Search results for: Sarah Jain
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 443

Search results for: Sarah Jain

353 Social Space or the Art of Belonging: The Socio-Spatial Approach in the Field of Residential Facilities for Persons with Disabilities

Authors: Sarah Reker

Abstract:

The Convention on the Rights of Persons with Disabilities (CRPD) provides the basis of this study. For all countries which have ratified the convention since its entry into force in 2007, the effective implementation of the requirements often leads to considerable challenges. Furthermore, missing indicators make it difficult to measure progress. Therefore, the aim of the research project is to contribute to analyze the consequences of the implementation process on the inclusion and exclusion conditions for people with disabilities in Germany. Disabled People’s Organisations and other associations consider the social space to be relevant for the successful implementation of the CRPD. Against this background, the research project wants to focus on the relationship between a barrier-free access to the social space and the “full and effective participation and inclusion” (Art. 3) of persons with disabilities. The theoretical basis of the study is the sociological theory of social space (“Sozialraumtheorie”).

Keywords: decentralisation, qualitative research, residential facilities, social space

Procedia PDF Downloads 334
352 Assessing Musculoskeletal Disorder Prevalence and Heat-Related Symptoms: A Cross-sectional Comparison in Indian Farmers

Authors: Makkhan Lal Meena, R. C. Bairwa, G. S. Dangayach, Rahul Jain

Abstract:

The current study looked at the frequency of chronic illness conditions, accidents, health complaints, and ergonomic issues among 100 conventional and 100 greenhouse farmers. Data related to the health symptoms and ergonomic problems were collected through questionnaires by conducting direct interviews of farmers. According to the findings, symptoms of heat exposure (skin rashes, headache, dizziness, and lack of appetite) were substantially higher among conventional farmers than greenhouse farmers. The greenhouse farmers reported much more pain, numbness, or weakness in wrists/hands, fingers, upper back, hips, and ankles/feet than conventional farmers. The findings of the study suggest that suitable ergonomic knowledge and awareness campaign programs concentrating on safety at work, particularly low back pain, should be implemented in workplaces to allow for earlier detection of symptoms among the greenhouse farmers.

Keywords: accident, conventional farmer, ergonomics, health symptoms, greenhouse farmers, pesticide

Procedia PDF Downloads 230
351 A Study of the Performance Parameter for Recommendation Algorithm Evaluation

Authors: C. Rana, S. K. Jain

Abstract:

The enormous amount of Web data has challenged its usage in efficient manner in the past few years. As such, a range of techniques are applied to tackle this problem; prominent among them is personalization and recommender system. In fact, these are the tools that assist user in finding relevant information of web. Most of the e-commerce websites are applying such tools in one way or the other. In the past decade, a large number of recommendation algorithms have been proposed to tackle such problems. However, there have not been much research in the evaluation criteria for these algorithms. As such, the traditional accuracy and classification metrics are still used for the evaluation purpose that provides a static view. This paper studies how the evolution of user preference over a period of time can be mapped in a recommender system using a new evaluation methodology that explicitly using time dimension. We have also presented different types of experimental set up that are generally used for recommender system evaluation. Furthermore, an overview of major accuracy metrics and metrics that go beyond the scope of accuracy as researched in the past few years is also discussed in detail.

Keywords: collaborative filtering, data mining, evolutionary, clustering, algorithm, recommender systems

Procedia PDF Downloads 379
350 Computer Aided Classification of Architectural Distortion in Mammograms Using Texture Features

Authors: Birmohan Singh, V.K.Jain

Abstract:

Computer aided diagnosis systems provide vital opinion to radiologists in the detection of early signs of breast cancer from mammogram images. Masses and microcalcifications, architectural distortions are the major abnormalities. In this paper, a computer aided diagnosis system has been proposed for distinguishing abnormal mammograms with architectural distortion from normal mammogram. Four types of texture features GLCM texture, GLRLM texture, fractal texture and spectral texture features for the regions of suspicion are extracted. Support Vector Machine has been used as classifier in this study. The proposed system yielded an overall sensitivity of 96.47% and accuracy of 96% for the detection of abnormalities with mammogram images collected from Digital Database for Screening Mammography (DDSM) database.

Keywords: architecture distortion, mammograms, GLCM texture features, GLRLM texture features, support vector machine classifier

Procedia PDF Downloads 461
349 Photovoltaic Water Pumping System Application

Authors: Sarah Abdourraziq

Abstract:

Photovoltaic (PV) water pumping system is one of the most used and important applications in the field of solar energy. However, the cost and the efficiency are still a concern, especially with continued change of solar radiation and temperature. Then, the improvement of the efficiency of the system components is a good solution to reducing the cost. The use of maximum power point tracking (MPPT) algorithms to track the output maximum power point (MPP) of the PV panel is very important to improve the efficiency of the whole system. In this paper, we will present a definition of the functioning of MPPT technique, and a detailed model of each component of PV pumping system with Matlab-Simulink, the results shows the influence of the changing of solar radiation and temperature in the output characteristics of PV panel, which influence in the efficiency of the system. Our system consists of a PV generator, a boost converter, a motor-pump set, and storage tank.

Keywords: PV panel, boost converter, MPPT, MPP, PV pumping system

Procedia PDF Downloads 371
348 Coloured Petri Nets Model for Web Architectures of Web and Database Servers

Authors: Nidhi Gaur, Padmaja Joshi, Vijay Jain, Rajeev Srivastava

Abstract:

Web application architecture is important to achieve the desired performance for the application. Performance analysis studies are conducted to evaluate existing or planned systems. Web applications are used by hundreds of thousands of users simultaneously, which sometimes increases the risk of server failure in real time operations. We use Coloured Petri Net (CPN), a very powerful tool for modelling dynamic behaviour of a web application system. CPNs extend the vocabulary of ordinary Petri nets and add features that make them suitable for modelling large systems. The major focus of this work is on server side of web applications. The presented work focuses on modelling restructuring aspects, with major focus on concurrency and architecture, using CPN. It also focuses on bringing out the appropriate architecture for web and database servers given the number of concurrent users.

Keywords: coloured Petri Nets (CPNs), concurrent users, per- formance modelling, web application architecture

Procedia PDF Downloads 574
347 Automated Pothole Detection Using Convolution Neural Networks and 3D Reconstruction Using Stereovision

Authors: Eshta Ranyal, Kamal Jain, Vikrant Ranyal

Abstract:

Potholes are a severe threat to road safety and a major contributing factor towards road distress. In the Indian context, they are a major road hazard. Timely detection of potholes and subsequent repair can prevent the roads from deteriorating. To facilitate the roadway authorities in the timely detection and repair of potholes, we propose a pothole detection methodology using convolutional neural networks. The YOLOv3 model is used as it is fast and accurate in comparison to other state-of-the-art models. You only look once v3 (YOLOv3) is a state-of-the-art, real-time object detection system that features multi-scale detection. A mean average precision(mAP) of 73% was obtained on a training dataset of 200 images. The dataset was then increased to 500 images, resulting in an increase in mAP. We further calculated the depth of the potholes using stereoscopic vision by reconstruction of 3D potholes. This enables calculating pothole volume, its extent, which can then be used to evaluate the pothole severity as low, moderate, high.

Keywords: CNN, pothole detection, pothole severity, YOLO, stereovision

Procedia PDF Downloads 110
346 Graphene/h-BN Heterostructure Interconnects

Authors: Nikhil Jain, Yang Xu, Bin Yu

Abstract:

The material behavior of graphene, a single layer of carbon lattice, is extremely sensitive to its dielectric environment. We demonstrate improvement in electronic performance of graphene nanowire interconnects with full encapsulation by lattice-matching, chemically inert, 2D layered insulator hexagonal boron nitride (h- BN). A novel layer-based transfer technique is developed to construct the h-BN/MLG/h-BN heterostructures. The encapsulated graphene wires are characterized and compared with that on SiO2 or h-BN substrate without passivating h-BN layer. Significant improvements in maximum current-carrying density, breakdown threshold, and power density in encapsulated graphene wires are observed. These critical improvements are achieved without compromising the carrier transport characteristics in graphene. Furthermore, graphene wires exhibit electrical behavior less insensitive to ambient conditions, as compared with the non-passivated ones. Overall, h-BN/graphene/h- BN heterostructure presents a robust material platform towards the implementation of high-speed carbon-based interconnects.

Keywords: two-dimensional nanosheet, graphene, hexagonal boron nitride, heterostructure, interconnects

Procedia PDF Downloads 296
345 Robust Fault Diagnosis for Wind Turbine Systems Subjected to Multi-Faults

Authors: Sarah Odofin, Zhiwei Gao, Sun Kai

Abstract:

Operations, maintenance and reliability of wind turbines have received much attention over the years due to rapid expansion of wind farms. This paper explores early fault diagnosis scale technique based on a unique scheme of a 5MW wind turbine system that is optimized by genetic algorithm to be very sensitive to faults and resilient to disturbances. A quantitative model based analysis is pragmatic for primary fault diagnosis monitoring assessment to minimize downtime mostly caused by components breakdown and exploit productivity consistency. Simulation results are computed validating the wind turbine model which demonstrates system performance in a practical application of fault type examples. The results show the satisfactory effectiveness of the applied performance investigated in a Matlab/Simulink/Gatool environment.

Keywords: disturbance robustness, fault monitoring and detection, genetic algorithm, observer technique

Procedia PDF Downloads 351
344 Observer-based Robust Diagnosis for Wind Turbine System

Authors: Sarah Odofin, Zhiwei Gao

Abstract:

Operations and maintenance of wind turbine have received much attention by researcher due to rapid expansion of wind farms. This paper explores a novel fault diagnosis that is designed and optimized to be very sensitive to faults and robust to disturbances. The faults considered are the sensor faults of which the augmented observer is considered to enlarge faults and to be robust to disturbance. A qualitative model based analysis is proposed for early fault diagnosis to minimize downtime mostly caused by components breakdown and exploit productivity. Simulation results are computed validating the models provided which demonstrates system performance using practical application of fault type examples. The results demonstrate the effectiveness of the developed techniques investigated in a Matlab/Simulink environment.

Keywords: wind turbine, condition monitoring, genetic algorithm, fault diagnosis, augmented observer, disturbance robustness, fault estimation, sensor monitoring

Procedia PDF Downloads 467
343 Ion-Acoustic Double Layers in a Non-Thermal Electronegative Magnetized Plasma

Authors: J. K. Chawla, S. K. Jain, M. K. Mishra

Abstract:

Ion-acoustic double layers have been studied in magnetized plasma. The modified Korteweg-de Vries (m-KdV) equation using reductive perturbation method is derived. It is found that for the selected set of parameters, the system supports rarefactive double layers depending upon the value of nonthermal parameters. It is also found that the magnetization affects only the width of the double layer. For a given set of parameter values, increases in the magnetization and the obliqueness angle (θ) between wave vector and magnetic field, affect the width of the double layers, however the amplitude of the double layers have no effect. An increase in the values of nonthermal parameter decreases the amplitude of the rarefactive double layer. The effect of the ion temperature ratio on the amplitude and width of the double layers are also discussed in detail.

Keywords: ion-acoustic double layers, magnetized electronegative plasma, reductive perturbation method, the modified Korteweg-de Vries (KdV) equation

Procedia PDF Downloads 578
342 A Rare Case of Acquired Benign Tracheoesophageal Fistula: Case Report and Literature Review

Authors: Sarah Bouayyad, Ajay Nigam, Meera Beena

Abstract:

Acquired benign tracheoesophageal fistula is a rare medical condition that usually results from trauma, foreign bodies, or granulomatous infections. This is an unusual presentation of a male patient with a history of laryngectomy who had had over a period of several years inappropriately and vigorously used valve cleaning brushes to clean tracheal secretions, which had led to the formation of a tracheoesophageal fistula. Due to the patient’s obsessive habit, we couldn’t manage him using conventional surgical methods. Instead, we opted for the placement of a salivary bypass tube, which yielded good results and recovery. To the best of our knowledge, no other case of similar etiology has been published. We would like to highlight the importance of appropriate patient selection and education prior to performing a tracheoesophageal puncture to avoid developing life-threatening complications as demonstrated in our case report.

Keywords: tracheoesophageal fistula, speech valve, endoscopic insertion of salivary bypass tube, head and neck malignancies

Procedia PDF Downloads 97
341 Two-Dimensional Nanostack Based On Chip Wiring

Authors: Nikhil Jain, Bin Yu

Abstract:

The material behavior of graphene, a single layer of carbon lattice, is extremely sensitive to its dielectric environment. We demonstrate improvement in electronic performance of graphene nanowire interconnects with full encapsulation by lattice-matching, chemically inert, 2D layered insulator hexagonal boron nitride (h-BN). A novel layer-based transfer technique is developed to construct the h-BN/MLG/h-BN heterostructures. The encapsulated graphene wires are characterized and compared with that on SiO2 or h-BN substrate without passivating h-BN layer. Significant improvements in maximum current-carrying density, breakdown threshold, and power density in encapsulated graphene wires are observed. These critical improvements are achieved without compromising the carrier transport characteristics in graphene. Furthermore, graphene wires exhibit electrical behavior less insensitive to ambient conditions, as compared with the non-passivated ones. Overall, h-BN/graphene/h-BN heterostructure presents a robust material platform towards the implementation of high-speed carbon-based interconnects.

Keywords: two-dimensional nanosheet, graphene, hexagonal boron nitride, heterostructure, interconnects

Procedia PDF Downloads 421
340 Media (Il) Literacy: An Evaluation of the Curriculum and Implementation of the Department of Education's Special Program in Journalism

Authors: Sarah Isabelle S. Torres

Abstract:

This study evaluated the curriculum and implementation of the Special Program in Journalism (SPJ). By conducting surveys, focus group discussions, and interviews and by analyzing the school publication of five national high schools, the researcher found out that SPJ is ineffective in instilling media literacy to the students. Media Literacy will help the students understand how media operates, thus, they will be able to produce outputs that are socially relevant, critical, and in-depth. For one, the curriculum includes lessons and activities that are mostly technical in nature. There are no theoretical topics such as ethics, history of the press, or media ownership. Second, most of the SPJ teachers have little background on Journalism and they are not trained enough to teach the program effectively. Third, most of the students are not really inclined in Journalism and do not see themselves as media practitioners in the future. Lastly, the Department of Education’s budget for the program is far from what the curriculum needs. All of these lead to the low Media Literacy levels of the students. SPJ, therefore, has to be reevaluated and amended. In conclusion, Media Literacy should be added in the curriculum so the students will not only be equipped with technical skills but with theoretical knowledge, as well.

Keywords: education, journalism, media, media literacy

Procedia PDF Downloads 380
339 Transport Related Air Pollution Modeling Using Artificial Neural Network

Authors: K. D. Sharma, M. Parida, S. S. Jain, Anju Saini, V. K. Katiyar

Abstract:

Air quality models form one of the most important components of an urban air quality management plan. Various statistical modeling techniques (regression, multiple regression and time series analysis) have been used to predict air pollution concentrations in the urban environment. These models calculate pollution concentrations due to observed traffic, meteorological and pollution data after an appropriate relationship has been obtained empirically between these parameters. Artificial neural network (ANN) is increasingly used as an alternative tool for modeling the pollutants from vehicular traffic particularly in urban areas. In the present paper, an attempt has been made to model traffic air pollution, specifically CO concentration using neural networks. In case of CO concentration, two scenarios were considered. First, with only classified traffic volume input and the second with both classified traffic volume and meteorological variables. The results showed that CO concentration can be predicted with good accuracy using artificial neural network (ANN).

Keywords: air quality management, artificial neural network, meteorological variables, statistical modeling

Procedia PDF Downloads 490
338 Effect of Ginger, Red Pepper, and Their Mixture in Diet on Growth Performance and Body Composition of Oscar, Astronotus ocellatus

Authors: Sarah Jorjani, Afshin Ghelichi, Mazyar Kamali

Abstract:

The aim of this study was to estimate the effect of addition of ginger and red pepper and their mixture in diet on growth performance, survival rate and body composition of Astronotus ocellatus (Oscar fish). This study had been carried out for 8 weeks. For this reason 132 oscar fishes with intial weight of 2.44±0.26 (gr) were divided into 4 treatments with three replicate as compeletly randomize design test and fed by 100% Biomar diet (T1), Biomar + red pepper (55 mg/kg) (T2), Biomar + ginger (1%) (T3) and Biomar + mixture of red pepper and ginger (T4).The fish were fed in 5% of their body weight. The results showed T2 have significant differences in most of growth parameters in compare with other treatments, such as PBWI, SGR, PER and SR (P < 0.05), but there were no significant differences between treatments in FCR and FE (P > 0.05).

Keywords: red pepper, ginger, oscar fish, growth performance, body composition

Procedia PDF Downloads 395
337 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 49
336 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 216
335 Improvement of Antibacterial Activity for Ceftazidime by Partially Purified Tannase from Penicillium expansum

Authors: Sahira N. Muslim, Alaa N. Mohammed, Saba Saadoon Khazaal, Batool Kadham Salman, Israa M. S. AL-Kadmy, Sraa N. Muslim, Ahmed S. Dwaish, Sawsan Mohammed Kareem, Sarah N. Aziz, Ruaa A. Jasim

Abstract:

Tannase has wide applications in food, beverage, brewing, cosmetics and chemical industries and one of the major applications of tannase is the production of gallic acid. Gallic acid is used for manufacturing of trimethoprim. In the present study, a local fungal strain of Penicillium expansum A4 isolated from spoilt apple samples gave the highest production level of tannase. Tannase was partially purified with a recovery yield of 92.52% and 6.32 fold of purification by precipitation using ammonium sulfate at 50% saturation. Tannase led to increased antimicrobial activity of ceftazidime against Pseudomonas aeruginosa and S. aureus and had a synergism effect at low concentrations of ceftazidime, and thus, tannase may be a useful adjuvant agent for the treatment of many bacterial infections in combination with ceftazidime.

Keywords: ceftazidime, Penicillium expansum, tannase, antimicrobial activity

Procedia PDF Downloads 698
334 Hybrid Subspace Approach for Time Delay Estimation in MIMO Systems

Authors: Mojtaba Saeedinezhad, Sarah Yousefi

Abstract:

In this paper, we present a hybrid subspace approach for Time Delay Estimation (TDE) in multivariable systems. While several methods have been proposed for time delay estimation in SISO systems, delay estimation in MIMO systems were always a big challenge. In these systems the existing TDE methods have significant limitations because most of procedures are just based on system response estimation or correlation analysis. We introduce a new hybrid method for TDE in MIMO systems based on subspace identification and explicit output error method; and compare its performance with previously introduced procedures in presence of different noise levels and in a statistical manner. Then the best method is selected with multi objective decision making technique. It is shown that the performance of new approach is much better than the existing methods, even in low signal-to-noise conditions.

Keywords: system identification, time delay estimation, ARX, OE, merit ratio, multi variable decision making

Procedia PDF Downloads 313
333 Pawn or Potentates: Corporate Governance Structure in Indian Central Public Sector Enterprises

Authors: Ritika Jain, Rajnish Kumar

Abstract:

The Department of Public Enterprises had made submissions of Self Evaluation Reports, for the purpose of corporate governance, mandatory for all central government owned enterprises. Despite this, an alarming 40% of the enterprises did not do so. This study examines the impact of external policy tools and internal firm-specific factors on corporate governance of central public sector enterprises (CPSEs). We use a dataset of all manufacturing and non-financial services owned by the central government of India for the year 2010-11. Using probit, ordered logit and Heckman’s sample selection models, the study finds that the probability and quality of corporate governance is positively influenced by the CPSE getting into a Memorandum of Understanding (MoU) with the central government of India, and hence, enjoying more autonomy in terms of day to day operations. Besides these, internal factors, including bigger size and lower debt size contribute significantly to better corporate governance.

Keywords: corporate governance, central public sector enterprises (CPSEs), sample selection, Memorandum of Understanding (MoU), ordered logit, disinvestment

Procedia PDF Downloads 229
332 Investigating the Effect of Study Plan and Homework on Student's Performance by Using Web Based Learning MyMathLab

Authors: Mohamed Chabi, Mahmoud I. Syam, Sarah Aw

Abstract:

In Summer 2012, the Foundation Program Unit of Qatar University has started implementing new ways of teaching Math by introducing MML (MyMathLab) as an innovative interactive tool to support standard teaching. In this paper, we focused on the effect of proper use of the Study Plan component of MML on student’s performance. Authors investigated the results of students of pre-calculus course during Fall 2013 in Foundation Program at Qatar University. The results showed that there is a strong correlation between study plan results and final exam results, also a strong relation between homework results and final exam results. In addition, the attendance average affected on the student’s results in general. Multiple regression is determined between passing rate dependent variable and study plan, homework as independent variable.

Keywords: MyMathLab, study plan, assessment, homework, attendance, correlation, regression

Procedia PDF Downloads 394
331 Effect of Various Tillage Systems on Soil Compaction

Authors: Sushil Kumar, Mukesh Jain, Vijaya Rani, Vinod Kumar

Abstract:

The prime importance of tillage is that it prepares the land where the seed easily germinate and later the plant can well establish. Using different types of equipments driven manually or by powered, machines make the soil suitable to place the seeds into the desirable depth. Moreover, tillage loosens the compacted layers. Heavy equipment and tillage implements can cause damage to the soil structure. Effect of various tillage methods on soil compaction was studied in Rabi season of 2013-14 at village Ladwa, Hisar, Haryana (India). The experiments studied the effect of six tillage treatments i.e. no tillage or zero tillage (T1), tillage with rotavator (T2), disc harrow (T3), rotavator + sub soiler (T4), disc harrow + sub soiler (T5) and power harrow (T6) on soil compaction. Soil compaction was measured before tillage and after sowing at 0, 30, 60 and 90 days after sowing. No change in soil resistance was recorded before and after no tillage treatment. Maximum soil resistance was found in zero tillage followed by disc harrow up to 150 mm soil depth. Minimum soil resistance was found in rotavator immediately after the tillage treatment. However, the soil resistance approached the same level as it had been before the tillage after the soil strata where the implement cannot reach.

Keywords: tillage, no tillage, rotavator, subsoiler, compaction

Procedia PDF Downloads 285
330 Optimization of Multiplier Extraction Digital Filter On FPGA

Authors: Shiksha Jain, Ramesh Mishra

Abstract:

One of the most widely used complex signals processing operation is filtering. The most important FIR digital filter are widely used in DSP for filtering to alter the spectrum according to some given specifications. Power consumption and Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. So we present a multiplier less technique (DA technique). In this technique, precomputed value of inner product is stored in LUT. Which are further added and shifted with number of iterations equal to the precision of input sample. But the exponential growth of LUT with the order of FIR filter, in this basic structure, makes it prohibitive for many applications. The significant area and power reduction over traditional Distributed Arithmetic (DA) structure is presented in this paper, by the use of slicing of LUT to the desired length. An architecture of 16 tap FIR filter is presented, with different length of slice of LUT. The result of FIR Filter implementation on Xilinx ISE synthesis tool (XST) vertex-4 FPGA Tool by using proposed method shows the increase of the maximum frequency, the decrease of the resources as usage saving in area with more number of slices and the reduction dynamic power.

Keywords: multiplier less technique, linear phase symmetric FIR filter, FPGA tool, look up table

Procedia PDF Downloads 364
329 Study on Parallel Shear Stress of Cement-Wood Composites Using Pinus sp. and Eucalyptus sp. in natura and Treated with CCA

Authors: Rodrigo D. S. Oliveira, Sarah David-Muzel, Maristela Gava, Victor A. De Araujo, Glaucia A. Prates, Juliana Cortez-Barbosa

Abstract:

Improper disposal of treated wood waste is a problem of the timber sector, since this residue is toxic, due to the harmful characteristics of the preservative substances. An environmentally friendly alternative is the use of this waste for the production of cement-wood composites. The aim of this work was to study the possibility of using wood treated with CCA (Chromated Cooper Arsenate) in cement-wood. Specimens of Pinus sp. and Eucalyptus sp. were produced with wood raw in natura and treated with CCA. A test was performed to determine the parallel shear stress of samples after 14 days of drying, according to the Brazilian Standard NBR-7215/97. Based on the analyzed results it is concluded that the use of wood treated with CCA is not feasible in cement-wood production, because the composite samples of treated wood showed lower mechanical strength in shear stress than those with wood in natura.

Keywords: waste recovery, wood composites, cement-wood, wood preservation, chromated copper arsenate

Procedia PDF Downloads 578
328 Graphene Transistor Employing Multilayer Hexagonal Boron Nitride as Substrate and Gate Insulator

Authors: Nikhil Jain, Bin Yu

Abstract:

We explore the potential of using ultra-thin hexagonal boron nitride (h-BN) as both supporting substrate and gate dielectric for graphene-channel field effect transistors (GFETs). Different from commonly used oxide-based dielectric materials which are typically amorphous, very rough in surface, and rich with surface traps, h-BN is layered insulator free of dangling bonds and surface states, featuring atomically smooth surface. In a graphene-channel-last device structure with local buried metal gate electrode (TiN), thin h-BN multilayer is employed as both supporting “substrate” and gate dielectric for graphene active channel. We observed superior carrier mobility and electrical conduction, significantly improved from that in GFETs with SiO2 as substrate/gate insulator. In addition, we report excellent dielectric behavior of layered h-BN, including ultra-low leakage current and high critical electric field for breakdown.

Keywords: graphene, field-effect transistors, hexagonal boron nitride, dielectric strength, tunneling

Procedia PDF Downloads 402
327 Life Cycle Assessment: Drinking Glass Systems

Authors: Devina Jain

Abstract:

The choice between single-use drinking glasses and reusable glasses is of major concern to our lifestyles, and hence, the environment. This study is aimed at comparing three systems - a disposable paper cup, a disposable cup and a reusable stainless steel cup or glass - with respect to their effect on the environment to find out which one is more advantageous for reducing the impact on the environment. Life Cycle Assessment was conducted using modeling software, Umberto NXT Universal (Version 7.1). For the purpose of this study, the cradle to grave approach was considered. Results showed that cleaning is of a very strong influence on the environmental burden by these drinking systems, with a contribution of up to 90 to 100%. Thus, the burden is determined by the way in which the utensils are washed, and how much water is consumed. It maybe seems like a small, insignificant daily practice. In the short term, it would seem that paper and plastic cups are a better idea, since they are easy to acquire and do not need to be stored, but in the long run, we can say that steel cups will have less of an environmental impact. However, if the frequency of use and the number of glasses employed per use are of significance to decide the appropriateness of the usage, it is better to use disposable cups and glasses.

Keywords: disposable glass, life cycle assessment, paper, plastic, reusable glass, stainless steel

Procedia PDF Downloads 307
326 Effect of Traffic Composition on Delay and Saturation Flow at Signal Controlled Intersections

Authors: Arpita Saha, Apoorv Jain, Satish Chandra, Indrajit Ghosh

Abstract:

Level of service at a signal controlled intersection is directly measured from the delay. Similarly, saturation flow rate is a fundamental parameter to measure the intersection capacity. The present study calculates vehicle arrival rate, departure rate, and queue length for every five seconds interval in each cycle. Based on the queue lengths, the total delay of the cycle has been calculated using Simpson’s 1/3rd rule. Saturation flow has been estimated in terms of veh/hr of green/lane for every five seconds interval of the green period until at least three vehicles are left to cross the stop line. Vehicle composition shows an immense effect on total delay and saturation flow rate. The increase in two-wheeler proportion increases the saturation flow rate and reduces the total delay per vehicle significantly. Additionally, an increase in the heavy vehicle proportion reduces the saturation flow rate and increases the total delay for each vehicle.

Keywords: delay, saturation flow, signalised intersection, vehicle composition

Procedia PDF Downloads 436
325 Demand for Domestic Marine and Coastal Tourism and Day Trips on an Island Nation

Authors: John Deely, Stephen Hynes, Mary Cawley, Sarah Hogan

Abstract:

Domestic marine and coastal tourism have increased in importance over the last number of years due to the impacts of international travel, environmental concerns, associated health benefits and COVID-19 related travel restrictions. Consequently, this paper conceptualizes domestic marine and coastal tourism within an economic framework. Two logit models examine the factors that influence participation in the coastal day trips and overnight stays markets, respectively. Two truncated travel cost models are employed to explore trip duration, one analyzing the number of day trips taken and the other examining the number of nights spent in marine and coastal areas. Although a range of variables predicts participation, no one variable had a significant and consistent effect on every model. A division in access to domestic marine and coastal tourism is also observed based on variation in household income. The results also indicate a vibrant day trip market and large consumer surpluses.

Keywords: domestic marine and coastal tourism, day tripper, participation models, truncated travel cost model

Procedia PDF Downloads 103
324 Quantum Entangled States and Image Processing

Authors: Sanjay Singh, Sushil Kumar, Rashmi Jain

Abstract:

Quantum registering is another pattern in computational hypothesis and a quantum mechanical framework has a few helpful properties like Entanglement. We plan to store data concerning the structure and substance of a basic picture in a quantum framework. Consider a variety of n qubits which we propose to use as our memory stockpiling. In recent years classical processing is switched to quantum image processing. Quantum image processing is an elegant approach to overcome the problems of its classical counter parts. Image storage, retrieval and its processing on quantum machines is an emerging area. Although quantum machines do not exist in physical reality but theoretical algorithms developed based on quantum entangled states gives new insights to process the classical images in quantum domain. Here in the present work, we give the brief overview, such that how entangled states can be useful for quantum image storage and retrieval. We discuss the properties of tripartite Greenberger-Horne-Zeilinger and W states and their usefulness to store the shapes which may consist three vertices. We also propose the techniques to store shapes having more than three vertices.

Keywords: Greenberger-Horne-Zeilinger, image storage and retrieval, quantum entanglement, W states

Procedia PDF Downloads 275