Search results for: sun protection factor
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7338

Search results for: sun protection factor

5178 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 73
5177 Graduate School of Biotechnology and Bioengineering/ YuanZe University

Authors: Sankhanil Das, Arunava Dasgupta, Keya Mitra

Abstract:

This paper investigates the relationship between natural ecological systems and modern urban morphology. Over years, ecological conditions represented by natural resources such as natural landforms, systems of water, urban geography and land covers have been a significant driving factor of how settlements have formed, expanded and functioned. These have played a pivotal role in formation of the community character and the cultural identity of the urban spaces, and have steered cultural behavior within these settings. Such cultural behaviors have been instrumental in transforming mere spaces to places with meaning and symbolism. The natural process of city formation is principally founded upon the idea of balance and harmony, mostly in a subconscious manner. Reimaging such processes of natural evolution, this paper systematically builds a development model that generates a balance between environment and development, with specific focus on the Urban-Rural fringe areas in the Temple Town of Puri, in Eastern India. Puri represents a unique cross section of ecological landscape, cultural practices and religious symbolism with a very rich history and a vibrant heritage. While the city centre gets more and more crowded by tourists and pilgrims to accommodate related businesses, the original residents of Puri relocate to move towards the urban peripheral areas for better living conditions, gradually converting agricultural lands into non agricultural uses. This rapid spread into the rural hinterland is devoid of any connection with the rich cultural identity of Puri. These past four decades of ‘development’ has been at the cost of 810 Hectares of ecological Lake systems in the region. Invaluable ecological resources at urban rural edges are often viewed as hindrances to development and conceptualized as taking away from the image of the city. This paper attempts to understand the language of development over years on existing natural resources through topo-analysis and proposes a sustainable approach of development using different planning tools, with ecological resources as the pivotal factor of development.

Keywords: livability, sustainable development, urbanization, urban-rural edge

Procedia PDF Downloads 171
5176 Dataset Quality Index:Development of Composite Indicator Based on Standard Data Quality Indicators

Authors: Sakda Loetpiparwanich, Preecha Vichitthamaros

Abstract:

Nowadays, poor data quality is considered one of the majority costs for a data project. The data project with data quality awareness almost as much time to data quality processes while data project without data quality awareness negatively impacts financial resources, efficiency, productivity, and credibility. One of the processes that take a long time is defining the expectations and measurements of data quality because the expectation is different up to the purpose of each data project. Especially, big data project that maybe involves with many datasets and stakeholders, that take a long time to discuss and define quality expectations and measurements. Therefore, this study aimed at developing meaningful indicators to describe overall data quality for each dataset to quick comparison and priority. The objectives of this study were to: (1) Develop a practical data quality indicators and measurements, (2) Develop data quality dimensions based on statistical characteristics and (3) Develop Composite Indicator that can describe overall data quality for each dataset. The sample consisted of more than 500 datasets from public sources obtained by random sampling. After datasets were collected, there are five steps to develop the Dataset Quality Index (SDQI). First, we define standard data quality expectations. Second, we find any indicators that can measure directly to data within datasets. Thirdly, each indicator aggregates to dimension using factor analysis. Next, the indicators and dimensions were weighted by an effort for data preparing process and usability. Finally, the dimensions aggregate to Composite Indicator. The results of these analyses showed that: (1) The developed useful indicators and measurements contained ten indicators. (2) the developed data quality dimension based on statistical characteristics, we found that ten indicators can be reduced to 4 dimensions. (3) The developed Composite Indicator, we found that the SDQI can describe overall datasets quality of each dataset and can separate into 3 Level as Good Quality, Acceptable Quality, and Poor Quality. The conclusion, the SDQI provide an overall description of data quality within datasets and meaningful composition. We can use SQDI to assess for all data in the data project, effort estimation, and priority. The SDQI also work well with Agile Method by using SDQI to assessment in the first sprint. After passing the initial evaluation, we can add more specific data quality indicators into the next sprint.

Keywords: data quality, dataset quality, data quality management, composite indicator, factor analysis, principal component analysis

Procedia PDF Downloads 118
5175 Machine Learning Framework: Competitive Intelligence and Key Drivers Identification of Market Share Trends among Healthcare Facilities

Authors: Anudeep Appe, Bhanu Poluparthi, Lakshmi Kasivajjula, Udai Mv, Sobha Bagadi, Punya Modi, Aditya Singh, Hemanth Gunupudi, Spenser Troiano, Jeff Paul, Justin Stovall, Justin Yamamoto

Abstract:

The necessity of data-driven decisions in healthcare strategy formulation is rapidly increasing. A reliable framework which helps identify factors impacting a healthcare provider facility or a hospital (from here on termed as facility) market share is of key importance. This pilot study aims at developing a data-driven machine learning-regression framework which aids strategists in formulating key decisions to improve the facility’s market share which in turn impacts in improving the quality of healthcare services. The US (United States) healthcare business is chosen for the study, and the data spanning 60 key facilities in Washington State and about 3 years of historical data is considered. In the current analysis, market share is termed as the ratio of the facility’s encounters to the total encounters among the group of potential competitor facilities. The current study proposes a two-pronged approach of competitor identification and regression approach to evaluate and predict market share, respectively. Leveraged model agnostic technique, SHAP, to quantify the relative importance of features impacting the market share. Typical techniques in literature to quantify the degree of competitiveness among facilities use an empirical method to calculate a competitive factor to interpret the severity of competition. The proposed method identifies a pool of competitors, develops Directed Acyclic Graphs (DAGs) and feature level word vectors, and evaluates the key connected components at the facility level. This technique is robust since its data-driven, which minimizes the bias from empirical techniques. The DAGs factor in partial correlations at various segregations and key demographics of facilities along with a placeholder to factor in various business rules (for ex. quantifying the patient exchanges, provider references, and sister facilities). Identified are the multiple groups of competitors among facilities. Leveraging the competitors' identified developed and fine-tuned Random Forest Regression model to predict the market share. To identify key drivers of market share at an overall level, permutation feature importance of the attributes was calculated. For relative quantification of features at a facility level, incorporated SHAP (SHapley Additive exPlanations), a model agnostic explainer. This helped to identify and rank the attributes at each facility which impacts the market share. This approach proposes an amalgamation of the two popular and efficient modeling practices, viz., machine learning with graphs and tree-based regression techniques to reduce the bias. With these, we helped to drive strategic business decisions.

Keywords: competition, DAGs, facility, healthcare, machine learning, market share, random forest, SHAP

Procedia PDF Downloads 73
5174 The Effect of Work Site Dangers on the Management of Construction Projects in Syria

Authors: Mohammed Aljoma, Eblal Zakzok

Abstract:

Safety is a science that seeks to protect and avoid humans from risks in any field and prevent losses in properties and lives as much as possible. On the other hand, occupational safety goals aim to protect workers from risks which can occur during work execution. The main purpose of occupational safety is to ultimately protect people, properties and the environment by reducing accidents and injuries that may cause losses and damages. To achieve this goal, we must remove the direct and indirect reasons which cause accidents and injuries; some of the reasons of accidents are the unsafe cases and inept behavior or both of them. This research focuses on the manner of providing instant protection from the very first beginning to people, properties and the environment by: -Inserting safety demands in the planning and designing works by identifying risk levels in every task of the project, -Using a new risk managing system or modifying or changing a previously-used one.

Keywords: planning, scheduling, risk management, project duration, site safety

Procedia PDF Downloads 279
5173 Mechanism of Changing a Product Concept

Authors: Kiyohiro Yamazaki

Abstract:

The purpose of this paper is to examine the hypothesis explaining the mechanism in the case, where the product is deleted or reduced the fundamental function of the product through the product concept changes in the digital camera industry. This paper points out not owning the fundamental technology might cause the change of the product concept. Casio could create new competitive factor so that this paper discusses a possibility of the mechanism of changing the product concept.

Keywords: firm without fundamental technology, product development, product concept, digital camera industry, Casio

Procedia PDF Downloads 543
5172 Effective Training System for Riding Posture Using Depth and Inertial Sensors

Authors: Sangseung Kang, Kyekyung Kim, Suyoung Chi

Abstract:

A good posture is the most important factor in riding. In this paper, we present an effective posture correction system for a riding simulator environment to provide position error detection and customized training functions. The proposed system detects and analyzes the rider's posture using depth data and inertial sensing data. Our experiments show that including these functions will help users improve their seat for a riding.

Keywords: posture correction, posture training, riding posture, riding simulator

Procedia PDF Downloads 461
5171 A Goms Model for Blind Users Website Navigation

Authors: Suraina Sulong

Abstract:

Keyboard support is one of the main accessibility requirements for web pages and web applications for blind user. But it is not sufficient that the blind user can perform all actions on the page using the keyboard. In addition, designers of web sites or web applications have to make sure that keyboard users can use their pages with acceptable performance. We present GOMS models for navigation in web pages with specific task given to the blind user to accomplish. These models can be used to construct the user model for accessible website.

Keywords: GOMS analysis, usability factor, blind user, human computer interaction

Procedia PDF Downloads 137
5170 Challenge Response-Based Authentication for a Mobile Voting System

Authors: Tohari Ahmad, Hudan Studiawan, Iwang Aryadinata, Royyana M. Ijtihadie, Waskitho Wibisono

Abstract:

A manual voting system has been implemented worldwide. It has some weaknesses which may decrease the legitimacy of the voting result. An electronic voting system is introduced to minimize this weakness. It has been able to provide a better result, in terms of the total time taken in the voting process and accuracy. Nevertheless, people may be reluctant to go to the polling location because of some reasons, such as distance and time. In order to solve this problem, mobile voting is implemented by utilizing mobile devices. There are many mobile voting architectures available. Overall, authenticity of the users is the common problem of all voting systems. There must be a mechanism which can verify the users’ authenticity such that only verified users can give their vote once; others cannot vote. In this paper, a challenge response-based authentication is proposed by utilizing properties of the users, for example, something they have and know. In terms of speed, the proposed system provides good result, in addition to other capabilities offered by the system.

Keywords: authentication, data protection, mobile voting, security

Procedia PDF Downloads 397
5169 Arisarum Vulgare: Bridging Tradition and Science through Phytochemical Characterization and Exploring Therapeutic Potential via in vitro and in vivo Biological Activities

Authors: Boudjelal Amel

Abstract:

Arisarum vulgare, a member of the Araceae family, is an herbaceous perennial widely distributed in the Mediterranean region. A. vulgare is recognized for its medicinal properties and holds significant traditional importance in Algeria for the treatment of various human ailments, including pain, infections, inflammation, digestive disorders, skin problems, eczema, cancer, wounds, burns and gynecological diseases. Despite its extensive traditional use, scientific exploration of A. vulgare remains limited. The study aims to investigate for the first time the therapeutic potential of A. vulgare ethanolic extract obtained by ultrasound-assisted extraction. The chemical composition of the extract was determined by LC-MS/MS analysis. For in vitro phytopharmacological evaluation, several assays, including DPPH, ABTS, FRAP and reducing power, were employed to evaluate the antioxidant activity. The antibacterial activity was assessed againt Escherichia coli, Salmonella typhimurium, Staphylococus aureus, Enterococcus feacium by disk diffusion and microdilution methods. The possible inhibitory activity of ethanolic extract was analyzed against the cholinesterases enzymes (AChE and BChE). The DNA protection activity of A. vulgare ethanolic extract was estimated using the agarose gel electrophoresis method. The capacities of the extract to protect plasmid DNA (pBR322) from the oxidizing effects of H2O2 and UV treatment were evaluated by their DNA-breaking forms. The in vivo wound healing potential of a traditional ointment containing 5% of A. vulgare ethanolic extract was also investigated. The LC-MS/MS profiling of the extract revealed the presence of various bioactive compounds, including naringenin, chlorogenic, vanillic, cafeic, coumaric acids, trans-cinnamic and trans ferrulic acids. The plant extract presented considerable antioxidant potential, being the most active for Reducing power (0,07326±0.001 mg/ml) and DPPH (0.14±0.004 mg/ml). The extract showed the highest inhibition zone diameter against Enterococcus feacium (36±0.1 mm). The ethanolic extract of A. vulgare suppressed the growth of Staphylococus aureus, Escherichia coli and Salmonella typhimurium according to the MIC values. The extract of the plant significantly inhibited both AChE and BChE enzymes. DNA protection activity of the A. vulgare extract was determined as 90.41% for form I and 51.92% for form II. The in vivo experiments showed that 5% ethanolic extract ointment accelerated the wound healing process. The topical application of the traditional formulation enhanced wound closure (95,36±0,6 %) and improved histological parameters in the treated group compared to the control groups. The promising biological properties of Arisarum vulgare revealed that the plant could be appraised as a potential origin of bioactive molecules having multifunctional medicinal uses.

Keywords: arisarum vulgare, LC-MS/MS, antioxidant activity, antimicrobial activity, cholinesterases enzymes inhibition, dna-damage activity, in vivo wound healing

Procedia PDF Downloads 37
5168 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic

Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato

Abstract:

Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.

Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security

Procedia PDF Downloads 343
5167 Phytochemicals Quatification, Trace Metal Accumulation Pattern and Contamination Risk Assessment of Different Variety of Tomatoes Cultivated on Municipal Waste Sludge Treated Soil

Authors: Mathodzi Nditsheni, Olawole Emmanuel Aina, Joshua Oluwole Olowoyo

Abstract:

The ever-increasing world population is putting extreme pressure on the already limited agricultural resources for food production. Different soil enhancers were introduced by famers to meet the need of the ever-increasing population demand for food. One of the soil enhancers is the municipal waste sludge. This research investigated the differences in the concentrations of trace metals and levels of phytochemicals in four different tomato varieties cultivated on soil treated with municipal waste sludge in Pretoria, South Africa. Fruits were harvested at maturity and analyzed for trace metals and phytochemicals contents using Inductively Coupled Plasma Optical Emission Spectrometry (ICP-OES) and a High-Performance Liquid Chromatography (HPLC) respectively. A one-way analysis of variance (ANOVA) was used to determine the differences in the concentrations of trace metals and phytochemical from different tomato varieties were significant. From the study, Rodade tomato bioaccumulated the highest concentrations of Mn, Cr, Cu and Ni, Roma bioaccumulated the highest concentrations of, Cd, Fe and Pb while Heinz bioaccumulated the highest concentrations of As and Zn. Cherry tomato on the other hand, recorded the lowest concentrations for most metals, Cd, Cr, Cu, Mn, Ni, Pb and Zn. The results of the study further showed that phenolic and flavonoids content were higher in the Solanum lycopersicum fruit grown in soils treated with municipal waste sludge. The study also showed that there was an inverse relationship between the levels of trace metals and phytochemicals. The calculated contamination factor values of trace metals like Cr, Cu, Pb and Zn were above the safe value of 1 which indicated that the tomato fruits may be unsafe for human consumption. However, the contamination factor values for the remaining trace metals were well below the safe value of 1. From the results obtained either for the control group or the treatment, the tomato varieties used in the study, bioaccumulated the toxic trace metals in their fruits and some of the values obtained were higher than the acceptable limit, which may then imply that the varieties of tomato used in this study bio accumulated the toxic trace metals from the soil, hence care should be taken when these tomato varieties are either cultivated or harvested from polluted areas

Keywords: trace metals, flavonoids, phenolics, waste sludge, tomato, contamination factors

Procedia PDF Downloads 58
5166 The Antecedents That Effect to the Adventure Tourism in Krabi, Thailand

Authors: Autjira Songjan, Vimolsri Sansuk

Abstract:

The research aim to study the possible negative environmental impact by adventure tourism in Krabi, Thailand, which is a popular destination for adventure tourism. The research is carried out through quantitative and qualitative methods. Questionnaires are distributed to 400 adventure tourists: 160 Thai and 240 international tourists. Questions involved experiences and opinions towards the environment and certain practices which influence a protection or degradation of environment from tour guides, tour operators and tourists. Furthermore, in-depth interviews were carried out with 21 adventure tour operators operating 5 main adventure tours. The finding shows the various types of adventure activities in Krabi involve different kinds of nature, therefore the characteristics of the different adventure activities are likely to affect the physical environment in different level. Kayaking tours are managed inside the mangrove forests, and may lead to negative impact on the ecosystem of mangroves, through loud noise, pulling out the mangrove population.

Keywords: adventure activities, Krabi province in Thailand, physical environment, adventure tourism

Procedia PDF Downloads 253
5165 A Study of Interleukin-1β Genetic Polymorphisms in Gastric Carcinoma and Colorectal Carcinoma in Egyptian Patients

Authors: Mariam Khaled, Noha Farag, Ghada Mohamed Abdel Salam, Khaled Abu-Aisha, Mohamed El-Azizi

Abstract:

Gastric and colorectal cancers are among the most frequent causes of cancer-associated mortalities in Africa. They have been considered as a global public health concern, as nearly one million new cases are reported per year. IL-1β is a pro-inflammatory cytokine-produced by activated macrophages and monocytes- and a member of the IL-1 family. The inactive IL-1β precursor is cleaved and activated by caspase-1 enzyme, which itself is activated by the assembly of intracellular structures defined as NLRP3 (Nod Like receptor P3) inflammasomes. Activated IL-1β stimulates the Interleukin-1 receptor type-1 (IL-1R1), which is responsible for the initiation of a signal transduction pathway leading to cell proliferation. It has been proven that the IL-1β gene is a highly polymorphic gene in which single nucleotide polymorphisms (SNPs) may affect its expression. It has been previously reported that SNPs including base transitions between C and T at positions, -511 (C-T; dbSNP: rs16944) and -31 (C-T; dbSNP: rs1143627), from the transcriptional start site, contribute to the pathogenesis of gastric and colorectal cancers by affecting IL-1β levels. Altered production of IL-1β due to such polymorphisms is suspected to stimulate an amplified inflammatory response and promote Epithelial Mesenchymal Transition leading to malignancy. Allele frequency distribution of the IL-1β-31 and -511 SNPs, in different populations, and their correlation to the incidence of gastric and colorectal cancers, has been intriguing to researchers worldwide. The current study aims to investigate allele distributions of the IL-1β SNPs among gastric and colorectal cancers Egyptian patients. In order to achieve to that, 89 Biopsy and surgical specimens from the antrum and corpus mucosa of chronic gastritis subjects and gastric and colorectal carcinoma patients was collected for DNA extraction followed by restriction fragment length polymorphism polymerase chain reaction (RFLP-PCR). The amplified PCR products of IL-1β-31C > T and IL-1β-511T > C were digested by incubation with the restriction endonuclease enzymes ALu1 and Ava1. Statistical analysis was carried out to determine the allele frequency distribution in the three studied groups. Also, the effect of the IL-1β -31 and -511 SNPs on nuclear factor binding was analyzed using Fluorescence Electrophoretic Mobility Shift Assay (EMSA), preceded by nuclear factor extraction from gastric and colorectal tissue samples and LPS stimulated monocytes. The results of this study showed that a significantly higher percentage of Egyptian gastric cancer patients have a homozygous CC genotype at the IL-1β-31 position and a heterozygous TC genotype at the IL-1β-511 position. Moreover, a significantly higher percentage of the colorectal cancer patients have a homozygous CC genotype at the IL-1β-31 and -511 positions as compared to the control group. In addition, the EMSA results showed that IL-1β-31C/T and IL-1β-511T/C SNPs do not affect nuclear factor binding. Results of this study suggest that the IL-1β-31 C/T and IL-1β-511 T/C may be correlated to the incidence of gastric cancer in Egyptian patients; however, similar findings couldn’t be proven in the colorectal cancer patients group for the IL-1β-511 T/C SNP. This is the first study to investigate IL-1β -31 and -511 SNPs in the Egyptian population.

Keywords: colorectal cancer, Egyptian patients, gastric cancer, interleukin-1β, single nucleotide polymorphisms

Procedia PDF Downloads 123
5164 Optical Fiber Data Throughput in a Quantum Communication System

Authors: Arash Kosari, Ali Araghi

Abstract:

A mathematical model for an optical-fiber communication channel is developed which results in an expression that calculates the throughput and loss of the corresponding link. The data are assumed to be transmitted by using of separate photons with different polarizations. The derived model also shows the dependency of data throughput with length of the channel and depolarization factor. It is observed that absorption of photons affects the throughput in a more intensive way in comparison with that of depolarization. Apart from that, the probability of depolarization and the absorption of radiated photons are obtained.

Keywords: absorption, data throughput, depolarization, optical fiber

Procedia PDF Downloads 272
5163 Validation of the Arabic Version of the Positive and Negative Syndrome Scale (PANSS)

Authors: Arij Yehya, Suhaila Ghuloum, Abdlmoneim Abdulhakam, Azza Al-Mujalli, Mark Opler, Samer Hammoudeh, Yahya Hani, Sundus Mari, Reem Elsherbiny, Ziyad Mahfoud, Hassen Al-Amin

Abstract:

Introduction: The Positive and Negative Syndrome Scale (PANSS) is a valid instrument developed by Kay and colleagues6 to assess symptoms of patients with schizophrenia. It consists of 30 items that factor the symptoms into three subscales: positive, negative and general psychopathology. This scale has been translated and validated in several languages. Objective: This study aims to determine the validity and psychometric properties of the Arabic version of the PANSS. Methods: A standardized translation and cultural adaptation method was adopted. Patients diagnosed with schizophrenia (n=98), according to psychiatrist’s diagnosis based on DSM-IV criteria, were recruited from the Psychiatry Department at Rumailah Hospital, Qatar. A first rater confirmed the diagnosis using the Arabic version of Mini International Neuropsychiatric Interview (MINI 6). A second and independent rater-administered the Arabic version of PANSS. Also, a control group (n=101), with no history of psychiatric disorder was recruited from the family and friends of the patients and from primary health care centers in Qatar. Results: There were more males than females in our sample of patients with schizophrenia (68.9% and 31.6%, respectively). On the other hand, in the control group the number of females outweighed that of males (58.4% and 41.6% respectively). The scale had a good internal consistency with Cronbach’s alpha 0.91. There was a significant difference between the scores on the three subscales of the PANSS. Patients with schizophrenia scored significantly higher (p<.0001) than the control subjects on subscales for positive symptoms 20.01(SD=7.21) and 7.30(SD=1.38), negative symptoms 18.89(SD=8.88) and 7.37(SD=2.38) and general psychopathology 34.41 (SD=11.56) and 16.93 (SD=3.93), respectively. Factor analysis and ROC curve were carried out to further test the psychometrics of the scale. Conclusions: The Arabic version of PANSS is a reliable and valid tool to assess both positive and negative symptoms of patients with schizophrenia in a balanced manner. In addition to providing the Arab population with a standardized tool to monitor symptoms of schizophrenia, this version provides a gateway to compare the prevalence of positive and negative symptoms in the Arab world which can be compared to others done elsewhere.

Keywords: Arabic version, assessment, diagnosis, schizophrenia, validation

Procedia PDF Downloads 616
5162 Numerical Study Pile Installation Disturbance Zone Effects on Excess Pore Pressure Dissipation

Authors: Kang Liu, Meng Liu, Meng-Long Wu, Da-Chang Yue, Hong-Yi Pan

Abstract:

The soil setup is an important factor affecting pile bearing capacity; there are many factors that influence it, all of which are closely related to pile construction disturbances. During pile installation in soil, a significant amount of excess pore pressure is generated, creating disturbance zones around the pile. The dissipation rate of excess pore pressure is an important factor influencing the pile setup. The paper aims to examine how alterations in parameters within disturbance zones affect the dissipation of excess pore pressure. An axisymmetric FE model is used to simulate pile installation in clay, subsequently consolidation using Plaxis 3D. The influence of disturbed zone on setup is verified, by comparing the parametric studies in uniform field and non-uniform field. Three types of consolidation are employed: consolidation in three directions, vertical consolidation, horizontal consolidation. The results of the parametric study show that the permeability coefficient decreases, soil stiffness decreases, and reference pressure increases in the disturbance zone, resulting in an increase in the dissipation time of excess pore pressure and exhibiting a noticeable threshold phenomenon, which has been commonly overlooked in previous literature. The research in this paper suggests that significant thresholds occur when the coefficient of permeability decreases to half of the original site's value for three-directional and horizontal consolidation within the disturbed zone. Similarly, the threshold for vertical consolidation is observed when the coefficient of permeability decreases to one-fourth of the original site's value. Especially in pile setup research, consolidation is assumed to be horizontal; the study findings suggest that horizontal consolidation has experienced notable alterations as a result of the presence of disturbed zones. Furthermore, the selection of pile installation methods proves to be critical. A nonlinearity excess pore pressure formula is proposed based on cavity expansion theory, which includes the distribution of soil profile modulus with depth.

Keywords: pile setup, threshold value effect, installation effects, uniform field, non-uniform field

Procedia PDF Downloads 21
5161 3D-Mesh Robust Watermarking Technique for Ownership Protection and Authentication

Authors: Farhan A. Alenizi

Abstract:

Digital watermarking has evolved in the past years as an important means for data authentication and ownership protection. The images and video watermarking was well known in the field of multimedia processing; however, 3D objects' watermarking techniques have emerged as an important means for the same purposes, as 3D mesh models are in increasing use in different areas of scientific, industrial, and medical applications. Like the image watermarking techniques, 3D watermarking can take place in either space or transform domains. Unlike images and video watermarking, where the frames have regular structures in both space and temporal domains, 3D objects are represented in different ways as meshes that are basically irregular samplings of surfaces; moreover, meshes can undergo a large variety of alterations which may be hard to tackle. This makes the watermarking process more challenging. While the transform domain watermarking is preferable in images and videos, they are still difficult to implement in 3d meshes due to the huge number of vertices involved and the complicated topology and geometry, and hence the difficulty to perform the spectral decomposition, even though significant work was done in the field. Spatial domain watermarking has attracted significant attention in the past years; they can either act on the topology or on the geometry of the model. Exploiting the statistical characteristics in the 3D mesh models from both geometrical and topological aspects was useful in hiding data. However, doing that with minimal surface distortions to the mesh attracted significant research in the field. A 3D mesh blind watermarking technique is proposed in this research. The watermarking method depends on modifying the vertices' positions with respect to the center of the object. An optimal method will be developed to reduce the errors, minimizing the distortions that the 3d object may experience due to the watermarking process, and reducing the computational complexity due to the iterations and other factors. The technique relies on the displacement process of the vertices' locations depending on the modification of the variances of the vertices’ norms. Statistical analyses were performed to establish the proper distributions that best fit each mesh, and hence establishing the bins sizes. Several optimizing approaches were introduced in the realms of mesh local roughness, the statistical distributions of the norms, and the displacements in the mesh centers. To evaluate the algorithm's robustness against other common geometry and connectivity attacks, the watermarked objects were subjected to uniform noise, Laplacian smoothing, vertices quantization, simplification, and cropping. Experimental results showed that the approach is robust in terms of both perceptual and quantitative qualities. It was also robust against both geometry and connectivity attacks. Moreover, the probability of true positive detection versus the probability of false-positive detection was evaluated. To validate the accuracy of the test cases, the receiver operating characteristics (ROC) curves were drawn, and they’ve shown robustness from this aspect. 3D watermarking is still a new field but still a promising one.

Keywords: watermarking, mesh objects, local roughness, Laplacian Smoothing

Procedia PDF Downloads 144
5160 Seismic Perimeter Surveillance System (Virtual Fence) for Threat Detection and Characterization Using Multiple ML Based Trained Models in Weighted Ensemble Voting

Authors: Vivek Mahadev, Manoj Kumar, Neelu Mathur, Brahm Dutt Pandey

Abstract:

Perimeter guarding and protection of critical installations require prompt intrusion detection and assessment to take effective countermeasures. Currently, visual and electronic surveillance are the primary methods used for perimeter guarding. These methods can be costly and complicated, requiring careful planning according to the location and terrain. Moreover, these methods often struggle to detect stealthy and camouflaged insurgents. The object of the present work is to devise a surveillance technique using seismic sensors that overcomes the limitations of existing systems. The aim is to improve intrusion detection, assessment, and characterization by utilizing seismic sensors. Most of the similar systems have only two types of intrusion detection capability viz., human or vehicle. In our work we could even categorize further to identify types of intrusion activity such as walking, running, group walking, fence jumping, tunnel digging and vehicular movements. A virtual fence of 60 meters at GCNEP, Bahadurgarh, Haryana, India, was created by installing four underground geophones at a distance of 15 meters each. The signals received from these geophones are then processed to find unique seismic signatures called features. Various feature optimization and selection methodologies, such as LightGBM, Boruta, Random Forest, Logistics, Recursive Feature Elimination, Chi-2 and Pearson Ratio were used to identify the best features for training the machine learning models. The trained models were developed using algorithms such as supervised support vector machine (SVM) classifier, kNN, Decision Tree, Logistic Regression, Naïve Bayes, and Artificial Neural Networks. These models were then used to predict the category of events, employing weighted ensemble voting to analyze and combine their results. The models were trained with 1940 training events and results were evaluated with 831 test events. It was observed that using the weighted ensemble voting increased the efficiency of predictions. In this study we successfully developed and deployed the virtual fence using geophones. Since these sensors are passive, do not radiate any energy and are installed underground, it is impossible for intruders to locate and nullify them. Their flexibility, quick and easy installation, low costs, hidden deployment and unattended surveillance make such systems especially suitable for critical installations and remote facilities with difficult terrain. This work demonstrates the potential of utilizing seismic sensors for creating better perimeter guarding and protection systems using multiple machine learning models in weighted ensemble voting. In this study the virtual fence achieved an intruder detection efficiency of over 97%.

Keywords: geophone, seismic perimeter surveillance, machine learning, weighted ensemble method

Procedia PDF Downloads 62
5159 Characterization of InP Semiconductor Quantum Dot Laser Diode after Am-Be Neutron Irradiation

Authors: Abdulmalek Marwan Rajkhan, M. S. Al Ghamdi, Mohammed Damoum, Essam Banoqitah

Abstract:

This paper is about the Am-Be neutron source irradiation of the InP Quantum Dot Laser diode. A QD LD was irradiated for 24 hours and 48 hours. The laser underwent IV characterization experiments before and after the first and second irradiations. A computer simulation using GAMOS helped in analyzing the given results from IV curves. The results showed an improvement in the QD LD series resistance, current density, and overall ideality factor at all measured temperatures. This is explained by the activation of the QD LD Indium composition to Strontium, ionization of the compound QD LD materials, and the energy deposited to the QD LD.

Keywords: quantum dot laser diode irradiation, effect of radiation on QD LD, Am-Be irradiation effect on SC QD LD

Procedia PDF Downloads 41
5158 Unravelling of the TOR Signaling Pathway in Human Fungal Pathogen Cryptococcus neoformans

Authors: Yee-Seul So, Guiseppe Ianiri, Alex Idnurm, Yong-Sun Bahn

Abstract:

Tor1 is a serine/threonine protein kinase that is widely conserved across eukaryotic species. Tor1 was first identified in Saccharomyces cerevisiae as a target of rapamycin (TOR). The TOR pathway has been implicated in regulating cellular responses to nutrients, proliferation, translation, transcription, autophagy, and ribosome biogenesis. Here we identified two homologues of S. cerevisiae Tor proteins, CNAG_06642 (Tor1) and CNAG_05220 (Tlk1, TOR-like kinase 1), in Cryptococcus neoformans causing a life-threatening fungal meningoencephalitis. Both Tor1 and Tlk1 have rapamycin-binding (RB) domains but Tlk1 has truncated RB form. To study the TOR-signaling pathway in the fungal pathogen, we attempt to construct the tor1Δ and tlk1Δ mutants and phenotypically analyze them. Although we failed to construct the tor1Δ mutant, we successfully construct the tlk1Δ mutant. The tlk1Δ mutant does not exhibit any discernable phenotypes, suggesting that Tlk1 is dispensable in C. neoformans. The essentiality of TOR1 is independently confirmed by constructing the TOR1 promoter replacement strain by using a copper transporter 4 (CTR4) promoter and the TOR1/tor1 heterozygous mutant in diploid C. neoformans strain background followed by sporulation analysis. To further analyze the function of Tor1, we construct TOR1 overexpression mutant using a constitutively active histone H3 in C. neoformans. We find that the Tor1 overexpression mutant is resistant to rapamycin but the tlk1Δ mutant does not exhibit any altered resistance to rapamycin, further confirming that Tor1, but not Tlk1, is critical for TOR signaling. Furthermore, we found that Tor1 is involved in response to diverse stresses, including genotoxic stress, oxidative stress, thermo-stress, antifungal drug treatment, and production of melanin. To identify any TOR-related transcription factors, we screened C. neoformans transcription factor library that we constructed in our previous study and identified several potential downstream factors of Tor1, including Atf1, Crg1 and Bzp3. In conclusion, the current study provides insight into the role of the TOR signaling pathway in human fungal pathogens as well as C. neoformans.

Keywords: fungal pathogen, serine/threonine kinase, target of rapamycin, transcription factor

Procedia PDF Downloads 208
5157 Predicting Wearable Technology Readiness in a South African Government Department: Exploring the Influence of Wearable Technology Acceptance and Positive Attitude

Authors: Henda J Thomas, Cornelia PJ Harmse, Cecile Schultz

Abstract:

Wearables are one of the technologies that will flourish within the fourth industrial revolution and digital transformation arenas, allowing employers to integrate collected data into organisational information systems. The study aimed to investigate whether wearable technology readiness can predict employees’ acceptance to wear wearables in the workplace. The factors of technology readiness predisposition that predict acceptance and positive attitudes towards wearable use in the workplace were examined. A quantitative research approach was used. The population consisted of 8 081 South African Department of Employment and Labour employees (DEL). Census sampling was used, and questionnaires to collect data were sent electronically to all 8 081 employees, 351 questionnaires were received back. The measuring instrument called the Technology Readiness and Acceptance Model (TRAM) was used in this study. Four hypotheses were formulated to investigate the relationship between readiness and acceptance of wearables in the workplace. The results found consistent predictions of technology acceptance (TA) by eagerness, optimism, and discomfort in the technology readiness (TR) scales. The TR scales of optimism and eagerness were consistent positive predictors of the TA scales, while discomfort proved to be a negative predictor for two of the three TA scales. Insecurity was found not to be a predictor of TA. It was recommended that the digital transformation policy of the DEL should be revised. Wearables in the workplace should be embraced from the viewpoint of convenience, automation, and seamless integration with the DEL information systems. The empirical contribution of this study can be seen in the fact that positive attitude emerged as a factor that extends the TRAM. In this study, positive attitude is identified as a new dimension to the TRAM not found in the original TA model and subsequent studies of the TRAM. Furthermore, this study found that Perceived Usefulness (PU) and Behavioural Intention to Use and (BIU) could not be separated but formed one factor. The methodological contribution of this study can lead to the development of a Wearable Readiness and Acceptance Model (WRAM). To the best of our knowledge, no author has yet introduced the WRAM into the body of knowledge.

Keywords: technology acceptance model, technology readiness index, technology readiness and acceptance model, wearable devices, wearable technology, fourth industrial revolution

Procedia PDF Downloads 69
5156 Assessment of the Effectiveness of the Anti-Debris Flow Engineering Constructed to Reduce the Risk of Expected Debris Flow in the River Mletiskhevi by Computer Program RAMMS

Authors: Sopio Gogilava, Goga Chakhaia, Levan Tsulukidze, Zurab Laoshvili, Irina Khubulava, Shalva Bosikashvili, Teimuraz Gugushvili

Abstract:

Geoinformatics systems (GIS) integrated computer program RAMMS is widely used for forecasting debris flows and accordingly for the determination of anticipating risks with 85% accuracy. In view of the above, the work introduces new capabilities of the computer program RAMMS, which evaluates the effectiveness of anti-debris flow engineering construction, namely: the possibility of decreasing the expected velocity, kinetic energy, and output cone volume in the Mletiskhevi River. As a result of research has been determined that the anti-debris flow engineering construction designed to reduce the expected debris flow risk in the Mletiskhevi River is an effective environmental protection technology, that's why its introduction is promising.

Keywords: construction, debris flow, geoinformatics systems, program RAMMS

Procedia PDF Downloads 128
5155 Case Study: Throughput Analysis over PLC Infrastructure as Last Mile Residential Solution in Colombia

Authors: Edward P. Guillen, A. Karina Martinez Barliza

Abstract:

Powerline Communications (PLC) as last mile solution to provide communication services, has the advantage of transmitting over channels already used for electrical distribution. However these channels have been not designed with this purpose, for that reason telecommunication companies in Colombia want to know how good would be using PLC in costs and network performance in comparison to cable modem or DSL. This paper analyzes PLC throughput for residential complex scenarios using a PLC network scenarios and some statistical results are shown.

Keywords: home network, power line communication, throughput analysis, power factor, cost, last mile solution

Procedia PDF Downloads 252
5154 Approximate-Based Estimation of Single Event Upset Effect on Statistic Random-Access Memory-Based Field-Programmable Gate Arrays

Authors: Mahsa Mousavi, Hamid Reza Pourshaghaghi, Mohammad Tahghighi, Henk Corporaal

Abstract:

Recently, Statistic Random-Access Memory-based (SRAM-based) Field-Programmable Gate Arrays (FPGAs) are widely used in aeronautics and space systems where high dependability is demanded and considered as a mandatory requirement. Since design’s circuit is stored in configuration memory in SRAM-based FPGAs; they are very sensitive to Single Event Upsets (SEUs). In addition, the adverse effects of SEUs on the electronics used in space are much higher than in the Earth. Thus, developing fault tolerant techniques play crucial roles for the use of SRAM-based FPGAs in space. However, fault tolerance techniques introduce additional penalties in system parameters, e.g., area, power, performance and design time. In this paper, an accurate estimation of configuration memory vulnerability to SEUs is proposed for approximate-tolerant applications. This vulnerability estimation is highly required for compromising between the overhead introduced by fault tolerance techniques and system robustness. In this paper, we study applications in which the exact final output value is not necessarily always a concern meaning that some of the SEU-induced changes in output values are negligible. We therefore define and propose Approximate-based Configuration Memory Vulnerability Factor (ACMVF) estimation to avoid overestimating configuration memory vulnerability to SEUs. In this paper, we assess the vulnerability of configuration memory by injecting SEUs in configuration memory bits and comparing the output values of a given circuit in presence of SEUs with expected correct output. In spite of conventional vulnerability factor calculation methods, which accounts any deviations from the expected value as failures, in our proposed method a threshold margin is considered depending on user-case applications. Given the proposed threshold margin in our model, a failure occurs only when the difference between the erroneous output value and the expected output value is more than this margin. The ACMVF is subsequently calculated by acquiring the ratio of failures with respect to the total number of SEU injections. In our paper, a test-bench for emulating SEUs and calculating ACMVF is implemented on Zynq-7000 FPGA platform. This system makes use of the Single Event Mitigation (SEM) IP core to inject SEUs into configuration memory bits of the target design implemented in Zynq-7000 FPGA. Experimental results for 32-bit adder show that, when 1% to 10% deviation from correct output is considered, the counted failures number is reduced 41% to 59% compared with the failures number counted by conventional vulnerability factor calculation. It means that estimation accuracy of the configuration memory vulnerability to SEUs is improved up to 58% in the case that 10% deviation is acceptable in output results. Note that less than 10% deviation in addition result is reasonably tolerable for many applications in approximate computing domain such as Convolutional Neural Network (CNN).

Keywords: fault tolerance, FPGA, single event upset, approximate computing

Procedia PDF Downloads 174
5153 Area-Efficient FPGA Implementation of an FFT Processor by Reusing Butterfly Units

Authors: Atin Mukherjee, Amitabha Sinha, Debesh Choudhury

Abstract:

Fast Fourier transform (FFT) of large-number of samples requires larger hardware resources of field programmable gate arrays and it asks for more area as well as power. In this paper, an area efficient architecture of FFT processor is proposed, that reuses the butterfly units more than once. The FFT processor is emulated and the results are validated on Virtex-6 FPGA. The proposed architecture outperforms the conventional architecture of a N-point FFT processor in terms of area which is reduced by a factor of log_N(2) with the negligible increase of processing time.

Keywords: FFT, FPGA, resource optimization, butterfly units

Procedia PDF Downloads 504
5152 Environmental Impacts Assessment of Power Generation via Biomass Gasification Systems: Life Cycle Analysis (LCA) Approach for Tars Release

Authors: Grâce Chidikofan, François Pinta, A. Benoist, G. Volle, J. Valette

Abstract:

Statement of the Problem: biomass gasification systems may be relevant for decentralized power generation from recoverable agricultural and wood residues available in rural areas. In recent years, many systems have been implemented in all over the world as especially in Cambodgia, India. Although they have many positive effects, these systems can also affect the environment and human health. Indeed, during the process of biomass gasification, black wastewater containing tars are produced and generally discharged in the local environment either into the rivers or on soil. However, in most environmental assessment studies of biomass gasification systems, the impact of these releases are underestimated, due to the difficulty of identification of their chemical substances. This work deal with the analysis of the environmental impacts of tars from wood gasification in terms of human toxicity cancer effect, human toxicity non-cancer effect, and freshwater ecotoxicity. Methodology: A Life Cycle Assessment (LCA) approach was adopted. The inventory of tars chemicals substances was based on experimental data from a downdraft gasification system. The composition of six samples from two batches of raw materials: one batch made of tree wood species (oak+ plane tree +pine) at 25 % moisture content and the second batch made of oak at 11% moisture content. The tests were carried out for different gasifier load rates, respectively in the range 50-75% and 50-100%. To choose the environmental impacts assessment method, we compared the methods available in SIMAPRO tool (8.2.0) which are taking into account most of the chemical substances. The environmental impacts for 1kg of tars discharged were characterized by ILCD 2011+ method (V.1.08). Findings Experimental results revealed 38 important chemical substances in varying proportion from one test to another. Only 30 are characterized by ILCD 2011+ method, which is one of the best performing methods. The results show that wood species or moisture content have no significant impact on human toxicity noncancer effect (HTNCE) and freshwater ecotoxicity (FWE) for water release. For human toxicity cancer effect (HTCE), a small gap is observed between impact factors of the two batches, either 3.08E-7 CTUh/kg against 6.58E-7 CTUh/kg. On the other hand, it was found that the risk of negative effects is higher in case of tar release into water than on soil for all impact categories. Indeed, considering the set of samples, the average impact factor obtained for HTNCE varies respectively from 1.64 E-7 to 1.60E-8 CTUh/kg. For HTCE, the impact factor varies between 4.83E-07 CTUh/kg and 2.43E-08 CTUh/kg. The variability of those impact factors is relatively low for these two impact categories. Concerning FWE, the variability of impact factor is very high. It is 1.3E+03 CTUe/kg for tars release into water against 2.01E+01 CTUe/kg for tars release on soil. Statement concluding: The results of this study show that the environmental impacts of tars emission of biomass gasification systems can be consequent and it is important to investigate the ways to reduce them. For environmental research, these results represent an important step of a global environmental assessment of the studied systems. It could be used to better manage the wastewater containing tars to reduce as possible the impacts of numerous still running systems all over the world.

Keywords: biomass gasification, life cycle analysis, LCA, environmental impact, tars

Procedia PDF Downloads 264
5151 Human Health Risk Assessment of Mercury-Contaminated Soils in Alebediah Mining Community, Sudan

Authors: Ahmed Elwaleed, Huiho Jeong, Ali H. Abdelbagi, Nguyen Thi Quynh, Koji Arizono, Yasuhiro Ishibashi

Abstract:

Artisanal and small-scale gold mining (ASGM) poses substantial risks to both human health and the environment, particularly through contamination of soil, water, and air. Prolonged exposure to ASGM-contaminated soils can lead to acute or chronic mercury toxicity. This study assesses the human health risks associated with mercury-contaminated soils and tailings in the Alebediah mining community in Sudan. Soil samples were collected from various locations within Alebediah, including ASGM areas, farmlands, and residential areas, along with tailings samples commonly found within ASGM sites. The evaluation of potential health risks to humans included the computation of the estimated daily intake (AvDI), the hazard quotient (HQ), and the hazard index (HI) for both adults and children. The primary exposure route identified as potentially posing a significant health risk was the volatilization of mercury from tailings samples, where mercury concentrations reached up to 25.5 mg/kg. In contrast, other samples within the ASGM area showed elevated mercury levels but did not present significant health risks, with HI values below 1. However, all areas indicated HI values above 1 for the remaining exposure routes. The study observed a decrease in mercury concentration with increasing distance from the ASGM community. Additionally, soil samples revealed elevated mercury levels exceeding background values, prompting an assessment of contamination levels using the enrichment factor (EF). The findings indicated that farmlands and residential areas exhibited depleted EF, while areas surrounding the ASGM community showed none to moderate pollution. In contrast, ASGM areas exhibited significant to extreme pollution. A GIS map was generated to visually depict the extent of mercury pollution, facilitating communication with stakeholders and decision-makers.

Keywords: mercury pollution, artisanal and small-scale gold mining, health risk assessment, hazard index, soil and tailings, enrichment factor

Procedia PDF Downloads 58
5150 Mosquito Repellent Finishing of Cotton Using Pepper Tree (Schinus molle) Seed Oil Extract

Authors: Granch Berhe Tseghai, Tekalgn Gebremedhin Belay, Abrehaley Hagos Gebremariam

Abstract:

Mosquito repellent textiles are one of the most growing ways to advance the textile field by providing the needed characteristics of protecting against mosquitoes, especially in the tropical areas. These types of textiles ensure the protection of human beings from the mosquitoes and the mosquito-borne disease includes malaria, filariasis and dengue fever. In this work Schinus Molle oil (pepper tree oil) was used for mosquito repellent finish as a preformatted thing. This study focused on the penetration of mosquito repellent finish in textile applications as well as nature based alternatives to commercial chemical mosquito repellents in the market. Suitable techniques and materials to achieve mosquito repellency are discussed and pointed out according to our project. In this study textile, sample was treated with binder and schinus oil. The different property has been studied for effective mosquito repellency.

Keywords: cotton, Schinus molle seed oil, mosquito repellent, mosquito-borne diseases

Procedia PDF Downloads 262
5149 Gender Dimension of Migrations Influenced by Genocide and Feminicides around the Globe

Authors: Lejla Mušić

Abstract:

Gender dimension of migration analyzes the intersection in between the world statistics on male and female migrations, around the world, involving the questions of youth migrations. Comparative analyses of world migration statistics as methodology offer the insight into the position of women in labor market around world. There are different forms of youth debris in contemporary world. The main problems are illegal migration, feminization of poverty, kidnapping the girls in Nigeria, femicides in Juarez and Mexico. Illegal migrations involve forced labor, rape and prostitution. Transgender youth share ideas through the online media (anti-bullying videos) and develop their own styles such as anarcho-punk, rave, or rock. Therefore, the stronger gender equality laws and laws for protection of women on work should be enforced.

Keywords: hyperfeminisation, rape, gangs of girls, rent boys masculinities, Varoç in Istanbul, forced labor, rape and prostitution, illegal emigrations

Procedia PDF Downloads 238