Search results for: graphic user interface (GUI)
646 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 141645 Energy Retrofitting Application Research to Achieve Energy Efficiency in Hot-Arid Climates in Residential Buildings: A Case Study of Saudi Arabia
Authors: A. Felimban, A. Prieto, U. Knaack, T. Klein
Abstract:
This study aims to present an overview of recent research in building energy-retrofitting strategy applications and analyzing them within the context of hot arid climate regions which is in this case study represented by the Kingdom of Saudi Arabia. The main goal of this research is to do an analytical study of recent research approaches to show where the primary gap in knowledge exists and outline which possible strategies are available that can be applied in future research. Also, the paper focuses on energy retrofitting strategies at a building envelop level. The study is limited to specific measures within the hot arid climate region. Scientific articles were carefully chosen as they met the expression criteria, such as retrofitting, energy-retrofitting, hot-arid, energy efficiency, residential buildings, which helped narrow the research scope. Then the papers were explored through descriptive analysis and justified results within the Saudi context in order to draw an overview of future opportunities from the field of study for the last two decades. The conclusions of the analysis of the recent research confirmed that the field of study had a research shortage on investigating actual applications and testing of newly introduced energy efficiency applications, lack of energy cost feasibility studies and there was also a lack of public awareness. In terms of research methods, it was found that simulation software was a major instrument used in energy retrofitting application research. The main knowledge gaps that were identified included the need for certain research regarding actual application testing; energy retrofitting strategies application feasibility; the lack of research on the importance of how strategies apply first followed by the user acceptance of developed scenarios.Keywords: energy efficiency, energy retrofitting, hot arid, Saudi Arabia
Procedia PDF Downloads 122644 WhatsApp Application and Challenges of Radio Broadcasting in Northern Nigeria: Special Interest on FRCN Kaduna
Authors: Aliyu Damri
Abstract:
This study analyzed the emergence of WhatsApp and how employees at the Federal Radio Corporation of Nigeria, Kaduna defined the concept base on their vast broadcasting experiences for over five decades and application of the phenomenon to the radio station. It also analyzed the nature, patterns, dimensions, features, challenges as well as the effects of WhatsApp as a social networking site with specific interest on the radio outlet. Also, the study identified how the radio organization responded to the challenges in an attempt to adapt to the new pattern of broadcasting characterized by many technological transformations. The study further explained in details such skills journalists need to function optimally using WhatsApp as well as the impacts of the WhatsApp on radio broadcasting. It used a combination of published materials, focus group discussion, in depth interviews and participant observation on the activities of the radio stations to address the research questions. The data generated provided insight to better understand the challenges posed to FRCN Kaduna as a result of WhatsApp application and how FRCN Kaduna responded to the challenges. It also provided information on the skills journalists need to function optimally in using WhatsApp application in the radio station. The interview and focus group discussion’s transcripts and the published materials were analyzed along thematic pattern related to the research questions in the study. The dominant response relied heavily on change in the radio station’s organizational and technical integration of newsrooms, the use of a multiskilled workforce, application of a flexible and user-friendly technology in all aspects of production, expansion of the station’s services in to new media such as internet and mobile phones as well as sharing of ideas across different units in the radio outfit.Keywords: broadcasting, challenge, northern Nigeria, radio, WhatsApp application
Procedia PDF Downloads 129643 The Management of Care by People with Type 2 Diabetes versus the Professional Care at Primary Health Care in Brazil
Authors: Nunila Ferreira de Oliveira, Silvana Martins Mishima
Abstract:
Diabetes mellitus type 2 (DM2) prevalence, is increasing on the world, in Brazil is considered a public health problem. Treatment focuses on glycemic control depending primarily of lifestyle changes - not drug treatment (NDT), may involve drug therapy (DT) and requires continuous health monitoring. In Brazil this monitoring is performed by the Unified Health System (SUS) through Primary Health Care (PHC), which stimulate people with DM2 empowerment for care management. SUS was approved in 1988 and the PHC operationalization was strengthened with the creation of the Family Health Strategy (FHS) in 1994. Our aim was to analyze the people with DM2 participation in front of the care management health monitoring in the FHS. Qualitative research was carried out through non-participant observation of attendance of 25 people with DM2 in the FHS and interviewed at home. Ethical guidelines were followed. It was found that people with DM2 only follow professionals’ recommendations that make sense according to their own conceptions of health/disease; most of them emphasize the importance of (DT) with little emphasis on the NDT, was found great difficulty in the NDT and lack of knowledge about the disease and care. As regards monitoring the FHS, were observed therapeutic practices based on the bio medical model, although the APS search for another care perspective; NDT is not systematically accompanied by the health team and takes place a few educational activities on the DM2 in the FHS, with low user adoption. The work of the FHS is done by multidisciplinary teams, but we see the need for greater participation of nurses in clinical-care follow-up of this population and may also act in adapting to the NDT. Finally we emphasize the need for professional practices that consider the difficulties to care management by people with DM2, especially because of the NDT. It is noticed that the measures recommended by the FHS professionals are not always developed by people with DM2. We must seek the empowerment of people with DM2 to manage the form of care associated with the FHS team, seeking to reduce the incidence of complications and higher quality of life.Keywords: diabetes mellitus, primary health care, nursing, management of care
Procedia PDF Downloads 456642 The Effects of Subsidised Irrigation Service Fees on Irrigation Performance in Vietnam
Authors: Trang Pham
Abstract:
Approximately 70% of the Vietnamese population lives in rural areas where the main livelihood is farming. For many years, the Vietnamese Government has been working towards improving farmers’ quality of life. In 2008, the Government issued the decree 115/2008/ND-CP to subsidize farmers’ water fees. The subsidy covers operation and management costs of major water infrastructure. Water users have only to pay for the operation and management of minor or tertiary canal systems. But the “subsidized water fee” has become contentious; there are two opposing schools of thought. One view is that the subsidy lessens the burden on farmers in terms of reducing their production costs, at the same time generating a sufficient budget for Irrigation Management Companies (IMCs) and Water User Association (WUAs). The alternate point of view is that the subsidy negatively effects irrigation performance, especially in tertiary canals. The aim of this study was to gain clear awareness of the perceptions of farmers, WUA members, and IMC staffs in regard to irrigation performance and management since the introduction of subsidies and local water fees. In order to find out how the government intervention has affected local farming communities, a series of questionnaires and interviews were administered in 2013. Four case studies were chosen which represent four different agricultural areas and four different irrigation systems in Vietnam. Interviews were conducted with IMC staffs and WUA members and questionnaires were used to gather information from farmers. The study compares the difference in operation and management costs across the four case studies both before and after the implementation of the decree. The results disclose factors behind the subsidized water fee that either allow or hinder improved irrigation performance and better irrigation management.Keywords: water fee, irrigation performance, local farming, tertiary canal systems
Procedia PDF Downloads 323641 The Contact between a Rigid Substrate and a Thick Elastic Layer
Authors: Nicola Menga, Giuseppe Carbone
Abstract:
Although contact mechanics has been widely focused on the study of contacts between half-space, it has been recently pointed out that in presence of finite thickness elastic layers the results of the contact problem show significant difference in terms of the main contact quantities (e.g. contact area, penetration, mean pressure, etc.). Actually, there exist a wide range of industrial application demanding for this kind of studies, such as seals leakage prediction or pressure-sensitive coatings for electrical applications. In this work, we focus on the contact between a rigid profile and an elastic layer of thickness h confined under two different configurations: rigid constrain and applied uniform pressure. The elastic problem at hand has been formalized following Green’s function method and then numerically solved by means of a matrix inversion. We study different contact conditions, both considering and neglecting adhesive interactions at the interface. This leads to different solution techniques: Adhesive contacts equilibrium solution is found, in term of contact area for given penetration, making stationary the total free energy of the system; whereas, adhesiveless contacts are addressed defining an equilibrium criterion, again on the contact area, relying on the fracture mechanics stress intensity factor KI. In particular, we make the KI vanish at the edges of the contact area, as peculiar for adhesiveless elastic contacts. The results are obtained in terms of contact area, penetration, and mean pressure for both adhesive and adhesiveless contact conditions. As expected, in the case of a uniform applied pressure the slab turns out much more compliant than the rigidly constrained one. Indeed, we have observed that the peak value of the contact pressure, for both the adhesive and adhesiveless condition, is much higher for the rigidly constrained configuration than in the case of applied uniform pressure. Furthermore, we observed that, for little contact area, both systems behave the same and the pull-off occurs at approximately the same contact area and mean contact pressure. This is an expected result since in this condition the ratio between the layers thickness and the contact area is very high and both layer configurations recover the half-space behavior where the pull-off occurrence is mainly controlled by the adhesive interactions, which are kept constant among the cases.Keywords: contact mechanics, adhesion, friction, thick layer
Procedia PDF Downloads 511640 Physical Modeling of Woodwind Ancient Greek Musical Instruments: The Case of Plagiaulos
Authors: Dimitra Marini, Konstantinos Bakogiannis, Spyros Polychronopoulos, Georgios Kouroupetroglou
Abstract:
Archaemusicology cannot entirely depend on the study of the excavated ancient musical instruments as most of the time their condition is not ideal (i.e., missing/eroded parts) and moreover, because of the concern damaging the originals during the experiments. Researchers, in order to overcome the above obstacles, build replicas. This technique is still the most popular one, although it is rather expensive and time-consuming. Throughout the last decades, the development of physical modeling techniques has provided tools that enable the study of musical instruments through their digitally simulated models. This is not only a more cost and time-efficient technique but also provides additional flexibility as the user can easily modify parameters such as their geometrical features and materials. This paper thoroughly describes the steps to create a physical model of a woodwind ancient Greek instrument, Plagiaulos. This instrument could be considered as the ancestor of the modern flute due to the common geometry and air-jet excitation mechanism. Plagiaulos is comprised of a single resonator with an open end and a number of tone holes. The combination of closed and open tone holes produces the pitch variations. In this work, the effects of all the instrument’s components are described by means of physics and then simulated based on digital waveguides. The synthesized sound of the proposed model complies with the theory, highlighting its validity. Further, the synthesized sound of the model simulating the Plagiaulos of Koile (2nd century BCE) was compared with its replica build in our laboratory by following the scientific methodologies of archeomusicology. The aforementioned results verify that robust dynamic digital tools can be introduced in the field of computational, experimental archaemusicology.Keywords: archaeomusicology, digital waveguides, musical acoustics, physical modeling
Procedia PDF Downloads 113639 Comparison of Blockchain Ecosystem for Identity Management
Authors: K. S. Suganya, R. Nedunchezhian
Abstract:
In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity
Procedia PDF Downloads 130638 Usefulness of Web Sites in Starting Up Wineries: A Comparative study of Canadian, Moroccan and American Small Firms
Authors: Jocelyn D. Perreault
Abstract:
An exploratory study has been launched in 2013-2014 in the province of Quebec, the state of Vermont (USA) and the region of Zaer in Morocco. We have realized three first case studies in order to better understand the marketing strategies of starting up vineries, which are defined as having a maximum of five years of operations. The methodology used consisted of visiting the vineyards; conducting semi-directed interviews with owner-managers; visiting points-of-sale of the wines and analysing the web sites using an assessment grid. The results indicate many differences between the three firms in their use of their web sites. More precisely, we have noticed that: -The Quebec vineyard uses its web site in collaboration with the touristic actors of its region and the association of the wine makers of the province of Quebec.Positioning is as a touristic attraction. -In comparison,the Moroccan firm limits the content of the web site to itself and its activities and somehow to the wine industry.Positioning is as a wine specialist. -The american firm associated its web site more to farm markets actors and activities of the region.Positioning is as an agricultural actor. -The positionings of the three vineyards are very different from each others and will be discussed more thoroughly during the presentation to better understand the use of web sites, thus contributing to the «brand image». -Improvements to the three web sites have been identified and suggested by more than a hundred of persons using the same grid and comprising students of bachelor and MBA degrees from our university. In general, the web sites have been considered satisfying but requiring several improvements at different levels. Changes or updates have been observed for the Quebec winery web site but practically no changes have been made to the others in the last months. The assessment grid will be presented in more details as well as the global and the partial scores given by the respondents. In conclusion, we have noticed that only one winery is considered as a «heavy and strategic user» of its web site and of Facebook and Twitter.Keywords: web site, wineries, marketing, positioning, starting up strategies
Procedia PDF Downloads 303637 Development of a Sprayable Piezoelectric Material for E-Textile Applications
Authors: K. Yang, Y. Wei, M. Zhang, S. Yong, R. Torah, J. Tudor, S. Beeby
Abstract:
E-textiles are traditional textiles with integrated electronic functionality. It is an emerging innovation with numerous applications in fashion, wearable computing, health and safety monitoring, and the military and medical sectors. The piezoelectric effect is a widespread and versatile transduction mechanism used in sensor and actuator applications. Piezoelectric materials produce electric charge when stressed. Conversely, mechanical deformation occurs when an electric field is applied across the material. Lead Zirconate Titanate (PZT) is a widely used piezoceramic material which has been used to fabricate e-textiles through screen printing, electro spinning and hydrothermal synthesis. This paper explores an alternative fabrication process: Spray coating. Spray coating is a straightforward and cost effective fabrication method applicable on both flat and curved surfaces. It can also be applied selectively by spraying through a stencil which enables the required design to be realised on the substrate. This work developed a sprayable PZT based piezoelectric ink consisting of a binder (Fabink-Binder-01), PZT powder (80 % 2 µm and 20 % 0.8 µm) and acetone as a thinner. The optimised weight ratio of PZT/binder is 10:1. The components were mixed using a SpeedMixer DAC 150. The fabrication processes is as follows: 1) Screen print a UV-curable polyurethane interface layer on the textile to create a smooth textile surface. 2) Spray one layer of a conductive silver polymer ink through a pre-designed stencil and dry at 90 °C for 10 minutes to form the bottom electrode. 3) Spray three layers of the PZT ink through a pre-designed stencil and dry at 90 °C for 10 minutes for each layer to form a total thickness of ~250µm PZT layer. 4) Spray one layer of the silver ink through a pre-designed stencil on top of the PZT layer and dry at 90 °C for 10 minutes to form the top electrode. The domains of the PZT elements were aligned by polarising the material at an elevated temperature under a strong electric field. A d33 of 37 pC/N has been achieved after polarising at 90 °C for 6 minutes with an electric field of 3 MV/m. The application of the piezoelectric textile was demonstrated by fabricating a pressure sensor to switch an LED on/off. Other potential applications on e-textiles include motion sensing, energy harvesting, force sensing and a buzzer.Keywords: piezoelectric, PZT, spray coating, pressure sensor, e-textile
Procedia PDF Downloads 465636 Towards a Biologically Relevant Tumor-on-a-Chip: Multiplex Microfluidic Platform to Study Breast Cancer Drug Response
Authors: Soroosh Torabi, Brad Berron, Ren Xu, Christine Trinkle
Abstract:
Microfluidics integrated with 3D cell culture is a powerful technology to mimic cellular environment, and can be used to study cell activities such as proliferation, migration and response to drugs. This technology has gained more attention in cancer studies over the past years, and many organ-on-a-chip systems have been developed to study cancer cell behaviors in an ex-vivo tumor microenvironment. However, there are still some barriers to adoption which include low throughput, complexity in 3D cell culture integration and limitations on non-optical analysis of cells. In this study, a user-friendly microfluidic multi-well plate was developed to mimic the in vivo tumor microenvironment. The microfluidic platform feeds multiple 3D cell culture sites at the same time which enhances the throughput of the system. The platform uses hydrophobic Cassie-Baxter surfaces created by microchannels to enable convenient loading of hydrogel/cell suspensions into the device, while providing barrier free placement of the hydrogel and cells adjacent to the fluidic path. The microchannels support convective flow and diffusion of nutrients to the cells and a removable lid is used to enable further chemical and physiological analysis on the cells. Different breast cancer cell lines were cultured in the device and then monitored to characterize nutrient delivery to the cells as well as cell invasion and proliferation. In addition, the drug response of breast cancer cell lines cultured in the device was compared to the response in xenograft models to the same drugs to analyze relevance of this platform for use in future drug-response studies.Keywords: microfluidics, multi-well 3d cell culture, tumor microenvironment, tumor-on-a-chip
Procedia PDF Downloads 264635 Derivation of a Risk-Based Level of Service Index for Surface Street Network Using Reliability Analysis
Authors: Chang-Jen Lan
Abstract:
Current Level of Service (LOS) index adopted in Highway Capacity Manual (HCM) for signalized intersections on surface streets is based on the intersection average delay. The delay thresholds for defining LOS grades are subjective and is unrelated to critical traffic condition. For example, an intersection delay of 80 sec per vehicle for failing LOS grade F does not necessarily correspond to the intersection capacity. Also, a specific measure of average delay may result from delay minimization, delay equality, or other meaningful optimization criteria. To that end, a reliability version of the intersection critical degree of saturation (v/c) as the LOS index is introduced. Traditionally, the level of saturation at a signalized intersection is defined as the ratio of critical volume sum (per lane) to the average saturation flow (per lane) during all available effective green time within a cycle. The critical sum is the sum of the maximal conflicting movement-pair volumes in northbound-southbound and eastbound/westbound right of ways. In this study, both movement volume and saturation flow are assumed log-normal distributions. Because, when the conditions of central limit theorem obtain, multiplication of the independent, positive random variables tends to result in a log-normal distributed outcome in the limit, the critical degree of saturation is expected to be a log-normal distribution as well. Derivation of the risk index predictive limits is complex due to the maximum and absolute value operators, as well as the ratio of random variables. A fairly accurate functional form for the predictive limit at a user-specified significant level is yielded. The predictive limit is then compared with the designated LOS thresholds for the intersection critical degree of saturation (denoted as XKeywords: reliability analysis, level of service, intersection critical degree of saturation, risk based index
Procedia PDF Downloads 131634 Impact of E-Resources and Its Acceessability by Faculty and Research Scholars of Academic Libraries: A Case Study
Authors: M. Jaculine Mary
Abstract:
Today electronic resources are considered as an integral part of information sources to impart efficient services to the people aspiring to acquire knowledge in different fields. E-resources are those resources which include documents in e-format that can be accessed via the Internet in a digital library environment. The present study focuses on accessibility and use of e-resources by faculty and research scholars of academic libraries of Coimbatore, TamilNadu, India. The main objectives are to identify their purpose of using e-resources, know the users’ Information and Communication Technology (ICT) skills, identify satisfaction level of availability of e-resources, use of different e-resources, overall user satisfaction of using e-resources, impact of e-resources on their research and problems faced by them in the access of e-resources. The research methodology adopted to collect data for this study includes analysis of survey reports carried out by distributing questionnaires to the users. The findings of the research are based on the study of responses received from questionnaires distributed to a sample population of 200 users. Among the 200 respondents, 55 percent of research students and 45 percent of faculty members were users of e-resources. It was found that a majority of the users agreed that relevant, updated information at a fast pace had influenced them to use e-resources. Most of the respondents were of the view that more numbers of computers in the library would facilitate quick learning. Academic libraries have to take steps to arrange various training and orientation programmes for research students and faculty members to use the availability of e-resources. This study helps the librarian in planning and development of e-resources to provide modern services to their users of libraries. The study recommends that measures should be taken to increase the accessibility level of e-resource services among the information seekers for increasing the best usage of available electronic resources in the academic libraries.Keywords: academic libraries, accessibility, electronic resources, satisfaction level, survey
Procedia PDF Downloads 142633 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms Top 10 Saudi Political Twitter Users
Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez
Abstract:
Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. A most important factor contributing to this effect is the existence of influential users, who have developed a reputation for their awareness and experience on specific subjects. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is based on the pioneering work of Katz and Lazarsfeld (1959), who created the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.Keywords: twitter, influencers, structured mechanism, Saudi Arabia
Procedia PDF Downloads 137632 Manipulating The PAAR Proteins of Acinetobacter Baumannii
Authors: Irene Alevizos, Jessica Lewis, Marina Harper, John Boyce
Abstract:
Acinetobacter baumannii causes a range of severe nosocomial-acquired infections, and many strains are multi-drug resistant. A. baumannii possesses survival mechanisms allowing it to thrive in competitive polymicrobial environments, including a Type VI Secretion System (T6SS) that injects effector proteins into other bacteria to give a competitive advantage. The effects of T6SS firing are broad and depend entirely on the effector that is delivered. Effects can include toxicity against prokaryotic or eukaryotic cells and the acquisition of essential nutrients. The T6SS of some species can deliver ‘specialised effectors’ that are fused directly to T6SS components, such as PAAR proteins. PAAR proteins are predicted to form the piercing tip of the T6SS and are essential for T6SS function. Although no specialised effectors have been identified in A. baumannii, many strains encode multiple PAAR proteins. Analysis of PAAR proteins across the species identified 12 families of PAAR proteins with distinct C-terminal extensions. A. baumannii AB307-0294 encodes two PAAR proteins, one of which has a C-terminal extension. Mutation of one or both of the PAAR-encoding genes in this strain showed that expression of either PAAR protein was sufficient for T6SS function. We employed a heterologous expression approach and determined that PAAR proteins from different A. baumannii strains, as well as the closely related A. baylyi species, could complement the A. baumannii ∆paar mutant and restore T6SS function. Furthermore, we showed that PAAR fusions could be used to deliver artificially cloned protein fragments by generating Histidine- and Streptavidin- tagged PAAR specialised effectors, which restored T6SS activity. This provides evidence that the fusion of protein fragments onto PAAR proteins in A. baumannii is compatible with a functional T6SS. Successful delivery by this mechanism extends the scope of what the T6SS can deliver, including user designed proteins.Keywords: A. baumannii, effectors, PAAR, T6SS
Procedia PDF Downloads 97631 Developing an Automated Protocol for the Wristband Extraction Process Using Opentrons
Authors: Tei Kim, Brooklynn McNeil, Kathryn Dunn, Douglas I. Walker
Abstract:
To better characterize the relationship between complex chemical exposures and disease, our laboratory uses an approach that combines low-cost, polydimethylsiloxane (silicone) wristband samplers that absorb many of the chemicals we are exposed to with untargeted high-resolution mass spectrometry (HRMS) to characterize 1000’s of chemicals at a time. In studies with human populations, these wristbands can provide an important measure of our environment: however, there is a need to use this approach in large cohorts to study exposures associated with the disease. To facilitate the use of silicone samplers in large scale population studies, the goal of this research project was to establish automated sample preparation methods that improve throughput, robustness, and scalability of analytical methods for silicone wristbands. Using the Opentron OT2 automated liquid platform, which provides a low-cost and opensource framework for automated pipetting, we created two separate workflows that translate the manual wristband preparation method to a fully automated protocol that requires minor intervention by the operator. These protocols include a sequence generation step, which defines the location of all plates and labware according to user-specified settings, and a transfer protocol that includes all necessary instrument parameters and instructions for automated solvent extraction of wristband samplers. These protocols were written in Python and uploaded to GitHub for use by others in the research community. Results from this project show it is possible to establish automated and open source methods for the preparation of silicone wristband samplers to support profiling of many environmental exposures. Ongoing studies include deployment in longitudinal cohort studies to investigate the relationship between personal chemical exposure and disease.Keywords: bioinformatics, automation, opentrons, research
Procedia PDF Downloads 115630 Experience of Transfering Critically Ill Patients on a Transport Ventilator in a Lower Middle-Income Country-Uganda
Authors: Baluku Nathan
Abstract:
Transferring critically ill patients from one health facility to another poses a major risk to the patient because of increased oxygen demands. transferring patients with critical COVID-19 from a rural health canter in a rural district to a national referral hospital over 350 km in 7 hours would require three size H oxygen cylinders for successful transfer. It was always difficult to arrange the three size cylinders in the ambulance as workspace was greatly compromised for the ambulance assistant. Purpose: The purpose of this study was to investigate the impact and effectiveness of transport ventilators on the transportation of the critically ill patients from rural health canters to national referral hospitals in Uganda. Methodology: This was a descriptive cross-sectional study conducted in sept 2022 among critical care nurses and ambulance assistants who had used both methods of transportation (ventilators and cylinders). A semi structured questionnaire was used to collect quantitative data after informed consent. Results: From the findings, distribution of transport ventilators to the regional referral hospitals by the Ministry of Health has gradually improved patient transfer as the team requires less than one size oxygen cylinder to successfully transfer a patient. We use two ambulance assistants (a critical care nurse and another nurse who has been trained on use of the ventilator) when transferring patients with critical COVID-19 as the teams have to interchange over the long distance. Conclusions: Transport ventilators are effective and efficient in transferring critically ill patients, therefore should be rolled out to lower levels coupled with user training to improve outcomes of patients transferred in ambulances in lower income countries.Keywords: emergency medical technician, critically ill, COVID-19, transport ventilator
Procedia PDF Downloads 86629 Social Media: The Major Trigger of Online and Offline Political Activism
Authors: Chan Eang Teng, Tang Mui Joo
Abstract:
With the viral factor on social media, the sense of persuasion is generated by repetition and popularity. When users’ interest is captured, political awareness increases to spark political enthusiasm, but, the level of user’s political participation and political attitude of those active users is still questionable. An online survey on 250 youth and in-depth interview on two politicians are conducted to answer the main question in this paper. The result shows that Facebook significantly increases political awareness among youths. Social media may not be the major trigger to political activism among youths as most respondents opined that they would still vote without Facebook. Other factors could be political campaigning, political climate, age, peer pressure or others. Finding also shows that majority of respondents did not participate in online political debates or political groups. Many also wondered if the social media was the main power switch that triggers the political influx among young voters. The research finding is significant to understand how the new media, Facebook, has reshaped the political landscape in Malaysia, creating the Social Media Election that changed the rules of the political game. However, research finding does not support the ideal notion that the social media is the major trigger to youth’s political activism. This research outcome has exposed the flaws of the Social Media Election. It has revealed the less optimistic side of youth political activism. Unfortunately, results fall short of the idealistic belief that the social media have given rise to political activism among youths in the 13th General Election in Malaysia. The research outcome also highlights an important lesson for the democratic discourse of Malaysia which is making informed and educated decisions takes more commitment, proactive and objective attitude.Keywords: social media, political participation, political activism, democracy, political communication
Procedia PDF Downloads 323628 Mobi Navi Tour for Rescue Operations
Authors: V. R. Sadasivam, M. Vipin, P. Vineeth, M. Sajith, G. Sathiskumar, R. Manikandan, N. Vijayarangan
Abstract:
Global positioning system technology is what leads to such things as navigation systems, GPS tracking devices, GPS surveying and GPS mapping. All that GPS does is provide a set of coordinates which represent the location of GPS units with respect to its latitude, longitude and elevation on planet Earth. It also provides time, which is accurate. The tracking devices themselves come in different flavors. They will contain a GPS receiver, and GPS software, along with some way of transmitting the resulting coordinates. GPS in mobile tend to use radio waves to transmit their location to another GPS device. The purpose of this prototype “Mobi Navi Tour for Rescue Operation” timely communication, and lightning fast decision-making with a group of people located in different places with a common goal. Timely communication and tracking the people are a critical issue in many situations, environments. Expedited can find missing person by sending the location and other related information to them through mobile. Information must be drawn from the caller and entered into the system by the administrator or a group leader and transferred to the group leader. This system will locate the closest available person, a group of people working in an organization/company or vehicle to determine availability and their position to track them. Misinformation cannot lead to the wrong decision in the rapidly paced environment in a normal and an abnormal situation. In “Mobi Navi Tour for Rescue Operation” we use Google Cloud Messaging for android (GCM) which is a service that helps developers send data from servers to their android applications on android devices. The service provides a simple, lightweight mechanism that servers can use to tell mobile applications to contact the server directly, to fetch updated application or user data.Keywords: android, gps, tour, communication, service
Procedia PDF Downloads 396627 Generation of Research Ideas Through a Matrix in the Field of International Comparative Education
Authors: Saleh Alzahrani
Abstract:
The studies in the field of International Comparative Education in the Arabic world and the middle east are scarcity. However, some International Comparative Education Researchers and post graduates face a challenge concerning of a selection of a distinguished study to improve their national education system. It requires a considerable effort. According to that, the matrix of scientific research in comparative and international education is designed to help specialists, researchers and graduate students in generating a variety of research ideas in a short time in this field. The matrix is built by using content analysis method of comparative education research published in the Arab journals from 1980 to 2017. Then, qualitative input with the in-depth focus analysis tool is utilized according to the root theory. The matrix consists of two axes; vertical (X) and horizontal (Y). The number of fields in the vertical axis are 6 domains, including 105 variables. The horizontal axis is two fields which are pre-university education that incorporate educational stages and contemporary formulations including (23) variables. The second field is the university education in its public universities and contemporary formulas including (15) variables. The researcher can access topics, ideas and research points through the matrix of scientific research in comparative and international education by selecting of any subject on the vertical axis (X) from (1) to (105) and selecting of any subject on the horizontal axis (Y) from (B) to (U). The cell where the axes intersect with the chosen fields can generate an idea or a research point conveniently and easily through the words that have been monitored by the user. These steps can be repeated to generate new ideas and research points. Many graduate researchers have been trained on using of this matrix which gave them more potential to generate an appropriate study serving the national education.Keywords: content analysis method, comparative education, international education, matrix, root theory
Procedia PDF Downloads 133626 Citizen Journalist: A Case Study of Audience Participation in Mainstream TV News Production in India
Authors: Sindhu Manjesh
Abstract:
This paper examines citizen journalism in India, specifically the inclusion of user-generated content (UGC) by mainstream media, by focusing on the case study of the Citizen Journalist show on CNN-News 18, a national television news broadcaster. It studies the processes of production involved in Citizen Journalist to find out how professional journalists and citizens interact to put together the show in order to help readers understand the relationship between journalists and the public in the evolving media landscape of India, the world’s largest democracy, and a leader in the Global South. Using an in-depth case study approach involving newsroom ethnography, interviews, and an examination of Citizen Journalist content, it studies the implications of audience participation for traditional journalistic routines and values – specifically gatekeeping and objectivity. Citizen Journalist began to much fanfare and promise about including neglected citizen views and voices. Based on evidence gathered, this study, however, argues that claims made by CNN-News18 about democratizing news production through Citizen Journalist were overstated. It made some effort to do this and broadcast a lot of important stories. But overall, in terms of bringing in citizen voices, it did not live up to its initial promise because the show was anchored in traditional journalistic norms and roles and the channel’s economic imperatives. Professional journalists were ironically the producers of 'citizen journalism' in this case. Mainstream media’s authority in defining journalistic work –who says what, where, when, why, and how– remains predominant in India. This has implications for democratic participation in India. The example of Citizen Journalist –the model it followed, its partial success, and many limitations– could well presage outcomes for other news outlets, in India and beyond, which copy its template.Keywords: citizen journalism, digital journalism, participatory journalism, public sphere
Procedia PDF Downloads 120625 LTE Modelling of a DC Arc Ignition on Cold Electrodes
Authors: O. Ojeda Mena, Y. Cressault, P. Teulet, J. P. Gonnet, D. F. N. Santos, MD. Cunha, M. S. Benilov
Abstract:
The assumption of plasma in local thermal equilibrium (LTE) is commonly used to perform electric arc simulations for industrial applications. This assumption allows to model the arc using a set of magneto-hydromagnetic equations that can be solved with a computational fluid dynamic code. However, the LTE description is only valid in the arc column, whereas in the regions close to the electrodes the plasma deviates from the LTE state. The importance of these near-electrode regions is non-trivial since they define the energy and current transfer between the arc and the electrodes. Therefore, any accurate modelling of the arc must include a good description of the arc-electrode phenomena. Due to the modelling complexity and computational cost of solving the near-electrode layers, a simplified description of the arc-electrode interaction was developed in a previous work to study a steady high-pressure arc discharge, where the near-electrode regions are introduced at the interface between arc and electrode as boundary conditions. The present work proposes a similar approach to simulate the arc ignition in a free-burning arc configuration following an LTE description of the plasma. To obtain the transient evolution of the arc characteristics, appropriate boundary conditions for both the near-cathode and the near-anode regions are used based on recent publications. The arc-cathode interaction is modeled using a non-linear surface heating approach considering the secondary electron emission. On the other hand, the interaction between the arc and the anode is taken into account by means of the heating voltage approach. From the numerical modelling, three main stages can be identified during the arc ignition. Initially, a glow discharge is observed, where the cold non-thermionic cathode is uniformly heated at its surface and the near-cathode voltage drop is in the order of a few hundred volts. Next, a spot with high temperature is formed at the cathode tip followed by a sudden decrease of the near-cathode voltage drop, marking the glow-to-arc discharge transition. During this stage, the LTE plasma also presents an important increase of the temperature in the region adjacent to the hot spot. Finally, the near-cathode voltage drop stabilizes at a few volts and both the electrode and plasma temperatures reach the steady solution. The results after some seconds are similar to those presented for thermionic cathodes.Keywords: arc-electrode interaction, thermal plasmas, electric arc simulation, cold electrodes
Procedia PDF Downloads 122624 Uniqueness of Fingerprint Biometrics to Human Dynasty: A Review
Authors: Siddharatha Sharma
Abstract:
With the advent of technology and machines, the role of biometrics in society is taking an important place for secured living. Security issues are the major concern in today’s world and continue to grow in intensity and complexity. Biometrics based recognition, which involves precise measurement of the characteristics of living beings, is not a new method. Fingerprints are being used for several years by law enforcement and forensic agencies to identify the culprits and apprehend them. Biometrics is based on four basic principles i.e. (i) uniqueness, (ii) accuracy, (iii) permanency and (iv) peculiarity. In today’s world fingerprints are the most popular and unique biometrics method claiming a social benefit in the government sponsored programs. A remarkable example of the same is UIDAI (Unique Identification Authority of India) in India. In case of fingerprint biometrics the matching accuracy is very high. It has been observed empirically that even the identical twins also do not have similar prints. With the passage of time there has been an immense progress in the techniques of sensing computational speed, operating environment and the storage capabilities and it has become more user convenient. Only a small fraction of the population may be unsuitable for automatic identification because of genetic factors, aging, environmental or occupational reasons for example workers who have cuts and bruises on their hands which keep fingerprints changing. Fingerprints are limited to human beings only because of the presence of volar skin with corrugated ridges which are unique to this species. Fingerprint biometrics has proved to be a high level authentication system for identification of the human beings. Though it has limitations, for example it may be inefficient and ineffective if ridges of finger(s) or palm are moist authentication becomes difficult. This paper would focus on uniqueness of fingerprints to the human beings in comparison to other living beings and review the advancement in emerging technologies and their limitations.Keywords: fingerprinting, biometrics, human beings, authentication
Procedia PDF Downloads 325623 Expert System: Debugging Using MD5 Process Firewall
Authors: C. U. Om Kumar, S. Kishore, A. Geetha
Abstract:
An Operating system (OS) is software that manages computer hardware and software resources by providing services to computer programs. One of the important user expectations of the operating system is to provide the practice of defending information from unauthorized access, disclosure, modification, inspection, recording or destruction. Operating system is always vulnerable to the attacks of malwares such as computer virus, worm, Trojan horse, backdoors, ransomware, spyware, adware, scareware and more. And so the anti-virus software were created for ensuring security against the prominent computer viruses by applying a dictionary based approach. The anti-virus programs are not always guaranteed to provide security against the new viruses proliferating every day. To clarify this issue and to secure the computer system, our proposed expert system concentrates on authorizing the processes as wanted and unwanted by the administrator for execution. The Expert system maintains a database which consists of hash code of the processes which are to be allowed. These hash codes are generated using MD5 message-digest algorithm which is a widely used cryptographic hash function. The administrator approves the wanted processes that are to be executed in the client in a Local Area Network by implementing Client-Server architecture and only the processes that match with the processes in the database table will be executed by which many malicious processes are restricted from infecting the operating system. The add-on advantage of this proposed Expert system is that it limits CPU usage and minimizes resource utilization. Thus data and information security is ensured by our system along with increased performance of the operating system.Keywords: virus, worm, Trojan horse, back doors, Ransomware, Spyware, Adware, Scareware, sticky software, process table, MD5, CPU usage and resource utilization
Procedia PDF Downloads 427622 Designing Urban Spaces Differently: A Case Study of the Hercity Herstreets Public Space Improvement Initiative in Nairobi, Kenya
Authors: Rehema Kabare
Abstract:
As urban development initiatives continue to emerge and are implemented amid rapid urbanization and climate change effects in the global south, the plight of women is only being noticed. The pandemic exposed the atrocities, violence and unsafety women and girls face daily both in their homes and in public urban spaces. This is a result of poorly implemented and managed urban structures, which women have been left out of during design and implementation for centuries. The UN Habitat’s HerCity toolkit provides a unique opportunity to change course for both governments and civil society actors where women and girls are onboarded onto urban development initiatives, with their designs and ideas being the focal point. This toolkit proves that when women and girls design, they design for everyone. The HerCity HerStreets, Public Space Improvement Initiative, resulted in a design that focused on two aspects: Streets are a shared resource, and Streets are public spaces. These two concepts illustrate that for streets to be experienced effectively as cultural spaces, they need to be user-friendly, safe and inclusive. This report demonstrates how the HerCity HerStreets as a pilot project can be a benchmark for designing urban spaces in African cities. The project focused on five dimensions to improve the air quality of the space, the space allocation to street vending and bodaboda (passenger motorcycle) stops parking and the green coverage. The process displays how digital tools such as Minecraft and Kobo Toolbox can be utilized to improve citizens’ participation in the development of public spaces, with a special focus on including vulnerable groups such as women, girls and youth.Keywords: urban space, sustainable development, gender and the city, digital tools and urban development
Procedia PDF Downloads 82621 A Protein-Wave Alignment Tool for Frequency Related Homologies Identification in Polypeptide Sequences
Authors: Victor Prevost, Solene Landerneau, Michel Duhamel, Joel Sternheimer, Olivier Gallet, Pedro Ferrandiz, Marwa Mokni
Abstract:
The search for homologous proteins is one of the ongoing challenges in biology and bioinformatics. Traditionally, a pair of proteins is thought to be homologous when they originate from the same ancestral protein. In such a case, their sequences share similarities, and advanced scientific research effort is spent to investigate this question. On this basis, we propose the Protein-Wave Alignment Tool (”P-WAT”) developed within the framework of the France Relance 2030 plan. Our work takes into consideration the mass-related wave aspect of protein biosynthesis, by associating specific frequencies to each amino acid according to its mass. Amino acids are then regrouped within their mass category. This way, our algorithm produces specific alignments in addition to those obtained with a common amino acid coding system. For this purpose, we develop the ”P-WAT” original algorithm, able to address large protein databases, with different attributes such as species, protein names, etc. that allow us to align user’s requests with a set of specific protein sequences. The primary intent of this algorithm is to achieve efficient alignments, in this specific conceptual frame, by minimizing execution costs and information loss. Our algorithm identifies sequence similarities by searching for matches of sub-sequences of different sizes, referred to as primers. Our algorithm relies on Boolean operations upon a dot plot matrix to identify primer amino acids common to both proteins which are likely to be part of a significant alignment of peptides. From those primers, dynamic programming-like traceback operations generate alignments and alignment scores based on an adjusted PAM250 matrix.Keywords: protein, alignment, homologous, Genodic
Procedia PDF Downloads 113620 Unlocking the Future of Grocery Shopping: Graph Neural Network-Based Cold Start Item Recommendations with Reverse Next Item Period Recommendation (RNPR)
Authors: Tesfaye Fenta Boka, Niu Zhendong
Abstract:
Recommender systems play a crucial role in connecting individuals with the items they require, as is particularly evident in the rapid growth of online grocery shopping platforms. These systems predominantly rely on user-centered recommendations, where items are suggested based on individual preferences, garnering considerable attention and adoption. However, our focus lies on the item-centered recommendation task within the grocery shopping context. In the reverse next item period recommendation (RNPR) task, we are presented with a specific item and challenged to identify potential users who are likely to consume it in the upcoming period. Despite the ever-expanding inventory of products on online grocery platforms, the cold start item problem persists, posing a substantial hurdle in delivering personalized and accurate recommendations for new or niche grocery items. To address this challenge, we propose a Graph Neural Network (GNN)-based approach. By capitalizing on the inherent relationships among grocery items and leveraging users' historical interactions, our model aims to provide reliable and context-aware recommendations for cold-start items. This integration of GNN technology holds the promise of enhancing recommendation accuracy and catering to users' individual preferences. This research contributes to the advancement of personalized recommendations in the online grocery shopping domain. By harnessing the potential of GNNs and exploring item-centered recommendation strategies, we aim to improve the overall shopping experience and satisfaction of users on these platforms.Keywords: recommender systems, cold start item recommendations, online grocery shopping platforms, graph neural networks
Procedia PDF Downloads 91619 A Cloud-Based Mobile Auditing Tools for Muslim-Friendly Hospitality Services
Authors: Mohd Iskandar Illyas Tan, Zuhra Junaida Mohamad Husny, Farawahida Mohd Yusof
Abstract:
The potentials of Muslim-friendly hospitality services bring huge opportunities to operators (hoteliers, tourist guides, and travel agents), especially among the Muslim countries. In order to provide guidelines that facilitate the operations among these operators, standards and manuals have been developing by the authorities. Among the challenges is the applicability and complexity of the standard to be adopted in the real world. Mobile digital technology can be implemented to overcome those challenges. A prototype has been developed to help operators and authorities to assess their readiness in complying with MS2610:2015. This study analyzes the of mobile digital technology characteristics that are suitable for the user in conducting sharia’ compliant hospitality audit. A focus group study was conducted in the state of Penang, Malaysia that involves operators (hoteliers, tourist guide, and travel agents) as well as agencies (Islamic Tourism Center, Penang Islamic Affairs Department, Malaysian Standard) that involved directly in the implementation of the certification. Both groups were given the 3 weeks to test and provide feedback on the usability of the mobile applications in order to conduct an audit on their readiness towards the Muslim-friendly hospitality services standard developed by the Malaysian Standard. The feedbacks were analyzed and the overall results show that three criteria (ease of use, completeness and fast to complete) show the highest responses among both groups for the mobile application. This study provides the evidence that the mobile application development has huge potentials to be implemented by the Muslim-friendly hospitality services operator and agencies.Keywords: hospitality, innovation, audit, compliance, mobile application
Procedia PDF Downloads 133618 Model Order Reduction of Complex Airframes Using Component Mode Synthesis for Dynamic Aeroelasticity Load Analysis
Authors: Paul V. Thomas, Mostafa S. A. Elsayed, Denis Walch
Abstract:
Airframe structural optimization at different design stages results in new mass and stiffness distributions which modify the critical design loads envelop. Determination of aircraft critical loads is an extensive analysis procedure which involves simulating the aircraft at thousands of load cases as defined in the certification requirements. It is computationally prohibitive to use a Global Finite Element Model (GFEM) for the load analysis, hence reduced order structural models are required which closely represent the dynamic characteristics of the GFEM. This paper presents the implementation of Component Mode Synthesis (CMS) method for the generation of high fidelity Reduced Order Model (ROM) of complex airframes. Here, sub-structuring technique is used to divide the complex higher order airframe dynamical system into a set of subsystems. Each subsystem is reduced to fewer degrees of freedom using matrix projection onto a carefully chosen reduced order basis subspace. The reduced structural matrices are assembled for all the subsystems through interface coupling and the dynamic response of the total system is solved. The CMS method is employed to develop the ROM of a Bombardier Aerospace business jet which is coupled with an aerodynamic model for dynamic aeroelasticity loads analysis under gust turbulence. Another set of dynamic aeroelastic loads is also generated employing a stick model of the same aircraft. Stick model is the reduced order modelling methodology commonly used in the aerospace industry based on stiffness generation by unitary loading application. The extracted aeroelastic loads from both models are compared against those generated employing the GFEM. Critical loads Modal participation factors and modal characteristics of the different ROMs are investigated and compared against those of the GFEM. Results obtained show that the ROM generated using Craig Bampton CMS reduction process has a superior dynamic characteristics compared to the stick model.Keywords: component mode synthesis, craig bampton reduction method, dynamic aeroelasticity analysis, model order reduction
Procedia PDF Downloads 209617 Characterization and Modelling of Aerosol Droplet in Absorption Columns
Authors: Hammad Majeed, Hanna Knuutila, Magne Hillestad, Hallvard F. Svendsen
Abstract:
Formation of aerosols can cause serious complications in industrial exhaust gas CO2 capture processes. SO3 present in the flue gas can cause aerosol formation in an absorption based capture process. Small mist droplets and fog formed can normally not be removed in conventional demisting equipment because their submicron size allows the particles or droplets to follow the gas flow. As a consequence of this aerosol based emissions in the order of grams per Nm3 have been identified from PCCC plants. In absorption processes aerosols are generated by spontaneous condensation or desublimation processes in supersaturated gas phases. Undesired aerosol development may lead to amine emissions many times larger than what would be encountered in a mist free gas phase in PCCC development. It is thus of crucial importance to understand the formation and build-up of these aerosols in order to mitigate the problem. Rigorous modelling of aerosol dynamics leads to a system of partial differential equations. In order to understand mechanics of a particle entering an absorber an implementation of the model is created in Matlab. The model predicts the droplet size, the droplet internal variable profiles and the mass transfer fluxes as function of position in the absorber. The Matlab model is based on a subclass method of weighted residuals for boundary value problems named, orthogonal collocation method. The model comprises a set of mass transfer equations for transferring components and the essential diffusion reaction equations to describe the droplet internal profiles for all relevant constituents. Also included is heat transfer across the interface and inside the droplet. This paper presents results describing the basic simulation tool for the characterization of aerosols formed in CO2 absorption columns and gives examples as to how various entering droplets grow or shrink through an absorber and how their composition changes with respect to time. Below are given some preliminary simulation results for an aerosol droplet composition and temperature profiles.Keywords: absorption columns, aerosol formation, amine emissions, internal droplet profiles, monoethanolamine (MEA), post combustion CO2 capture, simulation
Procedia PDF Downloads 246