Search results for: protecting variant
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 722

Search results for: protecting variant

512 Least-Square Support Vector Machine for Characterization of Clusters of Microcalcifications

Authors: Baljit Singh Khehra, Amar Partap Singh Pharwaha

Abstract:

Clusters of Microcalcifications (MCCs) are most frequent symptoms of Ductal Carcinoma in Situ (DCIS) recognized by mammography. Least-Square Support Vector Machine (LS-SVM) is a variant of the standard SVM. In the paper, LS-SVM is proposed as a classifier for classifying MCCs as benign or malignant based on relevant extracted features from enhanced mammogram. To establish the credibility of LS-SVM classifier for classifying MCCs, a comparative evaluation of the relative performance of LS-SVM classifier for different kernel functions is made. For comparative evaluation, confusion matrix and ROC analysis are used. Experiments are performed on data extracted from mammogram images of DDSM database. A total of 380 suspicious areas are collected, which contain 235 malignant and 145 benign samples, from mammogram images of DDSM database. A set of 50 features is calculated for each suspicious area. After this, an optimal subset of 23 most suitable features is selected from 50 features by Particle Swarm Optimization (PSO). The results of proposed study are quite promising.

Keywords: clusters of microcalcifications, ductal carcinoma in situ, least-square support vector machine, particle swarm optimization

Procedia PDF Downloads 337
511 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 241
510 Motivating Factors to Use Electric Vehicles Based on Behavioral Intention Model in South Korea

Authors: Seyedsamad Tahani, Samira Ghorbanpour

Abstract:

The global warming crisis forced humans to consider their place in the world and the earth's future. In this regard, Electric Vehicles (EVs) are a significant step toward protecting the environment. By identifying factors that influence people's behavior intentions toward using Electric Vehicles (EV), we proposed a theoretical model by extending the Technology Acceptance Model (TAM), including three more concepts, Subjective Norm (SN), Self-Efficacy (SE), and Perceived Behavior Control (PBC). The study was conducted in South Korea, and a random sample was taken at a specific time. In order to collect data, a questionnaire was created in a Google Form and sent via Kakao Talk, a popular social media application used in Korea. There were about 220 participants in this survey. However, 201 surveys were completely done. The findings revealed that all factors in the TAM model and the other added concepts such as subjective norms, self-efficacy and perceived behavior control significantly affect the behavioral intention of using EVs.

Keywords: electric vehicles, behavioral intention, perceived trust, perceived enjoyment, self-efficacy

Procedia PDF Downloads 109
509 An Industrial Wastewater Management Using Cloud Based IoT System

Authors: Kaarthik K., Harshini S., Karthika M., Kripanandhini T.

Abstract:

Water is an essential part of living organisms. Major water pollution is caused due to contamination of industrial wastewater in the river. The most important step in bringing wastewater contaminants down to levels that are safe for nature is wastewater treatment. The contamination of river water harms both humans who consume it and the aquatic life that lives there. We introduce a new cloud-based industrial IoT paradigm in this work for real-time control and monitoring of wastewater. The proposed system prevents prohibited entry of industrial wastewater into the plant by monitoring temperature, hydrogen power (pH), CO₂ and turbidity factors from the wastewater input that the wastewater treatment facility will process. Real-time sensor values are collected and uploaded to the cloud by the system using an IoT Wi-Fi Module. By doing so, we can prevent the contamination of industrial wastewater entering the river earlier, and the necessary actions will be taken by the users. The proposed system's results are 90% efficient, preventing water pollution due to industry and protecting human lives.

Keywords: sensors, pH, CO₂, temperature, turbidity

Procedia PDF Downloads 84
508 Design and Analysis of Shielding Magnetic Field for Active Space Radiation Protection

Authors: Chaoyan Huang, Hongxia Zheng

Abstract:

For deep space exploration and long duration interplanetary manned missions, protection of astronauts from cosmic radiation is an unavoidable problem. However, passive shielding can be little effective for protecting particles which energies are greater than 1GeV/nucleon. In this study, active magnetic protection method is adopted. Taking into account the structure and size of the end-cap, eight shielding magnetic field configurations are designed based on the Hoffman configuration. The shielding effect of shielding magnetic field structure, intensity B and thickness L on H particles with 2GeV energy is compared by test particle simulation. The result shows that the shielding effect is better with the linear type magnetic field structure in the end-cap region. Furthermore, two magnetic field configurations with better shielding effect are investigated through H and He galactic cosmic spectra. And the shielding effect of the linear type configuration adopted in the barrel and end-cap regions is best.

Keywords: galactic cosmic rays, active protection, shielding magnetic field configuration, shielding effect

Procedia PDF Downloads 112
507 Islam, Tolerance and Anti-Terrorism: A Critical Assessment with Reference to the Royal 'Amman Message'

Authors: Adnan M. Al Assaf

Abstract:

This research project aims to assess the methods of enhancing tolerant thinking and behavior among Muslim societies. This is in addition to spreading the anti-terrorist approach in their communities. The critical assessment for the Islamic major texts in question is the selected way for convincing, as Muslims adopt these sources as the authentic references for their lives and cultures. Moreover, this research devotes a special room to the analysis of the royal ‘Amman Message’ as a contemporary Islamic approach for enhancing tolerance and anti-terrorism from an Islamic perspective. The paper includes the study of the related concepts, texts, practical applications, with some reference to the history of Islam in human interaction, accepting the others, mercy with minorities, protecting human rights. Furthermore, it assesses the methods of enhancing tolerance and minimizing the terrorist thinking and behavior practically, in the view of Amman message, as well.

Keywords: Islam, tolerance, anti-terrorism, coexistence, Amman Message

Procedia PDF Downloads 434
506 Users’ Information Disclosure Determinants in Social Networking Sites: A Systematic Literature Review

Authors: Wajdan Al Malwi, Karen Renaud, Lewis Mackenzie

Abstract:

The privacy paradox describes a phenomenon whereby there is no connection between stated privacy concerns and privacy behaviours. We need to understand the underlying reasons for this paradox if we are to help users to preserve their privacy more effectively. In particular, the Social Networking System (SNS) domain offers a rich area of investigation due to the risks of unwise information disclosure decisions. Our study thus aims to untangle the complicated nature and underlying mechanisms of online privacy-related decisions in SNSs. In this paper, we report on the findings of a Systematic Literature Review (SLR) that revealed a number of factors that are likely to influence online privacy decisions. Our deductive analysis approach was informed by Communicative Privacy Management (CPM) theory. We uncovered a lack of clarity around privacy attitudes and their link to behaviours, which makes it challenging to design privacy-protecting SNS platforms and to craft legislation to ensure that users’ privacy is preserved.

Keywords: privacy paradox, self-disclosure, privacy attitude, privacy behavior, social networking sites

Procedia PDF Downloads 134
505 A Socio-Technical Approach to Cyber-Risk Assessment

Authors: Kitty Kioskli, Nineta Polemi

Abstract:

Evaluating the levels of cyber-security risks within an enterprise is most important in protecting its information system, services and all its digital assets against security incidents (e.g. accidents, malicious acts, massive cyber-attacks). The existing risk assessment methodologies (e.g. eBIOS, OCTAVE, CRAMM, NIST-800) adopt a technical approach considering as attack factors only the capability, intention and target of the attacker, and not paying attention to the attacker’s psychological profile and personality traits. In this paper, a socio-technical approach is proposed in cyber risk assessment, in order to achieve more realistic risk estimates by considering the personality traits of the attackers. In particular, based upon principles from investigative psychology and behavioural science, a multi-dimensional, extended, quantifiable model for an attacker’s profile is developed, which becomes an additional factor in the cyber risk level calculation.

Keywords: attacker, behavioural models, cyber risk assessment, cybersecurity, human factors, investigative psychology, ISO27001, ISO27005

Procedia PDF Downloads 133
504 Capital Punishment: A Paradoxical Wrinkle to the Principles of Ethics and Morality

Authors: Pranav Vaidya

Abstract:

The recent upheaval of a ballot initiative taken place in California & Los Angeles‘s newspapers shows how the concept of giving Death Penalty obliterates the very soul basis of community and society which rests upon the tripod of values, ethics, and morality. This paper goes on with examining how, by giving death penalties we are, on one hand trying to wipe out those heinous offenders committing such unspeakable crimes against the public; while on the other hand it comes with a devastating effect of corroding and eluding the existence of ethics and morality which is in the very nature of “protecting the life of humankind”. As it can be stated that, by giving capital punishment, we are trying to legitimize an irreversible act of violence by the authority of state and target innocent victims because as long as the human justice is fallible, the risk of executing an innocent can never be eliminated. However, scholars in the legalization of Capital Punishment have argued that the courts should impose punishment befitting the crime so that they could reflect public abhorrence of the crime, create deterrent or rehabilitating effects & deliver the truest form of justice.

Keywords: ethics, heinous offenders, morality, unspeakable crimes

Procedia PDF Downloads 262
503 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 352
502 Supplementation of Fig Fruit (Ficus carica linn.) Extract in Extender on Sperm Motility and Viability of Native Chicken Semen after Cooling

Authors: N. Isnaini, S. Wahjuningsih

Abstract:

Fig fruit is the fruit of a tropical plant with content of flavanoids, vitamins A, C, and E which are antioxidants that effectively prevent and neutralize free radicals. This study was conducted to evaluate the supplementation of fig fruit extract in a physiological NaCl-based diluent on sperm motility and viability of native chicken semen after cooling. Semen was collected from 4 male mature chocks using massage method. Fresh semen evaluated for colour, pH, volume, concentration, mass motility, individual motility, life sperm and sperm abnormality. Semen was diluted with physiological NaCl-based extender supplemented with different levels of fig fruit extract (0, 10, 20 and 30 %) v/v with the ratio of 1 semen: 4 diluter. Semen used had mass motility of 2+ and motility of 70%. Immediately after dilution semen was stored in 3-5 °C and sperm motility and viability percentage were observed at 0, 12 and 24 h. The obtained data were analyze with Analysis of Variant (ANOVA) and Least Significant Difference were determined. The experiment was designed using completely random design (4 treatments and 10 replications). The results showed that the level of fig fruit extract had very significant effect (P < 0,01) on sperm motility and viability percentage in 0, 12 and 24 h of cooling. It can be concluded that the best fig fruit extract level for resulting optimal sperm motility and viability was 10%.

Keywords: chock, antioxidant, fig fruit extract, sperm

Procedia PDF Downloads 282
501 Association of MIR146A rs2910164 Variation with a Predisposition to Sporadic Breast Cancer in a Pakistani Cohort

Authors: Mushtaq Ahmad, Bashir Rahman, Taqweem-ul-Haq, Fazal Jalil, Aftab Ali Shah

Abstract:

Single nucleotide polymorphisms (SNPs) in genes coding for microRNAs (miRNAs) play a pivotal role in the progression of breast cancer (BC). We investigated the association of miR-146a rs2910164 G/C polymorphism with the risk of BC in the Pakistani population. The miR-146a rs2910164 polymorphism was genotyped in 300 BC-cases and 300 age- and gender-matched healthy controls using T-ARMS-PCR. Genotype and allele frequencies were calculated, and the association between genotypes and the risk of BC was calculated by odds ratios (OR) and confidence intervals (95%). A significant difference in genotypic frequencies (χ2=63.10; p ≤ 0.0001) and allelic frequencies (OR=0.3955 (0.3132-0.4993); p ≤ 0.0001) was observed between cases and controls. Furthermore, we also found that miR-146 rs2910164 CC homozygote increased the risk of breast cancer in the dominant (OR=0.2397 (0.1629-0.3526); p=0.0001; GG vs GC+CC) and recessive (OR=2.803 (1.865- 4.213); P ≤ 0.0001; CC vs GC+GG) inheritance models. In summary, miR-146a rs2910164 G/C is significantly associated with BC in the Pakistani population. To our knowledge, this is the first study that assessed MIR146a rs2910164 G > C SNP in Pakistani population. By analyzing the secondary structure of MIR146A variant, a significant structural modification was noted. Study with a larger sample size is needed to further confirm these findings.

Keywords: breast cancer, MIR146A, microRNA, SNP

Procedia PDF Downloads 114
500 Improved Processing Speed for Text Watermarking Algorithm in Color Images

Authors: Hamza A. Al-Sewadi, Akram N. A. Aldakari

Abstract:

Copyright protection and ownership proof of digital multimedia are achieved nowadays by digital watermarking techniques. A text watermarking algorithm for protecting the property rights and ownership judgment of color images is proposed in this paper. Embedding is achieved by inserting texts elements randomly into the color image as noise. The YIQ image processing model is found to be faster than other image processing methods, and hence, it is adopted for the embedding process. An optional choice of encrypting the text watermark before embedding is also suggested (in case required by some applications), where, the text can is encrypted using any enciphering technique adding more difficulty to hackers. Experiments resulted in embedding speed improvement of more than double the speed of other considered systems (such as least significant bit method, and separate color code methods), and a fairly acceptable level of peak signal to noise ratio (PSNR) with low mean square error values for watermarking purposes.

Keywords: steganography, watermarking, time complexity measurements, private keys

Procedia PDF Downloads 122
499 Planning and Implementing Large-Scale Ecological Connectivity: A Review of Past and Ongoing Practices in Turkey

Authors: Tutku Ak, A. Esra Cengiz, Çiğdem Ayhan Kaptan

Abstract:

The conservation community has been increasingly promoting the concept of ecological connectivity towards the prevention and mitigation of landscape fragmentation. Many tools have been proposed for this purpose in not only Europe, but also around the world. Spatial planning for building connectivity, however, has many problems associated with the complexity of ecological processes at spatial and temporal scales. Furthermore, on the ground implementation could be very difficult potentially leading to ecologically disastrous results and waste of resources. These problems, on the other hand, can be avoided or rectified as more experience is gained with implementation. Therefore, it is the objective of this study to document the experiences gained with connectivity planning in Turkish landscapes. This paper is a preliminary review of the conservation initiatives and projects aimed at protecting and building ecological connectivity in and around Turkey. The objective is to scope existing conservation plans, tools and implementation approaches in Turkey and the ultimate goal is to understand to what degree they have been implemented and what are the constraints and opportunities that are being faced.

Keywords: ecological connectivity, large-scale landscapes, planning and implementation, Turkey

Procedia PDF Downloads 476
498 A Multi Agent Based Protection Scheme for Smart Distribution Network in Presence of Distributed Energy Resources

Authors: M. R. Ebrahimi, B. Mahdaviani

Abstract:

Conventional electric distribution systems are radial in nature, supplied at one end through a main source. These networks generally have a simple protection system usually implemented using fuses, re-closers, and over-current relays. Recently, great attention has been paid to applying Distributed energy resources (DERs) throughout electric distribution systems. Presence of such generation in a network leads to losing coordination of protection devices. Therefore, it is desired to develop an algorithm which is capable of protecting distribution systems that include DER. On the other hand smart grid brings opportunities to the power system. Fast advancement in communication and measurement techniques accelerates the development of multi agent system (MAS). So in this paper, a new approach for the protection of distribution networks in the presence of DERs is presented base on MAS. The proposed scheme has been implemented on a sample 27-bus distribution network.

Keywords: distributed energy resource, distribution network, protection, smart grid, multi agent system

Procedia PDF Downloads 576
497 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 56
496 Awareness in the Code of Ethics for Nurse Educators among Nurse Educators, Nursing Students and Professional Nurses at the Royal Thai Army, Thailand

Authors: Wallapa Boonrod

Abstract:

Thai National Education Act 1999 required all educational institutions received external quality evaluation at least once every five years. The purpose of this study was to compare the awareness in the code of ethics for nurse educators among nurse educators, professional nurses, and nursing students under The Royal Thai Army Nurse College. The sample consisted of 51 of nurse educators 200 nursing students and 340 professional nurses from Army nursing college and hospital by stratified random sampling techniques. The descriptive statistics indicated that the nurse educators, nursing students and professional nurses had different levels of awareness in the 9 roles of nurse educators: Nurse, Reliable Sacrifice, Intelligence, Giver, Nursing Skills, Teaching Responsibility, Unbiased Care, Tie to Organization, and Role Model. The code of ethics for nurse educators (CENE) measurement models from the awareness of nurse educators, professional nurses, and nursing students were well fitted with the empirical data. The CENE models from them were invariant in forms, but variant in factor loadings. Thai Army nurse educators strive to create a learning environment that nurtures the highest nursing potential and standards in their nursing students.

Keywords: awareness of the code of ethics for nurse educators, nursing college and hospital under The Royal Thai Army, Thai Army nurse educators, professional nurses

Procedia PDF Downloads 426
495 The Proactive Approach of Digital Forensics Methodology against Targeted Attack Malware

Authors: Mohamed Fadzlee Sulaiman, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin

Abstract:

Each individual organization has their own mechanism to build up cyber defense capability in protecting their information infrastructures from data breaches and cyber espionage. But, we can not deny the possibility of failing to detect and stop cyber attacks especially for those targeting credential information and intellectual property (IP). In this paper, we would like to share the modern approach of effective digital forensic methodology in order to identify the artifacts in tracing the trails of evidence while mitigating the infection from the target machine/s. This proposed approach will suit the digital forensic investigation to be conducted while resuming the business critical operation after mitigating the infection and minimizing the risk from the identified attack to transpire. Therefore, traditional digital forensics methodology has to be improvised to be proactive which not only focusing to discover the root caused and the threat actor but to develop the relevant mitigation plan in order to prevent from the same attack.

Keywords: digital forensic, detection, eradication, targeted attack, malware

Procedia PDF Downloads 247
494 Molecular Detection and Characterization of Infectious Bronchitis Virus from Libya

Authors: Abdulwahab Kammon, Tan Sheau Wei, Abdul Rahman Omar, Abdunaser Dayhum, Ibrahim Eldghayes, Monier Sharif

Abstract:

Infectious bronchitis virus (IBV) is a very dynamic and evolving virus which causing major economic losses to the global poultry industry. Recently, the Libyan poultry industry faced severe outbreak of respiratory distress associated with high mortality and dramatic drop in egg production. Tracheal and cloacal swabs were analyzed for several poultry viruses. IBV was detected using SYBR Green I real-time PCR detection based on the nucleocapsid (N) gene. Sequence analysis of the partial N gene indicated high similarity (~ 94%) to IBV strain 3382/06 that was isolated from Taiwan. Even though the IBV strain 3382/06 is more similar to that of the Mass type H120, the isolate has been implicated associated with intertypic recombinant of 3 putative parental IBV strains namely H120, Taiwan strain 1171/92 and China strain CK/CH/LDL/97I. Complete sequencing and antigenicity studies of the Libya IBV strains are currently underway to determine the evolution of the virus and its importance in vaccine induced immunity. In this paper, we documented for the first time the presence of possibly variant IBV strain from Libya which required a dramatic change in the vaccination program.

Keywords: Libya, infectious bronchitis, molecular characterization, viruses, vaccine

Procedia PDF Downloads 445
493 Safe Limits Concentration of Ammonia at Work Environments through CD8 Expression in Rats

Authors: Abdul Rohim Tualeka, Erick Caravan K. Betekeneng, Ramdhoni Zuhro, Reko Triyono, M. Sahri

Abstract:

It has been widely reported incidence caused by acute and chronic effects of exposure to ammonia in the working environment in Indonesia, but ammonia concentration was found to be below the threshold value. The purpose of this study was to determine the safety limit concentration of ammonia in the working environment through the expression of CD8 as a reference for determining the threshold value of ammonia in the working environment. This research was a laboratory experimental with post test only control group design using experimental animals as subjects experiment. From homogeneity test results indicated that the weight of white rats exposed and control groups had a homogeneous variant with a significant level of p (0.701) > α (0.05). Description of the average breathing rate is 0.0013 m³/h. Average weight rats based group listed exposure is 0.1405 kg. From the calculation IRS CD8, CD8 highest score in the doses contained 0.0154, with the location of the highest dose of ammonia without any effect on the lungs of rats is 0.0154 mg/kg body weight of mice. Safe Human Dose (SHD) ammonia is 0.002 mg/kg body weight workers. The conclusion of this study is the safety limit concentration of ammonia gas in the working environment of 0,025 ppm.

Keywords: ammonia, CD8, rats, safe limits concentration

Procedia PDF Downloads 194
492 The Use of Voice in Online Public Access Catalog as Faster Searching Device

Authors: Maisyatus Suadaa Irfana, Nove Eka Variant Anna, Dyah Puspitasari Sri Rahayu

Abstract:

Technological developments provide convenience to all the people. Nowadays, the communication of human with the computer is done via text. With the development of technology, human and computer communications have been conducted with a voice like communication between human beings. It provides an easy facility for many people, especially those who have special needs. Voice search technology is applied in the search of book collections in the OPAC (Online Public Access Catalog), so library visitors will find it faster and easier to find books that they need. Integration with Google is needed to convert the voice into text. To optimize the time and the results of searching, Server will download all the book data that is available in the server database. Then, the data will be converted into JSON format. In addition, the incorporation of some algorithms is conducted including Decomposition (parse) in the form of array of JSON format, the index making, analyzer to the result. It aims to make the process of searching much faster than the usual searching in OPAC because the data are directly taken to the database for every search warrant. Data Update Menu is provided with the purpose to enable users perform their own data updates and get the latest data information.

Keywords: OPAC, voice, searching, faster

Procedia PDF Downloads 319
491 Analysis of Airborne Data Using Range Migration Algorithm for the Spotlight Mode of Synthetic Aperture Radar

Authors: Peter Joseph Basil Morris, Chhabi Nigam, S. Ramakrishnan, P. Radhakrishna

Abstract:

This paper brings out the analysis of the airborne Synthetic Aperture Radar (SAR) data using the Range Migration Algorithm (RMA) for the spotlight mode of operation. Unlike in polar format algorithm (PFA), space-variant defocusing and geometric distortion effects are mitigated in RMA since it does not assume that the illuminating wave-fronts are planar. This facilitates the use of RMA for imaging scenarios involving severe differential range curvatures enabling the imaging of larger scenes at fine resolution and at shorter ranges with low center frequencies. The RMA algorithm for the spotlight mode of SAR is analyzed in this paper using the airborne data. Pre-processing operations viz: - range de-skew and motion compensation to a line are performed on the raw data before being fed to the RMA component. Various stages of the RMA viz:- 2D Matched Filtering, Along Track Fourier Transform and Slot Interpolation are analyzed to find the performance limits and the dependence of the imaging geometry on the resolution of the final image. The ability of RMA to compensate for severe differential range curvatures in the two-dimensional spatial frequency domain are also illustrated in this paper.

Keywords: range migration algorithm, spotlight SAR, synthetic aperture radar, matched filtering, slot interpolation

Procedia PDF Downloads 216
490 Measurement of the Dynamic Modulus of Elasticity of Cylindrical Concrete Specimens Used for the Cyclic Indirect Tensile Test

Authors: Paul G. Bolz, Paul G. Lindner, Frohmut Wellner, Christian Schulze, Joern Huebelt

Abstract:

Concrete, as a result of its use as a construction material, is not only subject to static loads but is also exposed to variables, time-variant, and oscillating stresses. In order to ensure the suitability of construction materials for resisting these cyclic stresses, different test methods are used for the systematic fatiguing of specimens, like the cyclic indirect tensile test. A procedure is presented that allows the estimation of the degradation of cylindrical concrete specimens during the cyclic indirect tensile test by measuring the dynamic modulus of elasticity in different states of the specimens’ fatigue process. Two methods are used in addition to the cyclic indirect tensile test in order to examine the dynamic modulus of elasticity of cylindrical concrete specimens. One of the methods is based on the analysis of eigenfrequencies, whilst the other one uses ultrasonic pulse measurements to estimate the material properties. A comparison between the dynamic moduli obtained using the three methods that operate in different frequency ranges shows good agreement. The concrete specimens’ fatigue process can therefore be monitored effectively and reliably.

Keywords: concrete, cyclic indirect tensile test, degradation, dynamic modulus of elasticity, eigenfrequency, fatigue, natural frequency, ultrasonic, ultrasound, Young’s modulus

Procedia PDF Downloads 148
489 Linear Semi Active Controller of Magneto-Rheological Damper for Seismic Vibration Attenuation

Authors: Zizouni Khaled, Fali Leyla, Sadek Younes, Bousserhane Ismail Khalil

Abstract:

In structural vibration caused principally by an earthquake excitation, the most vibration’s attenuation system used recently is the semi active control with a Magneto Rheological Damper device. This control was a subject of many researches and works in the last years. The big challenges of searchers in this case is to propose an adequate controller with a robust algorithm of current or tension adjustment. In this present paper, a linear controller is proposed to control the MR damper using to reduce a vibrations of three story structure exposed to El Centro’s 1940 and Boumerdès 2003 earthquakes. In this example, the MR damper is installed in the first floor of the structure. The numerical simulations results of the proposed linear control with a feedback law based on clipped optimal algorithm showed the feasibility of the semi active control to protecting civil structures. The comparison of the controlled structure and uncontrolled structures responses illustrate clearly the performance and the effectiveness of the simple proposed approach.

Keywords: MR damper, seismic vibration, semi-active control

Procedia PDF Downloads 261
488 Profitability Assessment of Granite Aggregate Production and the Development of a Profit Assessment Model

Authors: Melodi Mbuyi Mata, Blessing Olamide Taiwo, Afolabi Ayodele David

Abstract:

The purpose of this research is to create empirical models for assessing the profitability of granite aggregate production in Akure, Ondo state aggregate quarries. In addition, an artificial neural network (ANN) model and multivariate predicting models for granite profitability were developed in the study. A formal survey questionnaire was used to collect data for the study. The data extracted from the case study mine for this study includes granite marketing operations, royalty, production costs, and mine production information. The following methods were used to achieve the goal of this study: descriptive statistics, MATLAB 2017, and SPSS16.0 software in analyzing and modeling the data collected from granite traders in the study areas. The ANN and Multi Variant Regression models' prediction accuracy was compared using a coefficient of determination (R²), Root mean square error (RMSE), and mean square error (MSE). Due to the high prediction error, the model evaluation indices revealed that the ANN model was suitable for predicting generated profit in a typical quarry. More quarries in Nigeria's southwest region and other geopolitical zones should be considered to improve ANN prediction accuracy.

Keywords: national development, granite, profitability assessment, ANN models

Procedia PDF Downloads 76
487 A Four-Year Study of Thyroid Carcinoma in Hail Region: Increased Incidence

Authors: Laila Seada, Hanan Oreiby, Fawaz Al Rashid, Ashraf Negm

Abstract:

Background and Objective: In most areas of the world, the incidence of thyroid cancer has been increasing over the last decade, mostly due to a combination of early detection of the neoplasm resulting from sensitive procedures and increased population exposure to radiation and unrecognized carcinogens. Methods: Cases of thyroid cancer have been retrieved from the cancer registry at King Khalid Hospital during the period from August 2012 to April 2016. Age, gender and histopathologic types have been recorded. Results: Thyroid carcinoma ranked as the second most common malignancy in females (25%) after breast cancer (31%). It constituted 20.8% of all newly diagnosed cancer cases. As for males, it ranked the 4th type of malignancy after gastrointestinal cancer, lymphomas and soft tissue sarcomas. Mean age for females and males was 38.7 +/- 13.2 and 60.25 +/- 11.5 years, respectively, and the difference between the two groups was statistically significant (p value = 0.0001). Fifty-five (82%) were papillary carcinomas including 10 follicular variant of papillary (FVPC), and eight papillary micro carcinomas (PMC) and two tall cell/oncocytic variants. Follicular carcinomas constituted two (3.1%), while two (3.1%) were anaplastic, and two (3.1%) were medullary. Conclusion: Thyroid cancer incidence in Hail is ranking as the 2nd most common female malignancy similar to other regions in the Kingdom. However, this high incidence contrasts with much lower rates worldwide.

Keywords: thyroid, hail, papillary, microcarcinoma

Procedia PDF Downloads 285
486 Experimental Measurements for the Effect of Dilution Procedure in Blood Esterases as Animals Biomarker for Exposure to Organophosphate Compounds

Authors: Kasim Sakran Abass

Abstract:

This main aim of this study was to confirm and extend our current knowledge about the effects of dilutions on esterases activities in the blood for birds with respect to protecting the enzyme from organophosphate inhibition. There were significantly higher esterases activities in dilution 1:10 in all blood samples from quail, duck, and chick compared to other dilutions (1:5, 1:15, 1:20, and 1:25). Furthermore, our results also pointed to the importance of estimating different dilutions effects prior to using in birds as biomarker tools of environmental exposure. Concentration–inhibition curves were determined for the inhibitor in the presence of dilutions 1:5, 1:10 plus 1:15 (to stimulate carboxylesterase). Point estimates (concentrations calculated to produce 20, 50, and 80% inhibition) were compared across conditions and served as a measure of esterase-mediated detoxification. Among the thiol esters (dilution 1:5) was observed to have the highest specificity constant (kcat/Km), and the Km and kcat values were 176 μM and 16,765 s−1, respectively for S-phenyl thioacetate ester, while detected in (dilution 1:15) the lowest specificity constant (kcat/Km), and the Km and kcat values were 943 μM and 1154 s−1, respectively for acetylthiocholine iodide ester.

Keywords: esterase, animal, dilution, pesticides

Procedia PDF Downloads 503
485 Use of Remote Sensing for Seasonal and Temporal Monitoring in Wetlands: A Case Study of Akyatan Lagoon

Authors: A. Cilek, S. Berberoglu, A. Akin Tanriover, C. Donmez

Abstract:

Wetlands are the areas which have important effects and functions on protecting human life, adjust to nature, and biological variety, besides being potential exploitation sources. Observing the changes in these sensitive areas is important to study for data collecting and correct planning for the future. Remote sensing and Geographic Information System are being increasingly used for environmental studies such as biotope mapping and habitat monitoring. Akyatan Lagoon, one of the most important wetlands in Turkey, has been facing serious threats from agricultural applications in recent years. In this study, seasonal and temporal monitoring in wetlands system are determined by using remotely sensed data and Geographic Information Systems (GIS) between 1985 and 2015. The research method is based on classifying and mapping biotopes in the study area. The natural biotope types were determined as coastal sand dunes, salt marshes, river beds, coastal woods, lakes, lagoons.

Keywords: biotope mapping, GIS, remote sensing, wetlands

Procedia PDF Downloads 367
484 Pharmacogenetic Analysis of Inter-Ethnic Variability in the Uptake Transporter SLCO1B1 Gene in Colombian, Mozambican, and Portuguese Populations

Authors: Mulata Haile Nega, Derebew Fikadu Berhe, Vera Ribeiro Marques

Abstract:

There is no epidemiologic data on this gene polymorphism in several countries. Therefore, this study aimed to assess the genotype and allele frequencies of the gene variant in three countries. This study involved healthy individuals from Colombia, Mozambique, and Portugal. Genomic DNA was isolated from blood samples using the Qiamp DNA Extraction Kit (Qiagen). The isolated DNA was genotyped using Polymerase Chain Reaction (PCR) - Restriction Fragment Length Polymorphism. Microstat and GraphPad quick cal software were used for the Chi-square test and evaluation of Hardy-Weinberg equilibrium, respectively. A total of 181 individuals’ blood sample was analyzed. Overall, TT (74.0%) genotype was the highest, and CC (7.8%) was the lowest. Country wise genotypic frequencies were Colombia 47(70.2%) TT, 12(17.9%) TC and 8(11.9%) CC; Mozambique 47(88.7%) TT, 5(9.4%) TC, and 1(1.9%) CC; and Portugal 40(65.6%) TT, 16(26.2%) TC, and 5(8.2%) CC. The reference (T) allele was highest among Mozambicans (93.4%) compared to Colombians (79.1%) and Portuguese (78.7%). Mozambicans showed statistically significant genotypic and allelic frequency differences compared to Colombians (p<0.01) and Portuguese (p <0.01). Overall and country-wise, the CC genotype was less frequent and relatively high for Colombians and Portuguese populations. This finding may imply statins risk-benefit variability associated with CC genotype among these populations that needs further understanding.

Keywords: c.521T>C, polymorphism, SLCO1B1, SNP, statins

Procedia PDF Downloads 102
483 Lessons Learnt from Industry: Achieving Net Gain Outcomes for Biodiversity

Authors: Julia Baker

Abstract:

Development plays a major role in stopping biodiversity loss. But the ‘silo species’ protection of legislation (where certain species are protected while many are not) means that development can be ‘legally compliant’ and result in biodiversity loss. ‘Net Gain’ (NG) policies can help overcome this by making it an absolute requirement that development causes no overall loss of biodiversity and brings a benefit. However, offsetting biodiversity losses in one location with gains elsewhere is controversial because people suspect ‘offsetting’ to be an easy way for developers to buy their way out of conservation requirements. Yet the good practice principles (GPP) of offsetting provide several advantages over existing legislation for protecting biodiversity from development. This presentation describes the learning from implementing NG approaches based on GPP. It regards major upgrades of the UK’s transport networks, which involved removing vegetation in order to construct and safely operate new infrastructure. While low-lying habitats were retained, trees and other habitats disrupting the running or safety of transport networks could not. Consequently, achieving NG within the transport corridor was not possible and offsetting was required. The first ‘lessons learnt’ were on obtaining a commitment from business leaders to go beyond legislative requirements and deliver NG, and on the institutional change necessary to embed GPP within daily operations. These issues can only be addressed when the challenges that biodiversity poses for business are overcome. These challenges included: biodiversity cannot be measured easily unlike other sustainability factors like carbon and water that have metrics for target-setting and measuring progress; and, the mindset that biodiversity costs money and does not generate cash in return, which is the opposite of carbon or waste for example, where people can see how ‘sustainability’ actions save money. The challenges were overcome by presenting the GPP of NG as a cost-efficient solution to specific, critical risks facing the business that also boost industry recognition, and by using government-issued NG metrics to develop business-specific toolkits charting their NG progress whilst ensuring that NG decision-making was based on rich ecological data. An institutional change was best achieved by supporting, mentoring and training sustainability/environmental managers for these ‘frontline’ staff to embed GPP within the business. The second learning was from implementing the GPP where business partnered with local governments, wildlife groups and land owners to support their priorities for nature conservation, and where these partners had a say in decisions about where and how best to achieve NG. From this inclusive approach, offsetting contributed towards conservation priorities when all collaborated to manage trade-offs between: -Delivering ecologically equivalent offsets or compensating for losses of one type of biodiversity by providing another. -Achieving NG locally to the development whilst contributing towards national conservation priorities through landscape-level planning. -Not just protecting the extent and condition of existing biodiversity but ‘doing more’. -The multi-sector collaborations identified practical, workable solutions to ‘in perpetuity’. But key was strengthening linkages between biodiversity measures implemented for development and conservation work undertaken by local organizations so that developers support NG initiatives that really count.

Keywords: biodiversity offsetting, development, nature conservation planning, net gain

Procedia PDF Downloads 169