Search results for: source and target
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6947

Search results for: source and target

6767 Efficient Single Relay Selection Scheme for Cooperative Communication

Authors: Sung-Bok Choi, Hyun-Jun Shin, Hyoung-Kyu Song

Abstract:

This paper proposes a single relay selection scheme in cooperative communication. Decode and forward scheme is considered when a source node wants to cooperate with a single relay for data transmission. To use the proposed single relay selection scheme, the source node make a little different pattern signal which is not complex pattern and broadcasts it. The proposed scheme does not require the channel state information between the source node and candidates of the relay during the relay selection. Therefore, it is able to be used in many fields.

Keywords: relay selection, cooperative communication, df, channel codes

Procedia PDF Downloads 643
6766 Space Vector PWM and Model Predictive Control for Voltage Source Inverter Control

Authors: Irtaza M. Syed, Kaamran Raahemifar

Abstract:

In this paper, we present a comparative assessment of Space Vector Pulse Width Modulation (SVPWM) and Model Predictive Control (MPC) for two-level three phase (2L-3P) Voltage Source Inverter (VSI). VSI with associated system is subjected to both control techniques and the results are compared. Matlab/Simulink was used to model, simulate and validate the control schemes. Findings of this study show that MPC is superior to SVPWM in terms of total harmonic distortion (THD) and implementation.

Keywords: voltage source inverter, space vector pulse width modulation, model predictive control, comparison

Procedia PDF Downloads 484
6765 Cryptocurrency Forensics: Analysis on Bitcoin E-Wallet from Computer Source Evidence

Authors: Muhammad Nooraiman bin Noorashid, Mohd Sharizuan bin Mohd Omar, Mohd Zabri Adil bin Talib, Aswami Fadillah bin Mohd Ariffin

Abstract:

Nowadays cryptocurrency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The cryptocurrency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin cryptocurrency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, digital wallet, digital forensics

Procedia PDF Downloads 308
6764 The Priming Effect of Morphology, Phonology, Semantics, and Orthography in Mandarin Chinese: A Prime Paradigm Study

Authors: Bingqing Xu, Wenxing Shuai

Abstract:

This study investigates the priming effects of different Chinese compound words by native Mandarin speakers. There are lots of homonym, polysemy, and synonym in Chinese. However, it is unclear which kind of words have the biggest priming effect. Native Mandarin speakers were tested in a visual-word lexical decision experiment. The stimuli, which are all two-character compound words, consisted of two parts: primes and targets. Five types of relationships were used in all stimuli: morphologically related condition, in which the prime and the target contain the same morpheme; orthographically related condition, in which the target and the prime contain the different morpheme with the same form; phonologically related condition, in which the target and the prime contain the different morpheme with the same phonology; semantically related condition, in which the target and the prime contain the different morpheme with similar meanings; totally unrelated condition. The time since participants saw the target to respond was recorded. Analyses on reaction time showed that the average reaction time of morphologically related targets was much shorter than others, suggesting the morphological priming effect is the biggest. However, the reaction time of the phonologically related conditions was the longest, even longer than unrelated conditions. According to scatter plots analyses, 86.7% of participants had priming effects in morphologically related conditions, only 20% of participants had priming effects in phonologically related conditions. These results suggested that morphologically related conditions had the biggest priming effect. The orthographically and semantically related conditions also had priming effects, whereas the phonologically related conditions had few priming effects.

Keywords: priming effect, morphology, phonology, semantics, orthography

Procedia PDF Downloads 120
6763 The Use of Caricatures as a Means of Advertising: The Case of Sütaş

Authors: Güldane Zengin

Abstract:

Advertisers often make use of humorous elements in advertisements they create. Advertisements that contain such elements play a great role in creating awareness and attaining positive attitudes. Caricature, which is an element of humour, is interesting, eye catching, entertaining and memorable by its very nature. Because of these characteristics of caricatures, they are being used for advertising purposes. Advertisements with caricatures are spreading rapidly and embraced by consumers easily. Especially in the last ten years, companies in different sectors use advertisements with caricatures to publicize their products and services. These companies have different target audiences with different characteristics. They all have differences in opinions, attitudes, perceptions and buying behaviours. Target audiences’ brand choices depend on many different factors. Advertising is an important factor in brand choice. Using attention grabbing methods like advertising with caricatures affects their buying behaviours. This study examines the use of caricatures in Sütaş advertisements. Target audiences’ opinions, perceptions and attitudes about advertisements with caricatures are examined in this descriptive study.

Keywords: advertising, advertisements with caricatures, caricature, communication, humour, Sütaş caricatures

Procedia PDF Downloads 227
6762 The Co-Existence of Multidominance and Movement in the Syntax of Chinese Bi-Comparatives

Authors: Yaqing Hu

Abstract:

This paper puts forward a syntactic analysis involving multidominance and rightward movement in Chinese bi-comparatives, as in 'Yuehan bi Mali gao (John is taller than Mary).' It is argued here that the predicate of comparison is a shared constituent in two small clauses, namely one for the target and one for the standard; and then it moves rightward to form a degree phrase with the comparative morpheme. This proposal comes from four aspects. First, the example above can also be expressed in this way, 'A: Yuehan he Mali, shui gao? (John and Mary, who is taller?) B: Yuehan gao./Yuehan geng gao. (John is taller).' This shows that the gradable adjective is predicated of the target. In addition, according to a constraint on Chinese bi-comparatives, namely the target and the standard must be arguments of the predicate simultaneously, it is not unreasonable to assume that the gradable adjective may also be predicated of the standard. Second, subcomparatives are totally disallowed in Chinese, as in '*zhe-zhang zhuozi bi zhe-zhang yizi kuan chang. (This table is longer than this chair is wide.)' In order to save it from ungrammaticality, the target and the standard should be compared along the same dimension denoted by the gradable adjective. It may follow that in Chinese comparatives, having equal roles in the same eventuality, the target and the standard bear the same thematic relationship with the predicate of comparison. Third, verb-copy can appear in Chinese bi-comparatives, as in 'Yuehan qi ma bi Mali qi ma qi de kuai. (John rides horses faster than Mary does.)' The predicate qi seems to form a small clause with both the target and the standard. This might be supporting evidence that both the target and the standard share the predicate of comparison. Fourth, Chinese comparatives do have comparative morphemes, as in 'Yuehan bi Mali geng gao. (John is taller than Mary)', which is semantically equivalent to the first example above. Thus, it follows that one feature of Chinese comparative morphemes is that they can remain overt or covert in the syntax, which will not affect semantics. This further shows that comparative morphemes in bi-comparatives may not be able to saturate the degree argument denoted by the predicate of comparison due to its optionality in the structure. These four aspects present a challenge to the Direct Analysis used in Chinese comparatives since this approach would presume that the target and the standard somehow show independency with the predicate in the syntax. Meanwhile, this study also rejects the previous analysis of multidomiance in bi-comparatives in which the degree phrase comprised of the comparative morpheme and the gradable adjective may be shared by the standard when the comparative morpheme is covert. This syntactic analysis proposed in this study will therefore offer a different perspective of how to treat degree phrase in Chinese comparatives and may offer evidence to argue whether there is degree phrase movement in bi-comparatives as in its English counterparts.

Keywords: Chinese comparatives, degree phrase, movement, multidominance, syntactic analysis

Procedia PDF Downloads 307
6761 Simultaneous Targeting of MYD88 and Nur77 as an Effective Approach for the Treatment of Inflammatory Diseases

Authors: Uzma Saqib, Mirza S. Baig

Abstract:

Myeloid differentiation primary response protein 88 (MYD88) has long been considered a central player in the inflammatory pathway. Recent studies clearly suggest that it is an important therapeutic target in inflammation. On the other hand, a recent study on the interaction between the orphan nuclear receptor (Nur77) and p38α, leading to increased lipopolysaccharide-induced hyperinflammatory response, suggests this binary complex as a therapeutic target. In this study, we have designed inhibitors that can inhibit both MYD88 and Nur77 at the same time. Since both MYD88 and Nur77 are an integral part of the pathways involving lipopolysaccharide-induced activation of NF-κB-mediated inflammation, we tried to target both proteins with the same library in order to retrieve compounds having dual inhibitory properties. To perform this, we developed a homodimeric model of MYD88 and, along with the crystal structure of Nur77, screened a virtual library of compounds from the traditional Chinese medicine database containing ~61,000 compounds. We analyzed the resulting hits for their efficacy for dual binding and probed them for developing a common pharmacophore model that could be used as a prototype to screen compound libraries as well as to guide combinatorial library design to search for ideal dual-target inhibitors. Thus, our study explores the identification of novel leads having dual inhibiting effects due to binding to both MYD88 and Nur77 targets.

Keywords: drug design, Nur77, MYD88, inflammation

Procedia PDF Downloads 282
6760 Bioprospecting of Marine Actinobacteria: The Leading Way for Industrially Important Enzymes and Bioactive Natural Products

Authors: Ramesh Subramani, Mathivanan Narayanasamy, William Aalbersberg

Abstract:

It is well accepted by last 35 years of research and on-going programmes that marine environment harbours abundant and unique biodiversity, which is currently playing as an important source in bioprospecting. It has become apparent that marine microorganisms are lead in the biodiscovery. Among marine organisms, actinobacteria are a target phylum for discovering novel antibiotics against increasing the multi-drug resistant human pathogens because of these taxa representing for novel genera and species. Marine actinomycetes are a proven source of new antibiotic leads and novel enzymes with important industrial applications. A total of 183 streptomycete and 25 non-streptomycete strains were isolated from different marine samples collected from north-eastern part of the Indian Ocean. Among them, 111 isolates displayed antibacterial activity against human pathogens and 151 exhibited antifungal activity against phytopathogens. Importantly, most of them produced various extracellular enzymes and 58 of them produced exopolysaccharides. Totally eight small bioactive compounds and a thermostable alkaline protease have been purified from a selected strain, Streptomyces fungicidicus. Besides, our on-going studies on non-streptomycete strains (rare actinomycetes) are most likely promising resource for new and unique compounds against current emerging drug-resistant pathogens. We have just recognised the chemical diversity in marine microorganisms. Therefore it is worthwhile to continue the exploration of marine microorganisms for new drug leads, novel enzymes and other bioprospecting research.

Keywords: bioactive compounds, industrial enzymes, marine actinobacteria, microbial metabolites, marine natural products

Procedia PDF Downloads 254
6759 Estimation of the Road Traffic Emissions and Dispersion in the Developing Countries Conditions

Authors: Hicham Gourgue, Ahmed Aharoune, Ahmed Ihlal

Abstract:

We present in this work our model of road traffic emissions (line sources) and dispersion of these emissions, named DISPOLSPEM (Dispersion of Poly Sources and Pollutants Emission Model). In its emission part, this model was designed to keep the consistent bottom-up and top-down approaches. It also allows to generate emission inventories from reduced input parameters being adapted to existing conditions in Morocco and in the other developing countries. While several simplifications are made, all the performance of the model results are kept. A further important advantage of the model is that it allows the uncertainty calculation and emission rate uncertainty according to each of the input parameters. In the dispersion part of the model, an improved line source model has been developed, implemented and tested against a reference solution. It provides improvement in accuracy over previous formulas of line source Gaussian plume model, without being too demanding in terms of computational resources. In the case study presented here, the biggest errors were associated with the ends of line source sections; these errors will be canceled by adjacent sections of line sources during the simulation of a road network. In cases where the wind is parallel to the source line, the use of the combination discretized source and analytical line source formulas minimizes remarkably the error. Because this combination is applied only for a small number of wind directions, it should not excessively increase the calculation time.

Keywords: air pollution, dispersion, emissions, line sources, road traffic, urban transport

Procedia PDF Downloads 417
6758 Effect of Nitrogen Source on Production of CMCase by Bacillus megaterium 1295S Isolated from Sewage Treatment Plants

Authors: Adel A. S. Al-Gheethi, M. O. Abdul-Monem

Abstract:

Cellulase-producing bacteria were isolated from wastewater and sludge, and identified as Bacillus megaterium 1295S, Sporosarcina pasteurii 586S, Bacillus subtilis 117S, Burkholderia cepacia 120S and Staphylococcus xylosus 222W. Among bacteria, B. megaterium 1295S was the best cellulase producer under the catabolic repression and was therefore selected to study the factors affecting cellulase production. The optimum conditions for cellulase production were observed in CMC-Yeast Extract (CYE) agar medium (pH 6.5) inoculated with 0.4 mL of bacterial culture and incubated at 45˚C for 72 h. Twenty amino acids were introduced into the production medium as nitrogen source to investigate the production of cellulase in presence of amino acids in comparison to peptone (as an organic source) and sodium nitrate (as an inorganic source). The results found that the maximum production of cellulase was recorded at 50 ppm when L-hydroxy proline, L-arginine, glycine, L-histidine, L-leucine, DL-isoleucine, DL-β-phenylalanine were used as sole nitrogen sources and at 100 ppm when DL-threonine, L-ornithine 12.29, L-proline were used as sole nitrogen sources. The highest biomass yield was found when glycine 5 ppm and DL-serine 100 ppm used as a nitrogen source.

Keywords: CMCase, Bacillus megaterium 1295S, factors, amino acids

Procedia PDF Downloads 422
6757 Proactive Competence Management for Employees: A Bottom-up Process Model for Developing Target Competence Profiles Based on the Employee's Tasks

Authors: Maximilian Cedzich, Ingo Dietz Von Bayer, Roland Jochem

Abstract:

In order for industrial companies to continue to succeed in dynamic, globalized markets, they must be able to train their employees in an agile manner and at short notice in line with the exogenous conditions that arise. For this purpose, it is indispensable to operate a proactive competence management system for employees that recognizes qualification needs timely in order to be able to address them promptly through qualification measures. However, there are hardly any approaches to be found in the literature that includes systematic, proactive competence management. In order to help close this gap, this publication presents a process model that systematically develops bottom-up, future-oriented target competence profiles based on the tasks of the employees. Concretely, in the first step, the tasks of the individual employees are examined for assumed future conditions. In other words, qualitative scenarios are considered for the individual tasks to determine how they are likely to change. In a second step, these scenario-based future tasks are translated into individual future-related target competencies of the employee using a matrix of generic task properties. The final step pursues the goal of validating the target competence profiles formed in this way within the framework of a management workshop. This process model provides industrial companies with a tool that they can use to determine the competencies required by their own employees in the future and compare them with the actual prevailing competencies. If gaps are identified between the target and the actual, these qualification requirements can be closed in the short term by means of qualification measures.

Keywords: dynamic globalized markets, employee competence management, industrial companies, knowledge management

Procedia PDF Downloads 174
6756 Phytomolecules Intervening Inflammation in IgA Nephropathy: A Possible Therapeutic Approach

Authors: Rajiv Jash, Himangshusekhar Maji

Abstract:

Phytomolecules have long been associated with the effective treatment of various disorders since ages. This study focuses on identifying the immunomodulatory pure molecules isolated from plants, which can be studied for their effect in alleviating IgAN. All the phytomolecules mentioned here have inflammation-reducing properties, and IgAN, being an autoimmune disease, can be a good target of these phytomolecules. Various pathological pathways of IgA nephropathy can be targeted with these phytomolecules, and this study is an effort to find out the rationale behind the choice of the molecules based on their ability to target the effector molecules of those pathological pathways.

Keywords: IgAN, fibrosis, inflammation, ESRD, TGFβ

Procedia PDF Downloads 67
6755 The Evaluation Model for the Quality of Software Based on Open Source Code

Authors: Li Donghong, Peng Fuyang, Yang Guanghua, Su Xiaoyan

Abstract:

Using open source code is a popular method of software development. How to evaluate the quality of software becomes more important. This paper introduces an evaluation model. The model evaluates the quality from four dimensions: technology, production, management, and development. Each dimension includes many indicators. The weight of indicator can be modified according to the purpose of evaluation. The paper also introduces a method of using the model. The evaluating result can provide good advice for evaluating or purchasing the software.

Keywords: evaluation model, software quality, open source code, evaluation indicator

Procedia PDF Downloads 357
6754 Sensing Mechanism of Nano-Toxic Ions Using Quartz Crystal Microbalance

Authors: Chanho Park, Juneseok You, Kuewhan Jang, Sungsoo Na

Abstract:

Detection technique of nanotoxic materials is strongly imperative, because nano-toxic materials can harmfully influence human health and environment as their engineering applications are growing rapidly in recent years. In present work, we report the DNA immobilized quartz crystal microbalance (QCM) based sensor for detection of nano-toxic materials such as silver ions, Hg2+ etc. by using functionalization of quartz crystal with a target-specific DNA. Since the mass of a target material is comparable to that of an atom, the mass change caused by target binding to DNA on the quartz crystal is so small that it is practically difficult to detect the ions at low concentrations. In our study, we have demonstrated fast and in situ detection of nanotoxic materials using quartz crystal microbalance. We report the label-free and highly sensitive detection of silver ion for present case, which is a typical nano-toxic material by using QCM and silver-specific DNA. The detection is based on the measurement of frequency shift of Quartz crystal from constitution of the cytosine-Ag+-cytosine binding. It is shown that the silver-specific DNA measured frequency shift by QCM enables the capturing of silver ions below 100pM. The results suggest that DNA-based detection opens a new avenue for the development of a practical water-testing sensor.

Keywords: nano-toxic ions, quartz crystal microbalance, frequency shift, target-specific DNA

Procedia PDF Downloads 295
6753 Sensor Registration in Multi-Static Sonar Fusion Detection

Authors: Longxiang Guo, Haoyan Hao, Xueli Sheng, Hanjun Yu, Jingwei Yin

Abstract:

In order to prevent target splitting and ensure the accuracy of fusion, system error registration is an important step in multi-static sonar fusion detection system. To eliminate the inherent system errors including distance error and angle error of each sonar in detection, this paper uses offline estimation method for error registration. Suppose several sonars from different platforms work together to detect a target. The target position detected by each sonar is based on each sonar’s own reference coordinate system. Based on the two-dimensional stereo projection method, this paper uses real-time quality control (RTQC) method and least squares (LS) method to estimate sensor biases. The RTQC method takes the average value of each sonar’s data as the observation value and the LS method makes the least square processing of each sonar’s data to get the observation value. In the underwater acoustic environment, matlab simulation is carried out and the simulation results show that both algorithms can estimate the distance and angle error of sonar system. The performance of the two algorithms is also compared through the root mean square error and the influence of measurement noise on registration accuracy is explored by simulation. The system error convergence of RTQC method is rapid, but the distribution of targets has a serious impact on its performance. LS method can not be affected by target distribution, but the increase of random noise will slow down the convergence rate. LS method is an improvement of RTQC method, which is widely used in two-dimensional registration. The improved method can be used for underwater multi-target detection registration.

Keywords: data fusion, multi-static sonar detection, offline estimation, sensor registration problem

Procedia PDF Downloads 138
6752 PSRR Enhanced LDO Regulator Using Noise Sensing Circuit

Authors: Min-ju Kwon, Chae-won Kim, Jeong-yun Seo, Hee-guk Chae, Yong-seo Koo

Abstract:

In this paper, we presented the LDO (low-dropout) regulator which enhanced the PSRR by applying the constant current source generation technique through the BGR (Band Gap Reference) to form the noise sensing circuit. The current source through the BGR has a constant current value even if the applied voltage varies. Then, the noise sensing circuit, which is composed of the current source through the BGR, operated between the error amplifier and the pass transistor gate of the LDO regulator. As a result, the LDO regulator has a PSRR of -68.2 dB at 1k Hz, -45.85 dB at 1 MHz and -45 dB at 10 MHz. the other performance of the proposed LDO was maintained at the same level of the conventional LDO regulator.

Keywords: LDO regulator, noise sensing circuit, current reference, pass transistor

Procedia PDF Downloads 257
6751 Benefits of Hybrid Mix in Renewable Energy and Integration with E-Efficient Compositions

Authors: Ahmed Khalil

Abstract:

Increased energy demands around the world have led to the raise in power production which has resulted with more greenhouse gas emissions through fossil sources. These fossil sources and emissions cause deterioration in echo-system. Therefore, renewable energy sources come to the scene as echo-friendly and clean energy sourcing, whereas the electrical devices and energy needs decrease in the timeline. Each of these renewable energy sources contribute to the reduction of greenhouse gases and mitigate environmental deterioration. However, there are also some general and source-specific challenges, which influence the choice of the investors. The most prominent general challenge that effects end-users’ comfort and reliability is usually determined as the intermittence which derives from the diversions of source conditions, due to nature dynamics and uncontrolled periodic changes. Research and development professionals strive to mitigate intermittence challenge through material improvement for each renewable source whereas hybrid source mix stand as a solution. This solution prevails well, when single renewable technologies are upgraded further. On the other hand, integration of energy efficient devices and systems, raise the affirmative effect of such solution in means of less energy requirement in sustainability composition or scenario. This paper provides a glimpse on the advantages of composing renewable source mix versus single usage, with contribution of sampled e-efficient systems and devices. Accordingly it demonstrates the extended benefits, through planning and predictive estimation stages of Ahmadi Town Projects in Kuwait.

Keywords: e-efficient systems, hybrid source, intermittence challenge, renewable energy

Procedia PDF Downloads 110
6750 Automatic Vowel and Consonant's Target Formant Frequency Detection

Authors: Othmane Bouferroum, Malika Boudraa

Abstract:

In this study, a dual exponential model for CV formant transition is derived from locus theory of speech perception. Then, an algorithm for automatic vowel and consonant’s target formant frequency detection is developed and tested on real speech. The results show that vowels and consonants are detected through transitions rather than their small stable portions. Also, vowel reduction is clearly observed in our data. These results are confirmed by the observations made in perceptual experiments in the literature.

Keywords: acoustic invariance, coarticulation, formant transition, locus equation

Procedia PDF Downloads 239
6749 Victims and Violators: Open Source Information, Admissibility Standards, and War Crimes Investigations in Iraq and Syria

Authors: Genevieve Zingg

Abstract:

Modern technology and social media platforms have fundamentally altered the nature of war crimes investigations by providing new forms of data, evidence, and documentation, and pose a unique opportunity to expand the efficacy of international law. However, much of the open source information available is deemed inadmissible in subsequent legal proceedings and fails to function as evidence largely due to issues of reliability and verifiability. Focusing on current judicial investigations related to ongoing conflicts in Syria and Iraq, this paper will examine key challenges and opportunities for the effective use of open source information in securing justice. This paper will consider strategies and approaches that can be used to ensure that information collected by affected populations meets basic admissibility standards. This paper argues that the critical failure to equip civilian populations in conflict zones with knowledge and information regarding established admissibility standards and guidelines both jeopardizes the potential of open source information and compromises the ability of victims to participate effectively in justice and accountability processes. The ultimate purpose of this paper is, therefore, to examine how to maximize the value of open source information based on the rules of evidence in international, regional, and national courts, and how to maximize the participation of affected populations in holding their abusers to account.

Keywords: human rights, international criminal law, international justice, international law, Iraq, open source information, social media, Syria, transitional justice, war crimes

Procedia PDF Downloads 319
6748 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 113
6747 Signal Amplification Using Graphene Oxide in Label Free Biosensor for Pathogen Detection

Authors: Agampodi Promoda Perera, Yong Shin, Mi Kyoung Park

Abstract:

The successful detection of pathogenic bacteria in blood provides important information for early detection, diagnosis and the prevention and treatment of infectious diseases. Silicon microring resonators are refractive-index-based optical biosensors that provide highly sensitive, label-free, real-time multiplexed detection of biomolecules. We demonstrate the technique of using GO (graphene oxide) to enhance the signal output of the silicon microring optical sensor. The activated carboxylic groups in GO molecules bind directly to single stranded DNA with an amino modified 5’ end. This conjugation amplifies the shift in resonant wavelength in a real-time manner. We designed a capture probe for strain Staphylococcus aureus of 21 bp and a longer complementary target sequence of 70 bp. The mismatched target sequence we used was of Streptococcus agalactiae of 70 bp. GO is added after the complementary binding of the probe and target. GO conjugates to the unbound single stranded segment of the target and increase the wavelength shift on the silicon microring resonator. Furthermore, our results show that GO could successfully differentiate between the mismatched DNA sequences from the complementary DNA sequence. Therefore, the proposed concept could effectively enhance sensitivity of pathogen detection sensors.

Keywords: label free biosensor, pathogenic bacteria, graphene oxide, diagnosis

Procedia PDF Downloads 443
6746 Research on the Strategy of Orbital Avoidance for Optical Remote Sensing Satellite

Authors: Zheng DianXun, Cheng Bo, Lin Hetong

Abstract:

This paper focuses on the orbit avoidance strategies of optical remote sensing satellite. The optical remote sensing satellite, moving along the Sun-synchronous orbit, is equipped with laser warning equipment to alert CCD camera from laser attacks. There are three ways to protect the CCD camera: closing the camera cover, satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes the satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the satellite’s Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-target-points avoid maneuvers. On occasions of fulfilling the satellite orbit tasks, the orbit can be restored back to virtual satellite through orbit maneuvers. Thereinto, the avoid maneuvers adopts pulse guidance. And the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to optical remote sensing satellite when it is encountered with hostile attack of space-based laser anti-satellite.

Keywords: optical remote sensing satellite, satellite avoidance, virtual satellite, avoid target-point, avoid maneuver

Procedia PDF Downloads 377
6745 The Translation of Code-Switching in African Literature: Comparing the Two German Translations of Ngugi Wa Thiongo’s "Petals of Blood"

Authors: Omotayo Olalere

Abstract:

The relevance of code-switching for intercultural communication through literary translation cannot be overemphasized. The translation of code-switching and its implications for translations studies have been studied in the context of African literature. In these cases, code-switching was examined in the more general terms of its usage in source text and not particularly in Ngugi’s novels and its translations. In addition, the functions of translation and code-switching in the lyrics of some popular African songs have been studied, but this study is related more with oral performance than with written literature. As such, little has been done on the German translation of code-switching in African works. This study intends to fill this lacuna by examining the concept of code-switching in the German translations in Ngugi’s Petals of Blood. The aim is to highlight the significance of code-switching as a phenomenon in this African (Ngugi’s) novel written in English and to also focus on its representation in the two German translations. The target texts to be used are Verbrannte Blueten and Land der flammenden Blueten. “Abrogration“ as a concept will play an important role in the analysis of the data. Findings will show that the ideology of a translator plays a huge role in representing the concept of “abrogration” in the translation of code-switching in the selected source text. The study will contribute to knowledge in translation studies by bringing to limelight the need to foreground aspects of language contact in translation theory and practice, particularly in the African context. Relevant translation theories adopted for the study include Bandia’s (2008) postcolonial theory of translation and Snell-Hornby”s (1988) cultural translation theory.

Keywords: code switching, german translation, ngugi wa thiong’o, petals of blood

Procedia PDF Downloads 52
6744 Generation of Electro-Encephalography Readiness Potentials by Intention

Authors: Seokbeen Lim, Gilwon Yoon

Abstract:

The readiness potential in brain waves is a brain activity related with an intention whose potential arises even before its conscious intention. This study was carried out in order to understand the generation and mechanism of the readiness potential more. The experiment with two subjects was conducted in two ways following the Oddball task protocol. Firstly, auditory stimuli were randomly presented to the subjects. The subject was allowed to press the keyboard with the right index finger only when the subject heard the target stimulus but not the standard stimulus. Secondly, unlike the first one, the auditory stimuli were randomly presented, and the subjects pressed the keyboard in the same manner, but at the same time with grasping action of the left hand. The readiness potential showed up for both of these experiments. In the first Oddball experiment, the readiness potential was detected only when the target stimulus was presented. However, in the second Oddball experiment with the left hand action of grasping something, the readiness potential was detected at the presentation of for both standard and target stimuli. However, detected readiness potentials with the target stimuli were larger than those of the standard stimuli. We found an interesting phenomenon that the readiness potential was able to be detected even the standard stimulus. This indicates that motor-related readiness potentials can be generated only by the intention to move. These results present a new perspective in psychology and brain engineering since subconscious brain action may be prior to conscious recognition of the intention.

Keywords: readiness potential, auditory stimuli, event-related potential, electroencephalography, oddball task

Procedia PDF Downloads 176
6743 Semantic Data Schema Recognition

Authors: Aïcha Ben Salem, Faouzi Boufares, Sebastiao Correia

Abstract:

The subject covered in this paper aims at assisting the user in its quality approach. The goal is to better extract, mix, interpret and reuse data. It deals with the semantic schema recognition of a data source. This enables the extraction of data semantics from all the available information, inculding the data and the metadata. Firstly, it consists of categorizing the data by assigning it to a category and possibly a sub-category, and secondly, of establishing relations between columns and possibly discovering the semantics of the manipulated data source. These links detected between columns offer a better understanding of the source and the alternatives for correcting data. This approach allows automatic detection of a large number of syntactic and semantic anomalies.

Keywords: schema recognition, semantic data profiling, meta-categorisation, semantic dependencies inter columns

Procedia PDF Downloads 395
6742 Characterization of a Pure Diamond-Like Carbon Film Deposited by Nanosecond Pulsed Laser Deposition

Authors: Camilla G. Goncalves, Benedito Christ, Walter Miyakawa, Antonio J. Abdalla

Abstract:

This work aims to investigate the properties and microstructure of diamond-like carbon film deposited by pulsed laser deposition by ablation of a graphite target in a vacuum chamber on a steel substrate. The equipment was mounted to provide one laser beam. The target of high purity graphite and the steel substrate were polished. The mechanical and tribological properties of the film were characterized using Raman spectroscopy, nanoindentation test, scratch test, roughness profile, tribometer, optical microscopy and SEM images. It was concluded that the pulsed laser deposition (PLD) technique associated with the low-pressure chamber and a graphite target provides a good fraction of sp3 bonding, that the process variable as surface polishing and laser parameter have great influence in tribological properties and in adherence tests performance. The optical microscopy images are efficient to identify the metallurgical bond.

Keywords: characterization, DLC, mechanical properties, pulsed laser deposition

Procedia PDF Downloads 131
6741 Temporal Axis in Japanese: The Paradox of a Metaphorical Orientation in Time

Authors: Tomoko Usui

Abstract:

In the field of linguistics, it has been said that concepts associated with space and motion systematically contribute structure to the temporal concept. This is the conceptual metaphor theory. conceptual metaphors typically employ a more abstract concept (time) as their target and a more concrete or physical concept as their source (space). This paper will examine two major temporal conceptual metaphors: Ego-centered Moving Time Metaphor and Time-RP Metaphor. Moving time generally receives a front-back orientation, however, Japanese shows a different orientation given to time. By means of Ego perspective, this paper will illustrate the paradox of a metaphorical orientation in time.

Keywords: Ego-centered Moving Time Metaphor, Japanese saki, temporal metaphors, Time RP Metaphor

Procedia PDF Downloads 466
6740 Preparation of Li Ion Conductive Ceramics via Liquid Process

Authors: M. Kotobuki, M. Koishi

Abstract:

Li1.5Al0.5Ti1.5 (PO4)3(LATP) has received much attention as a solid electrolyte for lithium batteries. In this study, the LATP solid electrolyte is prepared by the co-precipitation method using Li3PO4 as a Li source. The LATP is successfully prepared and the Li ion conductivities of bulk (inner crystal) and total (inner crystal and grain boundary) are 1.1 × 10-3 and 1.1 × 10-4 S cm-1, respectively. These values are comparable to the reported values, in which Li2C2O4 is used as the Li source. It is conclude that the LATP solid electrolyte can be prepared by the co-precipitation method using Li3PO4 as the Li source and this procedure has an advantage in mass production over previous procedure using Li2C2O4 because Li3PO4 is lower price reagent compared with Li2C2O4.

Keywords: co-precipitation method, lithium battery, NASICON-type electrolyte, solid electrolyte

Procedia PDF Downloads 327
6739 Localization of Buried People Using Received Signal Strength Indication Measurement of Wireless Sensor

Authors: Feng Tao, Han Ye, Shaoyi Liao

Abstract:

City constructions collapse after earthquake and people will be buried under ruins. Search and rescue should be conducted as soon as possible to save them. Therefore, according to the complicated environment, irregular aftershocks and rescue allow of no delay, a kind of target localization method based on RSSI (Received Signal Strength Indication) is proposed in this article. The target localization technology based on RSSI with the features of low cost and low complexity has been widely applied to nodes localization in WSN (Wireless Sensor Networks). Based on the theory of RSSI transmission and the environment impact to RSSI, this article conducts the experiments in five scenes, and multiple filtering algorithms are applied to original RSSI value in order to establish the signal propagation model with minimum test error respectively. Target location can be calculated from the distance, which can be estimated from signal propagation model, through improved centroid algorithm. Result shows that the localization technology based on RSSI is suitable for large-scale nodes localization. Among filtering algorithms, mixed filtering algorithm (average of average, median and Gaussian filtering) performs better than any other single filtering algorithm, and by using the signal propagation model, the minimum error of distance between known nodes and target node in the five scene is about 3.06m.

Keywords: signal propagation model, centroid algorithm, localization, mixed filtering, RSSI

Procedia PDF Downloads 270
6738 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 50