Search results for: artificial air storage reservoir
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4582

Search results for: artificial air storage reservoir

1882 Verifying Environmental Performance through Inventory and Assessment: Case Study of the Los Alamos National Laboratory Waste Compliance and Tracking System

Authors: Oral S. Saulters, Shanon D. Goldberg, Wendy A. Staples, Ellena I. Martinez, Lorie M. Sanchez, Diego E. Archuleta, Deborah L. Williams, Scot D. Johnson

Abstract:

To address an important set of unverified field conditions, the Los Alamos National Laboratory Waste Compliance and Tracking System (WCATS) Wall-to-Wall Team performed an unprecedented and advanced inventory. This reconciliation involved confirmation analysis for approximately 5850 hazardous, low-level, mixed low-level, and transuranic waste containers located in more than 200 staging and storage areas across 33 technical areas. The interdisciplinary team scoped, planned, and developed the multidimensional assessments. Through coordination with cross-functional site hosts, they were able to verify and validate data while resolving discrepancies identified in WCATS. The results were extraordinary with an updated inventory, tailored outreach, more cohesive communications, and timely closed-loop feedback.

Keywords: circular economy, environmental performance data, social-ecological-technological systems, waste management

Procedia PDF Downloads 128
1881 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 330
1880 Clinical Experience and Perception of Risk affect the Acceptance and Trust of using AI in Medicine

Authors: Schulz Peter, Kee Kalya, Lwin May, Goh Wilson, Chia Kendrikck, Chueng Max, Lam Thomas, Sung Joseph

Abstract:

As Artificial Intelligence (AI) is progressively making inroads into clinical practice, questions have arisen as to whether acceptance of AI is skewed toward certain medical practitioner segments, even within particular specializations. This study examines distinct AI acceptance among gastroenterologists with contrasting levels of seniority/experience when interacting with AI typologies. Data from 319 gastroenterologists show the presence of four distinct clusters of clinicians based on experience levels and perceived risk typologies. Analysis of cluster-based responses further revealed that acceptance of AI was not uniform. Our findings showed that clinician experience and risk perspective have an interactive role in influencing AI acceptance. Senior clinicians with low-risk perceptions were highly accepting of AI, but those with high-risk perceptions of AI were substantially less accepting. In contrast, junior clinicians were more inclined to embrace AI when they perceived high risk, yet they hesitated to adopt AI when the perceived risk was minimal.

Keywords: risk perception, acceptance, trust, medicine

Procedia PDF Downloads 13
1879 The Effects of Sous Vide Technology Combined with Different Herbals on Sensorial and Physical Quality of Fish Species Caught in the Northern Aegean Sea and Marmara Sea

Authors: Zafer Ceylan, Gülgün F.Unal Şengör, Onur Gönülal

Abstract:

In this study, sous vide technology were treated with different herbs into different fish species which were caught from northern Aegean and Marmara Sea. Before samples were packaged under vacuum, herbs had been cut and added at the same ratio into the package. Samples were sliced, the weight of each sample was about 150 g, and packaged under vacuum. During the storage period at 4ºC, taste, odor, texture properties of fish samples treated with sous vide were evaluated by trained panelists. Meanwhile, the effect of different herbs on pH values of the samples was investigated. These results were correlated with sensorial results. Furthermore, the effects of different herbs on L, a, b values of fish samples treated with sous vide were evaluated by color measurement. All sensorial results indicated that the values of samples treated with herbs were higher than that of the control group. Color measurement results and pH values were found parallel with sensorial results.

Keywords: Sous vide, fish, herbs, consumer preferences, pH, color measurement

Procedia PDF Downloads 493
1878 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition

Authors: Michael Okeke, Andrew Blyth

Abstract:

Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.

Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)

Procedia PDF Downloads 345
1877 Unspoken Delights: Creative Strategies for Bypass Censorship System and Depicting Male-Female Relationships in Iranian Cinema

Authors: Parsa Naji

Abstract:

Following the Iran Islamic Revolution in 1979 and the subsequent formation of a theocratic regime, the new regime implemented stringent regulations and a complicated censorship system in the film industry. Thereupon, the screening of films showing the relationships between males and females encountered numerous limitations. Not only did these limits encompass the physical portrayal of the relationship between males and females, but also the dialogues containing explicit sexual or even passionate romantic themes, resulting in a film being permanently consigned to archival storage. However, despite these limitations, Iranian filmmakers persevered in creating their interesting cinematic works. Throughout the years after the revolution, Iranian directors have navigated a series of challenges and obstacles, employing innovative and unconventional methods to bypass the rigorous censorship system imposed by the government, ensuring the screening of their films. This study aims to analyze the creative approaches employed by Iranian filmmakers to circumvent governmental censorship regulations.

Keywords: censorship, Iranian cinema, Islamic revolution, male-female relationship

Procedia PDF Downloads 47
1876 An Axiomatic Approach to Constructing an Applied Theory of Possibility

Authors: Oleksii Bychkov

Abstract:

The fundamental difference between randomness and vagueness is that the former requires statistical research. These issues were studied by Zadeh L, Dubois D., Prad A. The theory of possibility works with expert assessments, hypotheses, etc. gives an idea of the characteristics of the problem situation, the nature of the goals and real limitations. Possibility theory examines experiments that are not repeated. The article discusses issues related to the formalization of a fuzzy, uncertain idea of reality. The author proposes to expand the classical model of the theory of possibilities by introducing a measure of necessity. The proposed model of the theory of possibilities allows us to extend the measures of possibility and necessity onto a Boolean while preserving the properties of the measure. Thus, upper and lower estimates are obtained to describe the fact that the event will occur. Knowledge of the patterns that govern mass random, uncertain, fuzzy events allows us to predict how these events will proceed. The article proposed for publication quite fully reveals the essence of the construction and use of the theory of probability and the theory of possibility.

Keywords: possibility, artificial, modeling, axiomatics, intellectual approach

Procedia PDF Downloads 32
1875 Proof of Concept Design and Development of a Computer-Aided Medical Evaluation of Symptoms Web App: An Expert System for Medical Diagnosis in General Practice

Authors: Ananda Perera

Abstract:

Computer-Assisted Medical Evaluation of Symptoms (CAMEOS) is a medical expert system designed to help General Practices (GPs) make an accurate diagnosis. CAMEOS comprises a knowledge base, user input, inference engine, reasoning module, and output statement. The knowledge base was developed by the author. User input is an Html file. The physician user collects data in the consultation. Data is sent to the inference engine at servers. CAMEOS uses set theory to simulate diagnostic reasoning. The program output is a list of differential diagnoses, the most probable diagnosis, and the diagnostic reasoning.

Keywords: CDSS, computerized decision support systems, expert systems, general practice, diagnosis, diagnostic systems, primary care diagnostic system, artificial intelligence in medicine

Procedia PDF Downloads 155
1874 Review of Research on Waste Plastic Modified Asphalt

Authors: Song Xinze, Cai Kejian

Abstract:

To further explore the application of waste plastics in asphalt pavement, this paper begins with the classification and characteristics of waste plastics. It then provides a state-of-the-art review of the preparation methods and processes of waste plastic modifiers, waste plastic-modified asphalt, and waste plastic-modified asphalt mixtures. The paper also analyzes the factors influencing the compatibility between waste plastics and asphalt and summarizes the performance evaluation indicators for waste plastic-modified asphalt and its mixtures. It explores the research approaches and findings of domestic and international scholars and presents examples of waste plastics applications in pavement engineering. The author believes that there is a basic consensus that waste plastics can improve the high-temperature performance of asphalt. The use of cracking processes to solve the storage stability of waste plastic polymer-modified asphalt is the key to promoting its application. Additionally, the author anticipates that future research will concentrate on optimizing the recycling, processing, screening, and preparation of waste plastics, along with developing composite plastic modifiers to improve their compatibility and long-term performance in asphalt pavements.

Keywords: waste plastics, asphalt pavement, asphalt performance, asphalt modification

Procedia PDF Downloads 36
1873 The Effect of Artificial Intelligence on Construction Development

Authors: Shady Gamal Aziz Shehata

Abstract:

Difficulty in defining construction quality arises due to perception based on the nature and requirements of the market, the different partners themselves and the results they want. Quantitative research was used in this constructivist research. A case-based study was conducted to assess the structures of positive attitudes and expectations in the context of quality improvement. A survey based on expert opinions was analyzed among construction organizations/companies operating in the construction industry in Pakistan. The financial strength, management structure and construction experience of the construction companies formed the basis of their selection. A good concept is visible at the project level and is seen as the most valuable part of the construction project. Each quality improvement technique was expected to increase the user's profits by improving the efficiency of the construction project. The Survey is useful for construction professionals to evaluate current construction concepts and expectations for the application of quality improvement techniques in construction projects.

Keywords: correlation analysis, lean construction tools, lean construction, logistic regression analysis, risk management, safety construction quality, expectation, improvement, perception

Procedia PDF Downloads 59
1872 Microfacies Analysis and Paleoenvironmental Trends of the Paleocene Farrud and Mabruk Reservoirs, Concession 11, West Sirte Basin, Libya

Authors: Nisreen Agha

Abstract:

Investigation of representative core samples under the petrological microscope reveals common petrographic and mineralogical characteristics with distinct faunal assemblages, allowing establishing of the microfacies associations and deducing the paleoenvironmental trends of the Paleocene Farrud and Mabruk rock units. Recognition of the early and post-diagenetic processes, particularly dolomitization and micritization, as well as dissolution and precipitation of spary drusy calcite as a new morphism process affecting the reservoir rocks, is established. The microfacies trends detected from the investigation of 46 core samples from Farrud member (Lower Paleocene) representing six wells; QQQ1-11, GG1-11, LLL1-11, RRR1-11, RRR40-11, and RRR45-11 indicate that the deposition was started within the realm of shallow supratidal and intertidal subenvironments followed by deeper environments of the shelf bays with maximum sea level during inner shelf environment where fossiliferous bioclastic packstone dominated. The microfacies associations determined in 8 core samples from two wells LLL1and RRR40 representing Mabruk Member (Upper Paleocene), indicate paleoenvironmental trends marked by sea level fluctuations accompanied with a relatively marine shelf bay conditions intervened with short-lived shallow intertidal and supratidal warm coastal sedimentation. As a result, dolostone, evaporitic dismicrites, and gypsiferous dolostone of supratidal characters were deposited. They reflect rapid oscillation of the sea level marked by drop land-ward shift of the sea shore deposition prevailed by supratidal gypsiferous dolostone and numerous ferruginous materials as clouds straining many parts of dolomite and surrounded the micritized fossils. This situation ends the deposition of the Farrud Member in most of the studied wells. On the other hand, the facies in the northern part of the Concession -11 field indicates deposition in a deeper marine setting than in the southern facies.

Keywords: Farrud and Mabruk members, paleocene, microfacies associations, diagenesis, sea level oscillation, depositional environments

Procedia PDF Downloads 77
1871 Numerical Methods for Topological Optimization of Wooden Structural Elements

Authors: Daniela Tapusi, Adrian Andronic, Naomi Tufan, Ruxandra Erbașu, Ioana Teodorescu

Abstract:

The proposed theme of this article falls within the policy of reducing carbon emissions imposed by the ‘Green New Deal’ by replacing structural elements made of energy-intensive materials with ecological materials. In this sense, wood has many qualities (high strength/mass and stiffness/mass ratio, low specific gravity, recovery/recycling) that make it competitive with classic building materials. The topological optimization of the linear glulam elements, resulting from different types of analysis (Finite Element Method, simple regression on metamodels), tests on models or by Monte-Carlo simulation, leads to a material reduction of more than 10%. This article proposes a method of obtaining topologically optimized shapes for different types of glued laminated timber beams. The results obtained will constitute the database for AI training.

Keywords: timber, glued laminated timber, artificial-intelligence, environment, carbon emissions

Procedia PDF Downloads 39
1870 The Effect of Artificial Intelligence on Media Production

Authors: Mona Mikhail Shakhloul Gadalla

Abstract:

The brand-new media revolution, which features a huge range of new media technologies like blogs, social networking, visual worlds, and wikis, has had a tremendous impact on communications, traditional media and across different disciplines. This paper gives an evaluation of the impact of recent media technology on the news, social interactions and conventional media in developing and advanced nations. The look points to the reality that there is a widespread impact of recent media technologies on the news, social interactions and the conventional media in developing and developed nations, albeit undoubtedly and negatively. Social interactions have been considerably affected, in addition to news manufacturing and reporting. It's miles reiterated that regardless of the pervasiveness of recent media technologies, it might now not carry a complete decline of conventional media. This paper contributes to the theoretical framework of the new media and will assist in assessing the extent of the effect of the new media in special places.

Keywords: court reporting, offenders in media, quantitative content analysis, victims in mediamedia literacy, ICT, internet, education communication, media, news, new media technologies, social interactions, traditional media

Procedia PDF Downloads 34
1869 Wide Dissemination of CTX-M-Type Extended-Spectrum β-Lactamases in Korean Swine Farms

Authors: Young Ah Kim, Hyunsoo Kim, Eun-Jeong Yoon, Young Hee Seo, Kyungwon Lee

Abstract:

Extended-spectrum β-lactamase (ESBL)-producing Escherichia coli from food animals are considered as a reservoir for transmission of ESBL genes to human. The aim of this study is to assess the prevalence and molecular epidemiology of ESBL-producing E. coli colonization in pigs, farm workers, and farm environments to elucidate the transmission of multidrug-resistant clones from animal to human. Nineteen pig farms were enrolled across the country in Korea from August to December 2017. ESBL-producing E. coli isolates were detected in 190 pigs, 38 farm workers, and 112 sites of farm environments using ChromID ESBL (bioMerieux, Marcy l'Etoile, France), directly (stool or perirectal swab) or after enrichment (sewage). Antimicrobial susceptibility tests were done with disk diffusion methods and blaTEM, blaSHV, and blaCTX-M were detected with PCR and sequencing. The genomes of the four CTX-M-55-producing E. coli isolates from various sources in one farm were entirely sequenced to assess the relatedness of the strains. Whole genome sequencing (WGS) was performed with PacBio RS II system (Pacific Biosciences, Menlo Park, CA, USA). ESBL genotypes were 85 CTX-M-1 group (one CTX-M-3, 23 CTX-M-15, one CTX-M-28, 59 CTX-M-55, one CTX-M-69) and 60 CTX-M-9 group (41 CTX-M-14, one CTX-M-17, one CTX-M-27, 13 CTX-M-65, 4 CTX-M-102) in total 145 isolates. The rectal colonization rates were 53.2% (101/190) in pigs and 39.5% (15/38) in farm workers. In WGS, sequence types (STs) were determined as ST69 (E. coli PJFH115 isolate from a human carrier), ST457 (two E. coli isolates PJFE101 recovered from a fence and PJFA1104 from a pig) and ST5899 (E. coli PJFA173 isolate from the other pig). The four plasmids encoding CTX-M-55 (88,456 to 149, 674 base pair), whether it belonged to IncFIB or IncFIC-IncFIB type, shared IncF backbone furnishing the conjugal elements, suggesting of genes originated from same ancestor. In conclusion, the prevalence of ESBL-producing E. coli in swine farms was surprisingly high, and many of them shared common ESBL genotypes of clinical isolates such as CTX-M-14, 15, and 55 in Korea. It could spread by horizontal transfer between isolates from different reservoirs (human-animal-environment).

Keywords: Escherichia coli, extended-spectrum β-lactamase, prevalence, whole genome sequencing

Procedia PDF Downloads 203
1868 A Model for Optimizing Inventory Replenishment and Shelf Space Management in Retail Industries

Authors: Nermine A. Harraz, Aliaa Abouali

Abstract:

The retail stores put up for sale multiple items while the spaces in the backroom and display areas constitute a scarce resource. Availability, volume, and location of the product displayed in the showroom influence the customer’s demand. Managing these operations individually will result in sub-optimal overall retail store’s profit; therefore, a non-linear integer programming model (NLIP) is developed to determine the inventory replenishment and shelf space allocation decisions that together maximize the retailer’s profit under shelf space and backroom storage constraints taking into consideration that the demand rate is positively dependent on the amount and location of items displayed in the showroom. The developed model is solved using LINGO® software. The NLIP model is implemented in a real world case study in a large retail outlet providing a large variety of products. The proposed model is validated and shows logical results when using the experimental data collected from the market.

Keywords: retailing management, inventory replenishment, shelf space allocation, showroom, backroom

Procedia PDF Downloads 354
1867 Predictive Models of Ruin Probability in Retirement Withdrawal Strategies

Authors: Yuanjin Liu

Abstract:

Retirement withdrawal strategies are very important to minimize the probability of ruin in retirement. The ruin probability is modeled as a function of initial withdrawal age, gender, asset allocation, inflation rate, and initial withdrawal rate. The ruin probability is obtained based on the 2019 period life table for the Social Security, IRS Required Minimum Distribution (RMD) Worksheets, US historical bond and equity returns, and inflation rates using simulation. Several popular machine learning algorithms of the generalized additive model, random forest, support vector machine, extreme gradient boosting, and artificial neural network are built. The model validation and selection are based on the test errors using hyperparameter tuning and train-test split. The optimal model is recommended for retirees to monitor the ruin probability. The optimal withdrawal strategy can be obtained based on the optimal predictive model.

Keywords: ruin probability, retirement withdrawal strategies, predictive models, optimal model

Procedia PDF Downloads 74
1866 Concept, Design and Implementation of Power System Component Simulator Based on Thyristor Controlled Transformer and Power Converter

Authors: B. Kędra, R. Małkowski

Abstract:

This paper presents information on Power System Component Simulator – a device designed for LINTE^2 laboratory owned by Gdansk University of Technology in Poland. In this paper, we first provide an introductory information on the Power System Component Simulator and its capabilities. Then, the concept of the unit is presented. Requirements for the unit are described as well as proposed and introduced functions are listed. Implementation details are given. Hardware structure is presented and described. Information about used communication interface, data maintenance and storage solution, as well as used Simulink real-time features are presented. List and description of all measurements is provided. Potential of laboratory setup modifications is evaluated. Lastly, the results of experiments performed using Power System Component Simulator are presented. This includes simulation of under frequency load shedding, frequency and voltage dependent characteristics of groups of load units, time characteristics of group of different load units in a chosen area.

Keywords: power converter, Simulink Real-Time, Matlab, load, tap controller

Procedia PDF Downloads 242
1865 The Conceptual Design Model of an Automated Supermarket

Authors: V. Sathya Narayanan, P. Sidharth, V. R. Sanal Kumar

Abstract:

The success of any retail business is predisposed by its swift response and its knack in understanding the constraints and the requirements of customers. In this paper a conceptual design model of an automated customer-friendly supermarket has been proposed. In this model a 10-sided, space benefited, regular polygon shaped gravity shelves have been designed for goods storage and effective customer-specific algorithms have been built-in for quick automatic delivery of the randomly listed goods. The algorithm is developed with two main objectives, viz., delivery time and priority. For meeting these objectives the randomly listed items are reorganized according to the critical-path of the robotic arm specific to the identified shop and its layout and the items are categorized according to the demand, shape, size, similarity and nature of the product for an efficient pick-up, packing and delivery process. We conjectured that the proposed automated supermarket model reduces business operating costs with much customer satisfaction warranting a win-win situation.

Keywords: automated supermarket, electronic shopping, polygon-shaped rack, shortest path algorithm for shopping

Procedia PDF Downloads 405
1864 Methodology for Obtaining Food Licenses in India

Authors: Rathna Malhotra Gaur

Abstract:

Owing to multiplicity and competition in the Indian food industry, it was always important for the government of India to bring in reforms that would protect the interest of the consumer and also the food operator. To further this objective, Food Safety, and Standards Act, 2006 (hereinafter referred to as FSSAI) was enacted for laying down science-based standards for articles and food and to regulate their storage, distribution, manufacture, same and import and to ensure safe food availability to the citizens of India. One of the safeguards towards consumer interest is the enactment of Food Safety and Standards (Licensing and Registration of Food Businesses, Regulation, 2011 within the mandate of FSSAI. It is mandatory for every food operator in India to get the registration certificate and procurement of food Licenses before starting operations in the country. All the nuances pertaining to the procurement of licenses are dealt with under these regulations. These regulations also lay down detailed provisions with regard to the conditions that the operator has to adhere to once the License is procured, going to the integrities of the safety and hygiene standards to be maintained by the food operators. This paper is an exhaustive effort to examine the provisions of obtaining the registration and License in India and the conditions that need to be fulfilled subsequently and further on the validity and renewal of these Food Licenses.

Keywords: food laws, food licenses, food registration, penalty

Procedia PDF Downloads 177
1863 Antigenic Diversity of Theileria parva Isolates from Cattle and Buffalo at the Wildlife-Livestock Interface in Southern and Eastern Africa

Authors: Mukolwe D. Lubembe, Odongo O. David, Githaka Naftali, Kanduma Esther, Marinda Oosthuizen, Kgomotso P. Sibeko

Abstract:

Theileriosis is a tick-borne disease of cattle caused by an apicomplexan protozoan parasite of the genus Theileria. In eastern and southern Africa, Theileria infections in cattle are caused by the species Theileria parva whose natural reservoir is the African buffalo (Syncerus caffer). Currently, East Coast Fever (ECF) caused by the cattle-derived Theileria parva is still a major problem in eastern Africa and some parts of southern Africa but not in South Africa following its eradication in the 1950s. However, Corridor disease (CD) caused by the buffalo-derived Theileria parva still remains a concern in South Africa. The diversity of Theileria parva in South Africa in comparison to other affected countries is poorly defined yet its known to be the survival strategy of this parasite. We assessed the antigenic diversity of Theileria parva isolates from Buffalo and cattle at the wildlife-livestock interface comparing samples from South Africa, Zimbabwe, Kenya, Tanzania, and Uganda. Antigenic epitopes of eight schizont antigen genes (Tp1, Tp3, Tp4, Tp5, Tp6, Tp7, Tp8 and Tp10) were amplified by PCR from genomic DNA extracted from blood samples collected from cattle and buffalo at the wildlife-livestock interface. Amplicons were purified and then sequenced on NGS platform. Full length open reading frames (ORFs) of two schizont antigen genes (Tp2 and Tp9) and one sporozoite antigen gene, p67 were also amplified from genomic DNA. Amplicons were then purified and cloned for sequencing. Analysis was based on sequence differences in the genes. Preliminary results show an extensively diverse population of Theileria parva circulating in buffalo and cattle populations at the wildlife-livestock interface. Diversity of the antigen genes contributes to the evasion of the immune system of the host by Theileria parva. This possess a concern in that, some of the Theileria parva populations may re-assort and become adapted to cattle to cause a form of theileriosis that is as fatal as ECF in areas where ECF was eradicated or is absent

Keywords: Theileria parva, east coast fever, corridor diseases, antigen genes, diversity

Procedia PDF Downloads 226
1862 Molluscicidal Effect of Cassia occidentalis and Physalis angulata Leaf Extract in the Elimination of Water Snail

Authors: Haruna Karamba, Nafisa Muhammad Danyaro

Abstract:

The study describe the action of natural latex (extract) of two sub-aquatic macrophytes plants i.e., Cassia occidentalis and Physalis angulata which were tested against two water snail species; Bulinus globusus and Lymnaea natalensis, the intermediate host of Bilharziasis (chistosomiasis) in the tropical countries. Bilherziasis is a disease prevalent and endermic to tropical Africa, seriously undermining health status of Nigerian youth. The easiest way to eradicate the disease is to eliminate the secondary host of the pathogen, chistosoma species. Therefore we carried out a research to investigate the molluscicidal effect of the leaf extract of C. occidentalis and P. angulata on mortality rate of B. globusus and L. natalensis water snails using pond water in the laboratory of science laboratory department of Kano State Polytechnic, Nigeria. One hundred and fifty juveniles’ snails were collected from Jakara Dam in the Northeastern part of Kano, Nigeria. The snails were put inside a plastic container and transported immediately to the laboratory where they were transferred into reservoir tank containing pond water and kept for 48 hours to get acclimatized with laboratory environment. Twelve water bathes 2/3 filled with pond water were prepared and kept in the laboratory. Leaf extract of the plants were obtained by blending and homogenizing the leaf tissue from which the extract were obtained and prepared in 10, 20, 30, 40 and 50 ppm, in addition to 0 ppm, which served as control. Ten snails were placed in each of the twelve water bathes. Six water bathes for the species of C. accidentalis extract and other six for P. angulata. The treatment combinations were maintained for 2 days after which the number of living snails present in each water bathes were counted and subsequently at 2 days intervals. The result indicated that extracts from both plants were lethal to the snails as concentration of the extract increases particularly mortality rate was highest at 40 and 50 ppm. Conclusively the toxicity of the extracts from these plants proven lethal to snails and hence can be used as molluscicides for cheap and easy method of eliminating water snails and therefore reducing the incidence of Bilharziasis.

Keywords: schistosomiasis, bilharziasis, Bulinus globusus, Lymnea natalensis, Physalis angulata, Cassia occidentalis, Kano

Procedia PDF Downloads 356
1861 Influence of Radio Frequency Identification Technology at Cost of Supply Chain as a Driver for the Generation of Competitive Advantage

Authors: Mona Baniahmadi, Saied Haghanifar

Abstract:

Radio Frequency Identification (RFID) is regarded as a promising technology for the optimization of supply chain processes since it improves manufacturing and retail operations from forecasting demand for planning, managing inventory, and distribution. This study precisely aims at learning to know the RFID technology and at explaining how it can concretely be used for supply chain management and how it can help improving it in the case of Hejrat Company which is located in Iran and works on the distribution of medical drugs and cosmetics. This study uses some statistical analysis to calculate the expected benefits of an integrated RFID system on supply chain obtained through competitive advantages increases with decreasing cost factor. The study investigates how the cost of storage process, labor cost, the cost of missing goods, inventory management optimization, on-time delivery, order cost, lost sales and supply process optimization affect the performance of the integrated RFID supply chain regarding cost factors and provides a competitive advantage.

Keywords: cost, competitive advantage, radio frequency identification, supply chain

Procedia PDF Downloads 276
1860 Foggy Image Restoration Using Neural Network

Authors: Khader S. Al-Aidmat, Venus W. Samawi

Abstract:

Blurred vision in the misty atmosphere is essential problem which needs to be resolved. To solve this problem, we developed a technique to restore foggy degraded image from its original version using Back-propagation neural network (BP-NN). The suggested technique is based on mapping between foggy scene and its corresponding original scene. Seven different approaches are suggested based on type of features used in image restoration. Features are extracted from spatial and spatial-frequency domain (using DCT). Each of these approaches comes with its own BP-NN architecture depending on type and number of used features. The weight matrix resulted from training each BP-NN represents a fog filter. The performance of these filters are evaluated empirically (using PSNR), and perceptually. By comparing the performance of these filters, the effective features that suits BP-NN technique for restoring foggy images is recognized. This system proved its effectiveness and success in restoring moderate foggy images.

Keywords: artificial neural network, discrete cosine transform, feed forward neural network, foggy image restoration

Procedia PDF Downloads 382
1859 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 437
1858 Characterization of Onion Peels Extracts and Its Utilization in a Deep Fried Snack

Authors: Nabia Siddiqui, Tahira Mohsin Ali, Tanveer Abbas, Abid Hasnain

Abstract:

The present study proposed the use of different onion peel extracts in a South Asian snacks called ‘sew’. The polyphenols extracted from peels were initially analyzed for their antimicrobial potential and bioactive components following three different extraction systems. A relatively higher level of total phenolic content (TP), total flavonoid (TF) and antioxidant activity was observed for EWE (ethanol and water based) extracts followed by EAAE (ethanol and acetic acid) and WE (water extract) sample. Onion extracts showed ability to inhibit gram-positive as well as gram-negative bacteria. The incorporation of onion peel extracts in sew showed a marked increase in bioactive components. Besides bioactivity, sensory attributes, textural characteristics and storage stability of these snacks containing onion peel extract also significantly improved during the shelf study at ambient temperature for up to two months. Thus, these results justify the utilization of these plant polyphenols in fried snacks.

Keywords: onion peels extract, South Asian snacks, antioxidant capacity, bioactivity

Procedia PDF Downloads 244
1857 Intrusion Detection Using Dual Artificial Techniques

Authors: Rana I. Abdulghani, Amera I. Melhum

Abstract:

With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.

Keywords: IDS, SI, BP, NSL_KDD, PSO

Procedia PDF Downloads 382
1856 Network Coding with Buffer Scheme in Multicast for Broadband Wireless Network

Authors: Gunasekaran Raja, Ramkumar Jayaraman, Rajakumar Arul, Kottilingam Kottursamy

Abstract:

Broadband Wireless Network (BWN) is the promising technology nowadays due to the increased number of smartphones. Buffering scheme using network coding considers the reliability and proper degree distribution in Worldwide interoperability for Microwave Access (WiMAX) multi-hop network. Using network coding, a secure way of transmission is performed which helps in improving throughput and reduces the packet loss in the multicast network. At the outset, improved network coding is proposed in multicast wireless mesh network. Considering the problem of performance overhead, degree distribution makes a decision while performing buffer in the encoding / decoding process. Consequently, BuS (Buffer Scheme) based on network coding is proposed in the multi-hop network. Here the encoding process introduces buffer for temporary storage to transmit packets with proper degree distribution. The simulation results depend on the number of packets received in the encoding/decoding with proper degree distribution using buffering scheme.

Keywords: encoding and decoding, buffer, network coding, degree distribution, broadband wireless networks, multicast

Procedia PDF Downloads 410
1855 Machine Learning Automatic Detection on Twitter Cyberbullying

Authors: Raghad A. Altowairgi

Abstract:

With the wide spread of social media platforms, young people tend to use them extensively as the first means of communication due to their ease and modernity. But these platforms often create a fertile ground for bullies to practice their aggressive behavior against their victims. Platform usage cannot be reduced, but intelligent mechanisms can be implemented to reduce the abuse. This is where machine learning comes in. Understanding and classifying text can be helpful in order to minimize the act of cyberbullying. Artificial intelligence techniques have expanded to formulate an applied tool to address the phenomenon of cyberbullying. In this research, machine learning models are built to classify text into two classes; cyberbullying and non-cyberbullying. After preprocessing the data in 4 stages; removing characters that do not provide meaningful information to the models, tokenization, removing stop words, and lowering text. BoW and TF-IDF are used as the main features for the five classifiers, which are; logistic regression, Naïve Bayes, Random Forest, XGboost, and Catboost classifiers. Each of them scores 92%, 90%, 92%, 91%, 86% respectively.

Keywords: cyberbullying, machine learning, Bag-of-Words, term frequency-inverse document frequency, natural language processing, Catboost

Procedia PDF Downloads 130
1854 Hydraulic Resources Management under Imperfect Competition with Thermal Plants in the Wholesale Electricity Market

Authors: Abdessalem Abbassi, Ahlem Dakhlaoui, Lota D. Tamini

Abstract:

In this paper, we analyze infinite discrete-time games between hydraulic and thermal power operators in the wholesale electricity market under Cournot competition. We consider a deregulated electrical industry where certain demand is satisfied by hydraulic and thermal technologies. The hydraulic operator decides the production in each season of each period that maximizes the sum of expected profits from power generation with respect to the stochastic dynamic constraint on the water stored in the dam, the environmental constraint and the non-negative output constraint. In contrast, the thermal plant is operated with quadratic cost function, with respect to the capacity production constraint and the non-negativity output constraint. We show that under imperfect competition, the hydraulic operator has a strategic storage of water in the peak season. Then, we quantify the strategic inter-annual and intra-annual water transfer and compare the numerical results. Finally, we show that the thermal operator can restrict the hydraulic output without compensation.

Keywords: asymmetric risk aversion, electricity wholesale market, hydropower dams, imperfect competition

Procedia PDF Downloads 359
1853 Estimating Poverty Levels from Satellite Imagery: A Comparison of Human Readers and an Artificial Intelligence Model

Authors: Ola Hall, Ibrahim Wahab, Thorsteinn Rognvaldsson, Mattias Ohlsson

Abstract:

The subfield of poverty and welfare estimation that applies machine learning tools and methods on satellite imagery is a nascent but rapidly growing one. This is in part driven by the sustainable development goal, whose overarching principle is that no region is left behind. Among other things, this requires that welfare levels can be accurately and rapidly estimated at different spatial scales and resolutions. Conventional tools of household surveys and interviews do not suffice in this regard. While they are useful for gaining a longitudinal understanding of the welfare levels of populations, they do not offer adequate spatial coverage for the accuracy that is needed, nor are their implementation sufficiently swift to gain an accurate insight into people and places. It is this void that satellite imagery fills. Previously, this was near-impossible to implement due to the sheer volume of data that needed processing. Recent advances in machine learning, especially the deep learning subtype, such as deep neural networks, have made this a rapidly growing area of scholarship. Despite their unprecedented levels of performance, such models lack transparency and explainability and thus have seen limited downstream applications as humans generally are apprehensive of techniques that are not inherently interpretable and trustworthy. While several studies have demonstrated the superhuman performance of AI models, none has directly compared the performance of such models and human readers in the domain of poverty studies. In the present study, we directly compare the performance of human readers and a DL model using different resolutions of satellite imagery to estimate the welfare levels of demographic and health survey clusters in Tanzania, using the wealth quintile ratings from the same survey as the ground truth data. The cluster-level imagery covers all 608 cluster locations, of which 428 were classified as rural. The imagery for the human readers was sourced from the Google Maps Platform at an ultra-high resolution of 0.6m per pixel at zoom level 18, while that of the machine learning model was sourced from the comparatively lower resolution Sentinel-2 10m per pixel data for the same cluster locations. Rank correlation coefficients of between 0.31 and 0.32 achieved by the human readers were much lower when compared to those attained by the machine learning model – 0.69-0.79. This superhuman performance by the model is even more significant given that it was trained on the relatively lower 10-meter resolution satellite data while the human readers estimated welfare levels from the higher 0.6m spatial resolution data from which key markers of poverty and slums – roofing and road quality – are discernible. It is important to note, however, that the human readers did not receive any training before ratings, and had this been done, their performance might have improved. The stellar performance of the model also comes with the inevitable shortfall relating to limited transparency and explainability. The findings have significant implications for attaining the objective of the current frontier of deep learning models in this domain of scholarship – eXplainable Artificial Intelligence through a collaborative rather than a comparative framework.

Keywords: poverty prediction, satellite imagery, human readers, machine learning, Tanzania

Procedia PDF Downloads 105