Search results for: transient ischaemic attack
932 Theoretical Evaluation of Oxirane and Aziridine Opening Regioselectivity, Solvent Effect, and Strength of Nucleophilic and Nucleofugal Groups for the Preparation of Benzimidazole-Fused 1,4-Benzoxazepine
Authors: M. Abdoul-Hakim, a. Zeroual, H. Garmes
Abstract:
In a route for the preparation of 1,4-benzoxazepine fused to benzimidazole, the use of 2-(2-methoxyphenyl)-benzimidazole or styrene-derived N-tosylaziridine does not give the desired products. On this basis, we theoretically studied this reaction using DFT at the B3LYP/6-31+G(d) level. The analysis of the results shows a preferential nucleophilic attack of 2-(2-fluorophenyl)-benzimidazole on the terminal carbon atom of the Alkylepoxides and on the substituted carbon of N-tosylaziridine. Taking into account the solvent effect (DMF) makes the reactions spontaneous for the opening of epoxides and N-tosylaziridine and disfavors the intramolecularnucleophilic aromatic substitution reaction step of the products of the attack of 2-(2-methoxyphenyl)benzimidazole on an epoxide and those of the opening of N-tosylaziridine, which is consistent with the experiment.Keywords: alkylepoxides, 4-benzoxazepine fused to benzimidazole imine, benzonitrile N-oxide, DFT, intramolecular nucleophilic aromatic substitution, N-tosyl aziridine
Procedia PDF Downloads 142931 Molecular Farming: Plants Producing Vaccine and Diagnostic Reagent
Authors: Katerina H. Takova, Ivan N. Minkov, Gergana G. Zahmanova
Abstract:
Molecular farming is the production of recombinant proteins in plants with the aim to use the protein as a purified product, crude extract or directly in the planta. Plants gain more attention as expression systems compared to other ones due to the cost effective production of pharmaceutically important proteins, appropriate post-translational modifications, assembly of complex proteins, absence of human pathogens to name a few. In addition, transient expression in plant leaves enables production of recombinant proteins within few weeks. Hepatitis E virus (HEV) is a causative agent of acute hepatitis. HEV causes epidemics in developing countries and is primarily transmitted through the fecal-oral route. Presently, all efforts for development of Hepatitis E vaccine are focused on the Open Read Frame 2 (ORF2) capsid protein as it contains epitopes that can induce neutralizing antibodies. For our purpose, we used the CMPV-based vector-pEAQ-HT for transient expression of HEV ORF2 in Nicotiana benthamina. Different molecular analysis (Western blot and ELISA) showed that HEV ORF2 capsid protein was expressed in plant tissue in high-yield up to 1g/kg of fresh leaf tissue. Electron microscopy showed that the capsid protein spontaneously assembled in low abundance virus-like particles (VLPs), which are highly immunogenic structures and suitable for vaccine development. The expressed protein was recognized by both human and swine HEV positive sera and can be used as a diagnostic reagent for the detection of HEV infection. Production of HEV capsid protein in plants is a promising technology for further HEV vaccine investigations. Here, we reported for a rapid high-yield transient expression of a recombinant protein in plants suitable for vaccine production as well as a diagnostic reagent. Acknowledgments -The authors’ research on HEV is supported with grants from the Project PlantaSYST under the Widening Program, H2020 as well as under the UK Biotechnological and Biological Sciences Research Council (BBSRC) Institute Strategic Programme Grant ‘Understanding and Exploiting Plant and Microbial Secondary Metabolism’ (BB/J004596/1). The authors want to thank Prof. George Lomonossoff (JIC, Norwich, UK) for his contribution.Keywords: hepatitis E virus, plant molecular farming, transient expression, vaccines
Procedia PDF Downloads 151930 Transient Free Laminar Convection in the Vicinity of a Thermal Conductive Vertical Plate
Authors: Anna Bykalyuk, Frédéric Kuznik, Kévyn Johannes
Abstract:
In this paper, the influence of a vertical plate’s thermal capacity is numerically investigated in order to evaluate the evolution of the thermal boundary layer structure, as well as the convective heat transfer coefficient and the velocity and temperature profiles. Whereas the heat flux of the heated vertical plate is evaluated under time depending boundary conditions. The main important feature of this problem is the unsteadiness of the physical phenomena. A 2D CFD model is developed with the Ansys Fluent 14.0 environment and is validated using unsteady data obtained for plasterboard studied under a dynamic temperature evolution. All the phenomena produced in the vicinity of the thermal conductive vertical plate (plasterboard) are analyzed and discussed. This work is the first stage of a holistic research on transient free convection that aims, in the future, to study the natural convection in the vicinity of a vertical plate containing Phase Change Materials (PCM).Keywords: CFD modeling, natural convection, thermal conductive plate, time-depending boundary conditions
Procedia PDF Downloads 277929 Introduction to Two Artificial Boundary Conditions for Transient Seepage Problems and Their Application in Geotechnical Engineering
Authors: Shuang Luo, Er-Xiang Song
Abstract:
Many problems in geotechnical engineering, such as foundation deformation, groundwater seepage, seismic wave propagation and geothermal transfer problems, may involve analysis in the ground which can be seen as extending to infinity. To that end, consideration has to be given regarding how to deal with the unbounded domain to be analyzed by using numerical methods, such as finite element method (FEM), finite difference method (FDM) or finite volume method (FVM). A simple artificial boundary approach derived from the analytical solutions for transient radial seepage problems, is introduced. It should be noted, however, that the analytical solutions used to derive the artificial boundary are particular solutions under certain boundary conditions, such as constant hydraulic head at the origin or constant pumping rate of the well. When dealing with unbounded domains with unsteady boundary conditions, a more sophisticated artificial boundary approach to deal with the infinity of the domain is presented. By applying Laplace transforms and introducing some specially defined auxiliary variables, the global artificial boundary conditions (ABCs) are simplified to local ones so that the computational efficiency is enhanced significantly. The introduced two local ABCs are implemented in a finite element computer program so that various seepage problems can be calculated. The two approaches are first verified by the computation of a one-dimensional radial flow problem, and then tentatively applied to more general two-dimensional cylindrical problems and plane problems. Numerical calculations show that the local ABCs can not only give good results for one-dimensional axisymmetric transient flow, but also applicable for more general problems, such as axisymmetric two-dimensional cylindrical problems, and even more general planar two-dimensional flow problems for well doublet and well groups. An important advantage of the latter local boundary is its applicability for seepage under rapidly changing unsteady boundary conditions, and even the computational results on the truncated boundary are usually quite satisfactory. In this aspect, it is superior over the former local boundary. Simulation of relatively long operational time demonstrates to certain extents the numerical stability of the local boundary. The solutions of the two local ABCs are compared with each other and with those obtained by using large element mesh, which proves the satisfactory performance and obvious superiority over the large mesh model.Keywords: transient seepage, unbounded domain, artificial boundary condition, numerical simulation
Procedia PDF Downloads 294928 Acid Attack on Cement Mortars Modified with Rubber Aggregates and EVA Polymer Binder
Authors: Konstantinos Sotiriadis, Michael Tupý, Nikol Žižková, Vít Petránek
Abstract:
The acid attack on cement mortars modified with rubber aggregates and EVA polymer binder was studied. Mortar specimens were prepared using a type CEM I 42.5 Portland cement and siliceous sand, as well as by substituting 25% of sand with shredded used automobile tires, and by adding EVA polymer in two percentages (5% and 10% of cement mass). Some specimens were only air cured, at laboratory conditions, and their compressive strength and water absorption were determined. The rest specimens were stored in acid solutions (HCl, H2SO4, HNO3) after 28 days of initial curing, and stored at laboratory temperature. Compressive strength tests, mass measurements and visual inspection took place for 28 days. Compressive strength and water absorption of the air-cured specimens were significantly decreased when rubber aggregates are used. The addition of EVA polymer further reduced water absorption, while had no important impact on strength. Compressive strength values were affected in a greater extent by hydrochloric acid solution, followed by sulfate and nitric acid solutions. The addition of EVA polymer decreased compressive strength loss for the specimens with rubber aggregates stored in hydrochloric and nitric acid solutions. The specimens without polymer binder showed similar mass loss, which was higher in sulfate acid solution followed by hydrochloric and nitric acid solutions. The use of EVA polymer delayed mass loss, while its content did not affect it significantly.Keywords: acid attack, mortar, EVA polymer, rubber aggregates
Procedia PDF Downloads 287927 Development of 35kV SF6 Phase-Control Circuit Breaker Equipped with EFDA
Authors: Duanlei Yuan, Guangchao Yan, Zhanqing Chen, Xian Cheng
Abstract:
This paper mainly focuses on the problem that high voltage circuit breaker’s closing and opening operation at random phase brings harmful electromagnetic transient effects on the power system. To repress the negative transient effects, a 35 kV SF6 phase-control circuit breaker equipped with electromagnetic force driving actuator is designed in this paper. Based on the constructed mathematical and structural models, the static magnetic field distribution and dynamic properties of the under loading actuator are simulated. The prototype of 35 kV SF6 phase-control circuit breaker is developed based on theories analysis and simulation. Tests are carried on to verify the operating reliability of the prototype. The developed circuit breaker can control its operating speed intelligently and switches with phase selection. Results of the tests and simulation prove that the phase-control circuit breaker is feasible for industrial applications.Keywords: phase-control, circuit breaker, electromagnetic force driving actuator, tests and simulation
Procedia PDF Downloads 396926 Effects of Daily Temperature Changes on Transient Heat and Moisture Transport in Unsaturated Soils
Authors: Davood Yazdani Cherati, Ali Pak, Mehrdad Jafarzadeh
Abstract:
This research contains the formulation of a two-dimensional analytical solution to transient heat, and moisture flow in a semi-infinite unsaturated soil environment under the influence of daily temperature changes. For this purpose, coupled energy conservation and mass fluid continuity equations governing hydrothermal behavior of unsaturated soil media are presented in terms of temperature and volumetric moisture content. In consideration of the soil environment as an infinite half-space and by linearization of the governing equations, Laplace–Fourier transformation is conducted to convert differential equations with partial derivatives (PDEs) to ordinary differential equations (ODEs). The obtained ODEs are solved, and the inverse transformations are calculated to determine the solution to the system of equations. Results indicate that heat variation induces moisture transport in both horizontal and vertical directions.Keywords: analytical solution, heat conduction, hydrothermal analysis, laplace–fourier transformation, two-dimensional
Procedia PDF Downloads 216925 Survival Chances and Costs after Heart Attacks: An Instrumental Variable Approach
Authors: Alice Sanwald, Thomas Schober
Abstract:
We analyze mortality and follow-up costs of heart attack patients using administrative data from Austria (2002-2011). As treatment intensity in a hospital largely depends on whether it has a catheterization laboratory, we focus on the effects of patients' initial admission to these specialized hospitals. To account for the nonrandom selection of patients into hospitals, we exploit individuals' place of residence as a source of exogenous variation in an instrumental variable framework. We find that the initial admission to specialized hospitals increases patients' survival chances substantially. The effect on 3-year mortality is -9.5 percentage points. A separation of the sample into subgroups shows the strongest effects in relative terms for patients below the age of 65. We do not find significant effects on longterm inpatient costs and find only marginal increases in outpatient costs.Keywords: acute myocardial infarction, mortality, costs, instrumental variables, heart attack
Procedia PDF Downloads 436924 When the Lights Go Down in the Delivery Room: Lessons From a Ransomware Attack
Authors: Rinat Gabbay-Benziv, Merav Ben-Natan, Ariel Roguin, Benyamine Abbou, Anna Ofir, Adi Klein, Dikla Dahan-Shriki, Mordechai Hallak, Boris Kessel, Mickey Dudkiewicz
Abstract:
Introduction: Over recent decades, technology has become integral to healthcare, with electronic health records and advanced medical equipment now standard. However, this reliance has made healthcare systems increasingly vulnerable to ransomware attacks. On October 13, 2021, Hillel Yaffe Medical Center experienced a severe ransomware attack that disrupted all IT systems, including electronic health records, laboratory services, and staff communications. The attack, carried out by the group DeepBlueMagic, utilized advanced encryption to lock the hospital's systems and demanded a ransom. This incident caused significant operational and patient care challenges, particularly impacting the obstetrics department. Objective: The objective is to describe the challenges facing the obstetric division following a cyberattack and discuss ways of preparing for and overcoming another one. Methods: A retrospective descriptive study was conducted in a mid-sized medical center. Division activities, including the number of deliveries, cesarean sections, emergency room visits, admissions, maternal-fetal medicine department occupancy, and ambulatory encounters, from 2 weeks before the attack to 8 weeks following it (a total of 11 weeks), were compared with the retrospective period in 2019 (pre-COVID-19). In addition, we present the challenges and adaptation measures taken at the division and hospital levels leading up to the resumption of full division activity. Results: On the day of the cyberattack, critical decisions were made. The media announced the event, calling on patients not to come to our hospital. Also, all elective activities other than cesarean deliveries were stopped. The number of deliveries, admissions, and both emergency room and ambulatory clinic visits decreased by 5%–10% overall for 11 weeks, reflecting the decrease in division activity. Nevertheless, in all stations, there were sufficient activities and adaptation measures to ensure patient safety, decision-making, and workflow of patients were accounted for. Conclusions: The risk of ransomware cyberattacks is growing. Healthcare systems at all levels should recognize this threat and have protocols for dealing with them once they occur.Keywords: ransomware attack, healthcare cybersecurity, obstetrics challenges, IT system disruption
Procedia PDF Downloads 24923 Fluid–Structure Interaction Modeling of Wind Turbines
Authors: Andre F. A. Cyrino
Abstract:
Knowing that the technological advance is the focus on the efficient extraction of energy from wind, and therefore in the design of wind turbine structures, this work aims the study of the fluid-structure interaction of an idealized wind turbine. The blade was studied as a beam attached to a cylindrical Hub with rotation axis pointing the air flow that passes through the rotor. Using the calculus of variations and the finite difference method the blade will be simulated by a discrete number of nodes and the aerodynamic forces were evaluated. The study presented here was written on Matlab and performs a numeric simulation of a simplified model of windmill containing a Hub and three blades modeled as Euler-Bernoulli beams for small strains and under the constant and uniform wind. The mathematical approach is done by Hamilton’s Extended Principle with the aerodynamic loads applied on the nodes considering the local relative wind speed, angle of attack and aerodynamic lift and drag coefficients. Due to the wide range of angles of attack, a wind turbine blade operates, the airfoil used on the model was NREL SERI S809 which allowed obtaining equations for Cl and Cd as functions of the angle of attack, based on a NASA study. Tridimensional flow effects were no taken in part, as well as torsion of the beam, which only bends. The results showed the dynamic response of the system in terms of displacement and rotational speed as the turbine reached the final speed. Although the results were not compared to real windmills or more complete models, the resulting values were consistent with the size of the system and wind speed.Keywords: blade aerodynamics, fluid–structure interaction, wind turbine aerodynamics, wind turbine blade
Procedia PDF Downloads 268922 Prediction of Welding Induced Distortion in Thin Metal Plates Using Temperature Dependent Material Properties and FEA
Authors: Rehan Waheed, Abdul Shakoor
Abstract:
Distortion produced during welding of thin metal plates is a problem in many industries. The purpose of this research was to study distortion produced during welding in 2mm Mild Steel plate by simulating the welding process using Finite Element Analysis. Simulation of welding process requires a couple field transient analyses. At first a transient thermal analysis is performed and the temperature obtained from thermal analysis is used as input in structural analysis to find distortion. An actual weld sample is prepared and the weld distortion produced is measured. The simulated and actual results were in quite agreement with each other and it has been found that there is profound deflection at center of plate. Temperature dependent material properties play significant role in prediction of weld distortion. The results of this research can be used for prediction and control of weld distortion in large steel structures by changing different weld parameters.Keywords: welding simulation, FEA, welding distortion, temperature dependent mechanical properties
Procedia PDF Downloads 390921 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 345920 Analyzing Electromagnetic and Geometric Characterization of Building Insulation Materials Using the Transient Radar Method (TRM)
Authors: Ali Pourkazemi
Abstract:
The transient radar method (TRM) is one of the non-destructive methods that was introduced by authors a few years ago. The transient radar method can be classified as a wave-based non destructive testing (NDT) method that can be used in a wide frequency range. Nevertheless, it requires a narrow band, ranging from a few GHz to a few THz, depending on the application. As a time-of-flight and real-time method, TRM can measure the electromagnetic properties of the sample under test not only quickly and accurately, but also blindly. This means that it requires no prior knowledge of the sample under test. For multi-layer structures, TRM is not only able to detect changes related to any parameter within the multi-layer structure but can also measure the electromagnetic properties of each layer and its thickness individually. Although the temperature, humidity, and general environmental conditions may affect the sample under test, they do not affect the accuracy of the Blind TRM algorithm. In this paper, the electromagnetic properties as well as the thickness of the individual building insulation materials - as a single-layer structure - are measured experimentally. Finally, the correlation between the reflection coefficients and some other technical parameters such as sound insulation, thermal resistance, thermal conductivity, compressive strength, and density is investigated. The sample to be studied is 30 cm x 50 cm and the thickness of the samples varies from a few millimeters to 6 centimeters. This experiment is performed with both biostatic and differential hardware at 10 GHz. Since it is a narrow-band system, high-speed computation for analysis, free-space application, and real-time sensor, it has a wide range of potential applications, e.g., in the construction industry, rubber industry, piping industry, wind energy industry, automotive industry, biotechnology, food industry, pharmaceuticals, etc. Detection of metallic, plastic pipes wires, etc. through or behind the walls are specific applications for the construction industry.Keywords: transient radar method, blind electromagnetic geometrical parameter extraction technique, ultrafast nondestructive multilayer dielectric structure characterization, electronic measurement systems, illumination, data acquisition performance, submillimeter depth resolution, time-dependent reflected electromagnetic signal blind analysis method, EM signal blind analysis method, time domain reflectometer, microwave, milimeter wave frequencies
Procedia PDF Downloads 69919 Transient Simulation Using SPACE for ATLAS Facility to Investigate the Effect of Heat Loss on Major Parameters
Authors: Suhib A. Abu-Seini, Kyung-Doo Kim
Abstract:
A heat loss model for ATLAS facility was introduced using SPACE code predefined correlations and various dialing factors. As all previous simulations were carried out using a heat loss free input; the facility was considered to be completely insulated and the core power was reduced by the experimentally measured values of heat loss to compensate to the account for the loss of heat, this study will consider heat loss throughout the simulation. The new heat loss model will be affecting SPACE code simulation as heat being leaked out of the system throughout a transient will alter many parameters corresponding to temperature and temperature difference. For that, a Station Blackout followed by a multiple Steam Generator Tube Rupture accident will be simulated using both the insulated system approach and the newly introduced heat loss input of the steady state. Major parameters such as system temperatures, pressure values, and flow rates to be put into comparison and various analysis will be suggested upon it as the experimental values will not be the reference to validate the expected outcome. This study will not only show the significance of heat loss consideration in the processes of prevention and mitigation of various incidents, design basis and beyond accidents as it will give a detailed behavior of ATLAS facility during both processes of steady state and major transient, but will also present a verification of how credible the data acquired of ATLAS are; since heat loss values for steady state were already mismatched between SPACE simulation results and ATLAS data acquiring system. Acknowledgement- This work was supported by the Korean institute of Energy Technology Evaluation and Planning (KETEP) and the Ministry of Trade, Industry & Energy (MOTIE) of the Republic of Korea.Keywords: ATLAS, heat loss, simulation, SPACE, station blackout, steam generator tube rupture, verification
Procedia PDF Downloads 224918 Effects of Prescribed Surface Perturbation on NACA 0012 at Low Reynolds Number
Authors: Diego F. Camacho, Cristian J. Mejia, Carlos Duque-Daza
Abstract:
The recent widespread use of Unmanned Aerial Vehicles (UAVs) has fueled a renewed interest in efficiency and performance of airfoils, particularly for applications at low and moderate Reynolds numbers, typical of this kind of vehicles. Most of previous efforts in the aeronautical industry, regarding aerodynamic efficiency, had been focused on high Reynolds numbers applications, typical of commercial airliners and large size aircrafts. However, in order to increase the levels of efficiency and to boost the performance of these UAV, it is necessary to explore new alternatives in terms of airfoil design and application of drag reduction techniques. The objective of the present work is to carry out the analysis and comparison of performance levels between a standard NACA0012 profile against another one featuring a wall protuberance or surface perturbation. A computational model, based on the finite volume method, is employed to evaluate the effect of the presence of geometrical distortions on the wall. The performance evaluation is achieved in terms of variations of drag and lift coefficients for the given profile. In particular, the aerodynamic performance of the new design, i.e. the airfoil with a surface perturbation, is examined under conditions of incompressible and subsonic flow in transient state. The perturbation considered is a shaped protrusion prescribed as a small surface deformation on the top wall of the aerodynamic profile. The ultimate goal by including such a controlled smooth artificial roughness was to alter the turbulent boundary layer. It is shown in the present work that such a modification has a dramatic impact on the aerodynamic characteristics of the airfoil, and if properly adjusted, in a positive way. The computational model was implemented using the unstructured, FVM-based open source C++ platform OpenFOAM. A number of numerical experiments were carried out at Reynolds number 5x104, based on the length of the chord and the free-stream velocity, and angles of attack 6° and 12°. A Large Eddy Simulation (LES) approach was used, together with the dynamic Smagorinsky approach as subgrid scale (SGS) model, in order to account for the effect of the small turbulent scales. The impact of the surface perturbation on the performance of the airfoil is judged in terms of changes in the drag and lift coefficients, as well as in terms of alterations of the main characteristics of the turbulent boundary layer on the upper wall. A dramatic change in the whole performance can be appreciated, including an arguably large level of lift-to-drag coefficient ratio increase for all angles and a size reduction of laminar separation bubble (LSB) for a twelve-angle-of-attack.Keywords: CFD, LES, Lift-to-drag ratio, LSB, NACA 0012 airfoil
Procedia PDF Downloads 386917 Experimental and Numerical Analyses of Tehran Research Reactor
Authors: A. Lashkari, H. Khalafi, H. Khazeminejad, S. Khakshourniya
Abstract:
In this paper, a numerical model is presented. The model is used to analyze a steady state thermo-hydraulic and reactivity insertion transient in TRR reference cores respectively. The model predictions are compared with the experiments and PARET code results. The model uses the piecewise constant and lumped parameter methods for the coupled point kinetics and thermal-hydraulics modules respectively. The advantages of the piecewise constant method are simplicity, efficiency and accuracy. A main criterion on the applicability range of this model is that the exit coolant temperature remains below the saturation temperature, i.e. no bulk boiling occurs in the core. The calculation values of power and coolant temperature, in steady state and positive reactivity insertion scenario, are in good agreement with the experiment values. However, the model is a useful tool for the transient analysis of most research reactor encountered in practice. The main objective of this work is using simple calculation methods and benchmarking them with experimental data. This model can be used for training proposes.Keywords: thermal-hydraulic, research reactor, reactivity insertion, numerical modeling
Procedia PDF Downloads 401916 Numerical Analysis of the Effects of Transpiration on Transient/Steady Natural Convection Flow of Reactive Viscous Fluid in a Vertical Channel Formed by Two Vertical Porous Plates
Authors: Ahmad K. Samaila, Basant K. Jha
Abstract:
This study is devoted to investigate the effect of transpiration on transient as well as steady-state natural convection flow of a reactive viscous fluid in a vertical channel formed by two infinite vertical parallel porous plates. The Boussinesq assumption is applied and the nonlinear governing equations of energy and momentum are developed. The problem is solved numerically using implicit finite difference method and analytically for steady-state case using perturbation method. Solutions are presented in graphical form for fluid temperature, velocity, and skin-friction and wall heat transfer rate for various parametric values. It is found that velocity, temperature, rate of heat transfer as well as skin-friction are strongly affected by mass leakage through the porous plates.Keywords: transpiration, reactive viscous fluid, porous plates, natural convection, suction/injection
Procedia PDF Downloads 373915 The Effect of Static Balance Enhance by Table Tennis Training Intervening on Deaf Children
Authors: Yi-Chun Chang, Ching-Ting Hsu, Wei-Hua Ho, Yueh-Tung Kuo
Abstract:
Children with hearing impairment have deficits of balance and motors. Although most of parents teach deaf children communication skills in early life, but rarely teach the deficits of balance. The purpose of this study was to investigate whether static balance improved after table tennis training. Table tennis training was provided four times a week for eight weeks to two 12-year-old deaf children. The table tennis training included crossover footwork, sideway attack, backhand block-sideways-flutter forehand attack, and one-on-one tight training. Data were gathered weekly and statistical comparisons were made with a paired t-test. We observed that the dominant leg is better than the non-dominant leg in static balance and girl balance ability is better than boy. The final result shows that table tennis training significantly improves the deaf children’s static balance performance. It indicates that table tennis training on deaf children helps the static balance ability.Keywords: deaf children, static balance, table tennis, vestibular structure
Procedia PDF Downloads 433914 Instructional Consequences of the Transiency of Spoken Words
Authors: Slava Kalyuga, Sujanya Sombatteera
Abstract:
In multimedia learning, written text is often transformed into spoken (narrated) text. This transient information may overwhelm limited processing capacity of working memory and inhibit learning instead of improving it. The paper reviews recent empirical studies in modality and verbal redundancy effects within a cognitive load framework and outlines conditions under which negative effects of transiency may occur. According to the modality effect, textual information accompanying pictures should be presented in an auditory rather than visual form in order to engage two available channels of working memory – auditory and visual - instead of only one of them. However, some studies failed to replicate the modality effect and found differences opposite to those expected. Also, according to the multimedia redundancy effect, the same information should not be presented simultaneously in different modalities to avoid unnecessary cognitive load imposed by the integration of redundant sources of information. However, a few studies failed to replicate the multimedia redundancy effect too. Transiency of information is used to explain these controversial results.Keywords: cognitive load, transient information, modality effect, verbal redundancy effect
Procedia PDF Downloads 380913 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 11912 Unsteady 3D Post-Stall Aerodynamics Accounting for Effective Loss in Camber Due to Flow Separation
Authors: Aritras Roy, Rinku Mukherjee
Abstract:
The current study couples a quasi-steady Vortex Lattice Method and a camber correcting technique, ‘Decambering’ for unsteady post-stall flow prediction. The wake is force-free and discrete such that the wake lattices move with the free-stream once shed from the wing. It is observed that the time-averaged unsteady coefficient of lift sees a relative drop at post-stall angles of attack in comparison to its steady counterpart for some angles of attack. Multiple solutions occur at post-stall and three different algorithms to choose solutions in these regimes show both unsteadiness and non-convergence of the iterations. The distribution of coefficient of lift on the wing span also shows sawtooth. Distribution of vorticity changes both along span and in the direction of the free-stream as the wake develops over time with distinct roll-up, which increases with time.Keywords: post-stall, unsteady, wing, aerodynamics
Procedia PDF Downloads 370911 A Robust Digital Image Watermarking Against Geometrical Attack Based on Hybrid Scheme
Authors: M. Samadzadeh Mahabadi, J. Shanbehzadeh
Abstract:
This paper presents a hybrid digital image-watermarking scheme, which is robust against varieties of attacks and geometric distortions. The image content is represented by important feature points obtained by an image-texture-based adaptive Harris corner detector. These feature points are extracted from LL2 of 2-D discrete wavelet transform which are obtained by using the Harris-Laplacian detector. We calculate the Fourier transform of circular regions around these points. The amplitude of this transform is rotation invariant. The experimental results demonstrate the robustness of the proposed method against the geometric distortions and various common image processing operations such as JPEG compression, colour reduction, Gaussian filtering, median filtering, and rotation.Keywords: digital watermarking, geometric distortions, geometrical attack, Harris Laplace, important feature points, rotation, scale invariant feature
Procedia PDF Downloads 501910 Simulation of the Asphaltene Deposition Rate in a Wellbore Blockage via Computational Fluid Dynamic
Authors: Xiaodong Gao, Pingchuan Dong, Qichao Gao
Abstract:
There has been lots of published work focused on asphaltene deposited on the smooth pipe under steady conditions, while particle deposition on the blockage wellbores under transient conditions has not been well elucidated. This work attempts to predict the deposition rate of asphaltene particles in blockage tube through CFD simulation. The Euler-Lagrange equation has been applied during the flow of crude oil and asphaltene particles. The net gravitational force, virtual mass, pressure gradient, saffman lift, and drag forces are incorporated in the simulations process. Validation of CFD simulation results is compared to the benchmark experiments from the previous literature. Furthermore, the effect of blockage location, blockage length, and blockage thickness on deposition rate are also analyzed. The simulation results indicate that the maximum deposition rate of asphaltene occurs in the blocked tube section, and the greater the deposition thickness, the greater the deposition rate. Moreover, the deposition amount and maximum deposition rate along the length of the tube have the same trend. Results of this study are in the ability to better understand the deposition of asphaltene particles in production and help achieve to deal with the asphaltene challenges.Keywords: asphaltene deposition rate, blockage length, blockage thickness, blockage diameter, transient condition
Procedia PDF Downloads 201909 The Effect of Partially Replacing Cement with Metakaolin on the Properties of Concrete
Authors: Gashaw Abebaw
Abstract:
Concrete usage in Ethiopia is expanding at a faster rate than before. Cement is the most important and costly ingredient in this respect. The construction industry is currently challenged by cement scarcity and stock market inflation. Scholars' trays, on the other hand, will use natural pozzolan material to substitute cement. Apart from that, Metakaolin has pozzolanic characteristics. According to the industrial mineral occurrence map, Ethiopia kaolin may be found in abundance. Some of them include Debretabor, so it is good to utilize Metakaolin as cement replacement material. In this study, the capability of Ethiopian Metakaolin as a partial substitute for cement in C-25 concrete production with 0%, 5%, 10%, 15%, and 20% replacement of PPC by MA with 0.49 percent water to cement ratio is investigated. The study examines; the chemical properties of MA, Physical properties of cement paste, workability, compressive strength, water absorption, density and sulfate attack of concrete was investigated. The chemical composition of Metakaolin was examined and the summation of SiO₂, AlO₃, and FeO₃ is 86.25% and the ash was classified class N pozzolan. The normal consistency percent of water increases as the MA replacement amount increase and both initial and final setting time rang increase as the MA replacement amount increase. On the 28th day, the compressive strength of concrete with MA replacement of 5%, 10%, and 15% exceeds the goal mean strength (33.5Mpa) with compressive strength enhancements of 2.23 %, 4.05 %, and 2.23 %, respectively. Similarly, on the 56th day, 5 %, 10%, and 15% replacement enhance concrete strength by 2.06 %, 3.06 %, and 1.2 %, respectively. The MA mixed concrete has improved significantly in terms of water absorption and sulphate attack, with a 15% replacement level. MA content Metakaolin could possibly replace cement up to 15%, according to the studies. The study's findings will help to offset cement price increases while also boosting house affordability without significantly degrading.Keywords: metakaolin, compressive strength, sulphate attack, water absorption, N pozzolan
Procedia PDF Downloads 119908 Optimal Perturbation in an Impulsively Blocked Channel Flow
Authors: Avinash Nayak, Debopam Das
Abstract:
The current work implements the variational principle to find the optimum initial perturbation that provides maximum growth in an impulsively blocked channel flow. The conventional method for studying temporal stability has always been through modal analysis. In most of the transient flows, this modal analysis is still followed with the quasi-steady assumption, i.e. change in base flow is much slower compared to perturbation growth rate. There are other studies where transient analysis on time dependent flows is done by formulating the growth of perturbation as an initial value problem. But the perturbation growth is sensitive to the initial condition. This study intends to find the initial perturbation that provides the maximum growth at a later time. Here, the expression of base flow for blocked channel is derived and the formulation is based on the two dimensional perturbation with stream function representing the perturbation quantity. Hence, the governing equation becomes the Orr-Sommerfeld equation. In the current context, the cost functional is defined as the ratio of disturbance energy at a terminal time 'T' to the initial energy, i.e. G(T) = ||q(T)||2/||q(0)||2 where q is the perturbation and ||.|| defines the norm chosen. The above cost functional needs to be maximized against the initial perturbation distribution. It is achieved with the constraint that perturbation follows the basic governing equation, i.e. Orr-Sommerfeld equation. The corresponding adjoint equation is derived and is solved along with the basic governing equation in an iterative manner to provide the initial spatial shape of the perturbation that provides the maximum growth G (T). The growth rate is plotted against time showing the development of perturbation which achieves an asymptotic shape. The effects of various parameters, e.g. Reynolds number, are studied in the process. Thus, the study emphasizes on the usage of optimal perturbation and its growth to understand the stability characteristics of time dependent flows. The assumption of quasi-steady analysis can be verified against these results for the transient flows like impulsive blocked channel flow.Keywords: blocked channel flow, calculus of variation, hydrodynamic stability, optimal perturbation
Procedia PDF Downloads 420907 Literature Review: Adversarial Machine Learning Defense in Malware Detection
Authors: Leidy M. Aldana, Jorge E. Camargo
Abstract:
Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.Keywords: Malware, adversarial, machine learning, defense, attack
Procedia PDF Downloads 62906 The Use of Social Media Sarcasm as a Response to Media-Coverage of Iran’s Unprecedented Attack on Israel
Authors: Afif J. Arabi
Abstract:
On April 15, 2024, Iran announced its unprecedented military attack by sending waves of more than 300 drones and ballistic missiles toward Israel. The Attack lasted approximately five hours and was a widely covered, distributed, and followed media event. Iran’s military action against Israel was a long-awaited action across the Middle East since the early days of the October 7th war on Gaza and after a long history of verbal threats. While people in many Arab countries stayed up past midnight in anticipation of watching the disastrous results of this unprecedented attack, voices on traditional and social media alike started to question the timed public announcement of the attack, which gave Israel at least a two-hour notice to prepare its defenses. When live news coverage started showing that nearly all the drones and missiles were intercepted by Israel – with help from the U.S. and other countries – and no deaths were reported, the social media response to this media event turned toward sarcasm, mockery, irony, and humor. Social media users posted sarcastic pictures, jokes, and comments mocking the Iranian offensive. This research examines this unique media event and the sarcastic response it generated on social media. The study aims to investigate the causes leading to media sarcasm in militarized political conflict, the social function of such generated sarcasm, and the role of social media as a platform for consuming frustration, dissatisfaction, and outrage passively through various media products. The study compares the serious traditional media coverage of the event with the humorous social media response among Arab countries. The research uses an eclectic theoretical approach using framing theory as a paradigm for understanding and investigating communication social functionalism theory in media studies to examine sarcasm. Social functionalism theory is a sociological perspective that views society as a complex system whose parts work together to promote solidarity and stability. In the context of media and sarcasm, this theory would suggest that sarcasm serves specific functions within society, such as reinforcing social norms, providing a means for social critique, or functioning as a safety valve for expressing social tension.; and a qualitative analysis of specific examples including responses of SM commentators to such manifestations of political criticism. The preliminary findings of this study point to a heightened dramatization of the televised event and a widespread belief that this attack was a staged show incongruent with Iran’s official enmity and death threats toward Israel. The social media sarcasm reinforces Arab’s view of Iran and Israel as mutual threats. This belief stems from the complex dynamics, historical context, and regional conflict surrounding these three nations: Iran, Israel, and Arabs.Keywords: social functionalism, social media sarcasm, Television news framing, live militarized conflict coverage, iran, israel, communication theory
Procedia PDF Downloads 44905 A Rare Case of Popliteal Artery Aneurysm Presenting with Foot Drop
Authors: John Yahng, Riteesh Bookun
Abstract:
Popliteal artery aneurysms (PAAs) are the most common arterial aneurysm of the periphery. It is defined as focal dilation of the artery more than 50% of the normal vessel diameter which usually varies between 7 mm to 11 mm. The most common presentation for PAAs is claudication due to luminal stenmosis secondary to mural thrombus or acute limb ischaemia due to occlusive thrombosis or distal thromboembolism. It is less common for patients to present with non-ischaemic symptoms secondary to mass effect and compression of adjacent structures, and of these, presentation with common peroneal nerve compression is particularly uncommon. We present a rare case of a 92-year-old female patient presenting with 4-month history of left foot drop with radiological evidence of common peroneal nerve compression secondary to PAA of 22 mm by21mm in size. To the best of our knowledge, this is the smallest reported popliteal aneurysm presenting with foot drop. We also present the endovascular treatment option taken in our case.Keywords: aneurysm, foot drop, peroneal nerve, popliteal
Procedia PDF Downloads 300904 On the Thermal Behavior of the Slab in a Reheating Furnace with Radiation
Authors: Gyo Woo Lee, Man Young Kim
Abstract:
A mathematical heat transfer model for the prediction of transient heating of the slab in a direct-fired walking beam type reheating furnace has been developed by considering the nongray thermal radiation with given furnace environments. The furnace is modeled as radiating nongray medium with carbon dioxide and water with five-zoned gas temperature and the furnace wall is considered as a constant temperature lower than furnace gas one. The slabs are moving with constant velocity depending on the residence time through the non-firing, charging, preheating, heating, and final soaking zones. Radiative heat flux obtained by considering the radiative heat exchange inside the furnace as well as convective one from the surrounding hot gases are introduced as boundary condition of the transient heat conduction within the slab. After validating thermal radiation model adopted in this work, thermal fields in both model and real reheating furnace are investigated in terms of radiative heat flux in the furnace and temperature inside the slab. The results show that the slab in the furnace can be more heated with higher slab emissivity and residence time.Keywords: reheating furnace, steel slab, radiative heat transfer, WSGGM, emissivity, residence time
Procedia PDF Downloads 287903 Tracing Back the Bot Master
Authors: Sneha Leslie
Abstract:
The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.Keywords: bonet, DDoS attack, network security, detection system, metasploit framework
Procedia PDF Downloads 254