites thus enhancing the popularity or links to their sites.

Keywords: levels of a product, popularity, travel, website evolution

Procedia PDF Downloads 310
9044 Detection of Trends and Break Points in Climatic Indices: The Case of Umbria Region in Italy

Authors: A. Flammini, R. Morbidelli, C. Saltalippi

Abstract:

The increase of air surface temperature at global scale is a fact, with values around 0.85 ºC since the late nineteen century, as well as a significant change in main features of rainfall regime. Nevertheless, the detected climatic changes are not equally distributed all over the world, but exhibit specific characteristics in different regions. Therefore, studying the evolution of climatic indices in different geographical areas with a prefixed standard approach becomes very useful in order to analyze the existence of climatic trend and compare results. In this work, a methodology to investigate the climatic change and its effects on a wide set of climatic indices is proposed and applied at regional scale in the case study of a Mediterranean area, Umbria region in Italy. From data of the available temperature stations, nine temperature indices have been obtained and the existence of trends has been checked by applying the non-parametric Mann-Kendall test, while the non-parametric Pettitt test and the parametric Standard Normal Homogeneity Test (SNHT) have been applied to detect the presence of break points. In addition, aimed to characterize the rainfall regime, data from 11 rainfall stations have been used and a trend analysis has been performed on cumulative annual rainfall depth, daily rainfall, rainy days, and dry periods length. The results show a general increase in any temperature indices, even if with a trend pattern dependent of indices and stations, and a general decrease of cumulative annual rainfall and average daily rainfall, with a time rainfall distribution over the year different from the past.

Keywords: climatic change, temperature, rainfall regime, trend analysis

Procedia PDF Downloads 99
9043 The Relationship between Personal, Psycho-Social and Occupational Risk Factors with Low Back Pain Severity in Industrial Workers

Authors: Omid Giahi, Ebrahim Darvishi, Mahdi Akbarzadeh

Abstract:

Introduction: Occupational low back pain (LBP) is one of the most prevalent work-related musculoskeletal disorders in which a lot of risk factors are involved that. The present study focuses on the relation between personal, psycho-social and occupational risk factors and LBP severity in industrial workers. Materials and Methods: This research was a case-control study which was conducted in Kurdistan province. 100 workers (Mean Age ± SD of 39.9 ± 10.45) with LBP were selected as the case group, and 100 workers (Mean Age ± SD of 37.2 ± 8.5) without LBP were assigned into the control group. All participants were selected from various industrial units, and they had similar occupational conditions. The required data including demographic information (BMI, smoking, alcohol, and family history), occupational (posture, mental workload (MWL), force, vibration and repetition), and psychosocial factors (stress, occupational satisfaction and security) of the participants were collected via consultation with occupational medicine specialists, interview, and the related questionnaires and also the NASA-TLX software and REBA worksheet. Chi-square test, logistic regression and structural equation modeling (SEM) were used to analyze the data. For analysis of data, IBM Statistics SPSS 24 and Mplus6 software have been used. Results: 114 (77%) of the individuals were male and 86 were (23%) female. Mean Career length of the Case Group and Control Group were 10.90 ± 5.92, 9.22 ± 4.24, respectively. The statistical analysis of the data revealed that there was a significant correlation between the Posture, Smoking, Stress, Satisfaction, and MWL with occupational LBP. The odds ratios (95% confidence intervals) derived from a logistic regression model were 2.7 (1.27-2.24) and 2.5 (2.26-5.17) and 3.22 (2.47-3.24) for Stress, MWL, and Posture, respectively. Also, the SEM analysis of the personal, psycho-social and occupational factors with LBP revealed that there was a significant correlation. Conclusion: All three broad categories of risk factors simultaneously increase the risk of occupational LBP in the workplace. But, the risks of Posture, Stress, and MWL have a major role in LBP severity. Therefore, prevention strategies for persons in jobs with high risks for LBP are required to decrease the risk of occupational LBP.

Keywords: industrial workers occupational, low back pain, occupational risk factors, psychosocial factors

Procedia PDF Downloads 246
9042 Computational Study of Flow and Heat Transfer Characteristics of an Incompressible Fluid in a Channel Using Lattice Boltzmann Method

Authors: Imdat Taymaz, Erman Aslan, Kemal Cakir

Abstract:

The Lattice Boltzmann Method (LBM) is performed to computationally investigate the laminar flow and heat transfer of an incompressible fluid with constant material properties in a 2D channel with a built-in triangular prism. Both momentum and energy transport is modelled by the LBM. A uniform lattice structure with a single time relaxation rule is used. Interpolation methods are applied for obtaining a higher flexibility on the computational grid, where the information is transferred from the lattice structure to the computational grid by Lagrange interpolation. The flow is researched on for different Reynolds number, while Prandtl number is keeping constant as a 0.7. The results show how the presence of a triangular prism effects the flow and heat transfer patterns for the steady-state and unsteady-periodic flow regimes. As an evaluation of the accuracy of the developed LBM code, the results are compared with those obtained by a commercial CFD code. It is observed that the present LBM code produces results that have similar accuracy with the well-established CFD code, as an additionally, LBM needs much smaller CPU time for the prediction of the unsteady phonema.

Keywords: laminar forced convection, lbm, triangular prism

Procedia PDF Downloads 359