Search results for: parallel and distributed computing
1695 Induction of G1 Arrest and Apoptosis in Human Cancer Cells by Panaxydol
Authors: Dong-Gyu Leem, Ji-Sun Shin, Sang Yoon Choi, Kyung-Tae Lee
Abstract:
In this study, we focused on the anti-proliferative effects of panaxydol, a C17 polyacetylenic compound derived from Panax ginseng roots, against various human cancer cells. We treated with panaxydol to various cancer cells and panaxydol treatment was found to significantly inhibit the proliferation of human lung cancer cells (A549) and human pancreatic cancer cells (AsPC-1 and MIA PaCa-2), of which AsPC-1 cells were most sensitive to its treatment. DNA flow cytometric analysis indicated that panaxydol blocked cell cycle progression at the G1 phase in A549 cells, which accompanied by a parallel reduction of protein expression of cyclin-dependent kinase (CDK) 2, CDK4, CDK6, cyclin D1 and cyclin E. CDK inhibitors (CDKIs), such as p21CIP1/WAF1 and p27KIP1, were gradually upregulated after panaxydol treatment at the protein levels. Furthermore, panaxydol induced the activation of p53 in A549 cells. In addition, panaxydol also induced apoptosis of AsPC-1 and MIA PaCa-2 cells, as shown by accumulation of subG1 and apoptotic cell populations. Panaxydol triggered the activation of caspase-3, -8, -9 and the cleavage of poly (ADP-ribose) polymerase (PARP). Reduction of mitochondrial transmembrane potential by panaxydol was determined by staining with dihexyloxacarbocyanine iodide. Furthermore, panaxydol suppressed the levels of anti-apoptotic proteins, XIAP and Bcl-2, and increased the levels of proapoptotic proteins, Bax and Bad. In addition, panaxydol inhibited the activation of Akt and extracellular signal-regulated kinase (ERK) and activated the p38 mitogen-activated protein kinase kinase (MAPK). Our results suggest that panaxydol is an anti-tumor compound that causes p53-mediated cell cycle arrest and apoptosis via mitochondrial apoptotic pathway in various cancer cells.Keywords: apoptosis, cancer, G1 arrest, panaxydol
Procedia PDF Downloads 3221694 Bird-Adapted Filter for Avian Species and Individual Identification Systems Improvement
Authors: Ladislav Ptacek, Jan Vanek, Jan Eisner, Alexandra Pruchova, Pavel Linhart, Ludek Muller, Dana Jirotkova
Abstract:
One of the essential steps of avian song processing is signal filtering. Currently, the standard methods of filtering are the Mel Bank Filter or linear filter distribution. In this article, a new type of bank filter called the Bird-Adapted Filter is introduced; whereby the signal filtering is modifiable, based upon a new mathematical description of audiograms for particular bird species or order, which was named the Avian Audiogram Unified Equation. According to the method, filters may be deliberately distributed by frequency. The filters are more concentrated in bands of higher sensitivity where there is expected to be more information transmitted and vice versa. Further, it is demonstrated a comparison of various filters for automatic individual recognition of chiffchaff (Phylloscopus collybita). The average Equal Error Rate (EER) value for Linear bank filter was 16.23%, for Mel Bank Filter 18.71%, the Bird-Adapted Filter gave 14.29%, and Bird-Adapted Filter with 1/3 modification was 12.95%. This approach would be useful for practical use in automatic systems for avian species and individual identification. Since the Bird-Adapted Filter filtration is based on the measured audiograms of particular species or orders, selecting the distribution according to the avian vocalization provides the most precise filter distribution to date.Keywords: avian audiogram, bird individual identification, bird song processing, bird species recognition, filter bank
Procedia PDF Downloads 3871693 The European Refugee Crisis and Its Effects on the Relationships between Turkey and the European Union
Authors: Ebru Nergiz
Abstract:
The world is facing one of the biggest refugee crisis’ in history as hundred thousands of refugees who run away from the battle and genocide in the Middle East are travelling illegally to reach Europe over the Mediterranean and Aegean Sea. The number of refugees has reached huge numbers due to the civil war that was caused by the Arab Spring. The number of asylum applications to the European Union has also increased in parallel with the increase in the number of refugees. The conflict in Syria between the government of Bashar Al-Assad and various other forces, which started in the spring of 2011, continues to cause displacement within the country and across the region. The refugee situation caused by the Syrian conflict has placed enormous strain on neighboring countries Lebanon, Jordan, Iraq, Egypt, and especially Turkey. Turkey hosts massive numbers of Syrian refugees, almost 3 million and Syrians have been seeking protection in increasing numbers. The refugee crisis has affected the relationships between Turkey and the European Union deeply. President of the European Council Donald Tusk chaired a meeting of EU heads of state or government with Turkey on 29 November 2015. The meeting opened a new era in the relationships between Turkey and the European Union in terms of the migration crisis. The EU and Turkey agreed to negotiate Turkey's accession process to the European Union and to hold regular summits on Turkey-EU relations and discuss these issues. This paper looks at the reasons and consequences of the European refugee crisis and its effects on Turkey- European Union relationships. This paper also argues that the European Union has not sufficiently contributed toward alleviating the burden caused by the refugee influx, in terms of both financial assistance and refugee resettlement. The European Union’s priority is to guarantee that the lowest possible number of refugees reach Europe rather than to ensure the security of the refugees.Keywords: European Union, human rights, refugee crisis, Turkey-European union relationships
Procedia PDF Downloads 2961692 Role of Fish Hepatic Aldehyde Oxidase in Oxidative In Vitro Metabolism of Phenanthridine Heterocyclic Aromatic Compound
Authors: Khaled S. Al Salhen
Abstract:
Aldehyde oxidase is molybdo-flavoenzyme involved in the oxidation of hundreds of endogenous and exogenous and N-heterocyclic compounds and environmental pollutants. Uncharged N-heterocyclic aromatic compounds such phenanthridine are commonly distributed pollutants in soil, air, sediments, surface water and groundwater, and in animal and plant tissues. Phenanthridine as uncharged N-heterocyclic aromatic compound was incubated with partially purified aldehyde oxidase from rainbow trout fish liver. Reversed-phase HLPC method was used to separate the oxidation products from phenanthridine and the metabolite was identified. The 6(5H)-phenanthridinone was identified the major metabolite by partially purified aldehyde oxidase from fish liver. Kinetic constant for the oxidation reactions were determined spectrophotometrically and showed that this substrate has a good affinity (Km = 78 ± 7.6 µM) for hepatic aldehyde oxidase, coupled with a relatively high oxidation rate (0.77± 0.03 nmol/min/mg protein). In addition, the kinetic parameters of hepatic fish aldehyde oxidase towards the phenanthridine substrate indicate that in vitro biotransformation by hepatic fish aldehyde oxidase will be a significant pathway. This study confirms that partially purified aldehyde oxidase from fish liver is indeed the enzyme responsible for the in vitro production 6(5H)-phenanthridinone metabolite as it is a major metabolite by mammalian aldehyde oxidase.Keywords: aldehyde oxidase, fish, phenanthridine, specificity
Procedia PDF Downloads 3641691 Basics of SCADA Security: A Technical Approach
Authors: Michał Witas
Abstract:
This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.Keywords: denial of service, SCADA, security policy, distributed network
Procedia PDF Downloads 3731690 Applicability of Fuzzy Logic for Intrusion Detection in Mobile Adhoc Networks
Authors: Ruchi Makani, B. V. R. Reddy
Abstract:
Mobile Adhoc Networks (MANETs) are gaining popularity due to their potential of providing low-cost mobile connectivity solutions to real-world communication problems. Integrating Intrusion Detection Systems (IDS) in MANETs is a tedious task by reason of its distinctive features such as dynamic topology, de-centralized authority and highly controlled/limited resource environment. IDS primarily use automated soft-computing techniques to monitor the inflow/outflow of traffic packets in a given network to detect intrusion. Use of machine learning techniques in IDS enables system to make decisions on intrusion while continuous keep learning about their dynamic environment. An appropriate IDS model is essential to be selected to expedite this application challenges. Thus, this paper focused on fuzzy-logic based machine learning IDS technique for MANETs and presented their applicability for achieving effectiveness in identifying the intrusions. Further, the selection of appropriate protocol attributes and fuzzy rules generation plays significant role for accuracy of the fuzzy-logic based IDS, have been discussed. This paper also presents the critical attributes of MANET’s routing protocol and its applicability in fuzzy logic based IDS.Keywords: AODV, mobile adhoc networks, intrusion detection, anomaly detection, fuzzy logic, fuzzy membership function, fuzzy inference system
Procedia PDF Downloads 1781689 Supplementation of Annatto (Bixa orellana)-Derived δ-Tocotrienol Produced High Number of Morula through Increased Expression of 3-Phosphoinositide-Dependent Protein Kinase-1 (PDK1) in Mice
Authors: S. M. M. Syairah, M. H. Rajikin, A. R. Sharaniza
Abstract:
Several embryonic cellular mechanism including cell cycle, growth and apoptosis are regulated by phosphatidylinositol-3-kinase (PI3K)/Akt signaling pathway. The goal of present study is to determine the effects of annatto (Bixa orellana)-derived δ-tocotrienol (δ-TCT) on the regulations of PI3K/Akt genes in murine morula. Twenty four 6-8 week old (23-25g) female balb/c mice were randomly divided into four groups (G1-G4; n=6). Those groups were subjected to the following treatments for 7 consecutive days: G1 (control) received tocopherol stripped corn oil, G2 was given 60 mg/kg/day of δ-TCT mixture (contains 90% delta & 10% gamma isomers), G3 was given 60 mg/kg/day of pure δ-TCT (>98% purity) and G4 received 60 mg/kg/day α-TOC. On Day 8, females were superovulated with 5 IU Pregnant Mare’s Serum Gonadotropin (PMSG) for 48 hours followed with 5 IU human Chorionic Gonadotropin (hCG) before mated with males at the ratio of 1:1. Females were sacrificed by cervical dislocation for embryo collection 48 hours post-coitum. About fifty morula from each group were used in the gene expression analyses using Affymetrix QuantiGene Plex 2.0 Assay. Present data showed a significant increase (p<0.05) in the average number (mean + SEM) of morula produced in G2 (26.0 + 0.45), G3 (23.0 + 0.63) and G4 (25.0 + 0.73) compared to control group (G1 – 16.0 + 0.63). This is parallel with the high expression of PDK1 gene with increase of 2.75-fold (G2), 3.07-fold (G3) and 3.59-fold (G4) compared to G1 (1.78-fold). From the present data, it can be concluded that supplementation with δ-TCT(s) and α-TOC induced high expression of PDK1 in G2-G4 which enhanced the PI3K/Akt signaling activity, resulting in the increased number of morula.Keywords: delta-tocotrienol, embryonic development, nicotine, vitamin E
Procedia PDF Downloads 4271688 Evaluation of the Ability of COVID-19 Infected Sera to Induce Netosis Using an Ex-Vivo NETosis Monitoring Tool
Authors: Constant Gillot, Pauline Michaux, Julien Favresse, Jean-Michel Dogné, Jonathan Douxfils
Abstract:
Introduction: NETosis has emerged as a crucial yet paradoxical factor in severe COVID-19 cases. While neutrophil extracellular traps (NETs) help contain and eliminate viral particles, excessive NET formation can lead to hyperinflammation, exacerbating tissue damage and acute respiratory distress syndrome (ARDS). Aims: This study evaluates the relationship between COVID-19-infected sera and NETosis using an ex-vivo model. Methods: Sera from 8 post-admission COVID-19 patients, after receiving corticoid therapy, were used to induce NETosis in neutrophils from a healthy donor. NET formation was tracked using fluorescent markers for DNA and neutrophil elastase (NE) every 2 minutes for 8 hours. The results were expressed as a percentage of DNA/NE released over time. Key metrics, including T50 (time to 50% release) and AUC (area under the curve), representing total NETosis potential), were calculated. A 27-cytokine screening kit was used to assess the cytokine composition of the sera. Results: COVID-19 sera induced NETosis based on their cytokine profile. The AUC of NE and DNA release decreased with time following corticoid therapy, showing a significant reduction in 6 of the 8 patients (p<0.05). T50 also decreased in parallel with AUC for both markers. Cytokines concentration decrease with time after therapy administration. There is correlation between 14 cytokines concentration and NE release. Conclusion: This ex-vivo model successfully demonstrated the induction of NETosis by COVID-19 sera using two markers. A clear decrease in NETosis potential was observed over time with glucocorticoid therapy. This model can be a valuable tool for monitoring NETosis and investigating potential NETosis inducers and inhibitors.Keywords: NETosis, COVID-19, cytokine storm, biomarkers
Procedia PDF Downloads 191687 Performance Comparison of Outlier Detection Techniques Based Classification in Wireless Sensor Networks
Authors: Ayadi Aya, Ghorbel Oussama, M. Obeid Abdulfattah, Abid Mohamed
Abstract:
Nowadays, many wireless sensor networks have been distributed in the real world to collect valuable raw sensed data. The challenge is to extract high-level knowledge from this huge amount of data. However, the identification of outliers can lead to the discovery of useful and meaningful knowledge. In the field of wireless sensor networks, an outlier is defined as a measurement that deviates from the normal behavior of sensed data. Many detection techniques of outliers in WSNs have been extensively studied in the past decade and have focused on classic based algorithms. These techniques identify outlier in the real transaction dataset. This survey aims at providing a structured and comprehensive overview of the existing researches on classification based outlier detection techniques as applicable to WSNs. Thus, we have identified key hypotheses, which are used by these approaches to differentiate between normal and outlier behavior. In addition, this paper tries to provide an easier and a succinct understanding of the classification based techniques. Furthermore, we identified the advantages and disadvantages of different classification based techniques and we presented a comparative guide with useful paradigms for promoting outliers detection research in various WSN applications and suggested further opportunities for future research.Keywords: bayesian networks, classification-based approaches, KPCA, neural networks, one-class SVM, outlier detection, wireless sensor networks
Procedia PDF Downloads 4961686 Identification and Analysis of Supports Required for Teachers Moving to Remote Teaching and Learning during Disasters and Pandemics
Authors: Susan Catapano, Meredith Jones, Carol McNulty
Abstract:
Analysis of one state’s collaborative effort to support teachers, in both public and private schools, as they moved from face-to-face teaching to remote teaching during the Covid pandemic to identify lessons learned and materials put into place to support teachers and families. Surveys were created, distributed, and analyzed throughout the three months of remote teaching, documents and lesson plans were developed, and training materials were created. All data collected and materials developed were analyzed to identify supports teachers used and needed for successful remote teaching. Researchers found most teachers easily moved to online teaching; however, many families did not have access to technology, so teachers needed to develop non-technology-based access and support for remote teaching. Teachers also reported the need to prepare to teach remotely as part of their teaching training, so they were prepared in the future. Finally, data indicated teachers were able to establish stronger relationships with families than usual as a result of remote teaching. The lessons learned and support developed are part of the state’s ongoing policy for online teaching in the event of disasters and pandemics in the future.Keywords: remote learning, teacher education, pandemic, families
Procedia PDF Downloads 1611685 The Persuasive Influence of Nollywood Film in Cultural Transmission: Negotiating Nigerian Culture in a South African Environment
Authors: Oluwayemisi Onyenankeya
Abstract:
The popularity and viewership of Nollywood films have expanded across African countries as well as European and American cities especially those with considerable Diaspora population. This appears to underscore the assumption that Nollywood films not only project or transmit the embedded Nigerian cultural values to audience members but also actually make appreciable impression on those audience members. This study sought to ascertain the role of Nollywood film in the transference of Nigerian cultural heritage across other cultures using students at the University of Fort Hare as a case study. This study sought to determine if audience members learn, imbibe or manifest any behavioural tendencies that can be ascribed to the influence of watching Nollywood films. Specifically, the study sought to establish the aspect of Nigerian culture that Nollywood films transmit to audience members. The survey research method was used while data was analysed using descriptive statistics. In all, 400 questionnaires were distributed while 370 were returned. Results show that students who were exposed to Nollywood film could mimic some common Nigerian expressions and exclamations. A small percentage of viewers could actually speak a smattering of some Nigerian language while a few have bought or made dresses in the pattern of what they saw in the films. It could be concluded that Nollywood films do exert significant influence on the viewers in the University of Fort Hare.Keywords: culture, film, Nollywood, transmission
Procedia PDF Downloads 2421684 Molecular Profiling and Potential Bioactive Characteristics of Endophytic Fungi Isolated from Leptadenia Pyrotechnica
Authors: Walaa Al-Maghraby
Abstract:
Endophytes are organisms that colonize internal plant tissues without causing apparent harm to their host. Almost all groups of microorganisms have been found in endophytic association with plants may be fungi. They stimulate the production of secondary metabolites with a diverse range of biological activities. Leptadenia pyrotechnica is a more or less leafless, erect shrub with straight stems which is highly distributed in Saudi Arabia. Four endophytes fungi were isolated from Leptadenia pyrotechnica and identified using 18S ribosomal RNA sequences, which revealed four fungi genuses, namely Aspergillus terreus; Aspergillus welwitschiae; Aspergillus fumigatus and Aspergillus flavus. In this present study, four endophytic fungi from Leptadenia pyrotechnica were used for obtaining crude aqueous and ethyl acetate extracts for antimicrobial screening against 6 human pathogens, the antibacterial tests presented satisfactory results, where the pathogenic bacteria were inhibited by the four extracts tested, except for Escherichia coli that was inhibited by all extracts except ethyl acetate extract of Aspergillus terreus. Analysis of variance showed that the extract produced by endophyte Leptadenia pyrotechnica was the most effective against all bacteria, either gram-negative or positive. However, the extract was not efficient against pathogenic fungi. Therefore, this study indicates that endophytes from medicinal plant Leptadenia pyrotechnica could be potential sources of antibacterial substances.Keywords: antimicrobial activity, Aspergillus sp, endophytes, Leptadenia pyrotechnica
Procedia PDF Downloads 1411683 The Reproducibility and Repeatability of Modified Likelihood Ratio for Forensics Handwriting Examination
Authors: O. Abiodun Adeyinka, B. Adeyemo Adesesan
Abstract:
The forensic use of handwriting depends on the analysis, comparison, and evaluation decisions made by forensic document examiners. When using biometric technology in forensic applications, it is necessary to compute Likelihood Ratio (LR) for quantifying strength of evidence under two competing hypotheses, namely the prosecution and the defense hypotheses wherein a set of assumptions and methods for a given data set will be made. It is therefore important to know how repeatable and reproducible our estimated LR is. This paper evaluated the accuracy and reproducibility of examiners' decisions. Confidence interval for the estimated LR were presented so as not get an incorrect estimate that will be used to deliver wrong judgment in the court of Law. The estimate of LR is fundamentally a Bayesian concept and we used two LR estimators, namely Logistic Regression (LoR) and Kernel Density Estimator (KDE) for this paper. The repeatability evaluation was carried out by retesting the initial experiment after an interval of six months to observe whether examiners would repeat their decisions for the estimated LR. The experimental results, which are based on handwriting dataset, show that LR has different confidence intervals which therefore implies that LR cannot be estimated with the same certainty everywhere. Though the LoR performed better than the KDE when tested using the same dataset, the two LR estimators investigated showed a consistent region in which LR value can be estimated confidently. These two findings advance our understanding of LR when used in computing the strength of evidence in handwriting using forensics.Keywords: confidence interval, handwriting, kernel density estimator, KDE, logistic regression LoR, repeatability, reproducibility
Procedia PDF Downloads 1241682 Violence and Challenges in the Pamir Hindu Kush: A Study of the Impact of Change on a Central but Unknown Region
Authors: Skander Ben Mami
Abstract:
Despite its particular patterns and historical importance, the remote region of the Pamir Hindu Kush still lacks public recognition, as well as scientific substance, because of the abundance of classical state-centred geopolitical studies, the resilience of (inter)national narratives, and the political utility of the concepts of 'Central Asia' and 'South Asia'. However, this specific region of about 100 million inhabitants and located at the criss-cross of four geopolitical areas (Indian, Iranian, Chinese and Russian) over a territory of half a million square kilometres features a string of patterns that set it apart from the neighbouring areas of the Fergana, the Gansu and Punjab. Moreover, the Pamir Hindu Kush undergoes a series of parallel social and economic transformations that deserve scrutiny for their strong effect on the people’s lifestyle, particularly in three major urban centres (Aksu in China, Bukhara in Uzbekistan and Islamabad in Pakistan) and their immediate rural surroundings. While the involvement of various public and private stakeholders (States, NGOs, civil movements, private firms…) has undeniably resulted in positive elements (economic growth, connectivity, higher school attendance), it has in the same time generated a collection of negative effects (radicalizing, inequalities, pollution, territorial divide) that need to be addressed to strengthen regional and international security. This paper underscores the region’s strategical importance as the major hotbed and engine of insecurity and violence in Asia, notably in the context of Afghanistan’s enduring violence. It introduces the inner structures of the region, the different sources of violence as well as the governments’ responses to address it.Keywords: geography, security, terrorism, urbanisation
Procedia PDF Downloads 1381681 Controlled Conductivity of Poly (3,4-Ethylenedioxythiophene): Poly (4-Styrene Sulfonate) Composites with Polyester
Authors: Kazui Sasakii, Seira Mormune-Moriya, Hiroaki Tanahashi, Shigeji Kongaya
Abstract:
Poly (3.4-ethylenedioxythiophene) doped with poly (4-styrene sulfonate) (PEDOT: PSS) attracted a great deal of attention because of its unique characteristics of flexibility, optical properties, heat resistance and colloidal dispersion in water. It is well known that when high boiling solvents such as ethylene glycol or dimethyl sulfoxide are added as a secondary dopant to the micellar structure, PEDOT microcrystallizes and becomes highly conductive. In previous study bis(4-hydroxyphenyl) sulfone (BPS) was used as a secondary dopant for PEDOT:PSS and the enhancement of the conductivity was revealed. However, ductility is one of the serious issues which limited the application of PEDOT:PSS/BPS. So far, the composition with polymer binders has been conducted, however, polymer binders decrease the conductivity of the materials. In this study, PEDOT: PSS composites with polyester (PEs) were prepared by a simple aqueous process using PEs emulsion. The structural studies revealed that PEDOT:PSS and PEs were homogeneously distributed in the composites. It was found that the properties of PEDOT:PSS were remarkably enhanced by the incorporation of PEs. According to the tensile test, the ductility of PEDOT:PSS was remarkably improved. Interestingly, the conductivity of PEDOT:PSS/PEs composites was higher than that of neat PEDOT:PSS. For example, the conductivity increased by 8% at PEs content of 25 wt%. Since PEDOT:PSS were homogeneously dispersed on the surface of PEs particles, it was assumed that the conductive pathway was constructed by PEs particles in the nanocomposites. Therefore, a significant increase in conductivity was achieved.Keywords: polymer composites, conductivity, PEDOT:PSS, polyester
Procedia PDF Downloads 1151680 Application of Enzyme-Mediated Calcite Precipitation for Surface Control of Gold Mining Tailing Waste
Authors: Yogi Priyo Pradana, Heriansyah Putra, Regina Aprilia Zulfikar, Maulana Rafiq Ramadhan, Devyan Meisnnehr, Zalfa Maulida Insani
Abstract:
This paper studied the effects and mechanisms of fine-grained tailing by Enzyme-Mediated Calcite Precipitation (EMCP). Grouting solution used consists of reagents (CaCl₂ and (CO(NH₂)₂) and urease enzymes which react to produce CaCO₃. In sample preparation, the test tube is used to investigate the precipitation rate of calcite. The grouting solution added is 75 mL for one mold sample. The solution was poured into a mold sample up to as high as 5 mm from the top surface of the tailing to ensure the entire surface is submerged. The sample is left open in a cylinder for up to 3 days for curing. The direct mixing method is conducted so that the cementation process occurs by evenly distributed. The relationship between the results of the UCS test and the calcite precipitation rate likely indicates that the amount of calcite deposited in treated tailing could control the strength of the tailing. The sample results are analyzed using atomic absorption spectroscopy (AAS) to evaluate metal and metalloid content. Calcium carbonate deposited in the tailing is expected to strengthen the bond between tailing granules, which are easily slipped on the banks of the tailing dam. The EMCP method is expected to strengthen tailing in erosion-control surfaces.Keywords: tailing, EMCP, UCS, AAS
Procedia PDF Downloads 1381679 An Appraisal of Revenue Collection in Local Government: A Case Study of Boripe Local Government Iragbiji Osun State
Authors: Olanike O. Akinwale, Isiaka S. Adedoyin
Abstract:
Revenue is a fund realized by the government to meet both current and capital expenditures. The study found out the various ways through which local governments in Nigeria generate revenue or obtain funds and determined whether the people of Boripe local government are paying tax as at when due and also evaluated how the revenue generated is being used by the local government. During the course of this study, research questionnaires were drafted and distributed to respondents in the local government secretariat who supplied the information needed to carry out the research work. Data were collected by using simple random sampling technique where members of the population have been given equal chance of being picked as a member of the sample. Data were analysed using chart table; the chart analyzed the figure of the past two years revenue and expenditure of the local government. It was deduced from the result that revenue generated but this was not up to what one expected for this local government to finance the projected expenditure when the size was considered, its location as well as its natural endowment of this local government. This was due to lack of cooperation of the people and staffs within the local government in the local government jurisdiction as well as fraudulent activities the revenue collectors engaged in. Revenue generation is a fuel for development in any organization whether public or private. The ability of revenue drive of Boripe was not strong enough since the targeted revenue from taxation was not enough to meet the projected expenditure for a particular year as in 2016, the difference was carried forward to the next year.Keywords: appraisal, expenditure, local government, questionnaire, revenue
Procedia PDF Downloads 4581678 Characteristics and Key Exploration Directions of Gold Deposits in China
Authors: Bin Wang, Yong Xu, Honggang Qu, Rongmei Liu, Zhenji Gao
Abstract:
Based on the geodynamic environment, basic geological characteristics of minerals and so on, gold deposits in China are divided into 11 categories, of which tectonic fracture altered rock, mid-intrudes and contact zone, micro-fine disseminated and continental volcanic types are the main prospecting kinds. The metallogenic age of gold deposits in China is dominated by the Mesozoic and Cenozoic. According to the geotectonic units, geological evolution, geological conditions, spatial distribution, gold deposits types, metallogenic factors etc., 42 gold concentration areas are initially determined and have a concentrated distribution feature. On the basis of the gold exploration density, gold concentration areas are divided into high, medium and low level areas. High ones are mainly distributed in the central and eastern regions. 93.04% of the gold exploration drillings are within 500 meters, but there are some problems, such as less and shallower of drilling verification etc.. The paper discusses the resource potentials of gold deposits and proposes the future prospecting directions and suggestions. The deep and periphery of old mines in the central and eastern regions and western area, especially in Xinjiang and Qinghai, will be the future key prospecting one and have huge potential gold reserves. If the exploration depth is extended to 2,000 meters shallow, the gold resources will double.Keywords: gold deposits, gold deposits types, gold concentration areas, prospecting, resource potentiality
Procedia PDF Downloads 771677 Vision-Based Collision Avoidance for Unmanned Aerial Vehicles by Recurrent Neural Networks
Authors: Yao-Hong Tsai
Abstract:
Due to the sensor technology, video surveillance has become the main way for security control in every big city in the world. Surveillance is usually used by governments for intelligence gathering, the prevention of crime, the protection of a process, person, group or object, or the investigation of crime. Many surveillance systems based on computer vision technology have been developed in recent years. Moving target tracking is the most common task for Unmanned Aerial Vehicle (UAV) to find and track objects of interest in mobile aerial surveillance for civilian applications. The paper is focused on vision-based collision avoidance for UAVs by recurrent neural networks. First, images from cameras on UAV were fused based on deep convolutional neural network. Then, a recurrent neural network was constructed to obtain high-level image features for object tracking and extracting low-level image features for noise reducing. The system distributed the calculation of the whole system to local and cloud platform to efficiently perform object detection, tracking and collision avoidance based on multiple UAVs. The experiments on several challenging datasets showed that the proposed algorithm outperforms the state-of-the-art methods.Keywords: unmanned aerial vehicle, object tracking, deep learning, collision avoidance
Procedia PDF Downloads 1601676 An Approximate Formula for Calculating the Fundamental Mode Period of Vibration of Practical Building
Authors: Abdul Hakim Chikho
Abstract:
Most international codes allow the use of an equivalent lateral load method for designing practical buildings to withstand earthquake actions. This method requires calculating an approximation to the fundamental mode period of vibrations of these buildings. Several empirical equations have been suggested to calculate approximations to the fundamental periods of different types of structures. Most of these equations are knowing to provide an only crude approximation to the required fundamental periods and repeating the calculation utilizing a more accurate formula is usually required. In this paper, a new formula to calculate a satisfactory approximation of the fundamental period of a practical building is proposed. This formula takes into account the mass and the stiffness of the building therefore, it is more logical than the conventional empirical equations. In order to verify the accuracy of the proposed formula, several examples have been solved. In these examples, calculating the fundamental mode periods of several farmed buildings utilizing the proposed formula and the conventional empirical equations has been accomplished. Comparing the obtained results with those obtained from a dynamic computer has shown that the proposed formula provides a more accurate estimation of the fundamental periods of practical buildings. Since the proposed method is still simple to use and requires only a minimum computing effort, it is believed to be ideally suited for design purposes.Keywords: earthquake, fundamental mode period, design, building
Procedia PDF Downloads 2841675 The Impacts of Soft and Hard Enterprise Resource Planning to the Corporate Business Performance through the Enterprise Resource Planning Integrated System
Authors: Sautma Ronni Basana, Zeplin Jiwa Husada Tarigan, Widjojo Suprapto
Abstract:
Companies have already implemented the Enterprise Resource Planning (ERP) system to increase the data integration so that they can improve their business performance. Although some companies have managed to implement the ERP well, they still need to improve gradually so that the ERP functions can be optimized. To obtain a faster and more accurate data, the key users and IT department have to customize the process to suit the needs of the company. In reality, sustaining the ERP technology system requires soft and hard ERP so it enables to improve the business performance of the company. Soft and hard ERP are needed to build a tough system to ensure the integration among departments running smoothly. This research has three questions. First, is the soft ERP bringing impacts to the hard ERP and system integration. Then, is the hard ERP having impacts to the system integration. Finally, is the business performance of the manufacturing companies is affected by the soft ERP, hard ERP, and system integration. The questionnaires are distributed to 100 manufacturing companies in East Java, and are collected from 90 companies which have implemented the ERP, with the response rate of 90%. From the data analysis using PLS program, it is obtained that the soft ERP brings positive impacts to the hard ERP and system integration for the companies. Then, the hard ERP brings also positive impacts to the system integration. Finally, the business process performance of the manufacturing companies is affected by the system integration, soft ERP, and hard ERP simultaneously.Keywords: soft ERP, hard ERP, system integration, business performance
Procedia PDF Downloads 4051674 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 1531673 Three-Dimensional Carbon Foams for the Application as Electrode Material in Energy Storage Systems
Authors: H. Beisch, J. Marx, S. Garlof, R. Shvets, I. I. Grygorchak, A. Kityk, B. Fiedler
Abstract:
Carbon materials, especially three-dimensional carbon foams, show very high potential in the application as electrode material for energy storage systems such as batteries and supercapacitors with unique fast charging and discharging times. Regarding their high specific surface areas (SSA) high specific capacities can be reached. Globugraphite is a newly developed carbon foam with an interconnected globular carbon morphology. Especially, this foam has a statistically distributed hierarchical pore structure resulting from the manufacturing process based on sintered ceramic templates which are synthetized during a final chemical vapor deposition (CVD) process. For morphology characterization scanning electron (SEM) and transmission electron microscopy (TEM) is used. In addition, the SSA is carried out by nitrogen adsorption combined with the Brunauer–Emmett–Teller (BET) theory. Electrochemical measurements in organic and inorganic electrolyte provide high energy densities and power densities resulting from ion absorption by forming an electrochemical double layer. All values are summarized in a Ragone Diagram. Finally, power densities up to 833 W/kg and energy densities up to 48 Wh/kg could be achieved. The corresponding SSA is between 376 m²/g and 859 m²/g. For organic electrolyte a specific capacity of 71 F/g at a density of 20 mg/cm³ was achieved.Keywords: BET, CVD process, electron microscopy, Ragone diagram
Procedia PDF Downloads 1741672 Ridership Study for the Proposed Installation of Automatic Guide-way Transit (AGT) System along Sapphire Street in Balanga City, Bataan
Authors: Nelson Andres, Meeko C. Masangcap, John Denver D. Catapang
Abstract:
Balanga City as, the heart of Bataan, is a growing City and is now at its fast pace of development. The growth of commerce in the city results to an increase in commuters who travel back and forth through the city, leading to congestions. Consequently, queuing of vehicles along national roads and even in the highways of the city have become a regular occurrence. This common scenario of commuters flocking the city, private and public vehicles going bumper to bumper, especially during the rush hours, greatly affect the flow of traffic vehicles and is now a burden not only to the commuters but also to the government who is trying to address this dilemma. Seeing these terrible events, the implementation of an elevated Automated Guide-way transit is seen as a possible solution to help in the decongestion of the affected parts of Balanga City.In response to the problem, the researchers identify if it is feasible to have an elevated guide-way transit in the vicinity of Sapphire Street in Balanga City, Bataan. Specifically, the study aims to determine who will be the riders based on the demographic profile, where the trip can be generated and distributed, the time when volume of people usually peaks and the estimated volume of passengers. Statistical analysis is applied to the data gathered to find out if there is an important relationship between the demographic profile of the respondents and their preference of having an elevated railway transit in the City of Balanga.Keywords: ridership, AGT, railway, elevated track
Procedia PDF Downloads 821671 A Two-Phase Flow Interface Tracking Algorithm Using a Fully Coupled Pressure-Based Finite Volume Method
Authors: Shidvash Vakilipour, Scott Ormiston, Masoud Mohammadi, Rouzbeh Riazi, Kimia Amiri, Sahar Barati
Abstract:
Two-phase and multi-phase flows are common flow types in fluid mechanics engineering. Among the basic and applied problems of these flow types, two-phase parallel flow is the one that two immiscible fluids flow in the vicinity of each other. In this type of flow, fluid properties (e.g. density, viscosity, and temperature) are different at the two sides of the interface of the two fluids. The most challenging part of the numerical simulation of two-phase flow is to determine the location of interface accurately. In the present work, a coupled interface tracking algorithm is developed based on Arbitrary Lagrangian-Eulerian (ALE) approach using a cell-centered, pressure-based, coupled solver. To validate this algorithm, an analytical solution for fully developed two-phase flow in presence of gravity is derived, and then, the results of the numerical simulation of this flow are compared with analytical solution at various flow conditions. The results of the simulations show good accuracy of the algorithm despite using a nearly coarse and uniform grid. Temporal variations of interface profile toward the steady-state solution show that a greater difference between fluids properties (especially dynamic viscosity) will result in larger traveling waves. Gravity effect studies also show that favorable gravity will result in a reduction of heavier fluid thickness and adverse gravity leads to increasing it with respect to the zero gravity condition. However, the magnitude of variation in favorable gravity is much more than adverse gravity.Keywords: coupled solver, gravitational force, interface tracking, Reynolds number to Froude number, two-phase flow
Procedia PDF Downloads 3151670 Electronic Commerce in Georgia: Problems and Development Perspectives
Authors: Nika GorgoShadze, Anri Shainidze, Bachuki Katamadze
Abstract:
In parallel to the development of the digital economy in the world, electronic commerce is also widely developing. Internet and ICT (information and communication technology) have created new business models as well as promoted to market consolidation, sustainability of the business environment, creation of digital economy, facilitation of business and trade, business dynamism, higher competitiveness, etc. Electronic commerce involves internet technology which is sold via the internet. Nowadays electronic commerce is a field of business which is used by leading world brands very effectively. After the research of internet market in Georgia, it was found out that quality of internet is high in Tbilisi and is low in the regions. The internet market of Tbilisi can be evaluated as high-speed internet service, competitive and cost effective internet market. Development of electronic commerce in Georgia is connected with organizational and methodological as well as legal problems. First of all, a legal framework should be developed which will regulate responsibilities of organizations. The Ministry of Economy and Sustainable Development will play a crucial role in creating legal framework. Ministry of Justice will also be involved in this process as well as agency for data exchange. Measures should be taken in order to make electronic commerce in Georgia easier. Business companies may be offered some model to get low-cost and complex service. A service centre should be created which will provide all kinds of online-shopping. This will be a rather interesting innovation which will facilitate online-shopping in Georgia. Development of electronic business in Georgia requires modernized infrastructure of telecommunications (especially in the regions) as well as solution of institutional and socio-economic problems. Issues concerning internet availability and computer skills are also important.Keywords: electronic commerce, internet market, electronic business, information technology, information society, electronic systems
Procedia PDF Downloads 3841669 A New Approach to Increase Consumer Understanding of Meal’s Quality – Food Focus Instead of Nutrient Focus
Authors: Elsa Lamy, Marília Prada, Ada Rocha, Cláudia Viegas
Abstract:
The traditional and widely used nutrition-focused approach to communicate with consumers is reductionist and makes it difficult for consumers to assess their food intake. Without sufficient nutrition knowledge and understanding, it would be difficult to choose a healthful diet based only on nutritional recommendations. This study aimed to evaluate the understanding of how food/nutritional information is presented in menus to Portuguese consumers, comparing the nutrient-focused approach (currently used Nutrition Declaration) and the new food-focused approach (the infographic). For data collection, a questionnaire was distributed online using social media channels. A main effect of format on ratings of meal balance and completeness (Fbalance(1,79) = 18.26, p < .001, ηp2 = .188; Fcompleteness(1,67) = 27.18, p < .001, ηp2 = .289). Overall, dishes paired with the nutritional information were rated as more balanced (Mbalance= 3.70, SE = .11; Mcompleteness = 4.00, SE = .14) than meals with the infographic representation (Mbalance = 3.14, SE = .11; Mcompleteness = 3.29, SE = .13). We also observed a main effect of the meal, F(3,237) = 48.90, p < .001, ηp2 = .382, such that M1 and M2 were perceived as less balanced than the M3 and M4, all p < .001. The use of a food-focused approach (infographic) helped participants identify the lack of balance in the less healthful meals (dishes M1 and M2), allowing for a better understanding of meals' compliance with recommendations contributing to better food choices and a healthier lifestyle.Keywords: food labelling, food and nutritional recommendations, infographics, portions based information
Procedia PDF Downloads 791668 Investigation of the Effects of Processing Parameters on Pla Based 3D Printed Tensile Samples
Authors: Saifullah Karimullah
Abstract:
Additive manufacturing techniques are becoming more common with the latest technological advancements. It is composed to bring a revolution in the way products are designed, planned, manufactured, and distributed to end users. Fused deposition modeling (FDM) based 3D printing is one of those promising aspects that have revolutionized the prototyping processes. The purpose of this design and study project is to design a customized laboratory-scale FDM-based 3D printer from locally available sources. The primary goal is to design and fabricate the FDM-based 3D printer. After the fabrication, a tensile test specimen would be designed in Solid Works or [Creo computer-aided design (CAD)] software. A .stl file is generated of the tensile test specimen through slicing software and the G-codes are inserted via a computer for the test specimen to be printed. Different parameters were under studies like printing speed, layer thickness and infill density of the printed object. Some parameters were kept constant such as temperature, extrusion rate, raster orientation etc. Different tensile test specimens were printed for a different sets of parameters of the FDM-based 3d printer. The tensile test specimen were subjected to tensile tests using a universal testing machine (UTM). Design Expert software has been used for analyses, So Different results were obtained from the different tensile test specimens. The best, average and worst specimen were also observed under a compound microscope to investigate the layer bonding in between.Keywords: additive manufacturing techniques, 3D printing, CAD software, UTM machine
Procedia PDF Downloads 1031667 Translating the Gendered Discourse: A Corpus-Based Study of the Chinese Science Fiction The Three Body Problem
Authors: Yi Gu
Abstract:
The Three-Body Problem by Cixin Liu has been a bestseller Chinese Sci-Fi novel for years since 2008. The book was translated into English by Ken Liu in 2014 and won the prestigious 2015 science fiction and fantasy writing Hugo Award, drawing greater attention from wider international communities. The story exposes the horrors of the Chinese Cultural Revolution in the 1960s, in an intriguing narrative for readers at home and abroad. However, without the access to the source text, western readers may not be aware that the original Chinese version of the book is rich in gender-bias. Some Chinese scholars have applied feminist translation theories to their analysis on this book before, based on isolated selected, cherry-picking examples. Thus this paper aims to obtain a more thorough picture of how translators can cope with gender discrimination and reshape the gendered discourse from the source text, by systematically investigating the lexical and syntactic patterns in the translation of Liu’s entire book of 400 pages. The source text and the translation were downloaded into digital files, automatically aligned at paragraph level and then manually post-edited. They were then compiled into a parallel corpus of 114,629 English words and 204,145 Chinese characters using Sketch Engine. Gender-discrimination markers such as the overuse of ‘girl’ to describe an adult woman were searched in the source text, and the alignment made it possible to identify the strategies adopted by the translator to mitigate gender discrimination. The results provide a framework for translators to address gender bias. The study also shows how corpus methods can be used to further research in feminist translation and critical discourse analysis.Keywords: corpus, discourse analysis, feminist translation, science fiction translation
Procedia PDF Downloads 2561666 The Impact of Corporate Social Responsibility on Tertiary Institutions in Bauchi State Nigeria
Authors: Aliyu Aminu Baba, Mustapha Makama
Abstract:
Tertiary institutions are citadel of learning and societal orientation. Due to the huge investment of various government to tertiary institutions, these institutions are solely financed by the government alone. As stakeholders of society, corporations have to have to intervene and provide corporate social responsibility. The study intends to investigate the role of Entrepreneurs in incorporating social Responsibility. Tertiary institutions are citadel of learning and societal orientation. Due to the huge investment of various government to tertiary institutions, the study intends to investigate the role of businesses and Entrepreneurs, which could be among the important contributions of businesses and Entrepreneurs on corporate social Responsibility to Tertiary Institutions in Bauchi State. Corporate social responsibility is vital in enhancing the infrastructural development of the tertiary institution as almost all individuals and corporate bodies benefit from this tertiary institutions. The study intends to examine the impact of corporate social responsibility to tertiary institutions and entrepreneurs in Bauchi state Nigeria. Questionnaires would be distributed to tertiary institutions and entrepreneurs in the Bauchi metropolis. The data collected will be analyzed with the help of SPSS version 23. The main objective is to investigate the role of businesses and Entrepreneurs, which could be among the important contributions of businesses and entrepreneurs on corporate social Responsibility to Tertiary Institutions in Bauchi State.Keywords: corporate social responsibility, tertiary, institutions, profitability
Procedia PDF Downloads 224