Search results for: adaptation mechanism
1771 Bibliometric Analysis of Global Research Trends on Organization Culture, Strategic Leadership and Performance Using Scopus Database
Authors: Anyia Nduka, Aslan Bin Amad Senin
Abstract:
Taking a behavioral perspective of Organization Culture, Strategic Leadership, and performance (OC, SLP). We examine the role of Strategic Leadership as key vicious mechanism linking OC,SLP to the organizational capacities. Given the increasing degree of dependence of modern businesses on the use and scientific discovery of relevant data, research efforts around the entire globe have been accelerated. In today's corporate world, Strategic Leadership is still the most sustainable option of performance and competitive advantage. This is why it is critical to gain a deep understanding of research area and to strengthen new collaborative networks in efforts to support research transition towards these integrative efforts. This bibliometric analysis is aimed to examine global trends in OC,SLP research based on publication output, author co-authorships, and co-occurrences of author keywords among authors and affiliated countries. 2829 journal articles were retrieved from the Scopus database Between 1974 and 2021. From the research findings, there is a significant increase in number of publications with strong global collaboration (e.g., USA & UK). We also discovered that while most countries/territories without affiliations were centered in developing countries, the outstanding performance of Asian countries and the volume of their collaborations should be emulated.Keywords: organizational culture, strategic leadership, organizational resilience, performance
Procedia PDF Downloads 851770 Contact-Impact Analysis of Continuum Compliant Athletic Systems
Authors: Theddeus Tochukwu Akano, Omotayo Abayomi Fakinlede
Abstract:
Proper understanding of the behavior of compliant mechanisms use by athletes is important in order to avoid catastrophic failure. Such compliant mechanisms like the flex-run require the knowledge of their dynamic response and deformation behavior under quickly varying loads. The modeling of finite deformations of the compliant athletic system is described by Neo-Hookean model under contact-impact conditions. The dynamic impact-contact governing equations for both the target and impactor are derived based on the updated Lagrangian approach. A method where contactor and target are considered as a united body is applied in the formulation of the principle of virtual work for the bodies. In this paper, methods of continuum mechanics and nonlinear finite element method were deployed to develop a model that could capture the behavior of the compliant athletic system under quickly varying loads. A hybrid system of symbolic algebra (AceGEN) and a compiled back end (AceFEM) were employed, leveraging both ease of use and computational efficiency. The simulated results reveal the effect of the various contact-impact conditions on the deformation behavior of the impacting compliant mechanism.Keywords: eigenvalue problems, finite element method, robin boundary condition, sturm-liouville problem
Procedia PDF Downloads 4731769 The Role of Defense Mechanisms in Treatment Adherence in Type 2 Diabetes Mellitus: An Exploratory Study
Authors: F. Marchini, A. Caputo, J. Balonan, F. Fedele, A. Napoli, V. Langher
Abstract:
Aim: The present study aims to explore the specific role of defense mechanisms in persons with type 2 diabetes mellitus in treatment adherence. Materials and methods: A correlational study design was employed. Thirty-two persons with type 2 diabetes mellitus were enrolled and assessed with Defense Mechanism Inventory, Beck Depression Inventory-II, Toronto Alexithymia Scale and Self-Care Inventory-Revised. Bivariate correlation and two-step regression analyses were performed. Results: Treatment adherence negatively correlates with hetero-directed hostility (r= -.537; p < .01), whereas it is positively associated with principalization (r= .407; p < .05). These two defense mechanisms overall explain an incremental variance of 26.9% in treatment adherence (ΔF=4.189, df1=2, df2 =21, p < .05), over and above the control variables for depression and alexithymia. However, only higher hetero-directed hostility is found to be a solid predictor of a decreased treatment adherence (β=-.497, p < .05). Conclusions: Despite providing preliminary results, this pilot study highlights the original contribution of defense mechanisms in adherence to type 2 diabetes regimens. Specifically, hetero-directed hostility may relate to an unconscious process, according to which disease-related painful feelings are displaced onto care relationships with negative impacts on adherence.Keywords: alexithymia, defense mechanisms, treatment adherence, type 2 diabetes mellitus
Procedia PDF Downloads 3191768 Efficient Photocatalytic Degradation of Tetracycline Hydrochloride Using Modified Carbon Nitride CCN/Bi₂WO₆ Heterojunction
Authors: Syed Najeeb-Uz-Zaman Haider, Yang Juan
Abstract:
Antibiotic overuse raises environmental concerns, boosting the demand for efficient removal from pharmaceutical wastewater. Photocatalysis, particularly using semiconductor photocatalysts, offers a promising solution and garners significant scientific interest. In this study, a Z-scheme 0.15BWO/CCN heterojunction was developed, analyzed, and employed for the photocatalytic degradation of tetracycline hydrochloride (TC) under visible light. The study revealed that the dosage of 0.15BWO@CCN and the presence of coexisting ions significantly influenced the degradation efficiency, achieving up to 87% within 20 minutes under optimal conditions (at pH 9-11/strongly basic conditions) while maintaining 84% efficiency under standard conditions (unaltered pH). Photoinduced electrons gathered on the conduction band of BWO while holes accumulated on the valence band of CCN, creating more favorable conditions to produce superoxide and hydroxyl radicals. Additionally, through comprehensive experimental analysis, the degradation pathway and mechanism were thoroughly explored. The superior photocatalytic performance of 0.15BWO@CCN was attributed to its Z-scheme heterojunction structure, which significantly reduced the recombination of photoinduced electrons and holes. The radicals produced were identified using ESR, and their involvement in tetracycline degradation was further analyzed through active species trapping experiments.Keywords: CCN, Bi₂WO₆, TC, photocatalytic degradation, heterojunction
Procedia PDF Downloads 441767 Inhibitory Effects of PPARγ Ligand, KR-62980, on Collagen-Stimulated Platelet Activation
Authors: Su Bin Wang, Jin Hee Ahn, Tong-Shin Chang
Abstract:
The peroxisome proliferator-activated receptors (PPARs) are member of nuclear receptor superfamily that act as a ligand-activated transcription factors. Although platelets lack a nucleus, previous studies have shown that PPARγ agonists, rosiglitazone, inhibited platelet activation induced by collagen. In this study, we investigated the inhibitory effects of KR-62980, a newly synthesized PPARγ agonist, on collagen receptor-stimulated platelet activation. The specific tyrosine phosphorylations of key components (Syk, Vav1, Btk and PLCγ2) for collagen receptor signaling pathways were suppressed by KR-62980. KR-62980 also attenuated downstream responses including cytosolic calcium elevation, P-selectin surface exposure, and integrin αIIbβ3 activation. PPARγ was found to associate with multiple proteins within the LAT signaling complex in collagen-stimulated platelets. This association was prevented by KR-62980, indicating a potential mechanism for PPARγ function in collagen-stimulated platelet activation. Furthermore, KR-62980 inhibited platelet aggregation and adhesion in response to collagen in vitro and prolonged in vivo thrombotic response in carotid arteries of mice. Collectively, these data suggest that KR-62980 inhibits collagen-stimulated platelet activation and thrombus formation through modulating the collagen receptor signaling pathways.Keywords: KR-62980, PPARγ, antiplatelet, thrombosis
Procedia PDF Downloads 3341766 Email Based Global Automation with Raspberry Pi and Control Circuit Module: Development of Smart Home Application
Authors: Lochan Basyal
Abstract:
Global Automation is an emerging technology of today’s era and is based on Internet of Things (IoT). Global automation deals with the controlling of electrical appliances throughout the world. The fabrication of this system has been carried out with interfacing an electrical control system module to Raspberry Pi. An electrical control system module includes a relay driver mechanism through which appliances are controlled automatically in respective condition. In this research project, one email ID has been assigned to Raspberry Pi, and the users from different location having different email ID can mail to Raspberry Pi on assigned email address “[email protected]” with subject heading “Device Control” with predefined command on compose email line. Also, a notification regarding current working condition of this system has been updated on respective user email ID. This approach is an innovative way of implementing smart automation system through which a user can control their electrical appliances like light, fan, television, refrigerator, etc. in their home with the use of email facility. The development of this project helps to enhance the concept of smart home application as well as industrial automation.Keywords: control circuit, e-mail, global automation, internet of things, IOT, Raspberry Pi
Procedia PDF Downloads 1671765 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 671764 The Relation between Authenticity at Work and Job Satisfaction
Authors: Godiva Kwan, Winton Au, Fanny Cheung
Abstract:
Authenticity, being true to oneself and acting in congruence with one’s values and beliefs, is a basic human strength, and is instrumental to understanding well-being. While dispositional authenticity was found to be associated with positive affect and subjective well-being, others have demonstrated that individuals assumed different levels of authenticity when they took up different social roles, suggesting that state authenticity can be an alternative mechanism. This study examined the relation between workplace authenticity and job satisfaction. We hypothesize that state authenticity at work will be predicted by psychological safety climate (organizational climate where employees feel safe to speak up without being embarrassed or rejected). Employees are expected to experience higher subjective well-being and job satisfaction as a result of being authentic at work. Survey results provided support to the hypotheses. Psychological safety climate enhanced employees’ authenticity state at work, which in turn improved well-being and job satisfaction. In conclusion, we found that employees become more authentic at work in an organizational climate where they feel safe to express themselves, leading to a higher job satisfaction and well-being. The current study contributes to the understanding of underlying mechanisms behind experiencing authenticity at work among employees in Hong Kong. Our findings are expected to provide insights and to raise organizations’ awareness of creating an open and trustful culture in order to enhance job satisfaction of employees through encouraging them to “be themselves”.Keywords: authenticity, job satisfaction, psychological safety climate, organizational climate
Procedia PDF Downloads 4281763 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks
Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri
Abstract:
With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi
Procedia PDF Downloads 741762 Virtual Screening of Potential Inhibitors against Efflux Pumps of Mycobacterium tuberculosis
Authors: Gagan Dhawan
Abstract:
Mycobacterium tuberculosis was described as ‘captain of death’ with an inherent property of multiple drug resistance majorly caused by the competent mechanism of efflux pumps. In this study, various open source tools combining chemo-informatics with bioinformatics were used for efficient in-silico drug designing. The efflux pump, Rv1218c, belonging to the ABC transporter superfamily, which is predicted to be a tetronasin-transporter in M. tuberculosis was targeted. Recent studies have shown that Rv1218c forms a complex with two more efflux pumps (Rv1219c and Rv1217c) to provide multidrug resistance to the bacterium. The 3D structure of the protein was modeled (as the structure was unavailable in the previously collected databases on this gene). The TMHMM analysis of this protein in TubercuList has shown that this protein is present in the outer membrane of the bacterium. Virtual screening of compounds from various publically available chemical libraries was performed on the M. tuberculosis protein using various open source tools. These ligands were further assessed where various physicochemical properties were evaluated and analyzed. On comparison of different physicochemical properties, toxicity and docking, the ligand 2-(hydroxymethyl)-6-[4, 5, 6-trihydroxy-2-(hydroxymethyl) tetrahydropyran-3-yl] oxy-tetrahydropyran-3, 4, 5-triol was found to be best suited for further studies.Keywords: drug resistance, efflux pump, molecular docking, virtual screening
Procedia PDF Downloads 3701761 Synthesis, Density Functional Theory (DFT) and Antibacterial Studies of Highly Functionalized Novel Spiropyrrolidine 4-Quinolone-3-Carboxylic Acids Derived from 6-Acetyl Quinolone
Authors: Thangaraj Arasakumar, Athar Ata, Palathurai Subramaniam Mohan
Abstract:
A series of novel 4-quinolone-3-carboxylic acid grafted spiropyrrolidines as new type of antibacterial agents were synthesized via multicomponent 1,3-dipolar cycloaddition reaction of an azomethine ylides with a newly prepared (E)-4-oxo-6-(3-phenyl-acryloyl)-1,4-dihydro-quinoline-3-carboxylic acids in high regioselectivity with good yields. The structure of cycloadduct characterized by FT IR, mass, 1H, 13C, 2D NMR techniques and elemental analysis. Structure and spectrometry of compound 8a has been investigated theoretically by using HF and DFT approach at B3LYP, M05-2x/6-31G* levels of theories. The optimized geometries and calculated vibrational frequencies are evaluated via comparison with experimental values. A good agreement is found between the measured and calculated values. The DFT studies support the molecular mechanism of this cycloaddition reaction and determine the molecular electrostatic potential and thermodynamic properties. Furthermore, the antibacterial activities of synthesized compounds were evaluated against Gram-positive bacteria (Staphylococcus aureus, Bacillus subtilis) and Gram-negative bacteria strains (Escherichia coli, Klebsiella pneumoniae). Among 21 compounds screened, 8f and 8p were found to be more active against tested bacteria.Keywords: antibacterial activity, azomethine ylide, DFT calculation, spirooxindole
Procedia PDF Downloads 2151760 Effects of Cell Phone Electromagnetic Radiation on the Brain System
Authors: A. Alao Olumuyiwa
Abstract:
Health hazards reported to be associated with exposure to electromagnetic radiations which include brain tumors, genotoxic effects, neurological effects, immune system deregulation, allergic responses and some cardiovascular effects are discussed under a closed tabular model in this study. This review however showed that there is strong and robust evidence that chronic exposures to electromagnetic frequency across the spectrum, through strength, consistency, biological plausibility and many dose-response relationships, may result in brain cancer and other carcinogenic disease symptoms. There is therefore no safe threshold because of the genotoxic nature of the mechanism that may however be involved. The discussed study explains that the cell phone has induced effects upon the blood –brain barrier permeability and the cerebellum exposure to continuous long hours RF radiation may result in significant increase in albumin extravasations. A physical Biomodeling approach is however employed to review this health effects using Specific Absorption Rate (SAR) of different GSM machines to critically examine the symptoms such as a decreased loco motor activity, increased grooming and reduced memory functions in a variety of animal spices in classified grouped and sub grouped models.Keywords: brain cancer, electromagnetic radiations, physical biomodeling, specific absorption rate (SAR)
Procedia PDF Downloads 3471759 Electric Field Impact on the Biomass Gasification and Combustion Dynamics
Authors: M. Zake, I. Barmina, R. Valdmanis, A. Kolmickovs
Abstract:
Experimental investigations of the DC electric field effect on thermal decomposition of biomass, formation of the axial flow of volatiles (CO, H2, CxHy), mixing of volatiles with swirling airflow at low swirl intensity (S ≈ 0.2-0.35), their ignition and on formation of combustion dynamics are carried out with the aim to understand the mechanism of electric field influence on biomass gasification, combustion of volatiles and heat energy production. The DC electric field effect on combustion dynamics was studied by varying the positive bias voltage of the central electrode from 0.6 kV to 3 kV, whereas the ion current was limited to 2 mA. The results of experimental investigations confirm the field-enhanced biomass gasification with enhanced release of volatiles and the development of endothermic processes at the primary stage of thermochemical conversion of biomass determining the field-enhanced heat energy consumption with the correlating decrease of the flame temperature and heat energy production at this stage of flame formation. Further, the field-enhanced radial expansion of the flame reaction zone correlates with a more complete combustion of volatiles increasing the combustion efficiency by 3 % and decreasing the mass fraction of CO, H2 and CxHy in the products, whereas by 10 % increases the average volume fraction of CO2 and the heat energy production downstream the combustor increases by 5-10 %Keywords: biomass, combustion, electrodynamic control, gasification
Procedia PDF Downloads 4441758 Evaluation of Achillea millefolium L. Biochemical Changes in Iran's Natural Habitat
Authors: Ghavamaldin Asadian, Aptin Rahnavard, Mariamalsadat Taghavi
Abstract:
Achillea millefolium L. is one of the most important medicinal plants with antioxidant compounds. The use of compounds derived from plants reduces the incidence of many chronic diseases. The purpose of this investigation is study of total phenolic content and antioxidant activity some of ecotypes yarrow grown in natural habitats in Iran. This experimental study was conducted in 2013 at the Islamic Azad University, Tonekabon Branch. After identifying the natural sites, we have attempted to harvest of aerial part and after drying in lab temperature, essential oil was extracted by steam distillation. In this research for evaluate the antioxidant properties was used of three method, DPPH, Antioxidant capacity ferro revival and phosphomolybdenum, that all mechanism is based on the electron donating. All ecotypes had antioxidant activity and ecotypes grown in Kandovan region were measured with the most total phenolic (89.5 mg GA/g dew) and flavonoid (20.4 µg/g dew) and the lowest in Saveh (71.3 mg GA/g dew, 17.4 µg/g dew). Variation of the antioxidant properties were significant (P≤0.01) in areas and were accounted Kandovan with highest value and the lowest in Save. As a result, yarrow essential oil grown in Kandovan in terms of amount of total phenolic, flavonoid and antioxidant property, it was determined the best natural habitat.Keywords: achillea millefolium L., antioxidant compounds, DPPH, total phenolic, flavonoid natural habitats
Procedia PDF Downloads 4561757 Estimation of Transition and Emission Probabilities
Authors: Aakansha Gupta, Neha Vadnere, Tapasvi Soni, M. Anbarsi
Abstract:
Protein secondary structure prediction is one of the most important goals pursued by bioinformatics and theoretical chemistry; it is highly important in medicine and biotechnology. Some aspects of protein functions and genome analysis can be predicted by secondary structure prediction. This is used to help annotate sequences, classify proteins, identify domains, and recognize functional motifs. In this paper, we represent protein secondary structure as a mathematical model. To extract and predict the protein secondary structure from the primary structure, we require a set of parameters. Any constants appearing in the model are specified by these parameters, which also provide a mechanism for efficient and accurate use of data. To estimate these model parameters there are many algorithms out of which the most popular one is the EM algorithm or called the Expectation Maximization Algorithm. These model parameters are estimated with the use of protein datasets like RS126 by using the Bayesian Probabilistic method (data set being categorical). This paper can then be extended into comparing the efficiency of EM algorithm to the other algorithms for estimating the model parameters, which will in turn lead to an efficient component for the Protein Secondary Structure Prediction. Further this paper provides a scope to use these parameters for predicting secondary structure of proteins using machine learning techniques like neural networks and fuzzy logic. The ultimate objective will be to obtain greater accuracy better than the previously achieved.Keywords: model parameters, expectation maximization algorithm, protein secondary structure prediction, bioinformatics
Procedia PDF Downloads 4811756 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 1151755 The Mechanism of Design and Analysis Modeling of Performance of Variable Speed Wind Turbine and Dynamical Control of Wind Turbine Power
Authors: Mohammadreza Heydariazad
Abstract:
Productivity growth of wind energy as a clean source needed to achieve improved strategy in production and transmission and management of wind resources in order to increase quality of power and reduce costs. New technologies based on power converters that cause changing turbine speed to suit the wind speed blowing turbine improve extraction efficiency power from wind. This article introduces variable speed wind turbines and optimization of power, and presented methods to use superconducting inductor in the composition of power converter and is proposed the dc measurement for the wind farm and especially is considered techniques available to them. In fact, this article reviews mechanisms and function, changes of wind speed turbine according to speed control strategies of various types of wind turbines and examines power possible transmission and ac from producing location to suitable location for a strong connection integrating wind farm generators, without additional cost or equipment. It also covers main objectives of the dynamic control of wind turbines, and the methods of exploitation and the ways of using it that includes the unique process of these components. Effective algorithm is presented for power control in order to extract maximum active power and maintains power factor at the desired value.Keywords: wind energy, generator, superconducting inductor, wind turbine power
Procedia PDF Downloads 3281754 Performants: Making the Organization of Concerts Easier
Authors: Ioannis Andrianakis, Panagiotis Panagiotopoulos, Kyriakos Chatzidimitriou, Dimitrios Tampakis, Manolis Falelakis
Abstract:
Live music, whether performed in organized venues, restaurants, hotels or any other spots, creates value chains that support and develop local economies and tourism development. In this paper, we describe PerformAnts, a platform that increases the mobility of musicians and their accessibility to remotely located venues by rationalizing the cost of live acts. By analyzing the event history and taking into account their potential availability, the platform provides bespoke recommendations to both bands and venues while also facilitating the organization of tours and helping rationalize transportation expenses by realizing an innovative mechanism called “chain booking”. Moreover, the platform provides an environment where complicated tasks such as technical and financial negotiations, concert promotion or copyrights are easily manipulated by users using best practices. The proposed solution provides important benefits to the whole spectrum of small/medium size concert organizers, as the complexity and the cost of the production are rationalized. The environment is also very beneficial for local talent, musicians that are very mobile, venues located away from large urban areas or in touristic destinations, and managers who will be in a position to coordinate a larger number of musicians without extra effort.Keywords: machine learning, music industry, creative industries, web applications
Procedia PDF Downloads 971753 A Comprehensive Review of Foam Assisted Water Alternating Gas (FAWAG) Technique: Foam Applications and Mechanisms
Authors: A. Shabib-Asl, M. Abdalla Ayoub Mohammed, A. F. Alta’ee, I. Bin Mohd Saaid, P. Paulo Jose Valentim
Abstract:
In the last few decades, much focus has been placed on enhancing oil recovery from existing fields. This is accomplished by the study and application of various methods. As for recent cases, the study of fluid mobility control and sweep efficiency in gas injection process as well as water alternating gas (WAG) method have demonstrated positive results on oil recovery and thus gained wide interest in petroleum industry. WAG injection application results in an increased oil recovery. Its mechanism consists in reduction of gas oil ratio (GOR). However, there are some problems associated with this which includes poor volumetric sweep efficiency due to its low density and high mobility when compared with oil. This has led to the introduction of foam assisted water alternating gas (FAWAG) technique, which in contrast with WAG injection, acts in improving the sweep efficiency and reducing the gas oil ration therefore maximizing the production rate from the producer wells. This paper presents a comprehensive review of FAWAG process from perspective of Snorre field experience. In addition, some comparative results between FAWAG and the other EOR methods are presented including their setbacks. The main aim is to provide a solid background for future laboratory research and successful field application-extend.Keywords: GOR, mobility ratio, sweep efficiency, WAG
Procedia PDF Downloads 4531752 Effective Charge Coupling in Low Dimensional Doped Quantum Antiferromagnets
Authors: Suraka Bhattacharjee, Ranjan Chaudhury
Abstract:
The interaction between the charge degrees of freedom for itinerant antiferromagnets is investigated in terms of generalized charge stiffness constant corresponding to nearest neighbour t-J model and t1-t2-t3-J model. The low dimensional hole doped antiferromagnets are the well known systems that can be described by the t-J-like models. Accordingly, we have used these models to investigate the fermionic pairing possibilities and the coupling between the itinerant charge degrees of freedom. A detailed comparison between spin and charge couplings highlights that the charge and spin couplings show very similar behaviour in the over-doped region, whereas, they show completely different trends in the lower doping regimes. Moreover, a qualitative equivalence between generalized charge stiffness and effective Coulomb interaction is also established based on the comparisons with other theoretical and experimental results. Thus it is obvious that the enhanced possibility of fermionic pairing is inherent in the reduction of Coulomb repulsion with increase in doping concentration. However, the increased possibility can not give rise to pairing without the presence of any other pair producing mechanism outside the t-J model. Therefore, one can conclude that the t-J-like models themselves solely are not capable of producing conventional momentum-based superconducting pairing on their own.Keywords: generalized charge stiffness constant, charge coupling, effective Coulomb interaction, t-J-like models, momentum-space pairing
Procedia PDF Downloads 1591751 VII Phytochemistry UNIT-IV Glycoside
Authors: Magy Magdy Danial Riad
Abstract:
Introduction: Glycosides: Enzymatic and hydrolysis reactions of glycosides, mechanism of action, SAR, therapeutic uses and toxicity of glycosides. Cardiac glycosides of digitalis, bufa and squill. Structure of salicin, hesperidin and rutin. Glycosides are certain molecules in which a sugar part is bound to some other part. Glycosides play numerous important roles in living organisms. Formally, a glycoside is any molecule in which a sugar group is bonded through its anomeric carbon to another group and form glycosidic bonds via an O-glycosidic bond or an S-glycosidic bond; glycosides involving the latter are also called thioglycosides. The purpose: the addition of sugar be bonded to a non-sugar for the molecule to qualify as a glycoside, The sugar group is then known as the glycone and the non-sugar group as the aglycone or genin part of the glycoside. The glycone can consist of a single sugar group (monosaccharide) or several sugar groups (oligosaccharide). The glycone and aglycone portions can be chemically separated by hydrolysis in the presence of acid. Methods: There are also numerous enzymes that can form and break glycosidic bonds. Results: The most important cleavage enzymes are the glycoside hydrolases, and the most important synthetic enzymes in nature are glycosyltransferases. Mutant enzymes termed glycosynthases have been developed that can form glycosidic bonds. Conclusions: There are a great many ways to chemically synthesize glycosidic bonds.Keywords: glycosides, bufa, squill, thioglycosides
Procedia PDF Downloads 621750 Home/Personal Budgeting: Implications for Financial Wellbeing of University Staffers in Ogun State Nigeria
Authors: Ben-Caleb Egbide, Egharevba Mathew, Achugamonu Uzoma, Faboyede Samuel
Abstract:
The importance of budgeting in government and corporate entities as medium for the efficient management of scarce resources is self-evident. But when it comes to home or personal budgeting, there seem to be lingering misconceptions as regards its relevance. While most people view personal budgeting merely as a tool for tracking expenses and schedule for paying bills and indebtedness, very few consider it as one of the most important device for sound financial planning, money management instrument and/or wealth-creation mechanism. This paper is conceptualised to investigate the association between personal budgeting and financial well-being among staffers of tertiary institution in the South West Nigeria. Underpinned by the individualistic/cultural theory of well-being and the adoption of a survey research design, a structured questionnaire was used to gather data from a cross section of staff of tertiary Institutions in Ogun State. A Spearman Rank Correlation was utilised for analysis of data. The result indicates a high positive relationship between personal budgeting and tendencies for enhanced financial well-being among staff. The paper established that a change of value and behavioural pattern by individuals and household, especially in the areas of personal spending and budgeting could drastically reduce the incidence of the severity of financial stress, hence, enhanced wellness among staff.Keywords: personal budgeting, financial well-being, tertiary institutions staffers, Nigeria
Procedia PDF Downloads 2991749 Roles of Lysine-63-Linked Ubiquitination in Cell Decision Fate between Cell Proliferation and Apoptosis
Authors: Chargui Abderrahman, Nehdi Afef , BelaïD Amine , Djerbi Nadir, Tauc Michel, Hofman Paul, Mograbi Baharia, El May MichèLe
Abstract:
K63-linked ubiquitination — i.e. conjugation of a chain of ubiquitins (Ub) linked through lys63 — has emerged as a key mechanism regulating signalling transduction pathways. Although critical, very little information is currently available about how subversion of K63 ubiquitination might contribute to cancers and inflammatory diseases. The present study provides the first evidence that Cadmium (Cd), a widespread environmental carcinogen and toxicant, is a powerful activator of K63 ubiquitination. Indeed, Cd induces accumulation of K63 polyUb proteins. Importantly, Cd-induced ubiquitination does not stem on oxidative damage or proteasome impairment. Rather, we demonstrate that Cd not only activates K63 ubiquitination but also amplifies their accumulation by overloading the capacity of autophagy pathway. At molecular level, Cd-induced ubiquitination is correlated with stabilization of HIF-1 and the activation of NF-B, two transcription factors. Strikingly, prolonged cell exposure to high Cd concentrations induces an exaggerated K63 ubiquitination that fosters aggresome formation, thus precluding these proteins from interacting with their downstream nuclear targets. We therefore propose that the aberrant activation of K63 ubiquitination by the carcinogen Cadmium could promote cell proliferation and inflammation at low levels while high levels committed cell to death.Keywords: cadmium, environmental exposure, Lysine-63-ubiquitination, kidney, apoptosis, proliferation, autophagy
Procedia PDF Downloads 2101748 Internet Memes: A Mirror of Culture and Society
Authors: Alexandra-Monica Toma
Abstract:
As the internet became a ruling force of society, computer-mediated communication has enriched its methods to convey meaning by combining linguistic means to visual means of expressivity. One of the elements of cyberspace is what we call a meme, a succinct, visually engaging tool used to communicate ideas or emotions, usually in a funny or ironic manner. Coined by Richard Dawkings in the late 1970s to refer to cultural genes, this term now denominates a special type of vernacular language used to share content on the internet. This research aims to analyse the basic mechanism that stands at the basis of meme creation as a blend of innovation and imitation and will approach some of the most widely used image macros remixed to generate new content while also pointing out success strategies. Moreover, this paper discusses whether memes can transcend the light-hearted and playful mood they mirror and become biting and sharp cultural comments. The study also uses the concept of multimodality and stresses how the text interacts with image, discussing three types of relations between the two: symmetry, amplification, and contradiction. We will furthermore show that memes are cultural artifacts and virtual tropes highly dependent on context and societal issues by using a corpus of memes created related to the COVID-19 pandemic.Keywords: context, computer-mediated communication, memes, multimodality
Procedia PDF Downloads 1841747 Beliefs in Auspicious Materials of Shop Entrepreneurs in Maung Hat Yai, Thailand
Authors: Punya Tepsing
Abstract:
This research aimed to study the beliefs in auspicious materials of entrepreneurs in Muang Hat Yai. The data were collected via documentary research and field work including interviews, observations shops in Hat Yai which used auspicious materials to bring lucks to the shops. The results were as follows. The beliefs in auspicious materials that the entrepreneurs had were of three areas: 1) The auspicious materials could correct the improperness of the shop location, for example, the shop situated opposite a branch road, a shrine, or a bank. The owner usually corrected it by putting Chinese auspicious materials in front of or in the shop, for example, a lion holding a sword in his mouth, or a mirror, etc. 2) The auspicious materials could bring in more income. The owner of the shop usually put the auspicious materials such as a cat beckoning and a bamboo fish trap believed to trap money in front of or inside the shop. 3) The auspicious materials like turtles, paired fish and a monster holding the moon in his mouth could solve life problems including health, family, and safety problems. The use of these auspicious materials showed the blending of the beliefs of the Chinese shop entrepreneurs with the Thai folk beliefs. What is interesting is that Hat Yai is located near the three southern border provinces which are the unrest area and this may cause the number of tourists to decline. This prompted them to build a mechanism in adjusting themselves both to save their lives and to increase the number of customers. Auspicious materials can make them feel more confident.Keywords: belief, auspicious materials, shop, entrepreneur, Maung Hat Yai
Procedia PDF Downloads 2401746 Somatosensory-Evoked Blink Reflex in Peripheral Facial Palsy
Authors: Sarah Sayed El- Tawab, Emmanuel Kamal Azix Saba
Abstract:
Objectives: Somatosensory blink reflex (SBR) is an eye blink response obtained from electrical stimulation of peripheral nerves or skin area of the body. It has been studied in various neurological diseases as well as among healthy subjects in different population. We designed this study to detect SBR positivity in patients with facial palsy and patients with post facial syndrome, to relate the facial palsy severity and the presence of SBR, and to associate between trigeminal BR changes and SBR positivity in peripheral facial palsy patients. Methods: 50 patients with peripheral facial palsy and post-facial syndrome 31 age and gender matched healthy volunteers were enrolled to this study. Facial motor conduction studies, trigeminal BR, and SBR were studied in all. Results: SBR was elicited in 67.7% of normal subjects, in 68% of PFS group, and in 32% of PFP group. On the non-paralytic side SBR was found in 28% by paralyzed side stimulation and in 24% by healthy side stimulation among PFP patients. For PFS group SBR was found on the non- paralytic side in 48%. Bilateral SBR elicitability was higher than its unilateral elicitability. Conclusion: Increased brainstem interneurons excitability is not essential to generate SBR. The hypothetical sensory-motor gating mechanism is responsible for SBR generation.Keywords: somatosensory evoked blink reflex, post facial syndrome, blink reflex, enchanced gain
Procedia PDF Downloads 6201745 Tribological Properties of Different Mass Ratio High Velocity Oxygen Fuel-Sprayed Al₂O₃-TiO₂ Coatings on Ti-6Al-4V Alloy
Authors: Mehmet Fahri Sarac, Gokcen Akgun
Abstract:
Ti–6Al–4V alloys are widely used in biomedical industries because of its attractive mechanical and physicochemical properties. However, they have poor wear resistance. High velocity oxygen fuel (HVOF) coatings were investigated as a way to improve the wear resistance of this alloy. In this paper, different mass ratio of Al₂O₃-TiO₂ powders (60/40, 87/13 and 97/3) was employed to enhance the tribological properties of Ti–6Al–4V. The tribological behavior was investigated by wear tests using ball-on-disc and pin-on-disc tribometer. The microstructures of the contact surfaces were determined by a scanning electron microscopy before and after the test to study the wear mechanism. Uncoated and coated surfaces after wear test are also subjected to micro-hardness tests. The tribological test results showed that the microhardness, friction and wear resistance of coated Ti-6Al-4V alloys increases by increasing TiO₂ content in the powder composite when other experimental conditions were constant. Finally, Al₂O₃-TiO₂ powder composites for the investigated conditions, both coating samples had satisfactory values of friction and wear resistance, and they could be suitable candidates for Ti–6Al–4V material.Keywords: HVOF (High Velocity Oxygen Fuel), Al₂O₃-TiO₂, Ti-6Al-4V, tribology
Procedia PDF Downloads 1951744 The Capacity Building in the Natural Disaster Management of Thailand
Authors: Eakarat Boonreang
Abstract:
The past two decades, Thailand faced the natural disasters, for instance, Gay typhoon in 1989, tsunami in 2004, and huge flood in 2011. The disaster management in Thailand was improved both structure and mechanism for cope with the natural disaster since 2007. However, the natural disaster management in Thailand has various problems, for examples, cooperation between related an organizations have not unity, inadequate resources, the natural disaster management of public sectors not proactive, people has not awareness the risk of the natural disaster, and communities did not participate in the natural disaster management. Objective of this study is to find the methods for capacity building in the natural disaster management of Thailand. The concept and information about the capacity building and the natural disaster management of Thailand were reviewed and analyzed by classifying and organizing data. The result found that the methods for capacity building in the natural disaster management of Thailand should be consist of 1)link operation and information in the natural disaster management between nation, province, local and community levels, 2)enhance competency and resources of public sectors which relate to the natural disaster management, 3)establish proactive natural disaster management both planning and implementation, 4)decentralize the natural disaster management to local government organizations, 5)construct public awareness in the natural disaster management to community, 6)support Community Based Disaster Risk Management (CBDRM) seriously, and 7)emphasis on participation in the natural disaster management of all stakeholders.Keywords: capacity building, Community Based Disaster Risk Management (CBDRM), Natural Disaster Management, Thailand
Procedia PDF Downloads 5571743 Cyclic NGR Peptide Anchored Block Co-Polymeric Nanoparticles as Dual Targeting Drug Delivery System for Solid Tumor Therapy
Authors: Madhu Gupta, G. P. Agrawa, Suresh P. Vyas
Abstract:
Certain tumor cells overexpress a membrane-spanning molecule aminopeptidase N (CD13) isoform, which is the receptor for peptides containing the NGR motif. NGR-modified Docetaxel (DTX)-loaded PEG-b-PLGA polymeric nanoparticles (cNGR-DNB-NPs) were developed and evaluated for their in vitro potential in HT-1080 cell line. The cNGR-DNB-NPs containing particles were about 148 nm in diameter with spherical shape and high encapsulation efficiency. Cellular uptake was confirmed both qualitatively and quantitatively by Confocal Laser Scanning Microscopy (CLSM) and flow cytometry. Both quantitatively and qualitatively results confirmed the NGR conjugated nanoparticles revealed the higher uptake of nanoparticles by CD13-overexpressed tumor cells. Free NGR inhibited the cellular uptake of cNGR-DNB-NPs, revealing the mechanism of receptor mediated endocytosis. In vitro cytotoxicity studies demonstrated that cNGR-DNB-NPs, formulation was more cytotoxic than unconjugated one, which were consistent well with the observation of cellular uptake. Hence, the selective delivery of cNGR-DNB-NPs formulation in CD13-overexpressing tumors represents a potential approach for the design of nanocarrier-based dual targeted delivery systems for targeting the tumor cells and vasculature.Keywords: solid Tumor, docetaxel, targeting, NGR ligand
Procedia PDF Downloads 4821742 Virtual Container Yard: Assessing the Perceived Impact of Legal Implications to Container Carriers
Authors: L. Edirisinghe, P. Mukherjee, H. Edirisinghe
Abstract:
Virtual Container Yard (VCY) is a modern concept that helps to reduce the empty container repositioning cost of carriers. The concept of VCY is based on container interchange between shipping lines. Although this mechanism has been theoretically accepted by the shipping community as a feasible solution, it has not yet achieved the necessary momentum among container shipping lines (CSL). This paper investigates whether there is any legal influence on this industry myopia about the VCY. It is believed that this is the first publication that focuses on the legal aspects of container exchange between carriers. Not much literature on this subject is available. This study establishes with statistical evidence that there is a phobia prevailing in the shipping industry that exchanging containers with other carriers may lead to various legal implications. The complexity of exchange is two faceted. CSLs assume that offering a container to another carrier (obviously, a competitor in terms of commercial context) or using a container offered by another carrier may lead to undue legal implications. This research reveals that this fear is reflected through four types of perceived components, namely: shipping associate; warehouse associate; network associate; and trading associate. These components carry eighteen subcomponents that comprehensively cover the entire process of a container shipment. The statistical explanation has been supported through regression analysis; INCO terms were used to illustrate the shipping process.Keywords: virtual container yard, legal, maritime law, inventory
Procedia PDF Downloads 165