Search results for: buried pipeline integrity management
10374 The Promotion of a Risk Culture: a Descriptive Study of Ghanaian Banks
Authors: Gerhard Grebe, Johan Marx
Abstract:
The aim of the study is to assess the state of operational risk management and the adoption of an appropriate risk culture in Ghanaian banks. The Bank of Ghana (BoG) joined the Basel Consultative Group (BCG) of the Basel Committee on Bank Supervision (BCBS) in 2021 and is proceeding with the implementation of the Basel III international regulatory framework for banks. The BoG’s Directive about risk management encourages, inter alia, the creation of an appropriate risk culture by Ghanaian banks. However, it is not evident how the risk management staff of Ghanaian banks experience the risk culture and the implementation of operational risk management in the banks where they are employed. Ghana is a developing economy, and it is addressing challenges with its organisational culture. According to Transparency International, successive Ghanaian governments claim to be fighting corruption, but little success has been achieved so far. This points to a possible lack of accountability, transparency, and integrity in the environment in which Ghanaian banks operate and which could influence their risk culture negatively. Purposive sampling was used for the survey, and the questionnaire was completed byGhanaian bank personnel who specializesin operational risk management, risk governance, and compliance, bank supervision, risk analyses, as well as the implementation of the operational risk management requirements of the Basel regulatory frameworks. The respondents indicated that they are fostering a risk culture and implementing monitoring and reporting procedures; the three lines of defence (3LOD); compliance; internal auditing; disclosure of operational risk information; and receiving guidance from the bank supervisor in an attempt to improve their operational risk management practices. However, the respondents reported the following challenges with staff members who are not inside the risk management departments(in order of priority), namelydemonstrating a risk culture, training and development; communication; reporting and disclosure; roles and responsibilities; performance appraisal; and technological and environmental barriers. Recommendations to address these challenges are providedKeywords: ghana, operational risk, risk culture, risk management
Procedia PDF Downloads 12210373 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms
Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez
Abstract:
This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.Keywords: temporal graph network, anomaly detection, cyber security, IDS
Procedia PDF Downloads 10310372 Dynamic Response around Inclusions in Infinitely Inhomogeneous Media
Authors: Jinlai Bian, Zailin Yang, Guanxixi Jiang, Xinzhu Li
Abstract:
The problem of elastic wave propagation in inhomogeneous medium has always been a classic problem. Due to the frequent occurrence of earthquakes, many economic losses and casualties have been caused, therefore, to prevent earthquake damage to people and reduce damage, this paper studies the dynamic response around the circular inclusion in the whole space with inhomogeneous modulus, the inhomogeneity of the medium is reflected in the shear modulus of the medium with the spatial position, and the density is constant, this method can be used to solve the problem of the underground buried pipeline. Stress concentration phenomena are common in aerospace and earthquake engineering, and the dynamic stress concentration factor (DSCF) is one of the main factors leading to material damage, one of the important applications of the theory of elastic dynamics is to determine the stress concentration in the body with discontinuities such as cracks, holes, and inclusions. At present, the methods include wave function expansion method, integral transformation method, integral equation method and so on. Based on the complex function method, the Helmholtz equation with variable coefficients is standardized by using conformal transformation method and wave function expansion method, the displacement and stress fields in the whole space with circular inclusions are solved in the complex coordinate system, the unknown coefficients are solved by using boundary conditions, by comparing with the existing results, the correctness of this method is verified, based on the superiority of the complex variable function theory to the conformal transformation, this method can be extended to study the inclusion problem of arbitrary shapes. By solving the dynamic stress concentration factor around the inclusions, the influence of the inhomogeneous parameters of the medium and the wavenumber ratio of the inclusions to the matrix on the dynamic stress concentration factor is analyzed. The research results can provide some reference value for the evaluation of nondestructive testing (NDT), oil exploration, seismic monitoring, and soil-structure interaction.Keywords: circular inclusions, complex variable function, dynamic stress concentration factor (DSCF), inhomogeneous medium
Procedia PDF Downloads 13510371 The Environmental Conflict over the Trans Mountain Pipeline Expansion in Burnaby, British Columbia, Canada
Authors: Emiliano Castillo
Abstract:
The aim of this research is to analyze the origins, the development and possible outcomes of the environmental conflict between grassroots organizations, indigenous communities, Kinder Morgan Corporation, and the Canadian government over the Trans Mountain pipeline expansion in Burnaby, British Columbia, Canada. Building on the political ecology and the environmental justice theoretical framework, this research examines the impacts and risks of tar sands extraction, production, and transportation on climate change, public health, the environment, and indigenous people´s rights over their lands. This study is relevant to the environmental justice and political ecology literature because it discusses the unequal distribution of environmental costs and economic benefits of tar sands development; and focuses on the competing interests, needs, values, and claims of the actors involved in the conflict. Furthermore, it will shed light on the context, conditions, and processes that lead to the organization and mobilization of a grassroots movement- comprised of indigenous communities, citizens, scientists, and non-governmental organizations- that draw significant media attention by opposing the Trans Mountain pipeline expansion. Similarly, the research will explain the differences and dynamics within the grassroots movement. This research seeks to address the global context of the conflict by studying the links between the decline of conventional oil production, the rise of unconventional fossil fuels (e.g. tar sands), climate change, and the struggles of low-income, ethnic, and racial minorities over the territorial expansion of extractive industries. Data will be collected from legislative documents, policy and technical reports, scientific journals, newspapers articles, participant observation, and semi-structured interviews with representatives and members of the grassroots organizations, indigenous communities, and Burnaby citizens that oppose the Trans Mountain pipeline. These interviews will focus on their perceptions of the risks of the Trans Mountain pipeline expansion; the roots of the anti-tar sands movement; the differences and dynamics within the movement; and the strategies to defend the livelihoods of local communities and the environment against tar sands development. This research will contribute to the understanding of the underlying causes of the environmental conflict between the Canadian government, Kinder Morgan, and grassroots organizations over tar sands extraction, production, and transportation in Burnaby, British Columbia, Canada. Moreover, this work will elucidate the transformations of society-nature relationships brought by tar sands development. Research findings will provide scientific information about how the resistance movement in British Columbia can challenge the dominant narrative on tar sands, exert greater influence in environmental politics, and efficiently defend Indigenous people´s rights to lands. Furthermore, this research will shed light into how grassroots movements can contribute towards the building of more inclusive and sustainable societies.Keywords: environmental conflict, environmental justice, extractive industry, indigenous communities, political ecology, tar sands
Procedia PDF Downloads 27810370 Multiresolution Mesh Blending for Surface Detail Reconstruction
Authors: Honorio Salmeron Valdivieso, Andy Keane, David Toal
Abstract:
In the area of mechanical reverse engineering, processes often encounter difficulties capturing small, highly localized surface information. This could be the case if a physical turbine was 3D scanned for lifecycle management or robust design purposes, with interest on eroded areas or scratched coating. The limitation partly is due to insufficient automated frameworks for handling -localized - surface information during the reverse engineering pipeline. We have developed a tool for blending surface patches with arbitrary irregularities into a base body (e.g. a CAD solid). The approach aims to transfer small surface features while preserving their shape and relative placement by using a multi-resolution scheme and rigid deformations. Automating this process enables the inclusion of outsourced surface information in CAD models, including samples prepared in mesh handling software, or raw scan information discarded in the early stages of reverse engineering reconstruction.Keywords: application lifecycle management, multiresolution deformation, reverse engineering, robust design, surface blending
Procedia PDF Downloads 13910369 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 29910368 Software Quality Assurance in Network Security using Cryptographic Techniques
Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar
Abstract:
The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography
Procedia PDF Downloads 73310367 Structural Integrity Analysis of Baffle Former Assembly in Pressurized Water Reactors Considering Irradiation Aging
Authors: Jong-Sung Kim, Myung-Jo Jhung
Abstract:
BFA is one of the reactor internals components in PWR. The BFA has the intended functions to support fuel assembly, to keep structural integrity of upper/lower core support structures, and to secure reactor coolant flow path. Failure of the BFA may give rise to significant effect on reactor safety operation and stop. The BFA is subject to relatively high neutron irradiation dose due to location close to the core. Therefore, IASCC can occur on the BFA due to damage accumulation as operating year increases. In this study, IASCC susceptibility on the BFA was assessed via the FEA considering variations of mechanical material behaviors with neutron irradiation. As a result of the assessment, some points have susceptibility more than 0.2 to IASCC during design lifetime.Keywords: baffle former assembly, finite element analysis, irradiation aging, nuclear power plant, pressurized water reactor
Procedia PDF Downloads 35910366 Mathematical Modeling and Optimization of Burnishing Parameters for 15NiCr6 Steel
Authors: Tarek Litim, Ouahiba Taamallah
Abstract:
The present paper is an investigation of the effect of burnishing on the surface integrity of a component made of 15NiCr6 steel. This work shows a statistical study based on regression, and Taguchi's design has allowed the development of mathematical models to predict the output responses as a function of the technological parameters studied. The response surface methodology (RSM) showed a simultaneous influence of the burnishing parameters and observe the optimal processing parameters. ANOVA analysis of the results resulted in the validation of the prediction model with a determination coefficient R=90.60% and 92.41% for roughness and hardness, respectively. Furthermore, a multi-objective optimization allowed to identify a regime characterized by P=10kgf, i=3passes, and f=0.074mm/rev, which favours minimum roughness and maximum hardness. The result was validated by the desirability of D= (0.99 and 0.95) for roughness and hardness, respectively.Keywords: 15NiCr6 steel, burnishing, surface integrity, Taguchi, RSM, ANOVA
Procedia PDF Downloads 19110365 Comparison of Various Response Spectrum of Nuclear Power Plant at Chashma Site
Authors: J. Iqbal, A. Shah, M. Zeeshan
Abstract:
UBC-97, USNRC, chines origin code GB50011-2011 and site response spectrum was used to make comparison between them for Chashma site and most conservative one was selected and the USNRC was the most conservative one. The dynamic analysis of CHASNUPP-2 containment building was performed using SAP-2000 for dead load, live load (crane), pre stressed loads, wind load, temperature load, accidental pressure during LOCA, earthquake loads and the conservative response spectrum. After applying selected response spectrum on model, detail comparison was made against area of steal calculated from the analysis and the actually provided. Then prepared curve of area of steal vs. g value which shows that if the particular site was design on that spectrum that much steel needed for structural integrity.Keywords: response spectrum, USNRC, LOCA, area of steel, structure integrity
Procedia PDF Downloads 67910364 An Integrative Computational Pipeline for Detection of Tumor Epitopes in Cancer Patients
Authors: Tanushree Jaitly, Shailendra Gupta, Leila Taher, Gerold Schuler, Julio Vera
Abstract:
Genomics-based personalized medicine is a promising approach to fight aggressive tumors based on patient's specific tumor mutation and expression profiles. A remarkable case is, dendritic cell-based immunotherapy, in which tumor epitopes targeting patient's specific mutations are used to design a vaccine that helps in stimulating cytotoxic T cell mediated anticancer immunity. Here we present a computational pipeline for epitope-based personalized cancer vaccines using patient-specific haplotype and cancer mutation profiles. In the workflow proposed, we analyze Whole Exome Sequencing and RNA Sequencing patient data to detect patient-specific mutations and their expression level. Epitopes including the tumor mutations are computationally predicted using patient's haplotype and filtered based on their expression level, binding affinity, and immunogenicity. We calculate binding energy for each filtered major histocompatibility complex (MHC)-peptide complex using docking studies, and use this feature to select good epitope candidates further.Keywords: cancer immunotherapy, epitope prediction, NGS data, personalized medicine
Procedia PDF Downloads 25210363 Integrating Heritage Conservation and Sustainable Development: The Role of Buffer Zones in Safeguarding the Tentative World Heritage Sites and Empowering Local Communities in India
Authors: Shweta Vardia
Abstract:
The 2021 decision by the World Heritage Center to align buffer zones with the 2015 Strategy for Sustainable Development marks a significant advancement in the protection of cultural and natural heritage sites. Buffer zones play a critical role in preserving the outstanding universal value, authenticity, and integrity of heritage sites, shielding them from threats such as urbanization, industrialization, and tourism. The 2015 Strategy emphasizes the integration of culture and heritage into sustainable development policies, highlighting the importance of community participation, traditional knowledge, and effective management in the conservation of heritage sites. This paper examines the implications of this strategic alignment for tentative World Heritage Sites in India. It explores how buffer zones can serve as tools for sustainable tourism, economic growth, and environmental protection while also addressing the socio-economic needs of local communities. By adopting a people-centered approach, the study underscores the need for active community involvement in heritage conservation, recognizing local residents as long-term custodians of cultural heritage. The role of buffer zones in promoting sustainable livelihoods, enhancing resilience to environmental changes, and fostering a sense of belonging among communities is also discussed. The challenges associated with buffer zones, including restrictive boundaries, unclear legislative frameworks, and potential disconnection from sociocultural contexts, are critically analyzed. The paper advocates for a holistic and integrated approach to buffer zone management, ensuring that policies are not only theoretically sound but also practically feasible. It concludes by emphasizing the need for collaborative efforts among conservation professionals, local communities, and policymakers to achieve sustainable development goals that respect both the heritage site's integrity and the well-being of surrounding populations.Keywords: buffer zones, India, local communities, urbanization, world heritage sites
Procedia PDF Downloads 2810362 Solubility of Water in CO2 Mixtures at Pipeline Operation Conditions
Authors: Mohammad Ahmad, Sander Gersen, Erwin Wilbers
Abstract:
Carbon capture, transport and underground storage have become a major solution to reduce CO2 emissions from power plants and other large CO2 sources. A big part of this captured CO2 stream is transported at high pressure dense phase conditions and stored in offshore underground depleted oil and gas fields. CO2 is also transported in offshore pipelines to be used for enhanced oil and gas recovery. The captured CO2 stream with impurities may contain water that causes severe corrosion problems, flow assurance failure and might damage valves and instrumentations. Thus, free water formation should be strictly prevented. The purpose of this work is to study the solubility of water in pure CO2 and in CO2 mixtures under real pipeline pressure (90-150 bar) and temperature operation conditions (5-35°C). A set up was constructed to generate experimental data. The results show the solubility of water in CO2 mixtures increasing with the increase of the temperature or/and with the increase in pressure. A drop in water solubility in CO2 is observed in the presence of impurities. The data generated were then used to assess the capabilities of two mixture models: the GERG-2008 model and the EOS-CG model. By generating the solubility data, this study contributes to determine the maximum allowable water content in CO2 pipelines.Keywords: carbon capture and storage, water solubility, equation of states, fluids engineering
Procedia PDF Downloads 30110361 Secure and Privacy-Enhanced Blockchain-Based Authentication System for University User Management
Authors: Ali El Ksimi
Abstract:
In today's digital academic environment, secure authentication methods are essential for managing sensitive user data, including that of students and faculty. The rise in cyber threats and data breaches has exposed the vulnerabilities of traditional authentication systems used in universities. Passwords, often the first line of defense, are particularly susceptible to hacking, phishing, and brute-force attacks. While multi-factor authentication (MFA) provides an additional layer of security, it can still be compromised and often adds complexity and inconvenience for users. As universities seek more robust security measures, blockchain technology emerges as a promising solution. Renowned for its decentralization, immutability, and transparency, blockchain has the potential to transform how user management is conducted in academic institutions. In this article, we explore a system that leverages blockchain technology specifically for managing user accounts within a university setting. The system enables the secure creation and management of accounts for different roles, such as administrators, teachers, and students. Each user is authenticated through a decentralized application (DApp) that ensures their data is securely stored and managed on the blockchain. By eliminating single points of failure and utilizing cryptographic techniques, the system enhances the security and integrity of user management processes. We will delve into the technical architecture, security benefits, and implementation considerations of this approach. By integrating blockchain into user management, we aim to address the limitations of traditional systems and pave the way for the future of digital security in education.Keywords: blockchain, university, authentication, decentralization, cybersecurity, user management, privacy
Procedia PDF Downloads 2310360 Fatigue Crack Behaviour in a Residual Stress Field at Fillet Welds in Ship Structures
Authors: Anurag Niranjan, Michael Fitzpatrick, Yin Jin Janin, Jazeel Chukkan, Niall Smyth
Abstract:
Fillet welds are used in joining longitudinal stiffeners in ship structures. Welding residual stresses in fillet welds are generally distributed in a non-uniform manner, as shown in previous research the residual stress redistribution occurs under the cyclic loading that is experienced by such joints during service, and the combination of the initial residual stress, local constraints, and loading can alter the stress field in ways that are extremely difficult to predict. As the residual stress influences the crack propagation originating from the toe of the fillet welds, full understanding of the residual stress field and how it evolves is very important for structural integrity calculations. Knowledge of the residual stress redistribution in the presence of a flaw is therefore required for better fatigue life prediction. Moreover, defect assessment procedures such as BS7910 offer very limited guidance for flaw acceptance and the associated residual stress redistribution in the assessment of fillet welds. Therefore the objective of this work is to study a surface-breaking flaw at the weld toe region in a fillet weld under cyclic load, in conjunction with residual stress measurement at pre-defined crack depths. This work will provide details of residual stress redistribution under cyclic load in the presence of a crack. The outcome of this project will inform integrity assessment with respect to the treatment of residual stress in fillet welds. Knowledge of the residual stress evolution for this weld geometry will be greatly beneficial for flaw tolerance assessments (BS 7910, API 591).Keywords: fillet weld, fatigue, residual stress, structure integrity
Procedia PDF Downloads 14210359 A Voice Signal Encryption Scheme Based on Chaotic Theory
Authors: Hailang Yang
Abstract:
To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)
Procedia PDF Downloads 5110358 Seismic Considerations in Case Study of Kindergartens Building Design: Ensuring Safety and Structural Integrity
Authors: Al-Naqdi Ibtehal Abdulmonem
Abstract:
Kindergarten buildings are essential for early childhood education, providing a secure environment for children's development. However, they are susceptible to seismic forces, which can endanger occupants during earthquakes. This article emphasizes the importance of conducting thorough seismic analysis and implementing proper structural design to protect the well-being of children, staff, and visitors. By prioritizing structural integrity and considering functional requirements, engineers can mitigate risks associated with seismic events. The use of specialized software like ETABS is crucial for designing earthquake-resistant kindergartens. An analysis using ETABS software compared the structural performance of two single-story kindergartens in Iraq's Ministry of Education, designed with and without seismic considerations. The analysis aimed to assess the impact of seismic design on structural integrity and safety. The kindergarten was designed with seismic considerations, including moment frames. In contrast, the same kindergarten was analyzed without seismic effects, revealing a lack of structural elements to resist lateral forces, rendering it vulnerable to structural failure during an earthquake. Maximum major shear increased over 4 times and over 5 times for bending moment in both kindergartens designed with seismic considerations induced by lateral loads and seismic forces. This component of shear force is vital for designing elements to resist lateral loads and ensure structural stability.Keywords: seismic analysis, structural design, lateral loads, earthquake resistance, major shear, ETABS
Procedia PDF Downloads 6910357 Structural Health Monitoring using Fibre Bragg Grating Sensors in Slab and Beams
Authors: Pierre van Tonder, Dinesh Muthoo, Kim twiname
Abstract:
Many existing and newly built structures are constructed on the design basis of the engineer and the workmanship of the construction company. However, when considering larger structures where more people are exposed to the building, its structural integrity is of great importance considering the safety of its occupants (Raghu, 2013). But how can the structural integrity of a building be monitored efficiently and effectively. This is where the fourth industrial revolution step in, and with minimal human interaction, data can be collected, analysed, and stored, which could also give an indication of any inconsistencies found in the data collected, this is where the Fibre Bragg Grating (FBG) monitoring system is introduced. This paper illustrates how data can be collected and converted to develop stress – strain behaviour and to produce bending moment diagrams for the utilisation and prediction of the structure’s integrity. Embedded fibre optic sensors were used in this study– fibre Bragg grating sensors in particular. The procedure entailed making use of the shift in wavelength demodulation technique and an inscription process of the phase mask technique. The fibre optic sensors considered in this report were photosensitive and embedded in the slab and beams for data collection and analysis. Two sets of fibre cables have been inserted, one purposely to collect temperature recordings and the other to collect strain and temperature. The data was collected over a time period and analysed used to produce bending moment diagrams to make predictions of the structure’s integrity. The data indicated the fibre Bragg grating sensing system proved to be useful and can be used for structural health monitoring in any environment. From the experimental data for the slab and beams, the moments were found to be64.33 kN.m, 64.35 kN.m and 45.20 kN.m (from the experimental bending moment diagram), and as per the idealistic (Ultimate Limit State), the data of 133 kN.m and 226.2 kN.m were obtained. The difference in values gave room for an early warning system, in other words, a reserve capacity of approximately 50% to failure.Keywords: fibre bragg grating, structural health monitoring, fibre optic sensors, beams
Procedia PDF Downloads 13910356 Development of an Automatic Computational Machine Learning Pipeline to Process Confocal Fluorescence Images for Virtual Cell Generation
Authors: Miguel Contreras, David Long, Will Bachman
Abstract:
Background: Microscopy plays a central role in cell and developmental biology. In particular, fluorescence microscopy can be used to visualize specific cellular components and subsequently quantify their morphology through development of virtual-cell models for study of effects of mechanical forces on cells. However, there are challenges with these imaging experiments, which can make it difficult to quantify cell morphology: inconsistent results, time-consuming and potentially costly protocols, and limitation on number of labels due to spectral overlap. To address these challenges, the objective of this project is to develop an automatic computational machine learning pipeline to predict cellular components morphology for virtual-cell generation based on fluorescence cell membrane confocal z-stacks. Methods: Registered confocal z-stacks of nuclei and cell membrane of endothelial cells, consisting of 20 images each, were obtained from fluorescence confocal microscopy and normalized through software pipeline for each image to have a mean pixel intensity value of 0.5. An open source machine learning algorithm, originally developed to predict fluorescence labels on unlabeled transmitted light microscopy cell images, was trained using this set of normalized z-stacks on a single CPU machine. Through transfer learning, the algorithm used knowledge acquired from its previous training sessions to learn the new task. Once trained, the algorithm was used to predict morphology of nuclei using normalized cell membrane fluorescence images as input. Predictions were compared to the ground truth fluorescence nuclei images. Results: After one week of training, using one cell membrane z-stack (20 images) and corresponding nuclei label, results showed qualitatively good predictions on training set. The algorithm was able to accurately predict nuclei locations as well as shape when fed only fluorescence membrane images. Similar training sessions with improved membrane image quality, including clear lining and shape of the membrane, clearly showing the boundaries of each cell, proportionally improved nuclei predictions, reducing errors relative to ground truth. Discussion: These results show the potential of pre-trained machine learning algorithms to predict cell morphology using relatively small amounts of data and training time, eliminating the need of using multiple labels in immunofluorescence experiments. With further training, the algorithm is expected to predict different labels (e.g., focal-adhesion sites, cytoskeleton), which can be added to the automatic machine learning pipeline for direct input into Principal Component Analysis (PCA) for generation of virtual-cell mechanical models.Keywords: cell morphology prediction, computational machine learning, fluorescence microscopy, virtual-cell models
Procedia PDF Downloads 20510355 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 14310354 Corrosive Bacteria Attached to Carbon Steel Used in Oil and Gas Company
Authors: Hadjer Didouh, Mohammed Hadj Melliani, Izzeddine Sameut Bouhaik
Abstract:
Microbiologically influenced corrosion (MIC) is a major cause of pipeline failure in the oil and gas industry, particularly affecting carbon steel, which is widely used for its cost-effectiveness and mechanical properties. This study investigates the adhesion of sulfate-reducing bacteria (SRB) and other corrosive microbial species on API 5L X52 carbon steel in crude oil and injection water environments. Experimental results showed that after 72 hours of exposure, biofilm formed extensively, leading to significant corrosion rates. Weight loss measurements indicated a corrosion rate of 0.39 mm/year, with localized pitting observed at depths reaching 120 μm. Electrochemical impedance spectroscopy (EIS) revealed a drastic decrease in charge transfer resistance, from 1200 Ω/cm² for sterile samples to 240 Ω/cm² in the presence of SRB biofilm. Scanning electron microscopy (SEM) and energy dispersive spectroscopy (EDS) analyses confirmed the presence of iron sulfide deposits, indicating active bacterial colonization and biofilm-induced pitting corrosion. This study highlights the severe impact of MIC on pipeline infrastructure, emphasizing the need for efficient microbial control strategies. Furthermore, the results provide a framework for the development of enhanced protective coatings and environmentally friendly biocides to mitigate the economic and environmental risks associated with MIC in oilfield operations in Algeria.Keywords: MIC, corrosion, bacteria, API 5L X52
Procedia PDF Downloads 3110353 Quality Function Deployment Application in Sewer Pipeline Assessment
Authors: Khalid Kaddoura, Tarek Zayed
Abstract:
Infrastructure assets are essential in urban cities; their purpose is to facilitate the public needs. As a result, their conditions and states shall always be monitored to avoid any sudden malfunction. Sewer systems, one of the assets, are an essential part of the underground infrastructure as they transfer sewer medium to designated areas. However, their conditions are subject to deterioration due to ageing. Therefore, it is of great significance to assess the conditions of pipelines to avoid sudden collapses. Current practices of sewer pipeline assessment rely on industrial protocols that consider distinct defects and grades to conclude the limited average or peak score of the assessed assets. This research aims to enhance the evaluation by integrating the Quality Function Deployment (QFD) and the Decision-Making Trial and Evaluation Laboratory (DEMATEL) methods in assessing the condition of sewer pipelines. The methodology shall study the cause and effect relationship of the systems’ defects to deduce the relative influence weights of each defect. Subsequently, the overall grade is calculated by aggregating the WHAT’s and HOW’s of the House of Quality (HOQ) using the computed relative weights. Thus, this study shall enhance the evaluation of the assets to conclude informative rehabilitation and maintenance plans for decision makers.Keywords: condition assessment, DEMATEL, QFD, sewer pipelines
Procedia PDF Downloads 43410352 Antecedents of Online Trust Towards E-Retailers for Repeat Buyers: An Empirical Study in Indian Context
Authors: Prageet Aeron, Shilpi Jain
Abstract:
The present work explores the trust building mechanisms in the context of e-commerce vendors and reconciles trust as a cognitive as well as a knowledge-based mechanism in the framework which is developed. The paper conducts an empirical examination of the variables integrity, benevolence, and ability with trust as the dependent variable and propensity to trust as the mediating variable. Authors establish ability and integrity as primary antecedents as well as establish the central role of trust propensity in the online context for Indian buyers. Authors further identify that benevolence in the context of Indian buyers online behaviour seems insignificant, and this seems counter-intutive given the role of discounts in the Indian market. Lastly, authors conclude that the role of media and social influencers in building a perception of trust seems of little consequence.Keywords: e-commerce, trust, e-retailers, propensity to trust
Procedia PDF Downloads 35610351 Degradation Model for UK Railway Drainage System
Authors: Yiqi Wu, Simon Tait, Andrew Nichols
Abstract:
Management of UK railway drainage assets is challenging due to the large amounts of historical assets with long asset life cycles. A major concern for asset managers is to maintain the required performance economically and efficiently while complying with the relevant regulation and legislation. As the majority of the drainage assets are buried underground and are often difficult or costly to examine, it is important for asset managers to understand and model the degradation process in order to foresee the upcoming reduction in asset performance and conduct proactive maintenance accordingly. In this research, a Markov chain approach is used to model the deterioration process of rail drainage assets. The study is based on historical condition scores and characteristics of drainage assets across the whole railway network in England, Scotland, and Wales. The model is used to examine the effect of various characteristics on the probabilities of degradation, for example, the regional difference in probabilities of degradation, and how material and shape can influence the deterioration process for chambers, channels, and pipes.Keywords: deterioration, degradation, markov models, probability, railway drainage
Procedia PDF Downloads 22110350 A Systematic Literature Review on the Prevalence of Academic Plagiarism and Cheating in Higher Educational Institutions
Authors: Sozon, Pok Wei Fong, Sia Bee Chuan, Omar Hamdan Mohammad
Abstract:
Owing to the widespread phenomenon of plagiarism and cheating in higher education institutions (HEIs), it is now difficult to ensure academic integrity and quality education. Moreover, the COVID-19 pandemic has intensified the issue by shifting educational institutions into virtual teaching and assessment mode. Thus, there is a need to carry out an extensive and holistic systematic review of the literature to highlight plagiarism and cheating in both prevalence and form among HEIs. This paper systematically reviews the literature concerning academic plagiarism and cheating in HEIs to determine the most common forms and suggest strategies for resolution and boosting the academic integrity of students. The review included 45 articles and publications for the period from February 12, 2018, to September 12, 2022, in the Scopus database aligned with the Systematic Review and Meta-Analysis (PRISMA) guidelines in the selection, filtering, and reporting of the papers for review from which a conclusion can be drawn. Based on the results, out of the studies reviewed, 48% of the quantitative results of students were plagiarized and obtained through cheating, with 84% coming from the fields of Humanities. Moreover, Psychology and Social Sciences studies accumulated 9% and 7% articles respectively. Based on the results, individual factors, institutional factors, and social and cultural factors have contributed to plagiarism and cheating cases in HEIs. The resolution of this issue can be the establishment of ethical and moral development initiatives and modern academic policies and guidelines supported by technological strategies of testing.Keywords: plagiarism, cheating, systematic review, academic integrity
Procedia PDF Downloads 7410349 Impact of Drainage Defect on the Railway Track Surface Deflections; A Numerical Investigation
Authors: Shadi Fathi, Moura Mehravar, Mujib Rahman
Abstract:
The railwaytransportation network in the UK is over 100 years old and is known as one of the oldest mass transit systems in the world. This aged track network requires frequent closure for maintenance. One of the main reasons for closure is inadequate drainage due to the leakage in the buried drainage pipes. The leaking water can cause localised subgrade weakness, which subsequently can lead to major ground/substructure failure.Different condition assessment methods are available to assess the railway substructure. However, the existing condition assessment methods are not able to detect any local ground weakness/damageand provide details of the damage (e.g. size and location). To tackle this issue, a hybrid back-analysis technique based on artificial neural network (ANN) and genetic algorithm (GA) has been developed to predict the substructurelayers’ moduli and identify any soil weaknesses. At first, afinite element (FE) model of a railway track section under Falling Weight Deflection (FWD) testing was developed and validated against field trial. Then a drainage pipe and various scenarios of the local defect/ soil weakness around the buried pipe with various geometriesand physical properties were modelled. The impact of the soil local weaknesson the track surface deflection wasalso studied. The FE simulations results were used to generate a database for ANN training, and then a GA wasemployed as an optimisation tool to optimise and back-calculate layers’ moduli and soil weakness moduli (ANN’s input). The hybrid ANN-GA back-analysis technique is a computationally efficient method with no dependency on seed modulus values. The modelcan estimate substructures’ layer moduli and the presence of any localised foundation weakness.Keywords: finite element (FE) model, drainage defect, falling weight deflectometer (FWD), hybrid ANN-GA
Procedia PDF Downloads 15210348 On the Design of Electronic Control Unitsfor the Safety-Critical Vehicle Applications
Authors: Kyung-Jung Lee, Hyun-Sik Ahn
Abstract:
This paper suggests a design methodology for the hardware and software of the Electronic Control Unit (ECU) of safety-critical vehicle applications such as braking and steering. The architecture of the hardware is a high integrity system such that it incorporates a high performance 32-bit CPU and a separate Peripheral Control-Processor (PCP) together with an external watchdog CPU. Communication between the main CPU and the PCP is executed via a common area of RAM and events on either processor which are invoked by interrupts. Safety-related software is also implemented to provide a reliable, self-testing computing environment for safety critical and high integrity applications. The validity of the design approach is shown by using the Hardware-in-the-Loop Simulation (HILS) for Electric Power Steering (EPS) systems which consists of the EPS mechanism, the designed ECU, and monitoring tools.Keywords: electronic control unit, electric power steering, functional safety, hardware-in-the-loop simulation
Procedia PDF Downloads 29410347 Mass Media and Electoral Conflict Management in Kogi State, Nigeria
Authors: Okpanachi Linus Odiji, Chris Ogwu Attah
Abstract:
Election is no doubt widely assumed as one of the most suitable means of resolving political quagmires even though it has never been bereft of conflict which can manifest before, during, or after polls. What, however, advances democracy and promotes electoral integrity is the existence and effectiveness of institutional frameworks for electoral conflict management. Electoral conflicts are no doubt unique in the sense that they represent the struggles of people over the control of public resources. In most cases, the stakes involved are high and emotional that they do not only undermine inter-group relationship but also threaten national security. The need, therefore, for an effectively functional conflict management apparatus becomes imperative. While at the State level, there exist numerous governmental initiatives at various electoral stages aimed at managing conflicts, this paper examines the activities of the mass media, which is another prominent stakeholder in the electoral process. Even though media influence has increased tremendously in the last decade, researchers are yet to agree on its utility in the management of conflicts. Guided by the social responsibility theory of media reporting and drawing data from observed trends in Kogi state, the paper, which context analyses the 2019 gubernatorial election coverage in the state, observes both conflict escalation and de-escalation roles in the media. To mitigate conflict reporting misrepresentation, therefore, a common approach to conflict reporting should be designed and ordered by the National Broadcasting Commission as well as the Nigerian Press Council. This should be garnished with the training of journalists on conflict reporting and development of a standard conflict reporting procedure.Keywords: conflict management, electoral conflict, mass media, media reporting
Procedia PDF Downloads 14910346 An Original and Suitable Induction Method of Repeated Hypoxic Stress by Hydralazine to Investigate the Integrity of an in Vitro Contact Co-Culture Blood Brain Barrier Model
Authors: Morgane Chatard, Clémentine Puech, Nathalie Perek, Frédéric Roche
Abstract:
Several neurological disorders are linked to repeated hypoxia. The impact of such repeated hypoxic stress, on endothelial cells function of the blood-brain barrier (BBB) is little studied in the literature. Indeed, the study of hypoxic stress in cellular pathways is complex using hypoxia exposure because HIF 1α (factor induced by hypoxia) has a short half life. Our study presents an innovative induction method of repeated hypoxic stress, more reproducible, which allows us to study its impacts on an in vitro contact co-culture BBB model. Repeated hypoxic stress was induced by hydralazine (a mimetic agent of hypoxia pathway) during two hours and repeated during 24 hours. Then, BBB integrity was assessed by permeability measurements (transendothelial electrical resistance and membrane permeability), tight junction protein expressions (cell-ELISA and confocal microscopy) and by studying expression and activity of efflux transporters. First, this study showed that repeated hypoxic stress leads to a BBB’s dysfunction illustrated by a significant increase in permeability. This loss of membrane integrity was linked to a significant decrease of tight junctions’ protein expressions, facilitating a possible transfer of potential cytotoxic compounds in the brain. Secondly, we demonstrated that brain microvascular endothelial cells had set-up defence mechanism. These endothelial cells significantly increased the activity of their efflux transporters which was associated with a significant increase in their expression. In conclusion, repeated hypoxic stress lead to a loss of BBB integrity with a decrease of tight junction proteins. In contrast, endothelial cells increased the expression of their efflux transporters to fight against cytotoxic compounds brain crossing. Unfortunately, enhanced efflux activity could also lead to reducing pharmacological drugs delivering to the brain in such hypoxic conditions.Keywords: BBB model, efflux transporters, repeated hypoxic stress, tigh junction proteins
Procedia PDF Downloads 29210345 An Investigation of the University Council’s Image: A Case of Suan Sunandha Rajabhat University
Authors: Phitsanu Phunphetchphan
Abstract:
The purposes of this research was to investigate opinions of Rajabhat University staff towards performance of the university council committee by focusing on (1) personal characteristics of the committees; (2) duties designated by the university council; and (3) relationship between university council and staff. The population of this study included all high level of management from Suan Sunandha Rajabhat University which made a total of 200 respondents. Data analysis included frequency, percentage, mean and standard deviation. The findings revealed that the majority of staff rated the performance of university council at a high level. The 'overall appropriate qualification of the university council' was rated as the highest score while 'good governance' was rated as the lowest mean score. Moreover, the findings also revealed that the relationship between university council’s members and the staff was rated at a high level while 'the integrity of policy implementation' was rated as the lowest score.Keywords: investigation, performance, university council, management
Procedia PDF Downloads 249