Search results for: out-of-plane free vibration analysis
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30729

Search results for: out-of-plane free vibration analysis

28719 Effect of BaO-Bi₂O₃-P₂O₅ Glass Additive on Structural and Dielectric Properties of BaTiO₃ Ceramics

Authors: El Mehdi Haily, Lahcen Bih, Mohammed Azrour, Bouchaib Manoun

Abstract:

The effects of xBi₂O₃-yBaO-zP₂O₅ (BBP) glass addition on the sintering, structural, and dielectric properties of BaTiO₃ ceramic (BT) are studied. The BT ceramic was synthesized by the conventional solid-state reaction method while the glasses BaO-Bi₂O₃-P₂O₅ (BBP) were elaborated by melting and quenching process. Different composites BT-xBBP were formed by mixing the BBP glasses with BT ceramic. For each glass composition, where the ratio (x:y:z) is maintained constant, we have developed three composites with different glass weight percentage (x = 2.5, 5, and 7.5 wt %). Addition of the glass helps in better sintering at lower temperatures with the presence of liquid phase at the respective sintering temperatures. The results showed that the sintering temperature decreased from more than 1300°C to 900°C. Density measurements of the composites are performed using the standard Archimedean method with water as medium liquid. It is found that their density and molar volume decrease and increase with glass content, respectively. Raman spectroscopy is used to characterize their structural approach. This technique has allowed the identification of different structural units of phosphate and the characteristic vibration modes of the BT. The electrical properties of the composite samples are carried out by impedance spectroscopy in the frequency range of 10 Hz to 1 MHz under various temperatures from 300 to 473 K. The obtained results show that their dielectric properties depend both on the content of the glass in the composite and the Bi/P ratio in the glasses.

Keywords: phosphate, glasses, composite, Raman spectroscopy, dielectric properties

Procedia PDF Downloads 163
28718 A Social Cognitive Investigation in the Context of Vocational Training Performance of People with Disabilities

Authors: Majid A. AlSayari

Abstract:

The study reported here investigated social cognitive theory (SCT) in the context of Vocational Rehab (VR) for people with disabilities. The prime purpose was to increase knowledge of VR phenomena and make recommendations for improving VR services. The sample consisted of 242 persons with Spinal Cord Injuries (SCI) who completed questionnaires. A further 32 participants were Trainers. Analysis of questionnaire data was carried out using factor analysis, multiple regression analysis, and thematic analysis. The analysis suggested that, in motivational terms, and consistent with research carried out in other academic contexts, self-efficacy was the best predictor of VR performance. The author concludes that that VR self-efficacy predicted VR training performance.

Keywords: people with physical disabilities, social cognitive theory, self-efficacy, vocational training

Procedia PDF Downloads 317
28717 Model Based Improvement of Ultrasound Assisted Transport of Cohesive Dry Powders

Authors: Paul Dunst, Ing. Tobias Hemsel, Ing. Habil. Walter Sextro

Abstract:

The use of fine powders with high cohesive and adhesive properties leads to challenges during transport, mixing and dosing in industrial processes, which have not been satisfactorily solved so far. Due to the increased contact forces at the transporting parts (e. g. pipe-wall and transport screws), conventional transport systems and also vibratory conveyors reach their limits. Often, flowability increasing additives that need to be removed again in later process steps are the only option to achieve wanted transport results. A rather new ultrasound-assisted powder transport system showed to overcome some of the issues by manipulating the effective friction between powder and transport pipe. Within this contribution, the transport mechanism will be introduced shortly, together with preliminary transport results. As the tangential force of the transport pipe and the powder is the main influencing factor within the transport process, a test stand for measuring tangential forces of a powder-wall contact in the presence of an ultrasonic vibration orthogonal to the contact plane was built. Measurements for a sample powder show that the effective tangential force can already be significantly reduced at very low ultrasonic amplitude. As a result of the measurements, an empirical model for the relationship of tangential force, contact parameters and ultrasonic excitation is presented. This model was used to adjust the driving parameters of the powder transport system, resulting in better performance.

Keywords: powder transport, ultrasound, friction, friction manipulation, vibratory conveyor

Procedia PDF Downloads 152
28716 Health Seeking Manners of Road Traffic Accident Victims: A Qualitative Study

Authors: Mohammad Mahbub Alam Talukder, Shahnewaz, Hasanat-E-Rabbi, Mohammed Nazrul Islam

Abstract:

Road traffic accident is a global problem which is severe in the developing countries like Bangladesh. In consequence, in developing countries road trauma has now been recognized as an increasing public health hazards and economic burning issue. And after road traffic accidents the lack of management and economic costs related with health seeking behavior have a disproportionate impact on lower income groups, thus contributing to the persistence of poverty in conjunction with disability. This cross sectional study, carried out during July 2012 to June 2013, aimed to explore health seeking decision and culture of handling the road traffic accident related victims, as taken from experiences of the poor disabled people of slum dwellers of Dhaka city. The present study has been designed based on qualitative techniques such as in-depth interview and case studies. Additionally, a survey questionnaire was used to collect the demographic characteristics of the study population (n=150) and to select participants purposely for in-depth interview (n=50) and case study (n=30). Content analysis of qualitative data was done through theme coding and matrix analysis of case study was done to use relevant verbatim. Most of the time the health seeking decision totally depended on the surrounded people of the accidental place, their knowledge, awareness and remaining facility and capacity regarding proper management of the victims. However, most of the cases the victims did not get any early treatment and it took 2-12 hours to get even the first aid because of distance, shortage of money, lack of availability of getting the aid, lack of mass awareness etc. Under the reality of discriminated and unaffordable health service provision better treatment could not turn out due to economic inability of the poor victims. To avoid the severe trauma, treatment delay must be reduced by providing first aid within very short time and to do so, mass awareness campaign is necessary for handing the victims. Moreover, necessary measures should be taken to ensure cost free health service provision to treat the chronic disabled condition of the road traffic accident related poor victims.

Keywords: accident, injury, disabled, qualitative, slum

Procedia PDF Downloads 365
28715 Accelerating Side Channel Analysis with Distributed and Parallelized Processing

Authors: Kyunghee Oh, Dooho Choi

Abstract:

Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing.

Keywords: DPA, distributed computing, parallelized processing, side channel analysis

Procedia PDF Downloads 431
28714 Evaluation of Residual Stresses in Human Face as a Function of Growth

Authors: M. A. Askari, M. A. Nazari, P. Perrier, Y. Payan

Abstract:

Growth and remodeling of biological structures have gained lots of attention over the past decades. Determining the response of living tissues to mechanical loads is necessary for a wide range of developing fields such as prosthetics design or computerassisted surgical interventions. It is a well-known fact that biological structures are never stress-free, even when externally unloaded. The exact origin of these residual stresses is not clear, but theoretically, growth is one of the main sources. Extracting body organ’s shapes from medical imaging does not produce any information regarding the existing residual stresses in that organ. The simplest cause of such stresses is gravity since an organ grows under its influence from birth. Ignoring such residual stresses might cause erroneous results in numerical simulations. Accounting for residual stresses due to tissue growth can improve the accuracy of mechanical analysis results. This paper presents an original computational framework based on gradual growth to determine the residual stresses due to growth. To illustrate the method, we apply it to a finite element model of a healthy human face reconstructed from medical images. The distribution of residual stress in facial tissues is computed, which can overcome the effect of gravity and maintain tissues firmness. Our assumption is that tissue wrinkles caused by aging could be a consequence of decreasing residual stress and thus not counteracting gravity. Taking into account these stresses seems therefore extremely important in maxillofacial surgery. It would indeed help surgeons to estimate tissues changes after surgery.

Keywords: finite element method, growth, residual stress, soft tissue

Procedia PDF Downloads 271
28713 Automatic Registration of Rail Profile Based Local Maximum Curvature Entropy

Authors: Hao Wang, Shengchun Wang, Weidong Wang

Abstract:

On the influence of train vibration and environmental noise on the measurement of track wear, we proposed a method for automatic extraction of circular arc on the inner or outer side of the rail waist and achieved the high-precision registration of rail profile. Firstly, a polynomial fitting method based on truncated residual histogram was proposed to find the optimal fitting curve of the profile and reduce the influence of noise on profile curve fitting. Then, based on the curvature distribution characteristics of the fitting curve, the interval search algorithm based on dynamic window’s maximum curvature entropy was proposed to realize the automatic segmentation of small circular arc. At last, we fit two circle centers as matching reference points based on small circular arcs on both sides and realized the alignment from the measured profile to the standard designed profile. The static experimental results show that the mean and standard deviation of the method are controlled within 0.01mm with small measurement errors and high repeatability. The dynamic test also verified the repeatability of the method in the train-running environment, and the dynamic measurement deviation of rail wear is within 0.2mm with high repeatability.

Keywords: curvature entropy, profile registration, rail wear, structured light, train-running

Procedia PDF Downloads 264
28712 What are the Factors Underlying the Differences between Young Saudi Women in Traditional Families that Choose to Conform to the Society Norms, and Young Saudi Women who do not Conform?

Authors: Mai Al-Subaie

Abstract:

This research suggests that women in traditional families of Saudi Arabia are divided into two groups, the one who conform to the society and the new type of women that has been emerged due to the changing and development of the culture, who do not want to conform to the rules. The factors underlying the differences were explored by using a test and an interview. That concluded some of the main factors that were a real effect of why some women still want to follow the society and traditional rules, and other want to break free.

Keywords: conformity, non conformity, females, Saudi Arabia

Procedia PDF Downloads 511
28711 Passive and Active Spatial Pendulum Tuned Mass Damper with Two Tuning Frequencies

Authors: W. T. A. Mohammed, M. Eltaeb, R. Kashani

Abstract:

The first bending modes of tall asymmetric structures in the two lateral X and Y-directions have two different natural frequencies. To add tuned damping to these bending modes, one needs to either a) use two pendulum-tuned mass dampers (PTMDs) with one tuning frequency, each PTMD targeting one of the bending modes, or b) use one PTMD with two tuning frequencies (one in each lateral directions). Option (a), being more massive, requiring more space, and being more expensive, is less attractive than option (b). Considering that the tuning frequency of a pendulum depends mainly on the pendulum length, one way of realizing option (b) is by constraining the swinging length of the pendulum in one direction but not in the other; such PTMD is dubbed passive Bi-PTMD. Alternatively, option (b) can be realized by actively setting the tuning frequencies of the PTMD in the two directions. In this work, accurate physical models of passive Bi-PTMD and active PTMD are developed and incorporated into the numerical model of a tall asymmetric structure. The model of PTMDs plus structure is used for a)synthesizing such PTMDs for particular applications and b)evaluating their damping effectiveness in mitigating the dynamic lateral responses of their target asymmetric structures, perturbed by wind load in X and Y-directions. Depending on how elaborate the control scheme is, the active PTMD can either be made to yield the same damping effectiveness as the passive Bi-PTMD of the same size or the passive Bi-TMD twice as massive as the active PTMD.

Keywords: active tuned mass damper, high-rise building, multi-frequency tuning, vibration control

Procedia PDF Downloads 107
28710 The International Legal Protection of Foreign Investment Through Bilateral Investment Treaties and Double Taxation Treaties in the Context of International Investment Law and International Tax Law

Authors: Abdulmajeed Abdullah Alqarni

Abstract:

This paper is devoted a study of the current frameworks applicable to foreign investments at the levels of domestic and international law, with a particular focus on the legitimate balance to be achieved between the rights of the host state and the legal protections owed to foreign investors. At the wider level of analysis, the paper attempts to map and critically examine the relationship between foreign investment and economic development. In doing so, the paper offers a study in how current discourses and practices on investment law can reconcile the competing interests of developing and developed countries. The study draws on the growing economic imperative for developing nations to create a favorable investment climate capable of attracting private foreign investment. It notes that that over the past decades, an abundance of legal standards that establish substantive and procedural protections for legal forms of foreign investments in the host countries have evolved and crystalized. The study then goes on to offer a substantive analysis of legal reforms at the domestic level in countries such as Saudi Arabia before going on to provide an in- depth and substantive examination of the most important instruments developed at the levels of international law: bilateral investment agreements and double taxation agreements. As to its methods, the study draws on case studies and from data assessing the link between double taxation and economic development. Drawing from the extant literature and doctrinal research, and international and comparative jurisprudence, the paper excavates and critically examines contemporary definitions and norms of international investment law, many of which have been given concrete form and specificity in an ever-expanding number of bilateral and multilateral investment treaties. By reconsidering the wider challenges of conflicts of law and jurisdiction, and the competing aims of the modern investment law regime, the study reflects on how bilateral investment treaties might succeed in achieving the dual aims of rights protection and economic sovereignty. Through its examination of the double taxation phenomena, the study goes on to identify key practical challenges raised by the implementation of bilateral treaties whilst also assessing the sufficiency of the domestic and international legal solutions that are proposed in response. In its final analysis, the study aims to contribute to existing scholarship by assessing contemporary legal and economic barriers to the free flow of investment with due regard for the legitimate concerns and diversity of developing nations. It does by situating its analysis of the domestic enforcement of international investment instrument in its wider historical and normative context. By focusing on the economic and legal dimensions of foreign investment, the paper also aims to offer an interdisciplinary and holistic perspective on contemporary issues and developments in investment law while offering practical reform proposals that can be used to be achieve a more equitable balance between the rights and interests of states and private entities in an increasingly trans nationalized sphere of investment regulation and treaty arbitration.

Keywords: foreign investment, bilateral investment treaties, international tax law, double taxation treaties

Procedia PDF Downloads 89
28709 The Application of Data Mining Technology in Building Energy Consumption Data Analysis

Authors: Liang Zhao, Jili Zhang, Chongquan Zhong

Abstract:

Energy consumption data, in particular those involving public buildings, are impacted by many factors: the building structure, climate/environmental parameters, construction, system operating condition, and user behavior patterns. Traditional methods for data analysis are insufficient. This paper delves into the data mining technology to determine its application in the analysis of building energy consumption data including energy consumption prediction, fault diagnosis, and optimal operation. Recent literature are reviewed and summarized, the problems faced by data mining technology in the area of energy consumption data analysis are enumerated, and research points for future studies are given.

Keywords: data mining, data analysis, prediction, optimization, building operational performance

Procedia PDF Downloads 854
28708 Inappropriate Effects Which the Use of Computer and Playing Video Games Have on Young People

Authors: Maja Ruzic-Baf, Mirjana Radetic-Paic

Abstract:

The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games. The use of computers by children has many positive aspects, including the development of memory, learning methods, problem-solving skills and the feeling of one’s own competence and self-confidence. Playing on line video games can encourage hanging out with peers having similar interests as well as communication; it develops coordination, spatial relations and presentation. On the other hand, the Internet enables quick access to different information and the exchange of experiences. How kids use computers and what the negative effects of this can be depends on various factors. ICT has improved and become easy to get for everyone. In the past 12 years so many video games has been made even to that level that some of them are free to play. Young people, even some adults, had simply start to forget about the real outside world because in that other, digital world, they have found something that makes them feal more worthy as a man. This article present the use of ICT, forms of behavior and addictions to on line video games.

Keywords: addiction to video games, behaviour, ICT, young people

Procedia PDF Downloads 547
28707 An Abductive Approach to Policy Analysis: Policy Analysis as Informed Guessing

Authors: Adrian W. Chew

Abstract:

This paper argues that education policy analysis tends to be steered towards empiricist oriented approaches, which place emphasis on objective and measurable data. However, this paper argues that empiricist oriented approaches are generally based on inductive and/or deductive reasoning, which are unable to generate new ideas/knowledge. This paper will outline the logical structure of induction, deduction, and abduction, and argues that only abduction provides possibilities for the creation of new ideas/knowledge. This paper proposes the neologism of ‘informed guessing’ as a reformulation of abduction, and also as an approach to education policy analysis. On one side, the signifier ‘informed’ encapsulates the idea that abductive policy analysis needs to be informed by descriptive conceptualization theory to be able to make relations and connections between, and within, observed phenomenon and unobservable general structures. On the other side, the signifier ‘guessing’ captures the cyclical and unsystematic process of abduction. This paper will end with a brief example of utilising ‘informed guessing’ for a policy analysis of school choice lotteries in the United States.

Keywords: abductive reasoning, empiricism, informed guessing, policy analysis

Procedia PDF Downloads 356
28706 Validation of a Reloading Vehicle Design by Finite Element Analysis

Authors: Tuğrul Aksoy, Hüseyin Karabıyık

Abstract:

Reloading vehicles are the vehicles which are generally equipped with a crane and used to carry a stowage from a point and locate onto the vehicle or vice versa. In this study, structural analysis of a reloading vehicle was performed under the loads which are predicted to be exposed under operating conditions via the finite element method. Among the finite element analysis results, the stress and displacement distributions of the vehicle and the contact pressure distributions of the guide rings within the stabilization legs were examined. Vehicle design was improved by strengthening certain parts according to the analysis results. The analyses performed for the final design were verified by the experiments involving strain gauge measurements.

Keywords: structural analysis, reloading vehicle, crane, strain gauge

Procedia PDF Downloads 71
28705 Anti-Inflammatory Effect of Carvedilol 1% Ointment in Topical Application to the Animal Model

Authors: Berina Pilipović, Saša Pilipović, Maja Pašić-Kulenović

Abstract:

Inflammation is the body's response to impaired homeostasis caused by infection, injury or trauma resulting in systemic and local effects. Inflammation causes the body's response to injury and is characterized by a series of events including inflammatory response, response to pain receptors and the recovery process. Inflammation can be acute and chronic. The inflammatory response is described in three different phases. Free radical is an atom or molecule that has the unpaired electron and is therefore generally very reactive chemical species. Biologically important example of reaction with free radicals is called Lipid peroxidation (LP). Lipid peroxidation reactions occur in biological membranes, and if at the outset is not stopped with the action of antioxidants, it will bring damage to the membrane, which results in partial or complete loss of their physiological functions. Calcium antagonists and beta-adrenergic receptor antagonists are known drugs, and for many years and widely used in the treatment of cardiovascular diseases. Some of these compounds also show antioxidant activity. The mechanism of antioxidant activities of calcium antagonists and beta-blockers is unknown, since their structure varies widely. This research investigated the possible local anti-inflammatory activity of ointments containing 1% carvedilol in the white petrolatum USP. Ear inflammation was induced by 3% croton oil acetone solution, in quantity of 10 µl on both mouse ears. Albino Swiss mouse (n = 8) are treated with 2.5 mg/ear ointment, and control group was treated on the same way as previous with hydrocortisone 1% ointment (2.5 mg/ear). The other ear of the same animal was used as control one. Ointments were administered once per day, on the left ear. After treatment, ears were observed for three days. After three days, we measured mass (mg) of 6 mm ear punch of treated and controlled ears. The results of testing anti-inflammatory effects of ointments with carvedilol in the mouse ear model show stronger observed effect than ointment with 1% hydrocortisone in the same basis. Identical results were confirmed by the difference between the mass of 6 mm ears punch. The results were also confirmed by histological examination. Ointments with carvedilol showed significant reduction of the inflammation process caused by croton oil on the mouse inflammation model.

Keywords: antioxidant, carvedilol, inflammation, mouse ear

Procedia PDF Downloads 237
28704 Exergy Analysis and Evaluation of the Different Flowsheeting Configurations for CO₂ Capture Plant Using 2-Amino-2-Methyl-1-Propanol

Authors: Ebuwa Osagie, Vasilije Manovic

Abstract:

Exergy analysis provides the identification of the location, sources of thermodynamic inefficiencies, and magnitude in a thermal system. Thus, both the qualitative and quantitative assessment can be evaluated with exergy, unlike energy which is based on quantitative assessment only. The main purpose of exergy analysis is to identify where exergy is destroyed. Thus, reduction of the exergy destruction and losses associated with the capture plant systems can improve work potential. Furthermore, thermodynamic analysis of different configurations of the process helps to identify opportunities for reducing the steam requirements for each of the configurations. This paper presents steady-state simulation and exergy analysis of the 2-amino-2-methyl-1-propanol (AMP)-based post-combustion capture (PCC) plant. Exergy analysis performed for the AMP-based plant and the different configurations revealed that the rich split with intercooling configuration gave the highest exergy efficiency of 73.6%, while that of the intercooling and the reference AMP-based plant were 57.3% and 55.8% respectively.

Keywords: 2-amino-2-methyl-1-propanol, modelling, and simulation, post-combustion capture plant, exergy analysis, flowsheeting configurations

Procedia PDF Downloads 165
28703 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 532
28702 Analysis of CO₂ Capture Products from Carbon Capture and Utilization Plant

Authors: Bongjae Lee, Beom Goo Hwang, Hye Mi Park

Abstract:

CO₂ capture products manufactured through Carbon Capture and Utilization (CCU) Plant that collect CO₂ directly from power plants require accurate measurements of the amount of CO₂ captured. For this purpose, two tests were carried out on the weight loss test. And one was analyzed using a carbon dioxide quantification device. First, the ignition loss analysis was performed by measuring the weight of the sample at 550°C after the first conversation and then confirming the loss when ignited at 950°C. Second, in the thermogravimetric analysis, the sample was divided into two sections of 40 to 500°C and 500 to 800°C to confirm the reduction. The results of thermal weight loss analysis and thermogravimetric analysis were confirmed to be almost similar. However, the temperature of the ignition loss analysis method was 950°C, which was 150°C higher than that of the thermogravimetric method at a temperature of 800°C, so that the difference in the amount of weight loss was 3 to 4% higher by the heat loss analysis method. In addition, the tendency that the CO₂ content increases as the reaction time become longer is similarly confirmed. Third, the results of the wet titration method through the carbon dioxide quantification device were found to be significantly lower than the weight loss method. Therefore, based on the results obtained through the above three analysis methods, we will establish a method to analyze the accurate amount of CO₂. Acknowledgements: This work was supported by the Korea Institute of Energy Technology Evaluation and planning (No. 20152010201850).

Keywords: carbon capture and utilization, CCU, CO2, CO2 capture products, analysis method

Procedia PDF Downloads 218
28701 A Novel Marketable Dried Mixture for High-Quality Sweet Wine Production in Domestic Refrigerator Using Tubular Cellulose

Authors: Ganatsios Vassilios, Terpou Antonia, Maria Kanellaki, Bekatorou Argyro, Athanasios Koutinas

Abstract:

In this study, a new fermentation technology is proposed with potential application in home wine-making. Delignified cellulosic material was used to preserve Tubular Cellulose (TC), an effective fermentation support material in high osmotic pressure, low temperature, and alcohol concentration. The psychrotolerant yeast strain Saccharomyces cerevisiae AXAZ-1 was immobilized on TC to preserve a novel home wine making biocatalyst (HWB) and the entrapment was examined by SEM. Various concentrations of HWB was added in high-density grape must and the mixture was dried immediately. The dried mixture was stored for various time intervals and its fermentation examined after addition of potable water. The percentage of added water was also examined to succeed high alcohol and residual sugar concentration. The effect of low temperature (1-10 oC) on fermentation kinetics was studied revealing the ability of HBW on low-temperature sweet wine making. Sweet wines SPME GC-MS analysis revealed the promotion effect of TC on volatile by-products formation in comparison with free cells. Kinetics results and aromatic profile of final product encouraged the efforts of high-quality sweet wine making in domestic refrigerator and potential marketable opportunities are also assessed and discussed.

Keywords: tubular cellulose, sweet wine, Saccharomyces cerevisiae AXAZ-1, residual sugar concentration

Procedia PDF Downloads 366
28700 A Comparative Analysis of Zotero and Mendeley Reference Management Software

Authors: Sujit K. Basak

Abstract:

This paper presents a comparison of the reference management software between Zotero and Mendeley and the results were drawn by comparing the two software’s. The novelty of this paper is the comparative analysis of the software and it has shown that Mendeley can import more information from the Google Scholar for the researchers. This finding can help to know researchers to use the reference management software.

Keywords: analysis, comparative analysis, zotero, researchers, Mendeley

Procedia PDF Downloads 614
28699 Conflicts Identification Approach among Stakeholders in Goal-Oriented Requirements Analysis

Authors: Muhammad Suhaib

Abstract:

Requirements Analysis are the most important part of software Engineering for both system application development, and project requirements. Conflicts often arise during the requirements gathering and analysis phase. This research aims to identify conflicts during the requirements gathering phase in software development life cycle, Research, Development, and Technology converted the world into a global village. During requirements elicitation/gathering phase it’s very difficult to understand the main objective of stakeholders, after completion of requirements elicitation task final results are used for Software Requirements Specification (SRS), SRS is the highly important outcome of the requirements analysis phase. this is the foundation between the developers and stakeholders or customers, proposed methodology will be helpful to identify those conflicts in a very easy manner during the initial phase of the project.

Keywords: goal oriented requirements analysis, conflicts identification model, requirements analysis, requirements engineering

Procedia PDF Downloads 136
28698 The Influence of Immunity on the Behavior and Dignity of Judges

Authors: D. Avnieli

Abstract:

Immunity of judges from liability represents a departure from the principle that all are equal under the law, and that victims may be granted compensation from their offenders. The purpose of the study is to determine if judicial immunity coincides with the need to ensure the existence of highly independent and incorruptible judiciary. Judges are immune from civil and criminal liability for their judicial acts. Judicial immunity is justified by the need to maintain complete independence and discretion of the judiciary. Scholars and judges believe that absolute immunity is needed to shield judges from pressures, threats, or outside interference. It is commonly accepted, that judges should be free to perform their judicial role in accordance with their assessment of the fact and their understanding of the law, without any restrictions, influences, inducements or interferences. In most countries, immunity applies when judges act in excess of jurisdiction. In some countries, it applies even when they act maliciously or corruptly. The only exception to absolute immunity applicable in all judicial systems is when judges act without jurisdiction over the subject matter. The Israeli Supreme Court recently decided to embrace absolute immunity and strike off a lawsuit of a refugee, who was unlawfully incarcerated. The Court ruled that the plaintiff cannot sue the State or the judge for damages. The questions of malice, dignity, and public scrutiny were not discussed. This paper, based on comparative analysis of many cases, aims to determine if immunity affects the dignity and behavior of judges. It demonstrates that most judges maintain their dignity and ethical code of behavior, but sometimes do not hesitate to act consciously in excess of jurisdiction, and in rare cases even corruptly. Therefore, in order to maintain independent and incorruptible judiciary, immunity should not be applied where judges act consciously in excess of jurisdiction or with malicious incentives.

Keywords: incorruptible judiciary, immunity, independent, judicial, judges, jurisdiction

Procedia PDF Downloads 106
28697 Configuration of Water-Based Features in Islamic Heritage Complexes and Vernacular Architecture: An Analysis into Interactions of Morphology, Form, and Climatic Performance

Authors: Mustaffa Kamal Bashar Mohd Fauzi, Puteri Shireen Jahn Kassim, Nurul Syala Abdul Latip

Abstract:

It is increasingly realized that sustainability includes both a response to the climatic and cultural context of a place. To assess the cultural context, a morphological analysis of urban patterns from heritage legacies is necessary. While the climatic form is derived from an analysis of meteorological data, cultural patterns and forms must be abstracted from a typological and morphological study. This current study aims to analyzes morphological and formal elements of water-based architectural and urban design of past Islamic vernacular complexes in the hot arid regions and how a vast utilization of water was shaped and sited to act as cooling devices for an entire complex. Apart from its pleasant coolness, water can be used in an aesthetically way such as emphasizing visual axes, vividly enhancing the visual of the surrounding environment and symbolically portraying the act of purity in the design. By comparing 2 case studies based on the analysis of interactions of water features into the form, planning and morphology of 2 Islamic heritage complexes, Fatehpur Sikri (India) and Lahore Fort (Pakistan) with a focus on Shish Mahal of Lahore Fort in terms of their mass, architecture and urban planning, it is agreeable that water plays an integral role in their climatic amelioration via different methods of water conveyance system. Both sites are known for their substantial historical values and prominent for their sustainable vernacular buildings for example; the courtyard of Shish Mahal in Lahore fort are designed to provide continuous coolness by constructing various miniatures water channels that run underneath the paved courtyard. One of the most remarkable features of this system that all water is made dregs-free before it was inducted into these underneath channels. In Fatehpur Sikri, the method of conveyance seems differed from Lahore Fort as the need to supply water to the ridge where Fatehpur Sikri situated is become the major challenges. Thus, the achievement of supplying water to the palatial complexes is solved by placing inhabitable water buildings within the two supply system for raising water. The process of raising the water can be either mechanical or laborious inside the enclosed well and water rising houses. The studies analyzes and abstract the water supply forms, patterns and flows in 3-dimensional shapes through the actions of evaporative cooling and wind-induced ventilation under arid climates. Through the abstraction analytical and descriptive relational morphology of the spatial configurations, the studies can suggest the idealized spatial system that can be used in urban design and complexes which later became a methodological and abstraction tool of sustainability to suit the modern contemporary world.

Keywords: heritage site, Islamic vernacular architecture, water features, morphology, urban design

Procedia PDF Downloads 375
28696 Acrylamide Concentration in Cakes with Different Caloric Sweeteners

Authors: L. García, N. Cobas, M. López

Abstract:

Acrylamide, a probable carcinogen, is formed in high-temperature processed food (>120ºC) when the free amino acid asparagine reacts with reducing sugars, mainly glucose and fructose. Cane juices' repeated heating would potentially form acrylamide during brown sugar production. This study aims to determine if using panela in yogurt cake preparation increases acrylamide formation. A secondary aim is to analyze the acrylamide concentration in four cake confections with different caloric sweetener ingredients: beet sugar (BS), cane sugar (CS), panela (P), and a panela and chocolate mix (PC). The doughs were obtained by combining ingredients in a planetary mixer. A model system made up of flour (25%), caloric sweeteners (25 %), eggs (23%), yogurt (15.7%), sunflower oil (9.4%), and brewer's yeast (2 %) was applied to BS, CS and P cakes. The ingredients of PC cakes varied: flour (21.5 %), panela chocolate (21.5 %), eggs (25.9 %), yogurt (18 %), sunflower oil (10.8 %), and brewer’s yeast (2.3 %). The preparations were baked for 45' at 180 ºC. Moisture was estimated by AOAC. Protein was determined by the Kjeldahl method. Ash percentage was calculated by weight loss after pyrolysis (≈ 600 °C). Fat content was measured using liquid-solid extraction in hydrolyzed raw ingredients and final confections. Carbohydrates were determined by difference and total sugars by the Luff-Schoorl method, based on the iodometric determination of copper ions. Finally, acrylamide content was determined by LC-MS by the isocratic system (phase A: 97.5 % water with 0.1% formic acid; phase B: 2.5 % methanol), using a standard internal procedure. Statistical analysis was performed using SPSS v.23. One-way variance analysis determined differences between acrylamide content and compositional analysis, with caloric sweeteners as fixed effect. Significance levels were determined by applying Duncan's t-test (p<0.05). P cakes showed a lower energy value than the other baked products; sugar content was similar to BS and CS, with 6.1 % mean crude protein. Acrylamide content in caloric sweeteners was similar to previously reported values. However, P and PC showed significantly higher concentrations, probably explained by the applied procedure. Acrylamide formation depends on both reducing sugars and asparagine concentration and availability. Beet sugar samples did not present acrylamide concentrations within the detection and quantification limit. However, the highest acrylamide content was measured in the BS. This may be due to the higher concentration of reducing sugars and asparagine in other raw ingredients. The cakes made with panela, cane sugar, or panela with chocolate did not differ in acrylamide content. The lack of asparagine measures constitutes a limitation. Cakes made with panela showed lower acrylamide formation than products elaborated with beet or cane sugar.

Keywords: beet sugar, cane sugar, panela, yogurt cake

Procedia PDF Downloads 66
28695 Linux Security Management: Research and Discussion on Problems Caused by Different Aspects

Authors: Ma Yuzhe, Burra Venkata Durga Kumar

Abstract:

The computer is a great invention. As people use computers more and more frequently, the demand for PCs is growing, and the performance of computer hardware is also rising to face more complex processing and operation. However, the operating system, which provides the soul for computers, has stopped developing at a stage. In the face of the high price of UNIX (Uniplexed Information and Computering System), batch after batch of personal computer owners can only give up. Disk Operating System is too simple and difficult to bring innovation into play, which is not a good choice. And MacOS is a special operating system for Apple computers, and it can not be widely used on personal computers. In this environment, Linux, based on the UNIX system, was born. Linux combines the advantages of the operating system and is composed of many microkernels, which is relatively powerful in the core architecture. Linux system supports all Internet protocols, so it has very good network functions. Linux supports multiple users. Each user has no influence on their own files. Linux can also multitask and run different programs independently at the same time. Linux is a completely open source operating system. Users can obtain and modify the source code for free. Because of these advantages of Linux, it has also attracted a large number of users and programmers. The Linux system is also constantly upgraded and improved. It has also issued many different versions, which are suitable for community use and commercial use. Linux system has good security because it relies on a file partition system. However, due to the constant updating of vulnerabilities and hazards, the using security of the operating system also needs to be paid more attention to. This article will focus on the analysis and discussion of Linux security issues.

Keywords: Linux, operating system, system management, security

Procedia PDF Downloads 111
28694 Modelling of the Linear Operator in the Representation of the Function of Wave of a Micro Particle

Authors: Mohammedi Ferhate

Abstract:

This paper deals with the generalized the notion of the function of wave a micro particle moving free, the concept of the linear operator in the representation function delta of Dirac which is a generalization of the symbol of Kronecker to the case of a continuous variation of the sizes concerned with the condition of orthonormation of the Eigen functions the use of linear operators and their Eigen functions in connection with the solution of given differential equations, it is of interest to study the properties of the operators themselves and determine which of them follow purely from the nature of the operators, without reference to specific forms of Eigen functions. The models simulation examples are also presented.

Keywords: function, operator, simulation, wave

Procedia PDF Downloads 148
28693 Caste of Women: An Inquiry into the Differences in Inter-Caste Marriages in an Adivasi Samaj

Authors: Dhiraj Kumar

Abstract:

The paper attempts to argue that the regulation of the rural lower caste woman’s life-world is at the core of the reproduction of hierarchy in an Adivasi samaj (society). It has been established in studies on caste and Adivasi that the two societies are distinct and operate through different structures, norms, rituals, beliefs, etc. This is as opposed to the colonial and certain post-independence anthropology in/of India that collapsed the two into single categories for analysis. However, how the two seemingly different social structures affect each other has attracted little attention. The paper is inspired by an action-research at Gadh-Bansla, an Adivasi village in the Kanker district of Chhattisgarh that houses different caste groups – OBCs and SCs, as well as two different Adivasi groups: Gond and Halba. The action-research, taken place across a year, has worked with six families of the different groups present (i.e., Gond, Halba, OBCs, and SCs) in which inter-caste marriages have taken place. Through in-depth interviews and free association discussions with these six families, the paper presents the ways in which the samaj and caste society have interacted. It has been observed that there is a difference in treatment in marriages between a lower caste woman marrying into an upper caste or Halba household, and an upper caste or Halba woman marrying into a lower caste household. While the upper caste woman is easily accepted into the Adivasi samaj and the husband’s family, the same does not hold true for the lower caste woman. The lower caste woman has to face humiliation through untouchability, fine on the family, or in some cases excommunication of the couple. The paper concludes with a need to use caste as a central analytic to understand gender discrimination even in Adivasi contexts.

Keywords: caste, Adivasi, Samaj, humiliation, woman

Procedia PDF Downloads 157
28692 Analysis of Flow Dynamics of Heated and Cooled Pylon Upstream to the Cavity past Supersonic Flow with Wall Heating and Cooling

Authors: Vishnu Asokan, Zaid M. Paloba

Abstract:

Flow over cavities is an important area of research due to the significant change in flow physics caused by cavity aspect ratio, free stream Mach number and the nature of upstream boundary layer approaching the cavity leading edge. Cavity flow finds application in aircraft wheel well, weapons bay, combustion chamber of scramjet engines, etc. These flows are highly unsteady, compressible and turbulent and it involves mass entrainment coupled with acoustics phenomenon. Variation of flow dynamics in an angled cavity with a heated and cooled pylon upstream to the cavity with spatial combinations of heat flux addition and removal to the wall studied numerically. The goal of study is to investigate the effect of energy addition, removal to the cavity walls and pylon cavity flow dynamics. Preliminary steady state numerical simulations on inclined cavities with heat addition have shown that wall pressure profiles, as well as the recirculation, are influenced by heat transfer to the compressible fluid medium. Such a hybrid control of cavity flow dynamics in the form of heat transfer and pylon geometry can open out greater opportunities in enhancement of mixing and flame holding requirements of supersonic combustors. Addition of pylon upstream to the cavity reduces the acoustic oscillations emanating from the geometry. A numerical unsteady analysis of supersonic flow past cavities exposed to cavity wall heating and cooling with heated and cooled pylon helps to get a clear idea about the oscillation suppression in the cavity. A Cavity of L/D 4 and aft wall angle 22 degree with an upstream pylon of h/D=1.5 mm with a wall angle 29 degree exposed to supersonic flow of Mach number 2 and heat flux of 40 W/cm² and -40 W/cm² modeled for the above study. In the preliminary study, the domain is modeled and validated numerically with a turbulence model of SST k-ω using an HLLC implicit scheme. Both qualitative and quantitative flow data extracted and analyzed using advanced CFD tools. Flow visualization is done using numerical Schlieren method as the fluid medium gives the density variation. The heat flux addition to the wall increases the secondary vortex size of the cavity and removal of energy leads to the reduction in vortex size. The flow field turbulence seems to be increasing at higher heat flux. The shear layer thickness increases as heat flux increases. The steady state analysis of wall pressure shows that there is variation on wall pressure as heat flux increases. Shift in frequency of unsteady wall pressure analysis is an interesting observation for the above study. The time averaged skin friction seems to be reducing at higher heat flux due to the variation in viscosity of fluid inside the cavity.

Keywords: energy addition, frequency shift, Numerical Schlieren, shear layer, vortex evolution

Procedia PDF Downloads 143
28691 Digital Forensics Analysis Focusing on the Onion Router Browser Artifacts in Windows 10

Authors: Zainurrasyid Abdullah, Mohamed Fadzlee Sulaiman, Muhammad Fadzlan Zainal, M. Zabri Adil Talib, Aswami Fadillah M. Ariffin

Abstract:

The Onion Router (Tor) browser is a well-known tool and widely used by people who seeking for web anonymity when browsing the internet. Criminals are taking this advantage to be anonymous over the internet. Accessing the dark web could be the significant reason for the criminal in order for them to perform illegal activities while maintaining their anonymity. For a digital forensic analyst, it is crucial to extract the trail of evidence in proving that the criminal’s computer has used Tor browser to conduct such illegal activities. By applying the digital forensic methodology, several techniques could be performed including application analysis, memory analysis, and registry analysis. Since Windows 10 is the latest operating system released by Microsoft Corporation, this study will use Windows 10 as the operating system platform that running Tor browser. From the analysis, significant artifacts left by Tor browser were discovered such as the execution date, application installation date and browsing history that can be used as an evidence. Although Tor browser was designed to achieved anonymity, there is still some trail of evidence can be found in Windows 10 platform that can be useful for investigation.

Keywords: artifacts analysis, digital forensics, forensic analysis, memory analysis, registry analysis, tor browser, Windows 10

Procedia PDF Downloads 171
28690 Transcriptomic Analysis of Acanthamoeba castellanii Virulence Alteration by Epigenetic DNA Methylation

Authors: Yi-Hao Wong, Li-Li Chan, Chee-Onn Leong, Stephen Ambu, Joon-Wah Mak, Priyasashi Sahu

Abstract:

Background: Acanthamoeba is a genus of amoebae which lives as a free-living in nature or as a human pathogen that causes severe brain and eye infections. Virulence potential of Acanthamoeba is not constant and can change with growth conditions. DNA methylation, an epigenetic process which adds methyl groups to DNA, is used by eukaryotic cells, including several human parasites to control their gene expression. We used qPCR, siRNA gene silencing, and RNA sequencing (RNA-Seq) to study DNA-methyltransferase gene family (DNMT) in order to indicate the possibility of its involvement in programming Acanthamoeba virulence potential. Methods: A virulence-attenuated Acanthamoeba isolate (designation: ATCC; original isolate: ATCC 50492) was subjected to mouse passages to restore its pathogenicity; a virulence-reactivated isolate (designation: AC/5) was generated. Several established factors associated with Acanthamoeba virulence phenotype were examined to confirm the succession of reactivation process. Differential gene expression of DNMT between ATCC and AC/5 isolates was performed by qPCR. Silencing on DNMT gene expression in AC/5 isolate was achieved by siRNA duplex. Total RNAs extracted from ATCC, AC/5, and siRNA-treated (designation: si-146) were subjected to RNA-Seq for comparative transcriptomic analysis in order to identify the genome-wide effect of DNMT in regulating Acanthamoeba gene expression. qPCR was performed to validate the RNA-Seq results. Results: Physiological and cytophatic assays demonstrated an increased in virulence potential of AC/5 isolate after mouse passages. DNMT gene expression was significantly higher in AC/5 compared to ATCC isolate (p ≤ 0.01) by qPCR. si-146 duplex reduced DNMT gene expression in AC/5 isolate by 30%. Comparative transcriptome analysis identified the differentially expressed genes, with 3768 genes in AC/5 vs ATCC isolate; 2102 genes in si-146 vs AC/5 isolate and 3422 genes in si-146 vs ATCC isolate, respectively (fold-change of ≥ 2 or ≤ 0.5, p-value adjusted (padj) < 0.05). Of these, 840 and 1262 genes were upregulated and downregulated, respectively, in si-146 vs AC/5 isolate. Eukaryotic orthologous group (KOG) assignments revealed a higher percentage of downregulated gene expression in si-146 compared to AC/5 isolate, were related to posttranslational modification, signal transduction and energy production. Gene Ontology (GO) terms for those downregulated genes shown were associated with transport activity, oxidation-reduction process, and metabolic process. Among these downregulated genes were putative genes encoded for heat shock proteins, transporters, ubiquitin-related proteins, proteins for vesicular trafficking (small GTPases), and oxidoreductases. Functional analysis of similar predicted proteins had been described in other parasitic protozoa for their survival and pathogenicity. Decreased expression of these genes in si146-treated isolate may account in part for Acanthamoeba reduced pathogenicity. qPCR on 6 selected genes upregulated in AC/5 compared to ATCC isolate corroborated the RNA sequencing findings, indicating a good concordance between these two analyses. Conclusion: To the best of our knowledge, this study represents the first genome-wide analysis of DNA methylation and its effects on gene expression in Acanthamoeba spp. The present data indicate that DNA methylation has substantial effect on global gene expression, allowing further dissection of the genome-wide effects of DNA-methyltransferase gene in regulating Acanthamoeba pathogenicity.

Keywords: Acanthamoeba, DNA methylation, RNA sequencing, virulence

Procedia PDF Downloads 196