Search results for: sheath driven magnetic cloud
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3533

Search results for: sheath driven magnetic cloud

3353 Protecting the Cloud Computing Data Through the Data Backups

Authors: Abdullah Alsaeed

Abstract:

Virtualized computing and cloud computing infrastructures are no longer fuzz or marketing term. They are a core reality in today’s corporate Information Technology (IT) organizations. Hence, developing an effective and efficient methodologies for data backup and data recovery is required more than any time. The purpose of data backup and recovery techniques are to assist the organizations to strategize the business continuity and disaster recovery approaches. In order to accomplish this strategic objective, a variety of mechanism were proposed in the recent years. This research paper will explore and examine the latest techniques and solutions to provide data backup and restoration for the cloud computing platforms.

Keywords: data backup, data recovery, cloud computing, business continuity, disaster recovery, cost-effective, data encryption.

Procedia PDF Downloads 61
3352 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 479
3351 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 291
3350 Mathematical Modeling on Capturing of Magnetic Nanoparticles in an Implant Assisted Channel for Magnetic Drug Targeting

Authors: Shashi Sharma, V. K. Katiyar, Uaday Singh

Abstract:

The ability to manipulate magnetic particles in fluid flows by means of inhomogeneous magnetic fields is used in a wide range of biomedical applications including magnetic drug targeting (MDT). In MDT, magnetic carrier particles bounded with drug molecules are injected into the vascular system up-stream from the malignant tissue and attracted or retained at the specific region in the body with the help of an external magnetic field. Although the concept of MDT has been around for many years, however, wide spread acceptance of the technique is still looming despite the fact that it has shown some promise in both in vivo and clinical studies. This is because traditional MDT has some inherent limitations. Typically, the magnetic force is not very strong and it is also very short ranged. Since the magnetic force must overcome rather large hydrodynamic forces in the body, MDT applications have been limited to sites located close to the surface of the skin. Even in this most favorable situation, studies have shown that it is difficult to collect appreciable amounts of the MDCPs at the target site. To overcome these limitations of the traditional MDT approach, Ritter and co-workers reported the implant assisted magnetic drug targeting (IA-MDT). In IA-MDT, the magnetic implants are placed strategically at the target site to greatly and locally increase the magnetic force on MDCPs and help to attract and retain the MDCPs at the targeted region. In the present work, we develop a mathematical model to study the capturing of magnetic nanoparticles flowing in a fluid in an implant assisted cylindrical channel under the magnetic field. A coil of ferromagnetic SS 430 has been implanted inside the cylindrical channel to enhance the capturing of magnetic nanoparticles under the magnetic field. The dominant magnetic and drag forces, which significantly affect the capturing of nanoparticles, are incorporated in the model. It is observed through model results that capture efficiency increases from 23 to 51 % as we increase the magnetic field from 0.1 to 0.5 T, respectively. The increase in capture efficiency by increase in magnetic field is because as the magnetic field increases, the magnetization force, which is attractive in nature and responsible to attract or capture the magnetic particles, increases and results the capturing of large number of magnetic particles due to high strength of attractive magnetic force.

Keywords: capture efficiency, implant assisted-magnetic drug targeting (IA-MDT), magnetic nanoparticles, modelling

Procedia PDF Downloads 443
3349 The Potential of Cloud Computing in Overcoming the Problems of Collective Learning

Authors: Hussah M. AlShayea

Abstract:

This study aimed to identify the potential of cloud computing, "Google Drive" in overcoming the problems of collective learning from the viewpoint of Princess Noura University students. The study included (92) students from the College of Education. To achieve the goal of the study, several steps have been taken. First, the most important problems of collective learning were identified from the viewpoint of the students. After that, a survey identifying the potential of cloud computing "Google Drive" in overcoming the problems of collective learning was distributed among the students. The study results showed that the students believe that the use of Google Drive contributed to overcoming these problems. In the light of those results, the researcher presented a set of recommendations and proposals, including: encouraging teachers and learners to employ cloud computing to overcome the problems and constraints of collective learning.

Keywords: cloud computing, collective learning, Google drive, Princess Noura University

Procedia PDF Downloads 466
3348 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 312
3347 A Theoretical Study of Accelerating Neutrons in LINAC Using Magnetic Gradient Method

Authors: Chunduru Amareswara Prasad

Abstract:

The main aim of this proposal it to reveal the secrets of the universe by accelerating neutrons. The proposal idea in its abridged version speaks about the possibility of making neutrons accelerate with help of thermal energy and magnetic energy under controlled conditions. Which is helpful in revealing the hidden secrets of the universe namely dark energy and in finding properties of Higgs boson. The paper mainly speaks about accelerating neutrons to near velocity of light in a LINAC, using magnetic energy by magnetic pressurizers. The center of mass energy of two colliding neutron beams is 94 GeV (~0.5c) can be achieved using this method. The conventional ways to accelerate neutrons has some constraints in accelerating them electromagnetically as they need to be separated from the Tritium or Deuterium nuclei. This magnetic gradient method provides efficient and simple way to accelerate neutrons.

Keywords: neutron, acceleration, thermal energy, magnetic energy, Higgs boson

Procedia PDF Downloads 306
3346 Development of a Very High Sensitivity Magnetic Field Sensor Based on Planar Hall Effect

Authors: Arnab Roy, P. S. Anil Kumar

Abstract:

Hall bar magnetic field sensors based on planar hall effect were fabricated from permalloy (Ni¬80Fe20) thin films grown by pulsed laser ablation. As large as 400% planar Hall voltage change was observed for a magnetic field sweep within ±4 Oe, a value comparable with present day TMR sensors at room temperature. A very large planar Hall sensitivity of 1200 Ω/T was measured close to switching fields, which was not obtained so far apart from 2DEG Hall sensors. In summary, a highly sensitive low magnetic field sensor has been constructed which has the added advantage of simple architecture, good signal to noise ratio and robustness.

Keywords: planar hall effect, permalloy, NiFe, pulsed laser ablation, low magnetic field sensor, high sensitivity magnetic field sensor

Procedia PDF Downloads 495
3345 An Efficient Architecture for Dynamic Customization and Provisioning of Virtual Appliance in Cloud Environment

Authors: Rajendar Kandan, Mohammad Zakaria Alli, Hong Ong

Abstract:

Cloud computing is a business model which provides an easier management of computing resources. Cloud users can request virtual machine and install additional softwares and configure them if needed. However, user can also request virtual appliance which provides a better solution to deploy application in much faster time, as it is ready-built image of operating system with necessary softwares installed and configured. Large numbers of virtual appliances are available in different image format. User can download available appliances from public marketplace and start using it. However, information published about the virtual appliance differs from each providers leading to the difficulty in choosing required virtual appliance as it is composed of specific OS with standard software version. However, even if user choses the appliance from respective providers, user doesn’t have any flexibility to choose their own set of softwares with required OS and application. In this paper, we propose a referenced architecture for dynamically customizing virtual appliance and provision them in an easier manner. We also add our experience in integrating our proposed architecture with public marketplace and Mi-Cloud, a cloud management software.

Keywords: cloud computing, marketplace, virtualization, virtual appliance

Procedia PDF Downloads 265
3344 A Study on Analysis of Magnetic Field in Induction Generator for Small Francis Turbine Generator

Authors: Young-Kwan Choi, Han-Sang Jeong, Yeon-Ho Ok, Jae-Ho Choi

Abstract:

The purpose of this study is to verify validity of design by testing output of induction generator through finite element analysis before manufacture of induction generator designed. Characteristics in the operating domain of induction generator can be understood through analysis of magnetic field according to load (rotational speed) of induction generator. Characteristics of induction generator such as induced voltage, current, torque, magnetic flux density (magnetic flux saturation), and loss can be predicted by analysis of magnetic field.

Keywords: electromagnetic analysis, induction generator, small hydro power generator, small francis turbine generator

Procedia PDF Downloads 1447
3343 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 278
3342 Spin-Polarized Investigation of Ferromagnetism on Magnetic Semiconductors MnxCa1-xS in the Rock-salt Phase

Authors: B. Ghebouli, M. A. Ghebouli, H. Choutri, M. Fatmi, L. Louail

Abstract:

The structural, elastic, electronic and magnetic properties of the diluted magnetic semiconductors MnxCa1-xS in the rock-salt phase have been investigated using first-principles calculations. Features such as lattice constant, bulk modulus, elastic constants, spin-polarized band structure, total and local densities of states have been computed. We predict the values of the exchange constants and the band edge spin splitting of the valence and conduction bands. The hybridization between S-3p and Mn-3d produces small local magnetic moment on the nonmagnetic Ca and S sites. The ferromagnetism is induced due to the exchange splitting of S-3p and Mn-3d hybridized bands. The total magnetic moment per Mn of MnxCa1-xS is 4.4µB and is independent of the Mn concentration. The unfilled Mn -3d levels reduce the local magnetic moment of Mn from its free space charge value of 5µB to 4.4µB due to 3p–3d hybridization.

Keywords: semiconductors, Ab initio calculations, band-structure, magnetic properties

Procedia PDF Downloads 330
3341 Research on Placement Method of the Magnetic Flux Leakage Sensor Based on Online Detection of the Transformer Winding Deformation

Authors: Wei Zheng, Mao Ji, Zhe Hou, Meng Huang, Bo Qi

Abstract:

The transformer is the key equipment of the power system. Winding deformation is one of the main transformer defects, and timely and effective detection of the transformer winding deformation can ensure the safe and stable operation of the transformer to the maximum extent. When winding deformation occurs, the size, shape and spatial position of the winding will change, which directly leads to the change of magnetic flux leakage distribution. Therefore, it is promising to study the online detection method of the transformer winding deformation based on magnetic flux leakage characteristics, in which the key step is to study the optimal placement method of magnetic flux leakage sensors inside the transformer. In this paper, a simulation model of the transformer winding deformation is established to obtain the internal magnetic flux leakage distribution of the transformer under normal operation and different winding deformation conditions, and the law of change of magnetic flux leakage distribution due to winding deformation is analyzed. The results show that different winding deformation leads to different characteristics of the magnetic flux leakage distribution. On this basis, an optimized placement of magnetic flux leakage sensors inside the transformer is proposed to provide a basis for the online detection method of transformer winding deformation based on the magnetic flux leakage characteristics.

Keywords: magnetic flux leakage, sensor placement method, transformer, winding deformation

Procedia PDF Downloads 164
3340 2D Ferromagnetism in Van der Waals Bonded Fe₃GeTe₂

Authors: Ankita Tiwari, Jyoti Saini, Subhasis Ghosh

Abstract:

For many years, researchers have been fascinated by the subject of how properties evolve as dimensionality is lowered. Early on, it was shown that the presence of a significant magnetic anisotropy might compensate for the lack of long-range (LR) magnetic order in a low-dimensional system (d < 3) with continuous symmetry, as proposed by Hohenberg-Mermin and Wagner (HMW). Strong magnetic anisotropy allows an LR magnetic order to stabilize in two dimensions (2D) even in the presence of stronger thermal fluctuations which is responsible for the absence of Heisenberg ferromagnetism in 2D. Van der Waals (vdW) ferromagnets, including CrI₃, CrTe₂, Cr₂X₂Te₆ (X = Si and Ge) and Fe₃GeTe₂, offer a nearly ideal platform for studying ferromagnetism in 2D. Fe₃GeTe₂ is the subject of extensive investigation due to its tunable magnetic properties, high Curie temperature (Tc ~ 220K), and perpendicular magnetic anisotropy. Many applications in the field of spintronics device development have been quite active due to these appealing features of Fe₃GeTe₂. Although it is known that LR-driven ferromagnetism is necessary to get around the HMW theorem in 2D experimental realization, Heisenberg 2D ferromagnetism remains elusive in condensed matter systems. Here, we show that Fe₃GeTe₂ hosts both localized and delocalized spins, resulting in itinerant and local-moment ferromagnetism. The presence of LR itinerant interaction facilitates to stabilize Heisenberg ferromagnet in 2D. With the help of Rhodes-Wohlfarth (RW) and generalized RW-based analysis, Fe₃GeTe₂ has been shown to be a 2D ferromagnet with itinerant magnetism that can be modulated by an external magnetic field. Hence, the presence of both local moment and itinerant magnetism has made this system interesting in terms of research in low dimensions. We have also rigorously performed critical analysis using an improvised method. We show that the variable critical exponents are typical signatures of 2D ferromagnetism in Fe₃GeTe₂. The spontaneous magnetization exponent β changes the universality class from mean-field to 2D Heisenberg with field. We have also confirmed the range of interaction via the renormalization group (RG) theory. According to RG theory, Fe₃GeTe₂ is a 2D ferromagnet with LR interactions.

Keywords: Van der Waal ferromagnet, 2D ferromagnetism, phase transition, itinerant ferromagnetism, long range order

Procedia PDF Downloads 53
3339 Magnetic versus Non-Magnetic Adatoms in Graphene Nanoribbons: Tuning of Spintronic Applications and the Quantum Spin Hall Phase

Authors: Saurabh Basu, Sudin Ganguly

Abstract:

Conductance in graphene nanoribbons (GNR) in presence of magnetic (for example, Iron) and non-magnetic (for example, Gold) adatoms are explored theoretically within a Kane-Mele model for their possible spintronic applications and topologically non-trivial properties. In our work, we have considered the magnetic adatoms to induce a Rashba spin-orbit coupling (RSOC) and an exchange bias field, while the non-magnetic ones induce an RSOC and an intrinsic spin-orbit (SO) coupling. Even though RSOC is present in both, they, however, represent very different physical situations, where the magnetic adatoms do not preserve the time reversal symmetry, while the non-magnetic case does. This has important implications on the topological properties. For example, the non-magnetic adatoms, for moderately strong values of SO, the GNR denotes a quantum spin Hall insulator as evident from a 2e²/h plateau in the longitudinal conductance and presence of distinct conducting edge states with an insulating bulk. Since the edge states are protected by time reversal symmetry, the magnetic adatoms in GNR yield trivial insulators and do not possess any non-trivial topological property. However, they have greater utility than the non-magnetic adatoms from the point of view of spintronic applications. Owing to the broken spatial symmetry induced by the presence of adatoms of either type, all the x, y and z components of the spin-polarized conductance become non-zero (only the y-component survives in pristine Graphene owing to a mirror symmetry present there) and hence become suitable for spintronic applications. However, the values of the spin polarized conductances are at least two orders of magnitude larger in the case of magnetic adatoms than their non-magnetic counterpart, thereby ensuring more efficient spintronic applications. Further the applications are tunable by altering the adatom densities.

Keywords: magnetic and non-magnetic adatoms, quantum spin hall phase, spintronic applications, spin polarized conductance, time reversal symmetry

Procedia PDF Downloads 273
3338 Electronic, Structure and Magnetic Properties of KXF3(X= Fe, Co, Mn, V) from Ab Initio Calculations

Authors: M. Ibrir, S. Berri, S. Lakel, D. Maouche And Y. Medkour

Abstract:

We have performed first-principle calculations of the structural, electronic and magnetic properties of KFeF3, KCoF3, KMnF3, KVF3, using full-potential linearized augmented plane-wave (FP-LAPW) scheme within GGA. Features such as the lattice constant, bulk modulus and its pressure derivative are reported. Also, we have presented our results of the band structure and the density of states. The magnetic moments of KFeF3, KCoF3, KMnF3, KVF3 compounds are in most came from the exchange-splitting of X-3d orbital.

Keywords: Ab initio calculations, electronic structure, magnetic materials

Procedia PDF Downloads 401
3337 Design and Analysis of Shielding Magnetic Field for Active Space Radiation Protection

Authors: Chaoyan Huang, Hongxia Zheng

Abstract:

For deep space exploration and long duration interplanetary manned missions, protection of astronauts from cosmic radiation is an unavoidable problem. However, passive shielding can be little effective for protecting particles which energies are greater than 1GeV/nucleon. In this study, active magnetic protection method is adopted. Taking into account the structure and size of the end-cap, eight shielding magnetic field configurations are designed based on the Hoffman configuration. The shielding effect of shielding magnetic field structure, intensity B and thickness L on H particles with 2GeV energy is compared by test particle simulation. The result shows that the shielding effect is better with the linear type magnetic field structure in the end-cap region. Furthermore, two magnetic field configurations with better shielding effect are investigated through H and He galactic cosmic spectra. And the shielding effect of the linear type configuration adopted in the barrel and end-cap regions is best.

Keywords: galactic cosmic rays, active protection, shielding magnetic field configuration, shielding effect

Procedia PDF Downloads 114
3336 Enhanced Magnetic Hyperthermic Efficiency of Ferrite Based Nanoparticles

Authors: J. P. Borah, R. D. Raland

Abstract:

Hyperthermia is one of many techniques used destroys cancerous cell. It uses the physical methods to heat certain organ or tissue delivering an adequate temperature in an appropriate period of time, to the entire tumor volume for achieving optimal therapeutic results. Magnetic Metal ferrites nanoparticles (MFe₂O₄ where M = Mn, Zn, Ni, Co, Mg, etc.) are one of the most potential candidates for hyperthermia due to their tunability, biocompatibility, chemical stability and notable ability to mediate high rate of heat induction. However, to obtain the desirable properties for these applications, it is important to optimize their chemical composition, structure and magnetic properties. These properties are mainly sensitive to cation distribution of tetrahedral and octahedral sites. Among the ferrites, zinc ferrite (ZnFe₂O₄) and Manganese ferrite ((MnFe₂O₄) is one of a strong candidate for hyperthermia application because Mn and zinc have a non-magnetic cation and therefore the magnetic property is determined only by the cation distribution of iron, which provides a better platform to manipulate or tailor the properties. In this talk, influence of doping and surfactant towards cation re-distribution leading to an enhancement of magnetic properties of ferrite nanoparticles will be demonstrated. The efficiency of heat generation in association with the enhanced magnetic property is also well discussed in this talk.

Keywords: magnetic nanoparticle, hyperthermia, x-ray diffraction, TEM study

Procedia PDF Downloads 143
3335 Magnetic Field Induced Mechanical Behavior of Fluid Filled Carbon Nanotube Foam

Authors: Siva Kumar Reddy, Anwesha Mukherjee, Abha Misra

Abstract:

Excellent energy absorption capability in carbon nanotubes (CNT) is shown in their bulk structure that behaves like super compressible foam. Furthermore, a tunable mechanical behavior of CNT foam is achieved using several methods like changing the concentration of precursors, polymer impregnation, non covalent functionalization of CNT microstructure etc. Influence of magnetic field on compressive behavior of magnetic CNT demonstrated an enhanced peak stress and energy absorption capability, which does not require any surface and structural modification of the foam. This presentation discusses the mechanical behavior of micro porous CNT foam that is impregnated in magnetic field responsive fluid. Magnetic particles are dispersed in a nonmagnetic fluid so that alignment of both particles and CNT could play a crucial role in controlling the stiffness of the overall structure. It is revealed that the compressive behavior of CNT foam critically depends on the fluid viscosity as well as magnetic field intensity. Both peak Stress and energy absorption in CNT foam followed a power law behavior with the increase in the magnetic field intensity. However, in the absence of magnetic field, both peak stress and energy absorption capability of CNT foam presented a linear dependence on the fluid viscosity. Hence, this work demonstrates the role magnetic filed in controlling the mechanical behavior of the foams prepared at nanoscale.

Keywords: carbon nanotubes, magnetic field, energy absorption capability and viscosity

Procedia PDF Downloads 278
3334 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 460
3333 Identification of Salt Responsive Proteins in Rice Leaf Sheath (Oryza sativa L.) with Nanoliquid Chromatography-Tandem Mass Spectrometry

Authors: Kanlaya Kong-Ngern, Chutima Homwonk, Sittiruk Roytrakul

Abstract:

In this research, we compared the proteomic profile of two rice leaf sheaths under salt stress, Thai moderately salt tolerant rice (Leaung Anan), and high salt tolerant rice (Pokkali). Seeds were grown in hydroponic culture for 21 days before NaCl was introduced initially at the level of 12 dS m⁻¹ for 10 days. Then the leaf sheath proteomes were analyzed by 1D-SDS-PAGE and NanoLC-MS/MS. In this study, 873 proteins were detected. Among these proteins, 219 proteins were known proteins and the other proteins were unnamed and unknown proteins. By using Mev software, we found that only 31 proteins in treated plants of both rice cultivars significantly expressed, 21 proteins were up-regulated and 10 proteins were down-regulated. Interestingly, the intensity of the 3 proteins in the Leaung Anan more expressed than in the Pokkali. The results indicate that the up-regulated proteins were more expressed in less tolerant rice may play an important role in helping rice to survive under salt stress.

Keywords: mass spectrometry, proteomics, rice leaf sheaths, salt stress

Procedia PDF Downloads 108
3332 Depth to Basement Determination Sculpting of a Magnetic Mineral Using Magnetic Survey

Authors: A. Ikusika, O. I. Poppola

Abstract:

This study was carried out to delineate possible structures that may favour the accumulation of tantalite, a magnetic mineral. A ground based technique was employed using proton precision magnetometer G-856 AX. A total of ten geophysical traverses were established in the study area. The acquired magnetic field data were corrected for drift. The trend analysis was adopted to remove the regional gradient from the observed data and the resulting results were presented as profiles. Quantitative interpretation only was adopted to obtain the depth to basement using Peter half slope method. From the geological setting of the area and the information obtained from the magnetic survey, a conclusion can be made that the study area is underlain by a rock unit of accumulated minerals. It is therefore suspected that the overburden is relatively thin within the study area and the metallic minerals are in disseminated quantity and at a shallow depth.

Keywords: basement, drift, magnetic field data, tantalite, traverses

Procedia PDF Downloads 459
3331 Magnetic Properties of Layered Rare-Earth Oxy-Carbonates Ln2O2CO3 (Ln = Nd, Sm, and Dy)

Authors: U. Arjun, K. Brinda, M. Padmanabhan, R. Nath

Abstract:

Polycrystalline samples of rare-earth oxy-carbonates Ln2O2CO3 (Ln = Nd, Sm, and Dy) are synthesized, and their structural and magnetic properties are investigated. All of them crystallize in a hexagonal structure with space group P6_3/mmc. They form a double layered structure with frustrated triangular arrangement of rare-earth magnetic ions. An antiferromagnetic transition is observed at TN ≈ 1.25 K, 0.61 K, and 1.21 K for Nd2O2CO3, Sm2O2CO3, and Dy2O2CO3, respectively. From the analysis of magnetic susceptibility, the value of the Curie-Weiss temperature θ_CW is obtained to be ≈ 21.7 K, 18 K, and 10.6 K for Nd2O2CO3, Sm2O2CO3, and Dy2O2CO3, respectively. The magnetic frustration parameter f ( = |θ_CW|/T_N) is calculated to be ≈ 17.4, 31, and 8.8 for Nd2O2CO3, Sm2O2CO3, and Dy2O2CO3, respectively which indicates that Sm2O2CO3 is strongly frustrated compared to its Nd and Dy analogues.

Keywords: chemical synthesis, exchange and superexchange, heat capacity, magnetically ordered materials

Procedia PDF Downloads 320
3330 Magnetic and Optical Properties of Quaternary GaFeMnN

Authors: B. Bouadjemi, S. Bentata, A. Abbad, W.Benstaali

Abstract:

The full-potential linearized augmented plane wave method (FP-LAPW) within the Generalized Gradient Approximation (GGA) is used to calculate the magnetic and optical properties of quaternary GaFeMnN. The results show that the compound becomes magnetic and half metallic and there is an apparition of peaks at low frequencies for the optical properties.

Keywords: optical properties, DFT, Spintronic, wave

Procedia PDF Downloads 529
3329 Cost-Based Analysis of Cloud and Traditional ERP Systems in Small and Medium Enterprises

Authors: Indu Saini, Ashu Khanna, S. K. Peddoju

Abstract:

Cloud computing is the new buzz word today attracting high interest among various domains like business enterprises, Particularly in Small and Medium Enterprises. As it is a pay-per-use model, SMEs have high expectations that adapting this model will not only make them flexible, hassle-free but also economic. In view of such expectations, this paper analyses the possibility of adapting cloud computing technologies in SMEs in light of economic concerns. In this paper, two hypotheses are developed to compare the average annual per-user costs of using Enterprise Resource Planning systems in two ways, The traditional approach and the cloud approach. A web based survey is conducted apart from the Interviews with the peers to collect the data across the selected SMEs and t-test is performed to compare both the technologies on the proposed hypothesis. Results achieved are produced and discussed.

Keywords: cloud computing, small and medium enterprises, enterprise resource solutions, interviews

Procedia PDF Downloads 314
3328 Effects and Mechanization of a High Gradient Magnetic Separation Process for Particulate and Microbe Removal from Ballast Water

Authors: Zhijun Ren, Zhang Lin, Zhao Ye, Zuo Xiangyu, Mei Dongxing

Abstract:

As a pretreatment process of ballast water treatment, the performance of high gradient magnetic separation (HGMS) technology for the removal of particulates and microorganisms was studied. The results showed that HGMS process could effectively remove suspended particles larger than 5 µm and had ability to resist impact load. Microorganism could also be effectively removed by HGMS process, and the removal effect increased with increasing magnetic field strength. The maximum removal rates for Escherichia coli (E. coli) and Staphylococcus aureus (S. aureus) were 4016.1% and 9675.3% higher, respectively, than without the magnetic field. In addition, the superoxide dismutase (SOD) activity of the microbes decreased by 32.2% when the magnetic field strength was 15.4 mT for 72 min. The microstructure of the stainless steel wool was investigated, and the results showed that particle removal by HGMS has common function by the magnetic force of the high-strength, high-gradient magnetic field on weakly magnetic particles in the water, and on the stainless steel wool.

Keywords: HGMS, particulates, superoxide dismutase (SOD) activity, steel wool magnetic medium

Procedia PDF Downloads 433
3327 Rectus Sheath Block to Extend the Effectiveness of Post Operative Epidural Analgesia

Authors: Sugam Kale, Arif Uzair Bin Mohammed Roslan, Cindy Lee, Syed Beevee Mohammed Ismail

Abstract:

Preemptive analgesia is an established concept in the modern practice of anaesthesia. To be most effective, it is best instituted earlier than the surgical stimulus and should last beyond the offset of surgically induced pain till healing is complete. Whereas the start of afferent pain blockade with regional anaesthesia is common, its effect often falls short to cover the entire period of pain impulses making their way to CNS in the post-operative period. We tried to use a combination of two regional anaesthetic techniques used sequentially to overcome this handicap. Madam S., a 56 year old lady, was scheduled for elective surgery for pancreatic cancer. She underwent laparotomy and distal pancreatectomy, splenectomy, bilateral salpingo oophorectomy, and sigmoid colectomy. Surgery was expected to be extensive, and it was presumed that the standard pain relief with PCA with opiates and oral analgesics would not be adequate. After counselling the patient pre-operative about the technique of regional anaesthesia techniques, including epidural catheterization and rectus sheath catheter placement, their benefits, and potential complications, informed consent was obtained. Epidural catheter was placed awake, and general anaesthesia was then induced. Epidural infusion of local anaesthetics was started prior to surgical incision and was continued till 60 hours into the postoperative period. Before skin closure, the surgeons inserted commercially available rectus sheath catheters bilaterally along the midline incision used for laparotomy. After 46 hours post-op, local anaesthetic infusion via these was started as bridging while the epidural infusion rate was tapered off. The epidural catheter was removed at 75 hours. Elastomeric pumps were used to provide local anaesthetic infusion with the ability to vary infusion rates. Acute pain service followed up the patient’s vital signs and effectiveness of pain relief twice daily or more frequently as required. Rectus sheath catheters were removed 137 hours post-op. The patient had good post-op analgesia with the minimal additional analgesic requirement. For the most part, the visual analog score (VAS) for pain remained at 1-3 on a scale of 1 to 10. Haemodynamics remained stable, and surgical recovery was as expected. Minimal opiate requirement after an extensive laparotomy also translates to the early return of intestinal motility. Our experience was encouraging, and we are hoping to extend this combination of two regional anaesthetic techniques to patients undergoing similar surgeries. Epidural analgesia is denser and offers excellent pain relief for both visceral and somatic pain in the first few days after surgery. As the pain intensity grows weaker, rectus sheath block and oral analgesics provide almost the same degree of pain relief after the epidural catheter is removed. We discovered that the background infusion of local anaesthetic down the rectus sheath catherter largely reduced the requirement for other classes of analgesics. We aim to study this further with a larger patient cohort and hope that it may become an established clinical practice that benefits patients everywhere.

Keywords: rectus sheath, epidural infusion, post operative analgesia, elastomeric

Procedia PDF Downloads 106
3326 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 302
3325 The Cloud Systems Used in Education: Properties and Overview

Authors: Agah Tuğrul Korucu, Handan Atun

Abstract:

Diversity and usefulness of information that used in education are have increased due to development of technology. Web technologies have made enormous contributions to the distance learning system especially. Mobile systems, one of the most widely used technology in distance education, made much easier to access web technologies. Not bounding by space and time, individuals have had the opportunity to access the information on web. In addition to this, the storage of educational information and resources and accessing these information and resources is crucial for both students and teachers. Because of this importance, development and dissemination of web technologies supply ease of access to information and resources are provided by web technologies. Dynamic web technologies introduced as new technologies that enable sharing and reuse of information, resource or applications via the Internet and bring websites into expandable platforms are commonly known as Web 2.0 technologies. Cloud systems are one of the dynamic web technologies that defined as a model provides approaching the demanded information independent from time and space in appropriate circumstances and developed by NIST. One of the most important advantages of cloud systems is meeting the requirements of users directly on the web regardless of hardware, software, and dealing with install. Hence, this study aims at using cloud services in education and investigating the services provided by the cloud computing. Survey method has been used as research method. In the findings of this research the fact that cloud systems are used such studies as resource sharing, collaborative work, assignment submission and feedback, developing project in the field of education, and also, it is revealed that cloud systems have plenty of significant advantages in terms of facilitating teaching activities and the interaction between teacher, student and environment.

Keywords: cloud systems, cloud systems in education, online learning environment, integration of information technologies, e-learning, distance learning

Procedia PDF Downloads 325
3324 High Performance Methyl Orange Capture on Magnetic Nanoporous MCM-41 Prepared by Incipient Wetness Impregnation Method

Authors: Talib M. Albayati, Omar S. Mahdy, Ghanim M. Alwan

Abstract:

This work is aimed to prepare magnetic nanoporous material Fe/MCM-41 and study its Physical characterization in order to enhance the magnetic properties for study the operating conditions on separation efficiency of methyl orange (MO) from wastewater by adsorption process. The experimental results are analysed to select the best operating conditions for different studied parameters which were obtained for both adsorbents mesoporous material samples MCM-41 and magnetic Fe/MCM-41 as follow: constant temperature (20 ºC), pH: (2) adsorbent dosage (0.03 gm), contact time (10 minute) and concentrations (30 mg/L). The results are demonstrated that the adsorption processes can be well fitted by the Langmuir isotherm model for pure MCM-41 with a higher correlation coefficient (0.999) and fitted by the freundlich isotherm model for magnetic Fe/MCM-41 with a higher correlation coefficient of (0.994).

Keywords: adsorption, nanoporous materials, mcm-41, magnetic material, wastewater, orange, wastewater

Procedia PDF Downloads 374