Search results for: distributed memory
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3119

Search results for: distributed memory

809 Robotic Solution for Nuclear Facility Safety and Monitoring System

Authors: Altab Hossain, Shakerul Islam, Golamur R. Khan, Abu Zafar M. Salahuddin

Abstract:

An effective identification of breakdowns is of premier importance for the safe and reliable operation of Nuclear Power Plants (NPP) and its associated facilities. A great number of monitoring and diagnosis methodologies are applied and used worldwide in areas such as industry, automobiles, hospitals, and power plant to detect and reduce human disasters. The potential consequences of several hazardous activities may harm the society using nuclear and its associated facilities. Hence, one of the most popular and effective methods to ensure safety and monitor the entire nuclear facility and imply risk-free operation without human interference during the hazardous situation is using a robot. Therefore, in this study, an advanced autonomous robot has been designed and developed that can monitor several parameters in the NPP to ensure the safety and do some risky job in case of nuclear disaster. The robot consisted of autonomous track following unit, data processing and transmitting unit can follow a straight line and take turn as the bank greater than 90 degrees. The developed robot can analyze various parameters such as temperature, altitude, radiation, obstacle, humidity, detecting fire, measuring distance, ultrasonic scan and taking the heat of any particular object. It has an ability to broadcast live stream and can record the document to its own server memory. There is a separate control unit constructed with a baseboard which processes the recorded data and a transmitter which transmits the processed data. To make the robot user-friendly, the code is developed such a way that a user can control any of robotic arm as per types of work. To control at any place and without the track, there is an advanced code has been developed to take manual overwrite. Through this process, administrator who has logged in permission to Dynamic Host Client Protocol (DHCP) can make the handover of the control of the robot. In this process, this robot is provided maximum nuclear security from being hacked. Not only NPP, this robot can be used to maximize the real-time monitoring system of any nuclear facility as well as nuclear material transportation and decomposition system.

Keywords: nuclear power plant, radiation, dynamic host client protocol, nuclear security

Procedia PDF Downloads 209
808 An Investigation into Slow ESL Reading Speed in Pakistani Students

Authors: Hina Javed

Abstract:

This study investigated the different strategies used by Pakistani students learning English as a second language at secondary level school. The basic premise of the study is that ESL students face tremendous difficulty while they are reading a text in English. It also purports to dig into the different causes of their slow reading. They might range from word reading accuracy, mental translation, lexical density, cultural gaps, complex syntactic constructions, and back skipping. Sixty Grade 7 students from two secondary mainstream schools in Lahore were selected for the study, thirty being boys and thirty girls. They were administered reading-related and reading speed pre and post-tests. The purpose of the tests was to gauge their performance on different reading tasks so as to be able to see how they used strategies, if any, and also to ascertain the causes hampering their performance on those tests. In the pretests, they were given simple texts with considerable lexical density and moderately complex sentential layout. In the post-tests, the reading tasks contained comic strips, texts with visuals, texts with controlled vocabulary, and an evenly distributed varied range of simple, compound, and complex sentences. Both the tests were timed. The results gleaned through the data gathered corroborated the researchers’ basic hunch that they performed significantly better than pretests. The findings suggest that the morphological structure of words and lexical density are the main sources of reading comprehension difficulties in poor ESL readers. It is also confirmed that if the texts are accompanied by pictorial visuals, it greatly facilitates students’ reading speed and comprehension. There is no substantial evidence that ESL readers adopt any specific strategy while reading in English.

Keywords: slow ESL reading speed, mental translation, complex syntactic constructions, back skipping

Procedia PDF Downloads 71
807 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 95
806 Alphabet Recognition Using Pixel Probability Distribution

Authors: Vaidehi Murarka, Sneha Mehta, Dishant Upadhyay

Abstract:

Our project topic is “Alphabet Recognition using pixel probability distribution”. The project uses techniques of Image Processing and Machine Learning in Computer Vision. Alphabet recognition is the mechanical or electronic translation of scanned images of handwritten, typewritten or printed text into machine-encoded text. It is widely used to convert books and documents into electronic files etc. Alphabet Recognition based OCR application is sometimes used in signature recognition which is used in bank and other high security buildings. One of the popular mobile applications includes reading a visiting card and directly storing it to the contacts. OCR's are known to be used in radar systems for reading speeders license plates and lots of other things. The implementation of our project has been done using Visual Studio and Open CV (Open Source Computer Vision). Our algorithm is based on Neural Networks (machine learning). The project was implemented in three modules: (1) Training: This module aims “Database Generation”. Database was generated using two methods: (a) Run-time generation included database generation at compilation time using inbuilt fonts of OpenCV library. Human intervention is not necessary for generating this database. (b) Contour–detection: ‘jpeg’ template containing different fonts of an alphabet is converted to the weighted matrix using specialized functions (contour detection and blob detection) of OpenCV. The main advantage of this type of database generation is that the algorithm becomes self-learning and the final database requires little memory to be stored (119kb precisely). (2) Preprocessing: Input image is pre-processed using image processing concepts such as adaptive thresholding, binarizing, dilating etc. and is made ready for segmentation. “Segmentation” includes extraction of lines, words, and letters from the processed text image. (3) Testing and prediction: The extracted letters are classified and predicted using the neural networks algorithm. The algorithm recognizes an alphabet based on certain mathematical parameters calculated using the database and weight matrix of the segmented image.

Keywords: contour-detection, neural networks, pre-processing, recognition coefficient, runtime-template generation, segmentation, weight matrix

Procedia PDF Downloads 389
805 How Childhood Trauma Changes the Recovery Models

Authors: John Michael Weber

Abstract:

The following research results spanned six months and 175 people addicted to some form of substance, from alcohol to heroin. One question was asked, and the answers were amazing and consistent. The following work is the detailed results of this writer’s answer to his own question and the 175 that followed. A constant pattern took shape throughout the bio-psycho-social assessments, these addicts had “first memories,” the memories were vivid and took place between the ages of three to six years old, to a person those first memories were traumatic. This writer’s personal search into his childhood was not to find an excuse for the way he became, but to explain the reason for becoming an addict. To treat addiction, these memories that have caused Post Traumatic Stress Disorder (PTSD), must be recognized as the catalyst that sparked a predisposition. Cognitive Behavioral Therapy (CBT), integrated with treatment specifically focused on PTSD, gives the addict a better chance at recovery sans relapse. This paper seeks to give the findings of first memories of the addicts assessed and provide the best treatment plan for such an addict, considering, the childhood trauma in congruence with treatment of the Substance Use Disorder (SUD). The question posed was concerning what their first life memory wa It is the hope of this author to take the knowledge that trauma is one of the main catalysts for addiction, will allow therapists to provide better treatment and reduce relapse from abstinence from drugs and alcohol. This research led this author to believe that if treatment of childhood trauma is not a priority, the twelve steps of Alcoholics Anonymous, specifically steps 4 and 5, will not be thoroughly addressed and odds for relapse increase. With this knowledge, parents can be educated on childhood trauma and the effect it has on their children. Parents could be mindful of the fact that the things they perceive as traumatic, do not match what a child, in the developmental years, absorbs as traumatic. It is this author’s belief that what has become the status quo in treatment facilities has not been working for a long time. It is for that reason this author believes things need to change. Relapse has been woven into the fabric of standard operating procedure and that, in this authors view, is not necessary. Childhood Trauma is not being addressed early in recovery and that creates an environment of inevitable relapse. This paper will explore how to break away from the status -quo and rethink the current “evidencebased treatments.” To begin breaking away from status-quo, this ends the Abstract, with hopes an interest has been peaked to read on.

Keywords: childood, trauma, treatment, addiction, change

Procedia PDF Downloads 79
804 Views of South African Academic Instructors to the Scholarship of Teaching and Learning in Anatomy Education

Authors: Lelika Lazarus, Reshma Sookrajh, Kapil S. Satyapal

Abstract:

Reflecting on teaching is commonly cited as a fundamental practice for personal and professional development. Educational research into the scholarship of teaching and learning anatomy includes engaging in discipline specific literature on teaching, reflecting on individual teaching methods and communicating these findings to peers. The aim of this paper is to formally assess the opinions of senior anatomy instructors regarding the state of anatomical knowledge at their respective institutions. The context of the paper derives from ongoing debates about the perceived decline in standards of anatomical knowledge of medical students and postgraduate learners. An open ended questionnaire was devised consisting of eight direct questions seeking opinions on anatomy teaching, knowledge, and potential educational developments and general thoughts on the teaching of anatomy to medical students. These were distributed to senior anatomy Faculty (identified by the author by their affiliation with the Anatomical Society of Southern Africa) based at the eight national medical schools within the country. A number of key themes emerged. Most senior faculty felt that the standard of medical education at their respective institutions was ‘good.’. However, emphasis was also placed on the ‘quality of teaching’ incorporating clinical scenarios. There were also indications that staff are split into those that are keen to do research and those that are happy to provide teaching to medical students as their primary function. Several challenges were also highlighted such as time constraints within the medical curriculum, the lack of cadavers to reinforce knowledge and gain depth perception and lack of appropriately qualified staff. Recommendations included fostering partnerships with both clinicians and medical scientists into the anatomy curriculum thus improving teaching and research.

Keywords: anatomy, education, reflection, teaching

Procedia PDF Downloads 295
803 Protein Feeding Pattern, Casein Feeding, or Milk-Soluble Protein Feeding did not Change the Evolution of Body Composition during a Short-Term Weight Loss Program

Authors: Solange Adechian, Michèle Balage, Didier Remond, Carole Migné, Annie Quignard-Boulangé, Agnès Marset-Baglieri, Sylvie Rousset, Yves Boirie, Claire Gaudichon, Dominique Dardevet, Laurent Mosoni

Abstract:

Studies have shown that timing of protein intake, leucine content, and speed of digestion significantly affect postprandial protein utilization. Our aim was to determine if one can spare lean body mass during energy restriction by varying the quality and the timing of protein intake. Obese volunteers followed a 6-wk restricted energy diet. Four groups were compared: casein pulse, casein spread, milk-soluble protein (MSP, = whey) pulse, and MSP spread (n = 10-11 per group). In casein groups, caseins were the only protein source; it was MSP in MSP groups. Proteins were distributed in four meals per day in the proportion 8:80:4:8% in the pulse groups; it was 25:25:25:25% in the spread groups. We measured weight, body composition, nitrogen balance, 3-methylhistidine excretion, perception of hunger, plasma parameters, adipose tissue metabolism, and whole body protein metabolism. Volunteers lost 7.5 ± 0.4 kg of weight, 5.1 ± 0.2 kg of fat, and 2.2 ± 0.2 kg of lean mass, with no difference between groups. In adipose tissue, cell size and mRNA expression of various genes were reduced with no difference between groups. Hunger perception was also never different between groups. In the last week, due to a higher inhibition of protein degradation and despite a lower stimulation of protein synthesis, postprandial balance between whole body protein synthesis and degradation was better with caseins than with MSP. It seems likely that the positive effect of caseins on protein balance occurred only at the end of the experiment.

Keywords: lean body mass, fat mass, casein, whey, protein metabolism

Procedia PDF Downloads 72
802 Dynamic Analysis of Functionally Graded Nano Composite Pipe with PZT Layers Subjected to Moving Load

Authors: Morteza Raminnia

Abstract:

In this study, dynamic analysis of functionally graded nano-composite pipe reinforced by single-walled carbon nano-tubes (SWCNTs) with simply supported boundary condition subjected to moving mechanical loads is investigated. The material properties of functionally graded carbon nano tube-reinforced composites (FG-CNTRCs) are assumed to be graded in the thickness direction and are estimated through a micro-mechanical model. In this paper polymeric matrix considered as isotropic material and for the CNTRC, uniform distribution (UD) and three types of FG distribution patterns of SWCNT reinforcements are considered. The system equation of motion is derived by using Hamilton's principle under the assumptions of first order shear deformation theory (FSDT).The thin piezoelectric layers embedded on inner and outer surfaces of FG-CNTRC layer are acted as distributed sensor and actuator to control dynamic characteristics of the FG-CNTRC laminated pipe. The modal analysis technique and Newmark's integration method are used to calculate the displacement and dynamic stress of the pipe subjected to moving loads. The effects of various material distribution and velocity of moving loads on dynamic behavior of the pipe is presented. This present approach is validated by comparing the numerical results with the published numerical results in literature. The results show that the above-mentioned effects play very important role on dynamic behavior of the pipe .This present work shows that some meaningful results that which are interest to scientific and engineering community in the field of FGM nano-structures.

Keywords: nano-composite, functionally garded material, moving load, active control, PZT layers

Procedia PDF Downloads 419
801 Factors Affecting Entrepreneurial Behavior and Performance of Youth Entrepreneurs in Malaysia

Authors: Mohd Najib Mansor, Nur Syamilah Md. Noor, Abdul Rahim Anuar, Shazida Jan Mohd Khan, Ahmad Zubir Ibrahim, Badariah Hj Din, Abu Sufian Abu Bakar, Kalsom Kayat, Wan Nurmahfuzah Jannah Wan Mansor

Abstract:

This study aimed and focused on the behavior of youth entrepreneurs’ especially entrepreneurial self-efficacy and the performance in micro SMEs in Malaysia. Entrepreneurship development calls for support from various quarters, and mostly the need exists to initiate a youth entrepreneurship culture and drive amongst the youth in the society. Although backed up by the government and non-government organizations, micro-entrepreneurs are still facing challenges which greatly delay their progress, growth and consequently their input towards economic advancement. Micro-entrepreneurs are confronted with unique difficulties such as uncertainty, innovation, and evolution. Reviews on the development of entrepreneurial characteristics such as need for achievement, internal locus of control, risk-taking and innovation and have been recognized as highly associated with entrepreneurial behavior. The data in this study was obtained from the Department of Statistics, Malaysia. A random sampling of 830 respondents was distributed to 14 states that involve of micro-entrepreneurs. The study adopted a quantitative approach whereby a set of questionnaire was used to gather data. Multiple regression analysis was chosen as a method of analysis testing. The result of this study is expected to provide insight into the factor affecting entrepreneurial behavior and performance of youth entrepreneurs in micro SMEs. The finding showed that the Malaysian youth entrepreneurs do not have the entrepreneurial self-efficacy within themselves in order to accomplish greater success in their business venture. The establishment of entrepreneurial schools to allow our youth to be exposed to entrepreneurship from an early age and the development of special training focuses on the creation of business network so that the continuous entrepreneurial culture is crafted.

Keywords: youth entrepreneurs, micro entrepreneurs, entrepreneurial self-efficacy, entrepreneurial performance

Procedia PDF Downloads 302
800 Derivation of a Risk-Based Level of Service Index for Surface Street Network Using Reliability Analysis

Authors: Chang-Jen Lan

Abstract:

Current Level of Service (LOS) index adopted in Highway Capacity Manual (HCM) for signalized intersections on surface streets is based on the intersection average delay. The delay thresholds for defining LOS grades are subjective and is unrelated to critical traffic condition. For example, an intersection delay of 80 sec per vehicle for failing LOS grade F does not necessarily correspond to the intersection capacity. Also, a specific measure of average delay may result from delay minimization, delay equality, or other meaningful optimization criteria. To that end, a reliability version of the intersection critical degree of saturation (v/c) as the LOS index is introduced. Traditionally, the level of saturation at a signalized intersection is defined as the ratio of critical volume sum (per lane) to the average saturation flow (per lane) during all available effective green time within a cycle. The critical sum is the sum of the maximal conflicting movement-pair volumes in northbound-southbound and eastbound/westbound right of ways. In this study, both movement volume and saturation flow are assumed log-normal distributions. Because, when the conditions of central limit theorem obtain, multiplication of the independent, positive random variables tends to result in a log-normal distributed outcome in the limit, the critical degree of saturation is expected to be a log-normal distribution as well. Derivation of the risk index predictive limits is complex due to the maximum and absolute value operators, as well as the ratio of random variables. A fairly accurate functional form for the predictive limit at a user-specified significant level is yielded. The predictive limit is then compared with the designated LOS thresholds for the intersection critical degree of saturation (denoted as X

Keywords: reliability analysis, level of service, intersection critical degree of saturation, risk based index

Procedia PDF Downloads 131
799 ACO-TS: an ACO-based Algorithm for Optimizing Cloud Task Scheduling

Authors: Fahad Y. Al-dawish

Abstract:

The current trend by a large number of organizations and individuals to use cloud computing. Many consider it a significant shift in the field of computing. Cloud computing are distributed and parallel systems consisting of a collection of interconnected physical and virtual machines. With increasing request and profit of cloud computing infrastructure, diverse computing processes can be executed on cloud environment. Many organizations and individuals around the world depend on the cloud computing environments infrastructure to carry their applications, platform, and infrastructure. One of the major and essential issues in this environment related to allocating incoming tasks to suitable virtual machine (cloud task scheduling). Cloud task scheduling is classified as optimization problem, and there are several meta-heuristic algorithms have been anticipated to solve and optimize this problem. Good task scheduler should execute its scheduling technique on altering environment and the types of incoming task set. In this research project a cloud task scheduling methodology based on ant colony optimization ACO algorithm, we call it ACO-TS Ant Colony Optimization for Task Scheduling has been proposed and compared with different scheduling algorithms (Random, First Come First Serve FCFS, and Fastest Processor to the Largest Task First FPLTF). Ant Colony Optimization (ACO) is random optimization search method that will be used for assigning incoming tasks to available virtual machines VMs. The main role of proposed algorithm is to minimizing the makespan of certain tasks set and maximizing resource utilization by balance the load among virtual machines. The proposed scheduling algorithm was evaluated by using Cloudsim toolkit framework. Finally after analyzing and evaluating the performance of experimental results we find that the proposed algorithm ACO-TS perform better than Random, FCFS, and FPLTF algorithms in each of the makespaan and resource utilization.

Keywords: cloud Task scheduling, ant colony optimization (ACO), cloudsim, cloud computing

Procedia PDF Downloads 421
798 In-Depth Analysis on Sequence Evolution and Molecular Interaction of Influenza Receptors (Hemagglutinin and Neuraminidase)

Authors: Dong Tran, Thanh Dac Van, Ly Le

Abstract:

Hemagglutinin (HA) and Neuraminidase (NA) play an important role in host immune evasion across influenza virus evolution process. The correlation between HA and NA evolution in respect to epitopic evolution and drug interaction has yet to be investigated. In this study, combining of sequence to structure evolution and statistical analysis on epitopic/binding site specificity, we identified potential therapeutic features of HA and NA that show specific antibody binding site of HA and specific binding distribution within NA active site of current inhibitors. Our approach introduces the use of sequence variation and molecular interaction to provide an effective strategy in establishing experimental based distributed representations of protein-protein/ligand complexes. The most important advantage of our method is that it does not require complete dataset of complexes but rather directly inferring feature interaction from sequence variation and molecular interaction. Using correlated sequence analysis, we additionally identified co-evolved mutations associated with maintaining HA/NA structural and functional variability toward immunity and therapeutic treatment. Our investigation on the HA binding specificity revealed unique conserved stalk domain interacts with unique loop domain of universal antibodies (CR9114, CT149, CR8043, CR8020, F16v3, CR6261, F10). On the other hand, NA inhibitors (Oseltamivir, Zaninamivir, Laninamivir) showed specific conserved residue contribution and similar to that of NA substrate (sialic acid) which can be exploited for drug design. Our study provides an important insight into rational design and identification of novel therapeutics targeting universally recognized feature of influenza HA/NA.

Keywords: influenza virus, hemagglutinin (HA), neuraminidase (NA), sequence evolution

Procedia PDF Downloads 164
797 Cognitive Methods for Detecting Deception During the Criminal Investigation Process

Authors: Laid Fekih

Abstract:

Background: It is difficult to detect lying, deception, and misrepresentation just by looking at verbal or non-verbal expression during the criminal investigation process, as there is a common belief that it is possible to tell whether a person is lying or telling the truth just by looking at the way they act or behave. The process of detecting lies and deception during the criminal investigation process needs more studies and research to overcome the difficulties facing the investigators. Method: The present study aimed to identify the effectiveness of cognitive methods and techniques in detecting deception during the criminal investigation. It adopted the quasi-experimental method and covered a sample of (20) defendants distributed randomly into two homogeneous groups, an experimental group of (10) defendants be subject to criminal investigation by applying cognitive techniques to detect deception and a second experimental group of (10) defendants be subject to the direct investigation method. The tool that used is a guided interview based on models of investigative questions according to the cognitive deception detection approach, which consists of three techniques of Vrij: imposing the cognitive burden, encouragement to provide more information, and ask unexpected questions, and the Direct Investigation Method. Results: Results revealed a significant difference between the two groups in term of lie detection accuracy in favour of defendants be subject to criminal investigation by applying cognitive techniques, the cognitive deception detection approach produced superior total accuracy rates both with human observers and through an analysis of objective criteria. The cognitive deception detection approach produced superior accuracy results in truth detection: 71%, deception detection: 70% compared to a direct investigation method truth detection: 52%; deception detection: 49%. Conclusion: The study recommended if practitioners use a cognitive deception detection technique, they will correctly classify more individuals than when they use a direct investigation method.

Keywords: the cognitive lie detection approach, deception, criminal investigation, mental health

Procedia PDF Downloads 66
796 Impact of E-Resources and Its Acceessability by Faculty and Research Scholars of Academic Libraries: A Case Study

Authors: M. Jaculine Mary

Abstract:

Today electronic resources are considered as an integral part of information sources to impart efficient services to the people aspiring to acquire knowledge in different fields. E-resources are those resources which include documents in e-format that can be accessed via the Internet in a digital library environment. The present study focuses on accessibility and use of e-resources by faculty and research scholars of academic libraries of Coimbatore, TamilNadu, India. The main objectives are to identify their purpose of using e-resources, know the users’ Information and Communication Technology (ICT) skills, identify satisfaction level of availability of e-resources, use of different e-resources, overall user satisfaction of using e-resources, impact of e-resources on their research and problems faced by them in the access of e-resources. The research methodology adopted to collect data for this study includes analysis of survey reports carried out by distributing questionnaires to the users. The findings of the research are based on the study of responses received from questionnaires distributed to a sample population of 200 users. Among the 200 respondents, 55 percent of research students and 45 percent of faculty members were users of e-resources. It was found that a majority of the users agreed that relevant, updated information at a fast pace had influenced them to use e-resources. Most of the respondents were of the view that more numbers of computers in the library would facilitate quick learning. Academic libraries have to take steps to arrange various training and orientation programmes for research students and faculty members to use the availability of e-resources. This study helps the librarian in planning and development of e-resources to provide modern services to their users of libraries. The study recommends that measures should be taken to increase the accessibility level of e-resource services among the information seekers for increasing the best usage of available electronic resources in the academic libraries.

Keywords: academic libraries, accessibility, electronic resources, satisfaction level, survey

Procedia PDF Downloads 142
795 Exploring the Use of Drones for Corn Borer Management: A Case Study in Central Italy

Authors: Luana Centorame, Alessio Ilari, Marco Giustozzi, Ester Foppa Pedretti

Abstract:

Maize is one of the most important agricultural cash crops in the world, involving three different chains: food, feed, and bioenergy production. Nowadays, the European corn borer (ECB), Ostrinia nubilalis, to the best of the author's knowledge, is the most important pest to control for maize growers. The ECB is harmful to maize; young larvae are responsible for minor damage to the leaves, while the most serious damage is tunneling by older larvae that burrow into the stock. Soon after, larvae can affect cobs, and it was found that ECB can foster mycotoxin contamination; this is why it is crucial to control it. There are multiple control methods available: agronomic, biological, and microbiological means, agrochemicals, and genetically modified plants. Meanwhile, the European Union’s policy focuses on the transition to sustainable supply chains and translates into the goal of reducing the use of agrochemicals by 50%. The current work aims to compare the agrochemical treatment of ECB and biological control through beneficial insects released by drones. The methodology used includes field trials of both chemical and biological control, considering a farm in central Italy as a case study. To assess the mechanical and technical efficacy of drones with respect to standard machinery, the available literature was consulted. The findings are positive because drones allow them to get in the field promptly, in difficult conditions and with lower costs if compared to traditional techniques. At the same time, it is important to consider the limits of drones regarding pilot certification, no-fly zones, etc. In the future, it will be necessary to deepen the topic with the real application in the field of both systems, expanding the scenarios in which drones can be used and the type of material distributed.

Keywords: beneficial insects, corn borer management, drones, precision agriculture

Procedia PDF Downloads 103
794 Distributive Justice through Constitution

Authors: Rohtash

Abstract:

Academically, the concept of Justice in the literature is vast, and theories are voluminous and definitions are numerous but it is very difficult to define. Through the ages, justice has been evolving and developing reasoning that how individuals and communities do the right thing that is just and fair to all in that society. Justice is a relative and dynamic concept, not absolute one. It is different in different societies based on their morality and ethics. The idea of justice cannot arise from a single morality but interaction of competing moralities and contending perspectives. Justice is the conditional and circumstantial term. Therefore, justice takes different meanings in different contexts. Justice is the application of the Laws. It is a values-based concept in order to protect the rights and liberties of the people. It is a socially created concept that has no physical reality. It exists in society on the basis of the spirit of sharing by the communities and members of society. The conception of justice in society or among communities and individuals is based on their social coordination. It can be effective only when people’s judgments are based on collective reasoning. Their behavior is shaped by social values, norms and laws. People must accept, share and respect the set of principles for delivering justice. Thus justice can be a reasonable solution to conflicts and to coordinate behavior in society. The subject matter of distributive justice is the Public Good and societal resources that should be evenly distributed among the different sections of society on the principles developed and established by the State through legislation, public policy and Executive orders. The Socioeconomic transformation of the society is adopted by the constitution within the limit of its morality and gives a new dimension to transformative justice. Therefore, both Procedural and Transformative justice is part of Distributive justice. Distributive justice is purely an economic phenomenon. It concerns the allocation of resources among the communities and individuals. The subject matter of distributive justice is the distribution of rights, responsibilities, burdens and benefits in society on the basis of the capacity and capability of individuals.

Keywords: distributive justice, constitutionalism, institutionalism, constitutional morality

Procedia PDF Downloads 83
793 Macroeconomic Policy Coordination and Economic Growth Uncertainty in Nigeria

Authors: Ephraim Ugwu, Christopher Ehinomen

Abstract:

Despite efforts by the Nigerian government to harmonize the macroeconomic policy implementations by establishing various committees to resolve disputes between the fiscal and monetary authorities, it is still evident that the federal government had continued its expansionary policy by increasing spending, thus creating huge budget deficit. This study evaluates the effect of macroeconomic policy coordination on economic growth uncertainty in Nigeria from 1980 to 2020. Employing the Auto regressive distributed lag (ARDL) bound testing procedures, the empirical results shows that the error correction term, ECM(-1), indicates a negative sign and is significant statistically with the t-statistic value of (-5.612882 ). Therefore, the gap between long run equilibrium value and the actual value of the dependent variable is corrected with speed of adjustment equal to 77% yearly. The long run coefficient results showed that the estimated coefficients of the intercept term indicates that other things remains the same (ceteris paribus), the economics growth uncertainty will continue reduce by 7.32%. The coefficient of the fiscal policy variable, PUBEXP, indicates a positive sign and significant statistically. This implies that as the government expenditure increases by 1%, economic growth uncertainty will increase by 1.67%. The coefficient of monetary policy variable MS also indicates a positive sign and insignificant statistically. The coefficients of merchandise trade variable, TRADE and exchange rate EXR show negative signs and significant statistically. This indicate that as the country’s merchandise trade and the rate of exchange increases by 1%, the economic growth uncertainty reduces by 0.38% and 0.06%, respectively. This study, therefore, advocate for proper coordination of monetary, fiscal and exchange rate policies in order to actualize the goal of achieving a stable economic growth.

Keywords: macroeconomic, policy coordination, growth uncertainty, ARDL, Nigeria

Procedia PDF Downloads 129
792 Using Baculovirus Expression Vector System to Express Envelop Proteins of Chikungunya Virus in Insect Cells and Mammalian Cells

Authors: Tania Tzong, Chao-Yi Teng, Tzong-Yuan Wu

Abstract:

Currently, Chikungunya virus (CHIKV) transmitted to humans by Aedes mosquitoes has distributed from Africa to Southeast Asia, South America, and South Europe. However, little is known about the antigenic targets for immunity, and there are no licensed vaccines or specific antiviral treatments for the disease caused by CHIKV. Baculovirus has been recognized as a novel vaccine vector with attractive characteristic features of an optional vaccine delivery vehicle. This approach provides the safety and efficacy of CHIKV vaccine. In this study, bi-cistronic recombinant baculoviruses vAc-CMV-CHIKV26S-Rhir-EGFP and vAc-CMV-pH-CHIKV26S-Lir-EGFP were produced. Both recombinant baculovirus can express EGFP reporter gene in insect cells to facilitate the recombinant virus isolation and purification. Examination of vAc-CMV-CHIKV26S-Rhir-EGFP and vAc-CMV-pH-CHIKV26S-Lir-EGFP showed that this recombinant baculovirus could induce syncytium formation in insect cells. Unexpectedly, the immunofluorescence assay revealed the expression of E1 and E2 of CHIKV structural proteins in insect cells infected by vAc-CMV-CHIKV26S-Rhir-EGFP. This result may imply that the CMV promoter can induce the transcription of CHIKV26S in insect cells. There are also E1 and E2 expression in mammalian cells transduced by vAc-CMV-CHIKV26S-Rhir-EGFP and vAc-CMV-pH-CHIKV26S-Lir-EGFP. The expression of E1 and E2 proteins of insect and mammalian cells was validated again by Western blot analysis. The vector construction with dual tandem promoters, which is polyhedrin and CMV promoter, has higher expression of the E1 and E2 of CHIKV structural proteins than the vector construction with CMV promoter only. Most of the E1 and E2 proteins expressed in mammalian cells were glycosylated. In the future, the expression of structural proteins of CHIKV in mammalian cells is expected can form virus-like particle, so it could be used as a vaccine for chikungunya virus.

Keywords: chikungunya virus, virus-like particle, vaccines, baculovirus expression vector system

Procedia PDF Downloads 423
791 Application of Regularized Spatio-Temporal Models to the Analysis of Remote Sensing Data

Authors: Salihah Alghamdi, Surajit Ray

Abstract:

Space-time data can be observed over irregularly shaped manifolds, which might have complex boundaries or interior gaps. Most of the existing methods do not consider the shape of the data, and as a result, it is difficult to model irregularly shaped data accommodating the complex domain. We used a method that can deal with space-time data that are distributed over non-planner shaped regions. The method is based on partial differential equations and finite element analysis. The model can be estimated using a penalized least squares approach with a regularization term that controls the over-fitting. The model is regularized using two roughness penalties, which consider the spatial and temporal regularities separately. The integrated square of the second derivative of the basis function is used as temporal penalty. While the spatial penalty consists of the integrated square of Laplace operator, which is integrated exclusively over the domain of interest that is determined using finite element technique. In this paper, we applied a spatio-temporal regression model with partial differential equations regularization (ST-PDE) approach to analyze a remote sensing data measuring the greenness of vegetation, measure by an index called enhanced vegetation index (EVI). The EVI data consist of measurements that take values between -1 and 1 reflecting the level of greenness of some region over a period of time. We applied (ST-PDE) approach to irregular shaped region of the EVI data. The approach efficiently accommodates the irregular shaped regions taking into account the complex boundaries rather than smoothing across the boundaries. Furthermore, the approach succeeds in capturing the temporal variation in the data.

Keywords: irregularly shaped domain, partial differential equations, finite element analysis, complex boundray

Procedia PDF Downloads 140
790 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning

Authors: Angela Mathias Kavishe

Abstract:

Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.

Keywords: cyberstalking, embodiment, gender-based violence, internet

Procedia PDF Downloads 50
789 Cross-sectional Developmental Trajectories of Executive Function and Relations to Theory of Mind in Autism Spectrum Disorder

Authors: Evangelia-Chrysanthi Kouklari, Evdokia Tagkouli, Vassiliki Ntre, Artemios Pehlivanidis, Stella Tsermentseli, Gerasimos Kolaitis, Katerina Papanikolaou

Abstract:

Executive Function (EF) is a set of goal-directed cognitive skills essentially needed in problem-solving and social behavior. Developmental EF research has indicated that EF emerges early in life and marks dramatic changes before the age of 5. Research evidence has suggested that it may continue to develop up to adolescence as well, following the development of the prefrontal cortex. Over the last decade, research evidence has suggested distinguished domains of cool and hot EF, but traditionally the development of EF in Autism Spectrum Disorder (ASD) has been examined mainly with tasks that address the “cool” cognitive aspects of EF. Thus, very little is known about the development of “hot” affective EF processes and whether the cross-sectional developmental pathways of cool and hot EF present similarities in ASD. Cool EF has also been proven to have a strong correlation with Theory of Mind (ToM) in young and middle childhood in typical development and in ASD, but information about the relationship of hot EF to ToM skills is minimal. The present study’s objective was to explore the age-related changes of cool and hot EF in ASD participants from middle childhood to adolescence, as well as their relationship to ToM. This study employed an approach of cross-sectional developmental trajectories to investigate patterns of cool and hot EF relative to chronological age within ASD. Eighty-two participants between 7 and 16 years of age were recruited to undertake measures that assessed cool EF (working memory, cognitive flexibility, planning & inhibition), hot EF (affective decision making & delay discounting) and ToM (false belief and mental state/emotion recognition). Results demonstrated that trajectories of all cool EF presented age-related changes in ASD (improvements with age). With regards to hot EF, affective decision-making presented age-related changes, but for delay discounting, there were no statistically significant changes found across younger and older ASD participants. ToM was correlated only to cool EF. Theoretical implications are discussed as the investigation of the cross-sectional developmental trajectories of the broader EF (cool and hot domains) may contribute to better defining cognitive phenotypes in ASD. These findings highlight the need to examine developmental trajectories of both hot and cool EF in research and clinical practice as they may aid in enhancing diagnosis or better-informed intervention programs.

Keywords: autism spectrum disorder, developmental trajectories, executive function, theory of mind

Procedia PDF Downloads 148
788 High Phosphate-Containing Foods and Beverages: Perceptions of the Future Healthcare Providers on Their Harmful Effect in Excessive Consumption

Authors: ATM Emdadul Haque

Abstract:

Phosphorus is an essential nutrient which is regularly consumed with food and exists in the body as phosphate. Phosphate is an important component of cellular structures and needed for bone mineralization. Excessive accumulation of phosphate is an important driving factor of mortality in chronic renal failure patients; of relevance, these patients are usually provided health care by doctors, nurses, and pharmacists. Hence, this study was planned to determine the level of awareness of the future healthcare providers about the phosphate-containing foods and beverages and to access their knowledge on the harmful effects of excess phosphate consumption. A questionnaire was developed and distributed among the year-1 medical, nursing and pharmacy students. 432 medical, nursing and pharmacy students responded with age ranging from 18-24 years. About 70% of the respondents were female with a majority (90.7%) from Malay ethnicity. Among the respondents, 29.9% were medical, 35.4% were the pharmacy and 34.7% were nursing students. 79.2% students knew that phosphate was an important component of the body, but only 61.8% knew that consuming too much phosphate could be harmful to the body. Despite 97% of the students knew that carbonated soda contained high sugar, surprisingly 77% of them did not know the presence of high phosphate in the same soda drinks; in the similar line of observation, 67% did not know the presence of it in the fast food. However, it was encouraging that 94% of the students wanted to know more about the effects of phosphate consumption, 74.3% were willing to give up drinking soda and eating fast food, and 52% considered taking green coconut water instead of soda drinks. It is, therefore, central to take an educational initiative to increase the awareness of the future healthcare providers about phosphate-containing food and its harmful effects in excessive consumptions.

Keywords: high phosphate containing foods and beverages, excessive consumption, future health care providers, phosphorus

Procedia PDF Downloads 370
787 Design of Built-Spaces and Enhanced Psychological Wellbeing by Limiting Effect of SBS: An Analytical Study across Students in Indian Universities

Authors: Sadaf H. Khan, Jyoti Kumar

Abstract:

Sick Building Syndrome (SBS) is a situation in which inhabitants of a building develop illness symptoms or get infected with a chronic disease as a result of the building in which they reside or work. Certain symptoms tend to get more severe as an individual spends more time in the building; however, they generally improve with time or even disappear when they leave that space. Though ‘Design of Built-Spaces’ is a crucial factor in regulating these symptoms but it still needs to be identified further as to what specific design features of a ‘Built-Space’ trigger sick building syndrome (SBS). Much of the research work present to date is focused on the physiological or physical sickness caused due to inappropriate built-space design. In this paper, the psychological aspects of sick building syndrome (SBS) will be investigated across the adult population, more specifically graduate students in India trying to settle in back to their previous physical work environments, i.e., campus, classrooms, hostels, after a very long hold which lasted more than a year due to lockdowns during Covid-19 crisis all over the world. The study will follow an analytical approach and the data will be collected through self-reported online surveys. The purpose of this study is to enquire causal agents, diagnosable symptoms and remedial design of built spaces which can enhance the productive level of built environments and better facilitate the inhabitants by improving their psychological wellbeing, which is the most uprising concern. The fact that SBS symptoms can be studied only within the initial few weeks as an occupant starts interacting with a built-environment and leaves as the occupant leaves that space or zone, the post-lockdown incoming of students back to their respective campuses provides an opportunity to clearly draw multiple conclusions of the relationship that exist between the Design of Built-Spaces and Psychological Sickness Syndrome associated with it. The study will be one of a kind approach for understanding and formulating methods to improve psychological wellbeing within a built-setting by better identifying factors associated with these psychological symptoms, including anxiety, mental fatigue, reduced attention span and reduced memory span as refined symptoms of SBS discussed in 1987 by Molhave within his study.

Keywords: built-environment psychology, built-space design, healthcare architecture, psychological wellbeing

Procedia PDF Downloads 174
786 Different Motor Inhibition Processes in Action Selection Stage: A Study with Spatial Stroop Paradigm

Authors: German Galvez-Garcia, Javier Albayay, Javiera Peña, Marta Lavin, George A. Michael

Abstract:

The aim of this research was to investigate whether the selection of the actions needs different inhibition processes during the response selection stage. In Experiment 1, we compared the magnitude of the Spatial Stroop effect, which occurs in response selection stage, in two motor actions (lifting vs reaching) when the participants performed both actions in the same block or in different blocks (mixed block vs. pure blocks).Within pure blocks, we obtained faster latencies when lifting actions were performed, but no differences in the magnitude of the Spatial Stroop effect were observed. Within mixed block, we obtained faster latencies as well as bigger-magnitude for Spatial Stroop effect when reaching actions were performed. We concluded that when no action selection is required (the pure blocks condition), inhibition works as a unitary system, whereas in the mixed block condition, where action selection is required, different inhibitory processes take place within a common processing stage. In Experiment 2, we investigated this common processing stage in depth by limiting participants’ available resources, requiring them to engage in a concurrent auditory task within a mixed block condition. The Spatial Stroop effect interacted with Movement as it did in Experiment 1, but it did not significantly interact with available resources (Auditory task x Spatial Stroop effect x Movement interaction). Thus, we concluded that available resources are distributed equally to both inhibition processes; this reinforces the likelihood of there being a common processing stage in which the different inhibitory processes take place.

Keywords: inhibition process, motor processes, selective inhibition, dual task

Procedia PDF Downloads 392
785 Utilizing Experiential Teaching Strategies to Reduce the Incidence of Falls in Patients in Orthopedic Wards

Authors: Yu-Shi Ye, Jia-Min Wu, Jhih-Ci Li

Abstract:

Background: Most orthopedic inpatients and primary caregivers are elderly, and patients are at high risk of falls. We set up a quality control team to analyze the root cause and found the following issues: 1. The nursing staff did not conduct cognitive assessments of patients and their primary caregivers to ensure that health education content was understood. 2. Nurses prefer to use spoken language in health education but lack the skills to use diverse teaching materials. 3. Newly recruited nurses have insufficient awareness of fall prevention. Methods: The study subjects were 16 nurses in the orthopedic ward of a teaching hospital in central Taiwan. We implemented the following strategies: 1. Developed a fall simulation teaching plan and conducted teaching courses and assessments in the morning meeting; 2. Designed and used a "fall prevention awareness card" to improve the prevention awareness of elderly patients; 3. All staff (including new staff) received experiential education training. Results: In 2021, 40% of patients in the orthopedic wards were aged 60-79 years (792/1979) with a high risk of falls. According to data collection, the incidence of falls in hospitalized patients was 0.04% (5/12651), which exceeded the threshold of 0.02% in our ward. After completing the on-the-job education training in October, the nursing staff expressed that they were more aware of the special situation of fall prevention. Through practical sharing and drills, combined with experiential teaching strategies, nurses can reconstruct the safety awareness of fall prevention and deepen their cognitive memory. Participants scored between 30 and 80 on the pretest (16 students, mean: 72.6) and between 90 and 100 on the post-test (16 students, mean: 92.6), resulting in a 73.8% improvement in overall scores. We have a total of 4 new employees who have all completed the first 3 months of compulsory PGY courses. From January to April 2022, the incidence of falls in hospitalized patients was 0.025% (1/3969). We have made good improvements and will continue to track the outcome. Discussion: In addition to enhancing the awareness of falls among nursing staff, how-to guide patients and primary caregivers to prevent falls is also the focus of improvement. The proper way of health education can be better understood through practical exercises and case sharing.

Keywords: experiential teaching strategies, fall prevention, cognitive card, elderly patients, orthopedic wards

Procedia PDF Downloads 53
784 Greenhouse Controlled with Graphical Plotting in Matlab

Authors: Bruno R. A. Oliveira, Italo V. V. Braga, Jonas P. Reges, Luiz P. O. Santos, Sidney C. Duarte, Emilson R. R. Melo, Auzuir R. Alexandria

Abstract:

This project aims to building a controlled greenhouse, or for better understanding, a structure where one can maintain a given range of temperature values (°C) coming from radiation emitted by an incandescent light, as previously defined, characterizing as a kind of on-off control and a differential, which is the plotting of temperature versus time graphs assisted by MATLAB software via serial communication. That way it is possible to connect the stove with a computer and monitor parameters. In the control, it was performed using a PIC 16F877A microprocessor which enabled convert analog signals to digital, perform serial communication with the IC MAX232 and enable signal transistors. The language used in the PIC's management is Basic. There are also a cooling system realized by two coolers 12V distributed in lateral structure, being used for venting and the other for exhaust air. To find out existing temperature inside is used LM35DZ sensor. Other mechanism used in the greenhouse construction was comprised of a reed switch and a magnet; their function is in recognition of the door position where a signal is sent to a buzzer when the door is open. Beyond it exist LEDs that help to identify the operation which the stove is located. To facilitate human-machine communication is employed an LCD display that tells real-time temperature and other information. The average range of design operating without any major problems, taking into account the limitations of the construction material and structure of electrical current conduction, is approximately 65 to 70 ° C. The project is efficient in these conditions, that is, when you wish to get information from a given material to be tested at temperatures not as high. With the implementation of the greenhouse automation, facilitating the temperature control and the development of a structure that encourages correct environment for the most diverse applications.

Keywords: greenhouse, microcontroller, temperature, control, MATLAB

Procedia PDF Downloads 402
783 Antioxidative, Anticholinesterase and Anti-Neuroinflammatory Properties of Malaysian Brown and Green Seaweeds

Authors: Siti Aisya Gany, Swee Ching Tan, Sook Yee Gan

Abstract:

Diminished antioxidant defense or increased production of reactive oxygen species in the biological system can result in oxidative stress which may lead to various neurodegenerative diseases including Alzheimer’s disease (AD). Microglial activation also contributes to the progression of AD by producing several pro-inflammatory cytokines, nitric oxide (NO), and prostaglandin E2 (PGE2). Oxidative stress and inflammation have been reported to be possible pathophysiological mechanisms underlying AD. In addition, the cholinergic hypothesis postulates that memory impairment in patient with AD is also associated with the deficit of cholinergic function in the brain. Although a number of drugs have been approved for the treatment of AD, most of these synthetic drugs have diverse side effects and yield relatively modest benefits. Marine algae have great potential in pharmaceutical and biomedical applications as they are valuable sources of bioactive properties such as anti-coagulation, anti-microbial, anti-oxidative, anti-cancer and anti-inflammatory. Hence, this study aimed to provide an overview of the properties of Malaysian seaweeds (Padina australis, Sargassum polycystum and Caulerpa racemosa) in inhibiting oxidative stress, neuroinflammation and cholinesterase enzymes. All tested samples significantly exhibit potent DPPH and moderate Superoxide anion radical scavenging ability (P<0.05). Hexane and methanol extracts of S. polycystum exhibited the most potent radical scavenging ability with IC50 values of 0.1572 ± 0.004 mg/ml and 0.8493 ± 0.02 for DPPH and ABTS assays, respectively. Hexane extract of C. racemosa gave the strongest superoxide radical inhibitory effect (IC50 of 0.3862± 0.01 mg/ml). Most seaweed extracts significantly inhibited the production of cytokine (IL-6, IL-1 β, TNFα) and NO in a concentration-dependent manner without causing significant cytotoxicity to the lipopolysaccharide (LPS)-stimulated microglia cells (P<0.05). All extracts suppressed cytokine and NO level by more than 80% at the concentration of 0.4mg/ml. In addition, C. racemosa and S. polycystum also showed anti-acetylcholinesterase activities with the IC50 values ranging from 0.086-0.115 mg/ml. Moreover, C. racemosa and P. australis were also found to be active against butyrylcholinesterase with IC50 values ranging from 0.118-0.287 mg/ml.

Keywords: anti-cholinesterase, anti-oxidative, neuroinflammation, seaweeds

Procedia PDF Downloads 663
782 Going beyond Elementary Algebraic Identities: The Expectation of a Gifted Child, an Indian Scenario

Authors: S. R. Santhanam

Abstract:

A gifted child is one who gives evidence of creativity, good memory, rapid learning. In mathematics, a teacher often comes across some gifted children and they exhibit the following characteristics: unusual alertness, enjoying solving problems, getting bored on repetitions, self-taught, going beyond what teacher taught, ask probing questions, connecting unconnected concepts, vivid imagination, readiness for research work, perseverance of a topic. There are two main areas of research carried out on them: 1)identifying gifted children, 2) interacting and channelizing them. A lack of appropriate recognition will lead the gifted child demotivated. One of the main findings is if proper attention and nourishment are not given then it leads a gifted child to become depressed, underachieving, fail to reach their full potential and sometimes develop negative attitude towards school and study. After identifying them, a mathematics teacher has to develop them into a fall fledged achiever. The responsibility of the teacher is enormous. The teacher has to be resourceful and patient. But interacting with them one finds a lot of surprises and awesomeness. The elementary algebraic identities like (a+b)(a-b)=a²-b², expansion of like (a+b)²(a-b)² and others are taught to students, of age group 13-15 in India. An average child will be satisfied with a single proof and immediate application of these identities. But a gifted child expects more from the teacher and at one stage after a little training will surpass the teacher also. In this short paper, the author shares his experience regarding teaching algebraic identities to gifted children. The following problem was given to a set of 10 gifted children of the specified age group: If a natural number ‘n’ to expressed as the sum of the two squares, will 2n also be expressed as the sum of two squares? An investigation has been done on what multiples of n satisfying the criterion. The attempts of the gifted children were consolidated and conclusion was drawn. A second problem was given to them as: can two natural numbers be found such that the difference of their square is 3? After a successful solution, more situations were analysed. As a third question, the finding of the sign of an algebraic expression in three variables was analysed. As an example: if a,b,c are real and unequal what will be sign of a²+4b²+9c²-4ab-12bc-6ca? Apart from an expression as a perfect square what other methods can be employed to prove an algebraic expression as positive negative or non negative has been analysed. Expressions like 4x²+2y²+13y²-2xy-4yz-6zx were given, and the children were asked to find the sign of the expression for all real values of x,y and z. In all investigations, only basic algebraic identities were used. As a next probe, a divisibility problem was initiated. When a,b,c are natural numbers such that a+b+c is at least 6, and if a+b+c is divisible by 6 then will 6 divide a³+b³+c³. The gifted children solved it in two different ways.

Keywords: algebraic identities, gifted children, Indian scenario, research

Procedia PDF Downloads 180
781 Design and Development of Fleet Management System for Multi-Agent Autonomous Surface Vessel

Authors: Zulkifli Zainal Abidin, Ahmad Shahril Mohd Ghani

Abstract:

Agent-based systems technology has been addressed as a new paradigm for conceptualizing, designing, and implementing software systems. Agents are sophisticated systems that act autonomously across open and distributed environments in solving problems. Nevertheless, it is impractical to rely on a single agent to do all computing processes in solving complex problems. An increasing number of applications lately require multiple agents to work together. A multi-agent system (MAS) is a loosely coupled network of agents that interact to solve problems that are beyond the individual capacities or knowledge of each problem solver. However, the network of MAS still requires a main system to govern or oversees the operation of the agents in order to achieve a unified goal. We had developed a fleet management system (FMS) in order to manage the fleet of agents, plan route for the agents, perform real-time data processing and analysis, and issue sets of general and specific instructions to the agents. This FMS should be able to perform real-time data processing, communicate with the autonomous surface vehicle (ASV) agents and generate bathymetric map according to the data received from each ASV unit. The first algorithm is developed to communicate with the ASV via radio communication using standard National Marine Electronics Association (NMEA) protocol sentences. Next, the second algorithm will take care of the path planning, formation and pattern generation is tested using various sample data. Lastly, the bathymetry map generation algorithm will make use of data collected by the agents to create bathymetry map in real-time. The outcome of this research is expected can be applied on various other multi-agent systems.

Keywords: autonomous surface vehicle, fleet management system, multi agent system, bathymetry

Procedia PDF Downloads 271
780 Solubility and Dissolution Enhancement of Poorly Soluble Drugs Using Biosericin

Authors: Namdeo Jadhav, Nitin Salunkhe

Abstract:

Currently, sericin is being treated as waste of sericulture industry, especially at reeling process. Looking at prospective physicochemical properties, an attempt has been made to explore pharmaceutical applications of sericin waste in fabrication of medicated solid dispersions. Solid dispersions (SDs) of poorly soluble drugs (Lornoxicam, Meloxicam & Felodipine) were prepared by spray drying, solvent evaporation, ball milling and physical kneading in mass ratio of drug: sericin (1:0.5, 1:1, 1:1.5, 1:2, 1:2.5 and 1:3 w/w) and were investigated by solubility, ATR-FTIR, XRD and DSC, micromeritics and tablettability, surface morphology and in-vitro dissolution. It has been observed that sericin improves solubility of drugs by 8 to 10 times compared to pure drugs. The presence of hydrogen bonding between drugs and sericin was confirmed from the ATR-FTIR spectra. Amongst these methods, spray dried (1:2 w/w) SDs showed fully amorphous state representing molecularly distributed drug as confirmed from XRD and DSC study. Spray dried meloxicam SDs showed better compressibility and compactibility. The microphotograph of spray dried batches of lornoxicam (SDLX) and meloxicam SDs (SDMX) showed bowl shaped, and bowl plus spherical particles respectively, while spray dried felodipine SDs (SDFL) showed spherical shape. The SDLX, SDMX and SDFL (1:2 w/w) displayed better dissolution performance than other methods. Conclusively, hydrophilic matrix of sericin can be used to deliver poor water soluble drugs and its aerodynamic shape may show a great potential for various drug deliveries. If established as pharmaceutical excipient, sericin holds a potential to revolutionise economics of pharmaceutical industry, and sericulture farming, especially of Asian countries.

Keywords: biosericin, poorly soluble drugs, solid dispersion, solubility and dissolution improvement

Procedia PDF Downloads 255