Search results for: Jackson Simon Lusagalika
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 264

Search results for: Jackson Simon Lusagalika

204 A Method for Rapid Evaluation of Ore Breakage Parameters from Core Images

Authors: A. Nguyen, K. Nguyen, J. Jackson, E. Manlapig

Abstract:

With the recent advancement in core imaging systems, a large volume of high resolution drill core images can now be collected rapidly. This paper presents a method for rapid prediction of ore-specific breakage parameters from high resolution mineral classified core images. The aim is to allow for a rapid assessment of the variability in ore hardness within a mineral deposit with reduced amount of physical breakage tests. This method sees its application primarily in project evaluation phase, where proper evaluation of the variability in ore hardness of the orebody normally requires prolong and costly metallurgical test work program. Applying this image-based texture analysis method on mineral classified core images, the ores are classified according to their textural characteristics. A small number of physical tests are performed to produce a dataset used for developing the relationship between texture classes and measured ore hardness. The paper also presents a case study in which this method has been applied on core samples from a copper porphyry deposit to predict the ore-specific breakage A*b parameter, obtained from JKRBT tests.

Keywords: geometallurgy, hyperspectral drill core imaging, process simulation, texture analysis

Procedia PDF Downloads 329
203 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 311
202 Artificial Intelligence in Global Healthcare: Need for Robust Governance Frameworks

Authors: Sandeep Reddy, Sonia Allan, Simon Coghlan, Paul Cooper

Abstract:

Artificial Intelligence (AI) and its application in medicine has generated ample interest amongst policymakers and clinicians. Successes with AI in medical imaging interpretation and clinical decision support are paving the way for its incorporation into routine healthcare delivery. While there has been a focus on the development of ethical principles to guide its application in healthcare, challenges of this application go beyond what ethics principles can address thus requiring robust governance frameworks. Also, while ethical challenges of medical artificial intelligence are being discussed, the ethics of deploying AI in lower-income countries receive less attention than in other developed economies. This creates an imperative not only for sound ethical guidelines but also for robust governance frameworks to regulate AI in medicine around the world. In this article, we discuss what components need to be considered in developing these governance frameworks and who should lead this worldwide effort.

Keywords: artificial intelligence, global health, governance, ethics

Procedia PDF Downloads 122
201 Statistic Regression and Open Data Approach for Identifying Economic Indicators That Influence e-Commerce

Authors: Apollinaire Barme, Simon Tamayo, Arthur Gaudron

Abstract:

This paper presents a statistical approach to identify explanatory variables linearly related to e-commerce sales. The proposed methodology allows specifying a regression model in order to quantify the relevance between openly available data (economic and demographic) and national e-commerce sales. The proposed methodology consists in collecting data, preselecting input variables, performing regressions for choosing variables and models, testing and validating. The usefulness of the proposed approach is twofold: on the one hand, it allows identifying the variables that influence e- commerce sales with an accessible approach. And on the other hand, it can be used to model future sales from the input variables. Results show that e-commerce is linearly dependent on 11 economic and demographic indicators.

Keywords: e-commerce, statistical modeling, regression, empirical research

Procedia PDF Downloads 195
200 Study of Coconut and Babassu Oils with High Acid Content and the Fatty Acids (C6 to C16) Obtained from These Oils

Authors: Flávio A. F. da Ponte, Jackson Q. Malveira, José A. S. Ramos Filho, Monica C. G. Albuquerque

Abstract:

The vegetable oils have many applications in industrial processes and due to this potential have constantly increased the demand for the use of low-quality oils, mainly in the production of biofuel. This work aims to the physicochemical evaluation of babassu oil (Orbinya speciosa) and coconut (Cocos nucifera) of low quality, as well the obtaining the free fatty acids 6 to 16 carbon atoms, with intention to be used as raw material for the biofuels production. The babassu oil and coconut low quality, as well the fatty acids obtained from these oils were characterized as their physicochemical properties and fatty acid composition (using gas chromatography coupled to mass). The NMR technique was used to assess the efficiency of fractional distillation under reduced pressure to obtain the intermediate carbonic chain fatty acids. The results showed that the bad quality in terms of physicochemical evaluation of babassu oils and coconut oils interfere directly in industrial application. However the fatty acids of intermediate carbonic chain (C6 to C16) may be used in cosmetic, pharmaceutical and particularly as the biokerosene fuel. The chromatographic analysis showed that the babassu oil and coconut oil have as major fatty acids are lauric acid (57.5 and 38.6%, respectively), whereas the top phase from distillation of coconut oil showed caprylic acid (39.1%) and major fatty acid.

Keywords: babassu oil (Orbinya speciosa), coconut oil (Cocos nucifera), fatty acids, biomass

Procedia PDF Downloads 286
199 A Knowledge-As-A-Service Support Framework for Ambient Learning in Kenya

Authors: Lucy W. Mburu, Richard Karanja, Simon N. Mwendia

Abstract:

Over recent years, learners have experienced a constant need to access on demand knowledge that is fully aligned with the paradigm of cloud computing. As motivated by the global sustainable development goal to ensure inclusive and equitable learning opportunities, this research has developed a framework hinged on the knowledge-as-a-service architecture that utilizes knowledge from ambient learning systems. Through statistical analysis and decision tree modeling, the study discovers influential variables for ambient learning among university students. The main aim is to generate a platform for disseminating and exploiting the available knowledge to aid the learning process and, thus, to improve educational support on the ambient learning system. The research further explores how collaborative effort can be used to form a knowledge network that allows access to heterogeneous sources of knowledge, which benefits knowledge consumers, such as the developers of ambient learning systems.

Keywords: actionable knowledge, ambient learning, cloud computing, decision trees, knowledge as a service

Procedia PDF Downloads 131
198 Non-Targeted Adversarial Object Detection Attack: Fast Gradient Sign Method

Authors: Bandar Alahmadi, Manohar Mareboyana, Lethia Jackson

Abstract:

Today, there are many applications that are using computer vision models, such as face recognition, image classification, and object detection. The accuracy of these models is very important for the performance of these applications. One challenge that facing the computer vision models is the adversarial examples attack. In computer vision, the adversarial example is an image that is intentionally designed to cause the machine learning model to misclassify it. One of very well-known method that is used to attack the Convolution Neural Network (CNN) is Fast Gradient Sign Method (FGSM). The goal of this method is to find the perturbation that can fool the CNN using the gradient of the cost function of CNN. In this paper, we introduce a novel model that can attack Regional-Convolution Neural Network (R-CNN) that use FGSM. We first extract the regions that are detected by R-CNN, and then we resize these regions into the size of regular images. Then, we find the best perturbation of the regions that can fool CNN using FGSM. Next, we add the resulted perturbation to the attacked region to get a new region image that looks similar to the original image to human eyes. Finally, we placed the regions back to the original image and test the R-CNN with the attacked images. Our model could drop the accuracy of the R-CNN when we tested with Pascal VOC 2012 dataset.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 160
197 Federal Character Principle and the Challenges of National Integration in Nigeria: A Comparative Analysis of Some Federal Appointments under Jonathan and Buhari Administrations

Authors: Simon O. Obadahun, Samuel Otohinoyi

Abstract:

The Nigerian state is heterogeneous both in character and content. Efforts to manage this diversity has so far not yielded the desired result. This paper examines the Federal Character Principle as one of the instruments intended to manage our obvious diversity such that no part of the country is marginalized or feels marginalized or sidelined. The paper observed that the Federal Character Principle have not achieved its set objectives, which is national unity and loyalty. It draws from secondary sources and discovered that there are factors that make an equitable distribution of public appointments difficult which is beyond the powers of the federal character commission. The major argument of this paper is that if the Federal Character Commission as an organization expected to enforce this principle is not restructured and given more power to sanction individuals and organizations that are found of circumventing the relevant guidelines in this regards, the hope of national unity and loyalty will continue to be a mirage.

Keywords: appointments, federalism, federal character, national integration

Procedia PDF Downloads 301
196 Medical Advances in Diagnosing Neurological and Genetic Disorders

Authors: Simon B. N. Thompson

Abstract:

Retinoblastoma is a rare type of childhood genetic cancer that affects children worldwide. The diagnosis is often missed due to lack of education and difficulty in presentation of the tumor. Frequently, the tumor on the retina is noticed by photography when the red-eye flash, commonly seen in normal eyes, is not produced. Instead, a yellow or white colored patch is seen or the child has a noticeable strabismus. Early detection can be life-saving though often results in removal of the affected eye. Remaining functioning in the healthy eye when the child is young has resulted in super-vision and high or above-average intelligence. Technological advancement of cameras has helped in early detection. Brain imaging has also made possible early detection of neurological diseases and, together with the monitoring of cortisol levels and yawning frequency, promises to be the next new early diagnostic tool for the detection of neurological diseases where cortisol insufficiency is particularly salient, such as multiple sclerosis and Cushing’s disease.

Keywords: cortisol, neurological disease, retinoblastoma, Thompson cortisol hypothesis, yawning

Procedia PDF Downloads 358
195 Assessing the Role of Failed-ADR in Civil Litigation

Authors: Masood Ahmed

Abstract:

There is a plethora of literature (including judicial and extra-judicial comments) concerning the virtues of alternative dispute resolution processes within the English civil justice system. Lord Woolf in his Access to Justice Report ushered in a new pro-ADR philosophy and this was reinforced by Sir Rupert Jackson in his review of civil litigation costs. More recently, Briggs LJ, in his review of the Chancery Court, reiterated the significant role played by ADR and the need for better integration of ADR processes within the Chancery Court. His Lordship also noted that ADR which had failed to produce a settlement (i.e. a failed-ADR) continued to play a significant role in contributing to a ‘substantial narrowing of the issues or increased focus on the key issues’ which were ‘capable of assisting both the parties and the court in the economical determination of the dispute at trial.’ With the assistance of empirical data, this paper investigates the nature of failed-ADR and, in particular, assesses the effectiveness of failed-ADR processes as a tool in: (a) narrowing the legal and/or factual issues which may assist the courts in more effective and efficient case management of the dispute; (b) assisting the parties in the future settlement of the matter. This paper will also measure the effectiveness of failed-ADR by considering the views and experiences of legal practitioners who have engaged in failed-ADR.

Keywords: English civil justice system, alternative dispute resolution processes, civil court process, empirical data from legal profession regarding failed ADR

Procedia PDF Downloads 441
194 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 95
193 Steps towards the Development of National Health Data Standards in Developing Countries

Authors: Abdullah I. Alkraiji, Thomas W. Jackson, Ian Murray

Abstract:

The proliferation of health data standards today is somewhat overlapping and conflicting, resulting in market confusion and leading to increasing proprietary interests. The government role and support in standardization for health data are thought to be crucial in order to establish credible standards for the next decade, to maximize interoperability across the health sector, and to decrease the risks associated with the implementation of non-standard systems. The normative literature missed out the exploration of the different steps required to be undertaken by the government towards the development of national health data standards. Based on the lessons learned from a qualitative study investigating the different issues to the adoption of health data standards in the major tertiary hospitals in Saudi Arabia and the opinions and feedback from different experts in the areas of data exchange and standards and medical informatics in Saudi Arabia and UK, a list of steps required towards the development of national health data standards was constructed. Main steps are the existence of: a national formal reference for health data standards, an agreed national strategic direction for medical data exchange, a national medical information management plan and a national accreditation body, and more important is the change management at the national and organizational level. The outcome of this study can be used by academics and practitioners to develop the planning of health data standards, and in particular those in developing countries.

Keywords: interoperabilty, medical data exchange, health data standards, case study, Saudi Arabia

Procedia PDF Downloads 305
192 A Tool for Rational Assessment of Dynamic Trust in Networked Organizations

Authors: Simon Samwel Msanjila

Abstract:

Networked environments which provides platforms and environments for business organizations are configured in different forms depending on many factors including life time, member characteristics, communication structure, and business objectives, among others. With continuing advances in digital technologies the distance has become a less barrier for business minded collaboration among organizations. With the need and ease to make business collaborate nowadays organizations are sometimes forced to co-work with others that are either unknown or less known to them in terms of history and performance. A promising approach for sustaining established collaboration has been establishment of trust relationship among organizations based on assessed trustworthiness for each participating organization. It has been stated in research that trust in organization is dynamic and thus assessment of trust level must address such dynamic nature. This paper assess relevant aspects of trust and applies the concepts to propose a semi-automated system for assessing the Sustainability and Evolution of trust in organizations participating in specific objective in a networked organizations environment.

Keywords: trust evolution, trust sustainability, networked organizations, dynamic trust

Procedia PDF Downloads 401
191 Relationship Between Quetelet Equation and Skin Fold Teckniques in Determining Obesity Among Adolescents in Maiduguri, Borno State, Nigeria

Authors: A. Kaidal, M. M. Abdllahi, O. L. Badaki

Abstract:

The study was conducted to determine the relationship between Quetelet Equation and Skin fold measurement in determining obesity among adolescent male students of University of Maiduguri Demonstration Secondary School, Borno State, Nigeria. A total of 66 students participated in the study, their age ranges from 15-18 years. The ex-post-facto research design was used for this study. Anthropometric measurements were taken at three sites (thigh, abdomen and chest) using accu–measure Skin fold caliper. The values of the three measurements were used to determine the percentage body fat of the participants using the 3-Point Skin Fold Bodyfat calculator of Jackson-Pollock. Body mass index (BMI) was determined using weight (kg) divided by height in (m2). The data obtained was analyzed using descriptive statistics (mean and standard deviation) and inferential statistics of Pearson product moment correlation coefficient to determine the relationship between the two techniques. The result showed a significant positive relationship r=0.673 p<0.05 between body mass index and skin fold measurement techniques. It was however observed that BMI techniques of determining body fat tend to overestimate the actual percent body fat of adolescents studied. Based on this result, it is recommended that the use of BMI as a technique for determining obesity should be used with caution.

Keywords: body max index, skin fold, quetelet, techniques

Procedia PDF Downloads 520
190 Impact of a Training Course in Cardiopulmonary Resuscitation for Primary Care Professionals

Authors: Luiz Ernani Meira Jr., Antônio Prates Caldeira, Gilson Gabriel Viana Veloso, Jackson Andrade

Abstract:

Background: In Brazil, primary health care (PHC) system has developed with multidisciplinary teams in facilities located in peripheral areas, as the entrance doors for all patients. So, professionals must be prepared to deal with patients with simple and complex problems. Objective: To evaluate the knowledge and the skills of physicians and nurses of PHC on cardiorespiratory arrest (CRA) and cardiopulmonary resuscitation (CPR) before and after training in Basic Life Support. Methods: This is a before-and-after study developed in a Simulation Laboratory in Montes Claros, Brazil. We included physicians and nurses randomly chosen from PHC services. Written tests on CRA and CPR were carried out and performances in a CPR simulation were evaluated, based on the American Heart Association recommendations. Training practices were performed using special manikins. Statistical analysis included Wilcoxon’s test to compare before and after scores. Results: Thirty-two professionals were included. Only 38% had previous courses and updates on emergency care. Most of professionals showed poor skills to attend to CRA in a simulated situation. Subjects showed an increased in knowledge and skills about CPR after training (p-value=0.003). Conclusion: Primary health care professionals must be continuously trained to assist urgencies and emergencies, like CRA.

Keywords: primary health care, professional training, cardiopulmonary resuscitation, cardiorespiratory, emergency

Procedia PDF Downloads 288
189 On the Difference between Cultural and Religious Identities

Authors: Mputu Ngandu Simon

Abstract:

Culture and religion are two of the most significant markers of an individual or group's identity. Religion finds its expression in a given culture, and culture is the costume in which a religion is dressed. In other words, there is a crucial relationship between religion and culture which should not be ignored. On the one hand, religion influences the way in which a culture is consumed. A person's consumption of a certain cultural practice is influenced by his/her religious identity. On the other hand, cultural identity plays an important role in how a religion is practiced by its adherents. Some cultural practices become more credible when interpreted in religious terms just as religious doctrines and dogmas need cultural interpretation to be understood by a given people in a given context. This relationship goes so deep that sometimes the boundaries between culture and religion become blurred, and people end up mixing religion and culture. In some cases, the two are considered to be one and the same thing. However, despite this apparent sameness, religion and culture are two distinct aspects of identity, and they should always be considered as such. One results from knowledge, while the other has beliefs as its foundation. This essay explores the difference between cultural and religious identity by drawing from existing literature on this topic as a whole before applying that knowledge to two specific case studies: Christianity and Islam in some African and Asian countries.

Keywords: culture, religion, identity, knowledge, belief

Procedia PDF Downloads 145
188 Dual Role of Microalgae: Carbon Dioxide Capture Nutrients Removal

Authors: Mohamad Shurair, Fares Almomani, Simon Judd, Rahul Bhosale, Anand Kumar, Ujjal Gosh

Abstract:

This study evaluated the use of mixed indigenous microalgae (MIMA) as a treatment process for wastewaters and CO2 capturing technology at different temperatures. The study follows the growth rate of MIMA, removals of organic matter, removal of nutrients from synthetic wastewater and its effectiveness as CO2 capturing technology from flue gas. A noticeable difference between the growth patterns of MIMA was observed at different CO2 and different operational temperatures. MIMA showed the highest growth grate when injected with CO2 dosage of 10% and limited growth was observed for the systems injected with 5% and 15 % of CO2 at 30 ◦C. Ammonia and phosphorus removals for Spirulina were 69%, 75%, and 83%, and 20%, 45%, and 75% for the media injected with 0, 5 and 10% CO2. The results of this study show that simple and cost-effective microalgae-based wastewater treatment systems can be successfully employed at different temperatures as a successful CO2 capturing technology even with the small probability of inhibition at high temperatures

Keywords: greenhouse, climate change, CO2 capturing, green algae

Procedia PDF Downloads 304
187 Characterization of the Upper Crust in Botswana Using Vp/Vs and Poisson's Ratios from Body Waves

Authors: Rapelang E. Simon, Thebeetsile A. Olebetse, Joseph R. Maritinkole, Ruth O. Moleleke

Abstract:

The P and S wave seismic velocity ratios (Vp/Vs) of some aftershocks are investigated using the method ofWadati diagrams. These aftershocks occurred after the 3rdApril 2017 Botswana’s Mw 6.5 earthquake and were recorded by the Network of Autonomously Recording Seismographs (NARS)-Botswana temporary network deployed from 2013 to 2018. In this paper, P and S wave data with good signal-to-noise ratiofrom twenty events of local magnitude greater or equal to 4.0are analysed with the Seisan software and used to infer properties of the upper crust in Botswana. The Vp/Vsratiosare determined from the travel-times of body waves and then converted to Poisson’s ratio, which is useful in determining the physical state of the subsurface materials. The Vp/Vs ratios of the upper crust in Botswana show regional variations from 1.70 to 1.77, with an average of 1.73. The Poisson’s ratios range from 0.24to 0.27 with an average of 0.25 and correlate well with the geological structures in Botswana.

Keywords: Botswana, earthquake, poisson's ratio, seismic velocity, Vp/Vs ratio

Procedia PDF Downloads 105
186 Cyber Victimization: School Experience of Malaysian Cyberbullied Teenagers

Authors: Shireen Simon

Abstract:

Cyberbullying among schoolchildren and teenagers became a hot issue discussed by Malaysian society. Cyberbullying is a new age of bullying because it uses the modern digital technology intentionally to hurt and degrade someone in the cyber world. Cyberbullying is a problem affecting many teenagers as they embrace online communication and interaction whereby virtual world with no borders. By adopting a qualitative approach, this study has captured 8 cyberbullied victims’ school experience. Even years after leaving school, these 8 cyberbullied victims remember how it feels to be bullied in the cyber world. The principal investigator also tries to identify the possibility factors that contribute to cyberbullying among these 8 victims. The result shows that these victims were bullied differently in cyber world. This study not just primarily focuses on cyberbullying issues among schoolchildren and teenagers; it also addresses the motives and causes of cyberbullying. Lastly, this article will be served as guidance for school teachers, parents and teenagers to prepare to tackle cyberbullying together. Cyberbullying is no laughing matter in our community, and it is time to spread the seeds of peace inspires others to do the same.

Keywords: cyberbullying, cyber victimization, internet, school experience, teenagers

Procedia PDF Downloads 264
185 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 237
184 Health Portals for Specific Populations: A Design for Pregnant Women

Authors: Janine Sommer, Mariana Daus, Mariana Simon, Maria Smith, Daniel Luna

Abstract:

The technologies and communication advances contributed to new tools development which allows patients to have an active role in their own health. In the light of information needs and paradigms changes about health, the patient self-manages their care. This line of care focuses on patients; specific portals come up to people with particular requirements like pregnant women. Thinking of a portal design to this sector of the population, in September 2016 a survey was made to users with the objective to knowing and understanding information’s needs at the moment to use an application for pregnant. Also, prototypes of the portal´s features were designed to try and validate with users, using the methodology of human-centered design. Investigations have made possible the identification of needs of this population and develop a tool who try to satisfy, providing timely information for each part of pregnancy and allowing the patients to make a physical check and the follow up of pregnancy seeking advice from our obstetricians.

Keywords: electronic health record, health personal record, mobile applications, pregnant women

Procedia PDF Downloads 331
183 Stubble and Senesced Leaves Are the Primary Sites of Ice Nucleation Activity in Wheat

Authors: Amanuel Bekuma, Rebecca Swift, Sarah Jackson, Ben Biddulph

Abstract:

Economic loss to frost damage is increasing over the past years in the Western Australian Wheatbelt. Agronomic, genetic, and climatic works have still found a weak correlation between temperature and frost damage. One possibility that has not been explored within the Australian cropping system is whether ice nucleation active bacteria (INB) either present in situ on crop residue or introduced by rainfall could be responsible for the increased sensitivity of cereal plants to frost at different stages of development. This study investigated upper and lower leaf canopy, stubble, and soil as a potential site of ice nucleation activity (INA) and tracked the changes in INA during the plant development. We found that older leaves of wheat are the primary sites of ice nucleation (-4.7 to -6.3°C) followed by stubble (-5.7 to -6.7°C) which increases the risk of frost damage during heading and flowering (the most susceptible stages). However, healthy and green upper canopy leaves (flag and flag-2) and the soil have lower INA (< -11°C) during the frost-sensitive stage of wheat. We anticipate the higher INA on the stubble and older leaves to be due to the presence of biologically active ice-nucleating bacteria (INB), known to cause frost injury to sensitive plants at -5°C. Stubble retained or applied during the growing season further exacerbates additional frost risk by potentially increasing the INB load. The implications of the result for stubble and frost risk management in a frost-prone landscape will be discussed.

Keywords: frost, ice-nucleation-activity, stubble, wheat

Procedia PDF Downloads 108
182 Analyzing the Representations of Afro-Peruvians in National TV Comedy Shows: The Construction of Parody and the Contradictory Responses to Afro-Peruvian TV Characters

Authors: Ana Lucia Mosquera Rosado

Abstract:

Media is believed to be the reflection of Peruvian society. However, the context in which media content is generated not always respond to an accurate representation of its cultural diversity, since many of the contents portray images of cultural minorities (indigenous and Afro-Peruvian) that contribute to the reproduction of negative stereotypes, having an impact on society. The current research paper aims to discuss the use of parody as a way of representing Afro-Peruvian population in the national television, through the reproduction of negative stereotypes and the construction of the black body, specifically relating the analysis to El Negro Mama, a very popular character in Peruvian television thought to be a portrait of the Afro-Peruvian men. In order to analyze these representations, the research will use the theory of simulation and simulacra, explained by James Baudrillard to understand the replacement of reality as a consequence of both of these concepts. This research paper will also focus on the social reaction to the existence of this character, in order to construct a hypothesis based on the theory of cultural hegemony, conceived by Jackson Lears as a legitimized group of patterns and behaviors that shape social interaction. This theoretical framework will be used to explain the popularity of this character among Peruvian society and the reactions caused by the controversy generated by the demands of civil society to remove the character from national television.

Keywords: media representation, media, race and ethnicity, racist discourse, afro-descendants in the media

Procedia PDF Downloads 224
181 Degradation Model for UK Railway Drainage System

Authors: Yiqi Wu, Simon Tait, Andrew Nichols

Abstract:

Management of UK railway drainage assets is challenging due to the large amounts of historical assets with long asset life cycles. A major concern for asset managers is to maintain the required performance economically and efficiently while complying with the relevant regulation and legislation. As the majority of the drainage assets are buried underground and are often difficult or costly to examine, it is important for asset managers to understand and model the degradation process in order to foresee the upcoming reduction in asset performance and conduct proactive maintenance accordingly. In this research, a Markov chain approach is used to model the deterioration process of rail drainage assets. The study is based on historical condition scores and characteristics of drainage assets across the whole railway network in England, Scotland, and Wales. The model is used to examine the effect of various characteristics on the probabilities of degradation, for example, the regional difference in probabilities of degradation, and how material and shape can influence the deterioration process for chambers, channels, and pipes.

Keywords: deterioration, degradation, markov models, probability, railway drainage

Procedia PDF Downloads 191
180 Buck Boost Inverter to Improve the Efficiency and Performance of E-Motor by Reducing the Influence of Voltage Sag of Battery on the Performance of E-Motor

Authors: Shefeen Maliyakkal, Pranav Satheesh, Steve Simon, Sharath Kuruppath

Abstract:

This paper researches the impact of battery voltage sag on the performance and efficiency of E-motor in electric cars. Terminal voltage of battery reduces with the S.o.C. This results in the downward shift of torque-speed curve of E-motor and increased copper losses in E-motor. By introducing a buck-boost inverter between the battery and E-motor, an additional degree of freedom was achieved. By boosting the AC voltage, the dependency of voltage sag on the performance of E-motor was eliminated. A strategy was also proposed for the operation of the buck-boost inverter to minimize copper and iron losses in E-motor to maximize efficiency. MATLAB-SIMULINK model of E-drive was used to obtain simulation results. The temperature rise in the E-motor was reduced by 14% for a 10% increase in AC voltage. From the results, it was observed that a 20% increase in AC voltage can result in improvement of running torque and maximum torque of E-motor by 44%. Hence it was concluded that using a buck-boost inverter for E-drive significantly improves both performance and efficiency of E-motor.

Keywords: buck-boost, E-motor, battery, voltage sag

Procedia PDF Downloads 378
179 Named Entity Recognition System for Tigrinya Language

Authors: Sham Kidane, Fitsum Gaim, Ibrahim Abdella, Sirak Asmerom, Yoel Ghebrihiwot, Simon Mulugeta, Natnael Ambassager

Abstract:

The lack of annotated datasets is a bottleneck to the progress of NLP in low-resourced languages. The work presented here consists of large-scale annotated datasets and models for the named entity recognition (NER) system for the Tigrinya language. Our manually constructed corpus comprises over 340K words tagged for NER, with over 118K of the tokens also having parts-of-speech (POS) tags, annotated with 12 distinct classes of entities, represented using several types of tagging schemes. We conducted extensive experiments covering convolutional neural networks and transformer models; the highest performance achieved is 88.8% weighted F1-score. These results are especially noteworthy given the unique challenges posed by Tigrinya’s distinct grammatical structure and complex word morphologies. The system can be an essential building block for the advancement of NLP systems in Tigrinya and other related low-resourced languages and serve as a bridge for cross-referencing against higher-resourced languages.

Keywords: Tigrinya NER corpus, TiBERT, TiRoBERTa, BiLSTM-CRF

Procedia PDF Downloads 67
178 Evaluating Mechanical Properties of CoNiCrAlY Coating from Miniature Specimen Testing at Elevated Temperature

Authors: W. Wen, G. Jackson, S. Maskill, D. G. McCartney, W. Sun

Abstract:

CoNiCrAlY alloys have been widely used as bond coats for thermal barrier coating (TBC) systems because of low cost, improved control of composition, and the feasibility to tailor the coatings microstructures. Coatings are in general very thin structures, and therefore it is impossible to characterize the mechanical responses of the materials via conventional mechanical testing methods. Due to this reason, miniature specimen testing methods, such as the small punch test technique, have been developed. This paper presents some of the recent research in evaluating the mechanical properties of the CoNiCrAlY coatings at room and high temperatures, through the use of small punch testing and the developed miniature specimen tensile testing, applicable to a range of temperature, to investigate the elastic-plastic and creep behavior as well as ductile-brittle transition temperature (DBTT) behavior. An inverse procedure was developed to derive the mechanical properties from such tests for the coating materials. A two-layer specimen test method is also described. The key findings include: 1) the temperature-dependent coating properties can be accurately determined by the miniature tensile testing within a wide range of temperature; 2) consistent DBTTs can be identified by both the SPT and miniature tensile tests (~ 650 °C); and 3) the FE SPT modelling has shown good capability of simulating the early local cracking. In general, the temperature-dependent material behaviors of the CoNiCrAlY coating has been effectively characterized using miniature specimen testing and inverse method.

Keywords: NiCoCrAlY coatings, mechanical properties, DBTT, miniature specimen testing

Procedia PDF Downloads 131
177 Characterization of Bacteriophage for Biocontrol of Pseudomonas syringae, Causative Agent of Canker in Prunus spp.

Authors: Mojgan Rabiey, Shyamali Roy, Billy Quilty, Ryan Creeth, George Sundin, Robert W. Jackson

Abstract:

Bacterial canker is a major disease of Prunus species such as cherry (Prunus avium). It is caused by Pseudomonas syringae species including P. syringae pv. syringae (Pss) and P. syringae pv. morsprunorum race 1 (Psm1) and race 2 (Psm2). Concerns over the environmental impact of, and developing resistance to, copper controls call for alternative approaches to disease management. One method of control could be achieved using naturally occurring bacteriophage (phage) infective to the bacterial pathogens. Phages were isolated from soil, leaf, and bark of cherry trees in five locations in the South East of England. The phages were assessed for their host range against strains of Pss, Psm1, and Psm2. The phages exhibited a differential ability to infect and lyse different Pss and Psm isolates as well as some other P. syringae pathovars. However, the phages were unable to infect beneficial bacteria such as Pseudomonas fluorescens. A subset of 18 of these phages were further characterised genetically (Random Amplification of Polymorphic DNA-PCR fingerprinting and sequencing) and using electron microscopy. The phages are tentatively identified as belonging to the order Caudovirales and the families Myoviridae, Podoviridae, and Siphoviridae, with genetic material being dsDNA. Future research will fully sequence the phage genomes. The efficacy of the phage, both individually and in cocktails, to reduce disease progression in vivo will be investigated to understand the potential for practical use of these phages as biocontrol agents.

Keywords: bacteriophage, pseudomonas, bacterial cancker, biological control

Procedia PDF Downloads 123
176 Grid-Connected Doubly-Fed Induction Generator under Integral Backstepping Control Combined with High Gain Observer

Authors: Oluwaseun Simon Adekanle, M'hammed Guisser, Elhassane Abdelmounim, Mohamed Aboulfatah

Abstract:

In this paper, modeling and control of a grid connected 660KW Doubly-Fed Induction Generator wind turbine is presented. Stator flux orientation is used to realize active-reactive power decoupling to enable independent control of active and reactive power. The recursive Integral Backstepping technique is used to control generator speed to its optimum value and to obtain unity power factor. The controller is combined with High Gain Observer to estimate the mechanical torque of the machine. The most important advantage of this combination of High Gain Observer and the Integral Backstepping controller is the annulation of static error that may occur due to incertitude between the actual value of a parameter and its estimated value by the controller. Simulation results under Matlab/Simulink show the robustness of this control technique in presence of parameter variation.

Keywords: doubly-fed induction generator, field orientation control, high gain observer, integral backstepping control

Procedia PDF Downloads 332
175 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 298