Search results for: message aggregation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 660

Search results for: message aggregation

240 Planktivorous Fish Schooling Responses to Current at Natural and Artificial Reefs

Authors: Matthew Holland, Jason Everett, Martin Cox, Iain Suthers

Abstract:

High spatial-resolution distribution of planktivorous reef fish can reveal behavioural adaptations to optimise the balance between feeding success and predator avoidance. We used a multi-beam echosounder to record bathymetry and the three-dimensional distribution of fish schools associated with natural and artificial reefs. We utilised generalised linear models to assess the distribution, orientation, and aggregation of fish schools relative to the structure, vertical relief, and currents. At artificial reefs, fish schooled more closely to the structure and demonstrated a preference for the windward side, particularly when exposed to strong currents. Similarly, at natural reefs fish demonstrated a preference for windward aspects of bathymetry, particularly when associated with high vertical relief. Our findings suggest that under conditions with stronger current velocity, fish can exercise their preference to remain close to structure for predator avoidance, while still receiving an adequate supply of zooplankton delivered by the current. Similarly, when current velocity is low, fish tend to disperse for better access to zooplankton. As artificial reefs are generally deployed with the goal of creating productivity rather than simply attracting fish from elsewhere, we advise that future artificial reefs be designed as semi-linear arrays perpendicular to the prevailing current, with multiple tall towers. This will facilitate the conversion of dispersed zooplankton into energy for higher trophic levels, enhancing reef productivity and fisheries.

Keywords: artificial reef, current, forage fish, multi-beam, planktivorous fish, reef fish, schooling

Procedia PDF Downloads 125
239 Short-Term Forecast of Wind Turbine Production with Machine Learning Methods: Direct Approach and Indirect Approach

Authors: Mamadou Dione, Eric Matzner-lober, Philippe Alexandre

Abstract:

The Energy Transition Act defined by the French State has precise implications on Renewable Energies, in particular on its remuneration mechanism. Until then, a purchase obligation contract permitted the sale of wind-generated electricity at a fixed rate. Tomorrow, it will be necessary to sell this electricity on the Market (at variable rates) before obtaining additional compensation intended to reduce the risk. This sale on the market requires to announce in advance (about 48 hours before) the production that will be delivered on the network, so to be able to predict (in the short term) this production. The fundamental problem remains the variability of the Wind accentuated by the geographical situation. The objective of the project is to provide, every day, short-term forecasts (48-hour horizon) of wind production using weather data. The predictions of the GFS model and those of the ECMWF model are used as explanatory variables. The variable to be predicted is the production of a wind farm. We do two approaches: a direct approach that predicts wind generation directly from weather data, and an integrated approach that estimâtes wind from weather data and converts it into wind power by power curves. We used machine learning techniques to predict this production. The models tested are random forests, CART + Bagging, CART + Boosting, SVM (Support Vector Machine). The application is made on a wind farm of 22MW (11 wind turbines) of the Compagnie du Vent (that became Engie Green France). Our results are very conclusive compared to the literature.

Keywords: forecast aggregation, machine learning, spatio-temporal dynamics modeling, wind power forcast

Procedia PDF Downloads 192
238 Decision Support System Based On GIS and MCDM to Identify Land Suitability for Agriculture

Authors: Abdelkader Mendas

Abstract:

The integration of MultiCriteria Decision Making (MCDM) approaches in a Geographical Information System (GIS) provides a powerful spatial decision support system which offers the opportunity to efficiently produce the land suitability maps for agriculture. Indeed, GIS is a powerful tool for analyzing spatial data and establishing a process for decision support. Because of their spatial aggregation functions, MCDM methods can facilitate decision making in situations where several solutions are available, various criteria have to be taken into account and decision-makers are in conflict. The parameters and the classification system used in this work are inspired from the FAO (Food and Agriculture Organization) approach dedicated to a sustainable agriculture. A spatial decision support system has been developed for establishing the land suitability map for agriculture. It incorporates the multicriteria analysis method ELECTRE Tri (ELimitation Et Choix Traduisant la REalité) in a GIS within the GIS program package environment. The main purpose of this research is to propose a conceptual and methodological framework for the combination of GIS and multicriteria methods in a single coherent system that takes into account the whole process from the acquisition of spatially referenced data to decision-making. In this context, a spatial decision support system for developing land suitability maps for agriculture has been developed. The algorithm of ELECTRE Tri is incorporated into a GIS environment and added to the other analysis functions of GIS. This approach has been tested on an area in Algeria. A land suitability map for durum wheat has been produced. Through the obtained results, it appears that ELECTRE Tri method, integrated into a GIS, is better suited to the problem of land suitability for agriculture. The coherence of the obtained maps confirms the system effectiveness.

Keywords: multicriteria decision analysis, decision support system, geographical information system, land suitability for agriculture

Procedia PDF Downloads 600
237 A Survey of Feature-Based Steganalysis for JPEG Images

Authors: Syeda Mainaaz Unnisa, Deepa Suresh

Abstract:

Due to the increase in usage of public domain channels, such as the internet, and communication technology, there is a concern about the protection of intellectual property and security threats. This interest has led to growth in researching and implementing techniques for information hiding. Steganography is the art and science of hiding information in a private manner such that its existence cannot be recognized. Communication using steganographic techniques makes not only the secret message but also the presence of hidden communication, invisible. Steganalysis is the art of detecting the presence of this hidden communication. Parallel to steganography, steganalysis is also gaining prominence, since the detection of hidden messages can prevent catastrophic security incidents from occurring. Steganalysis can also be incredibly helpful in identifying and revealing holes with the current steganographic techniques, which makes them vulnerable to attacks. Through the formulation of new effective steganalysis methods, further research to improve the resistance of tested steganography techniques can be developed. Feature-based steganalysis method for JPEG images calculates the features of an image using the L1 norm of the difference between a stego image and the calibrated version of the image. This calibration can help retrieve some of the parameters of the cover image, revealing the variations between the cover and stego image and enabling a more accurate detection. Applying this method to various steganographic schemes, experimental results were compared and evaluated to derive conclusions and principles for more protected JPEG steganography.

Keywords: cover image, feature-based steganalysis, information hiding, steganalysis, steganography

Procedia PDF Downloads 187
236 A Highly Efficient Broadcast Algorithm for Computer Networks

Authors: Ganesh Nandakumaran, Mehmet Karaata

Abstract:

A wave is a distributed execution, often made up of a broadcast phase followed by a feedback phase, requiring the participation of all the system processes before a particular event called decision is taken. Wave algorithms with one initiator such as the 1-wave algorithm have been shown to be very efficient for broadcasting messages in tree networks. Extensions of this algorithm broadcasting a sequence of waves using a single initiator have been implemented in algorithms such as the m-wave algorithm. However as the network size increases, having a single initiator adversely affects the message delivery times to nodes further away from the initiator. As a remedy, broadcast waves can be allowed to be initiated by multiple initiator nodes distributed across the network to reduce the completion time of broadcasts. These waves initiated by one or more initiator processes form a collection of waves covering the entire network. Solutions to global-snapshots, distributed broadcast and various synchronization problems can be solved efficiently using waves with multiple concurrent initiators. In this paper, we propose the first stabilizing multi-wave sequence algorithm implementing waves started by multiple initiator processes such that every process in the network receives at least one sequence of broadcasts. Due to being stabilizing, the proposed algorithm can withstand transient faults and do not require initialization. We view a fault as a transient fault if it perturbs the configuration of the system but not its program.

Keywords: distributed computing, multi-node broadcast, propagation of information with feedback and cleaning (PFC), stabilization, wave algorithms

Procedia PDF Downloads 475
235 Cultural-Creative Design with Language Figures of Speech

Authors: Wei Chen Chang, Ming Yu Hsiao

Abstract:

The commodity takes one kind of mark, the designer how to construction and interpretation the user how to use the process and effectively convey message in design education has always been an important issue. Cultural-creative design refers to signifying cultural heritage for product design. In terms of Peirce’s Semiotic Triangle: signifying elements-object-interpretant, signifying elements are the outcomes of design, the object is cultural heritage, and the interpretant is the positioning and description of product design. How to elaborate the positioning, design, and development of a product is a narrative issue of the interpretant, and how to shape the signifying elements of a product by modifying and adapting styles is a rhetoric matter. This study investigated the rhetoric of elements signifying products to develop a rhetoric model with cultural style. Figures of speech are a rhetoric method in narrative. By adapting figures of speech to the interpretant, this study developed the rhetoric context of cultural context by narrative means. In this two-phase study, phase I defines figures of speech and phase II analyzes existing cultural-creative products in terms of figures of speech to develop a rhetoric of style model. We expect it can reference for the future development of Cultural-creative design.

Keywords: cultural-creative design, cultural-creative products, figures of speech, Peirce’s semiotic triangle, rhetoric of style model

Procedia PDF Downloads 347
234 Amyloid Deposition in Granuloma of Tuberculosis Patients: A Pilot Study

Authors: Shreya Ghosh, Akansha Garg, Chayanika Kala, Ashwani Kumar Thakur

Abstract:

Background: Granuloma formation is one of the characteristic features of tuberculosis. Besides, chronic inflammation underlying tuberculosis is often indicated by an increase in the concentration of serum amyloid A (SAA) protein. The connection between tuberculosis and SAA-driven secondary amyloidosis is well documented. However, SAA-derived amyloid deposition start sites are not well understood in tuberculosis and other chronic inflammatory conditions. It was hypothesized that granuloma could be a potential site for an amyloid deposition because both SAA protein and proteases that cleave SAA into aggregation-prone fragments are reported to be present in the granuloma. Here the authors have shown the presence of SAA-derived amyloid deposits in the granuloma of tuberculosis patients. Methodology: Over a period of two years, tuberculosis patients were screened, and biopsies were collected from the affected organs of the patients. The gold standard, Congo red dye staining, was used to identify amyloid deposits in the tissue sections of tuberculosis patients containing granulomatous structure. Results: 11 out of 150 FFPE biopsy specimens of tuberculosis patients showed eosinophilic hyaline-rich deposits surrounding granuloma. Upon Congo red staining, these deposits exhibited characteristic apple-green birefringence under polarized light, confirming amyloid deposits. Further, upon immunohistochemical staining with anti-SAA, the amyloid enriched areas showed positive immunoreactivity. Conclusion: In this pilot study, we have shown that granuloma can be a potential site for serum amyloid A-derived amyloid formation in tuberculosis patients. Moreover, the presence of amyloid gave significant cues that granuloma might be a probable amyloid deposition start in tuberculosis patients. This study will set a stage to expand the clinical and fundamental research in the understanding of amyloid formation in granuloma underlying tuberculosis and chronic inflammatory conditions.

Keywords: amyloid, granuloma, periphery, serum amyloid A, tuberculosis

Procedia PDF Downloads 173
233 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 636
232 Language on Skin Whitening Products in Pakistan Promotes Unfair Beauty Standards: A Critical Discourse Analysis

Authors: Azeem Alphonce

Abstract:

In Pakistan, there is a variety of skin tones and colors across all provinces. However, a fair complexion is one of the standards of beauty among females in Pakistan, which creates insecurities in dark-complexioned females. This research is a critical discourse analysis of the language used on beauty products for females in Pakistan. The purpose was to analyze the language used on female beauty products using Van Dijk's three-stage socio-cognitive model to understand what message is received from the few words written and repeated across the packaging of various facial products, why such language is used and what are its wider socio-cognitive effects? The criterion for the selection of beauty products was skin whitening terminologies and the language used on these products. The results showed that over 57 per cent of products utilized skin-whitening terms. The adjectives written on the package indicate that fairer skin is the ultimate beauty goal of females. The analysis explored how the language reinforces unfair beauty standards and perpetuates colorism. It was concluded that female beauty products utilize discriminatory discourse by marginalizing individuals of darker skin tones. Fairer skin is promoted, whereas darker skin is referred to as a problem, flaw or imperfection. Socially shared mental models seem to have caused beauty companies to exploit and promote perceptions of colorism in society. Therefore, such discourse should be prevented, and beauty companies should utilize their discourse to promote acceptance of various skin tones.

Keywords: language, skin whitening products, beauty standards, social mental models

Procedia PDF Downloads 43
231 Carbohydrate-Based Recommendations as a Basis for Dietary Guidelines

Authors: A. E. Buyken, D. J. Mela, P. Dussort, I. T. Johnson, I. A. Macdonald, A. Piekarz, J. D. Stowell, F. Brouns

Abstract:

Recently a number of renewed dietary guidelines have been published by various health authorities. The aim of the present work was 1) to review the processes (systematic approach/review, inclusion of public consultation) and methodological approaches used to identify and select the underpinning evidence base for the established recommendations for total carbohydrate (CHO), fiber and sugar consumption, and 2) examine how differences in the methods and processes applied may have influenced the final recommendations. A search of WHO, US, Canada, Australia and European sources identified 13 authoritative dietary guidelines with the desired detailed information. Each of these guidelines was evaluated for its scientific basis (types and grading of the evidence) and the processes by which the guidelines were developed Based on the data retrieved the following conclusions can be drawn: 1) Generally, a relatively high total CHO and fiber intake and limited intake of sugars (added or free) is recommended. 2) Even where recommendations are quite similar, the specific, justifications for quantitative/qualitative recommendations differ across authorities. 3) Differences appear to be due to inconsistencies in underlying definitions of CHO exposure and in the concurrent appraisal of CHO-providing foods and nutrients as well the choice and number of health outcomes selected for the evidence appraisal. 4) Differences in the selected articles, time frames or data aggregation method appeared to be of rather minor influence. From this assessment, the main recommendations are for: 1) more explicit quantitative justifications for numerical guidelines and communication of uncertainty; and 2) greater international harmonization, particularly with regard to underlying definitions of exposures and range of relevant nutrition-related outcomes.

Keywords: carbohydrates, dietary fibres, dietary guidelines, recommendations, sugars

Procedia PDF Downloads 234
230 Aspects of the Promotional Language of Tourism in Social Media. A Case Study of Romanian Accommodation Industry

Authors: Sanda-Maria Ardeleanu, Ana Crăciunescu

Abstract:

This paper is sustained by our previous research on discursive strategies, whichdemonstrated that tourismhas developed and employed apromotional languageper se. We have studied this concept within the framework of audio-visual advertising by analyzing its discursive structures at the level of three main strategies (textual, visual, and both textual and visual) and confirmed the applicability of the promotional language per se within the field. Tourism, at large, represents a largely potential interdisplinary field, which allowed us to use qualitative methods of research such as Discourse Analysis (DA). Due to further research which showed that in the third phase of qualitative research methodologies, scholars in tourism recognized semiotics and DA as potential paths to follow, but which were insufficiently explored at the time, we soon realized that the natural next step to take is to bring together common qualitative methodologies for both fields, such as the method of observation, the triangulation, Discourse Analysis, etc. Therefore and in the light of fast transformations of the medium that intermediates the message, in this paper, we are going to focus on the manifestations of the promotional language in social media texts, which advertise for the urban industry of accommodation in Romania. We shall constitute a corpus of study as the basis for our research methodology and, through the empirical method of observation and DA, we propose to recognize or discover new patterns developed at textual (mainly) and visual level or the mix of the two, known as strategies of the promotional language of tourism.

Keywords: discourse analysis, promotional language of tourism, social media, urban accommodation industry, tourism

Procedia PDF Downloads 131
229 Anticancer Effect of Resveratrol-Loaded Gelatin Nanoparticles in NCI-H460 Non-Small Cell Lung Carcinoma Cell Lines

Authors: N. Rajendra Prasad

Abstract:

Resveratrol (RSV), a grape phytochemical, has drawn greater attention because of its beneficial ef-fects against cancer. However, RSV has some draw-backs such as unstabilization, poor water solubility and short biological half time, which limit the utili-zation of RSV in medicine, food and pharmaceutical industries. In this study, we have encapsulated RSV in gelatin nanoparticles (GNPs) and studied its anti-cancer efficacy in NCI-H460 lung cancer cells. SEM and DLS studies have revealed that the prepared RSV-GNPs possess spherical shape with a mean diameter of 294 nm. The successful encapsulation of RSV in GNPs has been achieved by the cross-linker glutaraldehyde probably through Schiff base reaction and hydrogen bond interaction. Spectrophotometric analysis revealed that the max-imum of 93.6% of RSV has been entrapped in GNPs. In vitro drug release kinetics indicated that there was an initial burst release followed by a slow and sustained release of RSV from GNPs. The prepared RSV-GNPs exhibited very rapid and more efficient cellular uptake than free RSV. Further, RSV-GNPs treatment showed greater antiproliferative efficacy than free RSV treatment in NCI-H460 cells. It has been found that greater ROS generation, DNA damage and apoptotic incidence in RSV-GNPs treated cells than free RSV treatment. Erythrocyte aggregation assay showed that the prepared RSV-GNPs formulation elicit no toxic response. HPLC analysis revealed that RSV-GNPs was more bioavailable and had a longer half-life than free RSV. Hence, GNPs carrier system might be a promising mode for controlled delivery and for improved therapeutic index of poorly water soluble RSV.

Keywords: resveratrol, coacervation, anticancer gelatin nanoparticles, lung cancer, controlled release

Procedia PDF Downloads 425
228 Mathematical Modelling of Blood Flow with Magnetic Nanoparticles as Carrier for Targeted Drug Delivery in a Stenosed Artery

Authors: Sreeparna Majee, G. C. Shit

Abstract:

A study on targeted drug delivery is carried out in an unsteady flow of blood infused with magnetic NPs (nanoparticles) with an aim to understand the flow pattern and nanoparticle aggregation in a diseased arterial segment having stenosis. The magnetic NPs are supervised by the magnetic field which is significant for therapeutic treatment of arterial diseases, tumor and cancer cells and removing blood clots. Coupled thermal energy have also been analyzed by considering dissipation of energy because of the application of the magnetic field and the viscosity of blood. Simulation technique used to solve the mathematical model is vorticity-stream function formulations in the diseased artery. An elevation in SLP (Specific loss power) is noted in the aortic bloodstream when the agglomeration of nanoparticles is higher. This phenomenon has potential application in the treatment of hyperthermia. The study focuses on the lowering of WSS (Wall Shear Stress) with increasing particle concentration at the downstream of the stenosis which depicts the vigorous flow circulation zone. These low shear stress regions prolong the residing time of the nanoparticles carrying drugs which soaks up the LDL (Low Density Lipoprotein) deposition. Moreover, an increase in NP concentration enhances the Nusselt number which marks the increase of heat transfer from the arterial wall to the surrounding tissues to destroy tumor and cancer cells without affecting the healthy cells. The results have a significant influence in the study of medicine, to treat arterial diseases such as atherosclerosis without the need for surgery which can minimize the expenditures on cardiovascular treatments.

Keywords: magnetic nanoparticles, blood flow, atherosclerosis, hyperthermia

Procedia PDF Downloads 111
227 Sun-Light Driven Photocatalytic Degradation of Tetracycline Antibiotics Employing Hydrothermally Synthesized sno₂/mnv₂o₆ Heterojunction

Authors: Sandeep Kaushal

Abstract:

Tetracycline (TC) is a widespread antibiotic that is utilised in a multitude of countries, particularly China, India, and the United States of America, due to its low cost and potency in boosting livestock production. Unfortunately, certain antibiotics can be hazardous to living beings due to metal complexation and aggregation, which can lead to teratogenicity and carcinogenicity. Heterojunction photocatalysts are promising for the effective removal of pollutants like antibiotics. Herein, a simple, economical, and pollution-less hydrothermal technique was used to construct SnO₂/MnV₂O₆heterojunction with varying amounts of tin dioxide (SO₂). Various sophisticated techniques like XRD, FTIR, XPS, FESEM, HRTEM, and PLand Raman spectroscopy demonstrated the successful synthesis of SnO₂/MnV₂O₆ heterojunction photocatalysts.BET surface area analysis revealed that the as-synthesized heterojunction has a favorable surface area and surface properties for efficacious degradation of tetracycline. Under the direct sunlight exposure, the SnO₂/MnV₂O₆ heterojunction possessed superior photodegradation activity toward TC than the pristine SnO₂ and MnV2O6owing to their excellent adsorption abilities suitable band positions, large surface areas along with the effective charge-transfer ability of the heterojunction. The SnO₂/MnV₂O₆ heterojunction possessed extraordinary efficiency for the photocatalytic degradation of TC antibiotic (98% in 60 min) with an apparent rate constant of 0.092 min–1. In the degradation experiments, photocatalytic activities of as-synthesized heterojunction were studied by varying different factors such as time contact, catalyst dose, and solution pH. The role of reactive species in antibiotics was validated by radical scavenging studies, which indicated that.OH, radical has a critical role in photocatalytic degradation. Moreover, liquid chromatography-mass spectrometry (LC-MS) investigations were employed to anticipate a plausible mechanism for TC degradation.

Keywords: photocatalytic degradation, tetracycline, heterojunction, LC-MS

Procedia PDF Downloads 82
226 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 119
225 The Effects of Negative Electronic Word-of-Mouth and Webcare on Thai Online Consumer Behavior

Authors: Pongsatorn Tantrabundit, Lersak Phothong, Ong-art Chanprasitchai

Abstract:

Due to the emergence of the Internet, it has extended the traditional Word-of-Mouth (WOM) to a new form called “Electronic Word-of-Mouth (eWOM).” Unlike traditional WOM, eWOM is able to present information in various ways by applying different components. Each eWOM component generates different effects on online consumer behavior. This research investigates the effects of Webcare (responding message) from product/ service providers on negative eWOM by applying two types of products (search and experience). The proposed conceptual model was developed based on the combination of the stages in consumer decision-making process, theory of reasoned action (TRA), theory of planned behavior (TPB), the technology acceptance model (TAM), the information integration theory and the elaboration likelihood model. The methodology techniques used in this study included multivariate analysis of variance (MANOVA) and multiple regression analysis. The results suggest that Webcare does slightly increase Thai online consumer’s perceptions on perceived eWOM trustworthiness, information diagnosticity and quality. For negative eWOM, we also found that perceived eWOM Trustworthiness, perceived eWOM diagnosticity and quality have a positive relationship with eWOM influence whereas perceived valence has a negative relationship with eWOM influence in Thai online consumers.

Keywords: consumer behavior, electronic word-of-mouth, online review, online word-of-mouth, Thai online consumer, webcare

Procedia PDF Downloads 180
224 A Review on Benzo(a)pyrene Emission Factors from Biomass Combustion

Authors: Franziska Klauser, Manuel Schwabl, Alexander Weissinger, Christoph Schmidl, Walter Haslinger, Anne Kasper-Giebl

Abstract:

Benzo(a)pyrene (BaP) is the most widely investigated representative of Polycyclic Aromatic Hydrocarbons (PAH) as well as one of the most toxic compounds in this group. Since 2013 in the European Union a limit value for BaP concentration in the ambient air is applied, which was set to a yearly average value of 1 ng m-3. Several reports show that in some regions, even where industry and traffic are of minor impact this threshold is regularly exceeded. This is taken as proof that biomass combustion for heating purposes contributes significantly to BaP pollution. Several investigations have been already carried out on the BaP emission behavior of biomass combustion furnaces, mostly focusing on a certain aspect like the influences from wood type, of operation type or of technology type. However, a superior view on emission patterns of BaP from biomass combustion and the aggregation of determined values also from recent studies is not presented so far. The combination of determined values allows a better understanding of the BaP emission behavior from biomass combustion. In this work the review conclusions are driven from the combination of outcomes from different publication. In two examples it was shown that technical progress leads to 10 to 100 fold lower BaP emission from modern furnaces compared to old technologies of equivalent type. It was also indicated that the operation with pellets or wood chips exhibits clearly lower BaP emission factors compared to operation with log wood. Although, the BaP emission level from automatic furnaces is strongly impacted by the kind of operation. This work delivers an overview on BaP emission factors from different biomass combustion appliances, from different operation modes and from the combustion of different fuel and wood types. The main impact factors are depicted, and suggestions for low BaP emission biomass combustion are derived. As one result possible investigation fields concerning BaP emissions from biomass combustion that seem to be most important to be clarified are suggested.

Keywords: benzo(a)pyrene, biomass, combustion, emission, pollution

Procedia PDF Downloads 335
223 Divergences in Interpreters’ Oral Interpretation among Pentecostal Churches: Sermonic Reflections

Authors: Rufus Olufemi Adebayo, Sylvia Phiwani Zulu

Abstract:

Interpreting in the setting of diverse language and multicultural congregants, is often understood as integrating the content of the message. Preaching, similar to any communication, takes seriously people’s multiple contexts. The one who provides the best insight into understanding “the other”, traditionally speaking could be an interpreter in a multilingual context. Nonetheless, there are reflections in the loss of spiritual communication, translation and interpretive dialogue. No matter how eloquent the preacher is, an interpreter can make or mere the sermon (speech). The sermon that the preacher preaches is not always the one the congregation hears from the interpreter. In other occurrences, however, interpreting can lead not only to distort messages but also to dissatisfied audiences and preacher being overshadowed by the pranks of the interpreter. Using qualitative methodology, this paper explores the challenges and the conventional assumptions about preachers’ interpreter as influenced by spirituality, culture, and language in empirical and theoretical perspectives. An emphasis on the bias translation and the basis of reality that suppresses or devalues the spiritual communication is examined. The result indicates that interpretation of the declaration of guilt, history of congregation, spirituality, attitudes, morals, customs, specific practices of a preacher, education, and the environment form an entangled and misinterpretation. The article concludes by re-examining these qualities and rearticulating them into a preliminary theory for practice, as distinguished from theory, which could possibly enhance the development of more sustainable multilingual interpretation in the South African Pentecostal churches.

Keywords: congregants, divergences, interpreting/translation, language & communication, sermon/preaching

Procedia PDF Downloads 131
222 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique

Authors: Mario A. Blanco, Nicholas Burkhardt

Abstract:

An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.

Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer

Procedia PDF Downloads 329
221 The Hydrotrope-Mediated, Low-Temperature, Aqueous Dissolution of Maize Starch

Authors: Jeroen Vinkx, Jan A. Delcour, Bart Goderis

Abstract:

Complete aqueous dissolution of starch is notoriously difficult. A high-temperature autoclaving process is necessary, followed by cooling the solution below its boiling point. The cooled solution is inherently unstable over time. Gelation and retrogradation processes, along with aggregation-induced by undissolved starch remnants, result in starch precipitation. We recently observed the spontaneous gelatinization of native maize starch (MS) in aqueous sodium salicylate (NaSal) solutions at room temperature. A hydrotropic mode of solubilization is hypothesized. Differential scanning calorimetry (DSC) and polarized optical microscopy (POM) of starch dispersions in NaSal solution were used to demonstrate the room temperature gelatinization of MS at different concentrations of MS and NaSal. The DSC gelatinization peak shifts to lower temperatures, and the gelatinization enthalpy decreases with increasing NaSal concentration. POM images confirm the same trend through the disappearance of the ‘Maltese cross’ interference pattern of starch granules. The minimal NaSal concentration to induce complete room temperature dissolution of MS was found to be around 15-20 wt%. The MS content of the dispersion has little influence on the amount of NaSal needed to dissolve it. The effect of the NaSal solution on the MS molecular weight was checked with HPSEC. It is speculated that, because of its amphiphilic character, NaSal enhances the solubility of MS in water by association with the more hydrophobic MS moieties, much like urea, which has also been used to enhance starch dissolution in alkaline aqueous media. As such small molecules do not tend to form micelles in water, they are called hydrotropes rather than surfactants. A minimal hydrotrope concentration (MHC) is necessary for the hydrotropes to structure themselves in water, resulting in a higher solubility of MS. This is the case for the system MS/NaSal/H₂O. Further investigations into the putative hydrotropic dissolution mechanism are necessary.

Keywords: hydrotrope, dissolution, maize starch, sodium salicylate, gelatinization

Procedia PDF Downloads 150
220 Magnetoresistance Transition from Negative to Positive in Functionalization of Carbon Nanotube and Composite with Polyaniline

Authors: Krishna Prasad Maity, Narendra Tanty, Ananya Patra, V. Prasad

Abstract:

Carbon nanotube (CNT) is a well-known material for very good electrical, thermal conductivity and high tensile strength. Because of that, it’s widely used in many fields like nanotechnology, electronics, optics, etc. In last two decades, polyaniline (PANI) with CNT and functionalized CNT (fCNT) have been promising materials in application of gas sensing, electromagnetic shielding, electrode of capacitor etc. So, the study of electrical conductivity of PANI/CNT and PANI/fCNT is important to understand the charge transport and interaction between PANI and CNT in the composite. It is observed that a transition in magnetoresistance (MR) with lowering temperature, increasing magnetic field and decreasing CNT percentage in CNT/PANI composite. Functionalization of CNT prevent the nanotube aggregation, improves interfacial interaction, dispersion and stabilized in polymer matrix. However, it shortens the length, breaks C-C sp² bonds and enhances the disorder creating defects on the side walls. We have studied electrical resistivity and MR in PANI with CNT and fCNT composites for different weight percentages down to the temperature 4.2K and up to magnetic field 5T. Resistivity increases significantly in composite at low temperature due to functionalization of CNT compared to only CNT. Interestingly a transition from negative to positive magnetoresistance has been observed when the filler is changed from pure CNT to functionalized CNT after a certain percentage (10wt%) as the effect of more disorder in fCNT/PANI composite. The transition of MR has been explained on the basis of polaron-bipolaron model. The long-range Coulomb interaction between two polarons screened by disorder in the composite of fCNT/PANI, increases the effective on-site Coulomb repulsion energy to form bipolaron which leads to change the sign of MR from negative to positive.

Keywords: coulomb interaction, magnetoresistance transition, polyaniline composite, polaron-bipolaron

Procedia PDF Downloads 142
219 Impact of Map Generalization in Spatial Analysis

Authors: Lin Li, P. G. R. N. I. Pussella

Abstract:

When representing spatial data and their attributes on different types of maps, the scale plays a key role in the process of map generalization. The process is consisted with two main operators such as selection and omission. Once some data were selected, they would undergo of several geometrical changing processes such as elimination, simplification, smoothing, exaggeration, displacement, aggregation and size reduction. As a result of these operations at different levels of data, the geometry of the spatial features such as length, sinuosity, orientation, perimeter and area would be altered. This would be worst in the case of preparation of small scale maps, since the cartographer has not enough space to represent all the features on the map. What the GIS users do is when they wanted to analyze a set of spatial data; they retrieve a data set and does the analysis part without considering very important characteristics such as the scale, the purpose of the map and the degree of generalization. Further, the GIS users use and compare different maps with different degrees of generalization. Sometimes, GIS users are going beyond the scale of the source map using zoom in facility and violate the basic cartographic rule 'it is not suitable to create a larger scale map using a smaller scale map'. In the study, the effect of map generalization for GIS analysis would be discussed as the main objective. It was used three digital maps with different scales such as 1:10000, 1:50000 and 1:250000 which were prepared by the Survey Department of Sri Lanka, the National Mapping Agency of Sri Lanka. It was used common features which were on above three maps and an overlay analysis was done by repeating the data with different combinations. Road data, River data and Land use data sets were used for the study. A simple model, to find the best place for a wild life park, was used to identify the effects. The results show remarkable effects on different degrees of generalization processes. It can see that different locations with different geometries were received as the outputs from this analysis. The study suggests that there should be reasonable methods to overcome this effect. It can be recommended that, as a solution, it would be very reasonable to take all the data sets into a common scale and do the analysis part.

Keywords: generalization, GIS, scales, spatial analysis

Procedia PDF Downloads 307
218 Comparative Analysis of Data Gathering Protocols with Multiple Mobile Elements for Wireless Sensor Network

Authors: Bhat Geetalaxmi Jairam, D. V. Ashoka

Abstract:

Wireless Sensor Networks are used in many applications to collect sensed data from different sources. Sensed data has to be delivered through sensors wireless interface using multi-hop communication towards the sink. The data collection in wireless sensor networks consumes energy. Energy consumption is the major constraints in WSN .Reducing the energy consumption while increasing the amount of generated data is a great challenge. In this paper, we have implemented two data gathering protocols with multiple mobile sinks/elements to collect data from sensor nodes. First, is Energy-Efficient Data Gathering with Tour Length-Constrained Mobile Elements in Wireless Sensor Networks (EEDG), in which mobile sinks uses vehicle routing protocol to collect data. Second is An Intelligent Agent-based Routing Structure for Mobile Sinks in WSNs (IAR), in which mobile sinks uses prim’s algorithm to collect data. Authors have implemented concepts which are common to both protocols like deployment of mobile sinks, generating visiting schedule, collecting data from the cluster member. Authors have compared the performance of both protocols by taking statistics based on performance parameters like Delay, Packet Drop, Packet Delivery Ratio, Energy Available, Control Overhead. Authors have concluded this paper by proving EEDG is more efficient than IAR protocol but with few limitations which include unaddressed issues likes Redundancy removal, Idle listening, Mobile Sink’s pause/wait state at the node. In future work, we plan to concentrate more on these limitations to avail a new energy efficient protocol which will help in improving the life time of the WSN.

Keywords: aggregation, consumption, data gathering, efficiency

Procedia PDF Downloads 471
217 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 275
216 Design of Demand Pacemaker Using an Embedded Controller

Authors: C. Bala Prashanth Reddy, B. Abhinay, C. Sreekar, D. V. Shobhana Priscilla

Abstract:

The project aims in designing an emergency pacemaker which is capable of giving shocks to a human heart which has stopped working suddenly. A pacemaker is a machine commonly used by cardiologists. This machine is used in order to shock a human’s heart back into usage. The way the heart works is that there are small cells called pacemakers sending electrical pulses to cardiac muscles that tell the heart when to pump blood. When these electrical pulses stop, the heart stops beating. When this happens, a pacemaker is used to shock the heart muscles and the pacemakers back into action. The way this is achieved is by rubbing the two panels of the pacemaker together to create an adequate electrical current, and then the heart gets back to the normal state. The project aims in designing a system which is capable of continuously displaying the heart beat and blood pressure of a person on LCD. The concerned doctor gets the heart beat and also the blood pressure details continuously through the GSM Modem in the form of SMS alerts. In case of abnormal condition, the doctor sends message format regarding the amount of electric shock needed. Automatically the microcontroller gives the input to the pacemaker which in turn gives the shock to the patient. Heart beat monitor and display system is a portable and a best replacement for the old model stethoscope which is less efficient. The heart beat rate is calculated manually using stethoscope where the probability of error is high because the heart beat rate lies in the range of 70 to 90 per minute whose occurrence is less than 1 sec, so this device can be considered as a very good alternative instead of a stethoscope.

Keywords: missing R wave, PWM, demand pacemaker, heart

Procedia PDF Downloads 443
215 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 274
214 Preparation of Flurbiprofen Derivative for Enhanced Brain Penetration

Authors: Jungkyun Im

Abstract:

Nonsteroidal anti-inflammatory drugs (NSAIDs) are effective for relieving pain and reducing inflammation. They are nonselective inhibitors of two isoforms of COX, cyclooxygenase-1 (COX-1) and cyclooxygenase-2 (COX-2), and thereby inhibiting the production of hormone-like lipid compounds such as, prostaglandins and thromboxanes which cause inflammation, pain, fever, platelet aggregation, etc. In addition, recently there are many research articles reporting the neuroprotective effect of NSAIDs in neurodegenerative diseases, such as Alzheimer’s disease (AD) and Parkinson’s disease (PD). However, the clinical use of NSAIDs in these diseases is limited by low brain distribution. Therefore, in order to assist the in-depth investigation on the pharmaceutical mechanism of flurbiprofen in neuroprotection and to make flurbiprofen a more potent drug to prevent or alleviate neurodegenerative diseases, delivery of flurbiprofen to brain should be effective and sufficient amount of flurbiprofen must penetrate the BBB thus gaining access into the patient’s brain. We have recently developed several types of guanidine-rich molecular carriers with high molecular weights and good water solubility that readily cross the blood-brain barrier (BBB) and display efficient distributions in the mouse brain. The G8 (having eight guanidine groups) molecular carrier based on D-sorbitol was found to be very effective in delivering anticancer drugs to a mouse brain. In the present study, employing the same molecular carrier, we prepared the flurbiprofen conjugate and studied its BBB permeation by mouse tissue distribution study. Flurbiprofen was attached to a molecular carrier with a fluorescein probe and multiple terminal guanidiniums. The conjugate was found to internalize into live cells and readily cross the BBB to enter the mouse brain. Our novel synthetic flurbiprofen conjugate will hopefully delivery NSAIDs into brain, and is therefore applicable to the neurodegenerative diseases treatment or prevention.

Keywords: flurbiprofen, drug delivery, molecular carrier, organic synthesis

Procedia PDF Downloads 211
213 Towards Kurdish Internet Linguistics: A Case Study on the Impact of Social Media on Kurdish Language

Authors: Karwan K. Abdalrahman

Abstract:

Due to the impacts of the internet and social media, new words and expressions enter the Kurdish language, and a number of familiarized words get new meanings. The case is especially true when the technique of transliteration is taken into consideration. Through transliteration, a number of selected words widely used on social media are entering the Kurdish media discourse. In addition, a selected number of Kurdish words get new cultural and psychological meanings. The significance of this study is to delve into the process of word formation in the Kurdish language and explore how new words and expressions are formed by social media users and got public recognition. First, the study investigates the English words that enter the Kurdish language through different social media platforms. All of these words are transliterated and are used in spoken and written discourses. Second, there are a specific number of Kurdish words that got new meanings in social media. As for these words, there are psychological and cultural factors that make people use these expressions for specific political reasons. It can be argued that they have an indirect political message along with their new linguistic usages. This is a qualitative study analyzing video content that was published in the last two years on social media platforms, including Facebook and YouTube. The collected data was analyzed based on the themes discussed above. The findings of the research can be summarized as follows: the widely used transliterated words have entered both the spoken and written discourses. Authors in online and offline newspapers, TV presenters, literary writers, columnists are using these new expressions in their writings. As for the Kurdish words with new meanings, they are also widely used for psychological, cultural, and political reasons.

Keywords: Kurdish language, social media, new meanings, transliteration, vocabulary

Procedia PDF Downloads 159
212 Normalized Enterprises Architectures: Portugal's Public Procurement System Application

Authors: Tiago Sampaio, André Vasconcelos, Bruno Fragoso

Abstract:

The Normalized Systems Theory, which is designed to be applied to software architectures, provides a set of theorems, elements and rules, with the purpose of enabling evolution in Information Systems, as well as ensuring that they are ready for change. In order to make that possible, this work’s solution is to apply the Normalized Systems Theory to the domain of enterprise architectures, using Archimate. This application is achieved through the adaptation of the elements of this theory, making them artifacts of the modeling language. The theorems are applied through the identification of the viewpoints to be used in the architectures, as well as the transformation of the theory’s encapsulation rules into architectural rules. This way, it is possible to create normalized enterprise architectures, thus fulfilling the needs and requirements of the business. This solution was demonstrated using the Portuguese Public Procurement System. The Portuguese government aims to make this system as fair as possible, allowing every organization to have the same business opportunities. The aim is for every economic operator to have access to all public tenders, which are published in any of the 6 existing platforms, independently of where they are registered. In order to make this possible, we applied our solution to the construction of two different architectures, which are able of fulfilling the requirements of the Portuguese government. One of those architectures, TO-BE A, has a Message Broker that performs the communication between the platforms. The other, TO-BE B, represents the scenario in which the platforms communicate with each other directly. Apart from these 2 architectures, we also represent the AS-IS architecture that demonstrates the current behavior of the Public Procurement Systems. Our evaluation is based on a comparison between the AS-IS and the TO-BE architectures, regarding the fulfillment of the rules and theorems of the Normalized Systems Theory and some quality metrics.

Keywords: archimate, architecture, broker, enterprise, evolvable systems, interoperability, normalized architectures, normalized systems, normalized systems theory, platforms

Procedia PDF Downloads 331
211 A Multi-Objective Decision Making Model for Biodiversity Conservation and Planning: Exploring the Concept of Interdependency

Authors: M. Mohan, J. P. Roise, G. P. Catts

Abstract:

Despite living in an era where conservation zones are de-facto the central element in any sustainable wildlife management strategy, we still find ourselves grappling with several pareto-optimal situations regarding resource allocation and area distribution for the same. In this paper, a multi-objective decision making (MODM) model is presented to answer the question of whether or not we can establish mutual relationships between these contradicting objectives. For our study, we considered a Red-cockaded woodpecker (Picoides borealis) habitat conservation scenario in the coastal plain of North Carolina, USA. Red-cockaded woodpecker (RCW) is a non-migratory territorial bird that excavates cavities in living pine trees for roosting and nesting. The RCW groups nest in an aggregation of cavity trees called ‘cluster’ and for our model we use the number of clusters to be established as a measure of evaluating the size of conservation zone required. The case study is formulated as a linear programming problem and the objective function optimises the Red-cockaded woodpecker clusters, carbon retention rate, biofuel, public safety and Net Present Value (NPV) of the forest. We studied the variation of individual objectives with respect to the amount of area available and plotted a two dimensional dynamic graph after establishing interrelations between the objectives. We further explore the concept of interdependency by integrating the MODM model with GIS, and derive a raster file representing carbon distribution from the existing forest dataset. Model results demonstrate the applicability of interdependency from both linear and spatial perspectives, and suggest that this approach holds immense potential for enhancing environmental investment decision making in future.

Keywords: conservation, interdependency, multi-objective decision making, red-cockaded woodpecker

Procedia PDF Downloads 315