Search results for: most significant bits
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15980

Search results for: most significant bits

15920 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 78
15919 Filtering and Reconstruction System for Grey-Level Forensic Images

Authors: Ahd Aljarf, Saad Amin

Abstract:

Images are important source of information used as evidence during any investigation process. Their clarity and accuracy is essential and of the utmost importance for any investigation. Images are vulnerable to losing blocks and having noise added to them either after alteration or when the image was taken initially, therefore, having a high performance image processing system and it is implementation is very important in a forensic point of view. This paper focuses on improving the quality of the forensic images. For different reasons packets that store data can be affected, harmed or even lost because of noise. For example, sending the image through a wireless channel can cause loss of bits. These types of errors might give difficulties generally for the visual display quality of the forensic images. Two of the images problems: noise and losing blocks are covered. However, information which gets transmitted through any way of communication may suffer alteration from its original state or even lose important data due to the channel noise. Therefore, a developed system is introduced to improve the quality and clarity of the forensic images.

Keywords: image filtering, image reconstruction, image processing, forensic images

Procedia PDF Downloads 335
15918 Approximate-Based Estimation of Single Event Upset Effect on Statistic Random-Access Memory-Based Field-Programmable Gate Arrays

Authors: Mahsa Mousavi, Hamid Reza Pourshaghaghi, Mohammad Tahghighi, Henk Corporaal

Abstract:

Recently, Statistic Random-Access Memory-based (SRAM-based) Field-Programmable Gate Arrays (FPGAs) are widely used in aeronautics and space systems where high dependability is demanded and considered as a mandatory requirement. Since design’s circuit is stored in configuration memory in SRAM-based FPGAs; they are very sensitive to Single Event Upsets (SEUs). In addition, the adverse effects of SEUs on the electronics used in space are much higher than in the Earth. Thus, developing fault tolerant techniques play crucial roles for the use of SRAM-based FPGAs in space. However, fault tolerance techniques introduce additional penalties in system parameters, e.g., area, power, performance and design time. In this paper, an accurate estimation of configuration memory vulnerability to SEUs is proposed for approximate-tolerant applications. This vulnerability estimation is highly required for compromising between the overhead introduced by fault tolerance techniques and system robustness. In this paper, we study applications in which the exact final output value is not necessarily always a concern meaning that some of the SEU-induced changes in output values are negligible. We therefore define and propose Approximate-based Configuration Memory Vulnerability Factor (ACMVF) estimation to avoid overestimating configuration memory vulnerability to SEUs. In this paper, we assess the vulnerability of configuration memory by injecting SEUs in configuration memory bits and comparing the output values of a given circuit in presence of SEUs with expected correct output. In spite of conventional vulnerability factor calculation methods, which accounts any deviations from the expected value as failures, in our proposed method a threshold margin is considered depending on user-case applications. Given the proposed threshold margin in our model, a failure occurs only when the difference between the erroneous output value and the expected output value is more than this margin. The ACMVF is subsequently calculated by acquiring the ratio of failures with respect to the total number of SEU injections. In our paper, a test-bench for emulating SEUs and calculating ACMVF is implemented on Zynq-7000 FPGA platform. This system makes use of the Single Event Mitigation (SEM) IP core to inject SEUs into configuration memory bits of the target design implemented in Zynq-7000 FPGA. Experimental results for 32-bit adder show that, when 1% to 10% deviation from correct output is considered, the counted failures number is reduced 41% to 59% compared with the failures number counted by conventional vulnerability factor calculation. It means that estimation accuracy of the configuration memory vulnerability to SEUs is improved up to 58% in the case that 10% deviation is acceptable in output results. Note that less than 10% deviation in addition result is reasonably tolerable for many applications in approximate computing domain such as Convolutional Neural Network (CNN).

Keywords: fault tolerance, FPGA, single event upset, approximate computing

Procedia PDF Downloads 156
15917 Design and Implementation of Pseudorandom Number Generator Using Android Sensors

Authors: Mochamad Beta Auditama, Yusuf Kurniawan

Abstract:

A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk.

Keywords: Android hardware-based sensor, deterministic process, entropy source, random number generation/generators

Procedia PDF Downloads 337
15916 Error Probability of Multi-User Detection Techniques

Authors: Komal Babbar

Abstract:

Multiuser Detection is the intelligent estimation/demodulation of transmitted bits in the presence of Multiple Access Interference. The authors have presented the Bit-error rate (BER) achieved by linear multi-user detectors: Matched filter (which treats the MAI as AWGN), Decorrelating and MMSE. In this work, authors investigate the bit error probability analysis for Matched filter, decorrelating, and MMSE. This problem arises in several practical CDMA applications where the receiver may not have full knowledge of the number of active users and their signature sequences. In particular, the behavior of MAI at the output of the Multi-user detectors (MUD) is examined under various asymptotic conditions including large signal to noise ratio; large near-far ratios; and a large number of users. In the last section Authors also shows Matlab Simulation results for Multiuser detection techniques i.e., Matched filter, Decorrelating, MMSE for 2 users and 10 users.

Keywords: code division multiple access, decorrelating, matched filter, minimum mean square detection (MMSE) detection, multiple access interference (MAI), multiuser detection (MUD)

Procedia PDF Downloads 494
15915 Emotiv EPOC BCI Matrix Speller Based on Single Emokey

Authors: S. M. Abdullah Al Mamun

Abstract:

Human Computer Interaction (HCI) is an excellent area for the researchers to make daily life more simple and fast. Necessary hardware equipments for any BCI are generally expensive and not affordable for most of the people. Emotiv is one of the solutions for this problem, which can provide electroencephalograph (EEG) signal and explain the brain activities. BCI virtual speller was one of the important applications for the people who have lost their hand or speaking ability because of diseases or unexpected accident. In this paper, a matrix speller has been designed for the first time for Bengali speaking people around the world. Bengali is one of the most commonly spoken languages. Among them, a lot of disabled person will be able to express their desire in their mother tongue. This application is also usable for the social networks and daily life communications. For this virtual keyboard, the well-known matrix speller method with column flashing is applied and controlled by single Emokey only. Emokey is a great feature which translates emotional state for application inputs. In this paper, it is presented that the ITR (Information Transfer Rate) were 29.4 bits/min and typing speed achieved up to 7.43 char/per min.

Keywords: brain computer interface, Emotiv EPOC, EEG, virtual keyboard, matrix speller

Procedia PDF Downloads 271
15914 A High Compression Ratio for a Losseless Image Compression Based on the Arithmetic Coding with the Sorted Run Length Coding: Meteosat Second Generation Image Compression

Authors: Cherifi Mehdi, Lahdir Mourad, Ameur Soltane

Abstract:

Image compression is the heart of several multimedia techniques. It is used to reduce the number of bits required to represent an image. Meteosat Second Generation (MSG) satellite allows the acquisition of 12 image files every 15 minutes and that results in a large databases sizes. In this paper, a novel image compression method based on the arithmetic coding with the sorted Run Length Coding (SRLC) for MSG images is proposed. The SRLC allows us to find the occurrence of the consecutive pixels of the original image to create a sorted run. The arithmetic coding allows the encoding of the sorted data of the previous stage to retrieve a unique code word that represents a binary code stream in the sorted order to boost the compression ratio. Through this article, we show that our method can perform the best results concerning compression ratio and bit rate unlike the method based on the Run Length Coding (RLC) and the arithmetic coding. Evaluation criteria like the compression ratio and the bit rate allow the confirmation of the efficiency of our method of image compression.

Keywords: image compression, arithmetic coding, Run Length Coding, RLC, Sorted Run Length Coding, SRLC, Meteosat Second Generation, MSG

Procedia PDF Downloads 324
15913 Mobile Learning: Toward Better Understanding of Compression Techniques

Authors: Farouk Lawan Gambo

Abstract:

Data compression shrinks files into fewer bits then their original presentation. It has more advantage on internet because the smaller a file, the faster it can be transferred but learning most of the concepts in data compression are abstract in nature therefore making them difficult to digest by some students (Engineers in particular). To determine the best approach toward learning data compression technique, this paper first study the learning preference of engineering students who tend to have strong active, sensing, visual and sequential learning preferences, the paper also study the advantage that mobility of learning have experienced; Learning at the point of interest, efficiency, connection, and many more. A survey is carried out with some reasonable number of students, through random sampling to see whether considering the learning preference and advantages in mobility of learning will give a promising improvement over the traditional way of learning. Evidence from data analysis using Ms-Excel as a point of concern for error-free findings shows that there is significance different in the students after using learning content provided on smart phone, also the result of the findings presented in, bar charts and pie charts interpret that mobile learning has to be promising feature of learning.

Keywords: data analysis, compression techniques, learning content, traditional learning approach

Procedia PDF Downloads 321
15912 Method of False Alarm Rate Control for Cyclic Redundancy Check-Aided List Decoding of Polar Codes

Authors: Dmitry Dikarev, Ajit Nimbalker, Alexei Davydov

Abstract:

Polar coding is a novel example of error correcting codes, which can achieve Shannon limit at block length N→∞ with log-linear complexity. Active research is being carried to adopt this theoretical concept for using in practical applications such as 5th generation wireless communication systems. Cyclic redundancy check (CRC) error detection code is broadly used in conjunction with successive cancellation list (SCL) decoding algorithm to improve finite-length polar code performance. However, there are two issues: increase of code block payload overhead by CRC bits and decrease of CRC error-detection capability. This paper proposes a method to control CRC overhead and false alarm rate of polar decoding. As shown in the computer simulations results, the proposed method provides the ability to use any set of CRC polynomials with any list size while maintaining the desired level of false alarm rate. This level of flexibility allows using polar codes in 5G New Radio standard.

Keywords: 5G New Radio, channel coding, cyclic redundancy check, list decoding, polar codes

Procedia PDF Downloads 192
15911 Effect of Ownership Structure and Financial Leverage on Corporate Investment Behavior in Tehran Stock Exchange

Authors: Shamshiri Mitra, Abedi Rahim

Abstract:

This paper investigates corporate investment behavior and its relationship with ownership structure and financial leverage for the listed company of Tehran stock exchange during 2008-2012. The results show that the concentration of ownership has s significant positive effect on corporate investment. The results for the kind of major owners show that institutional ownership had a positive significant effect and state and individual ownership had negative significant effects on the corporate investment but the effect of corporate ownership was not significant. Furthermore the effect of financial leverage was negative and significant.

Keywords: corporate investment behavior, financial leverage, ownership structure corporate investment behavior

Procedia PDF Downloads 500
15910 Effect of Citric Acid and Clove on Cured Smoked Meat: A Traditional Meat Product

Authors: Esther Eduzor, Charles A. Negbenebor, Helen O. Agu

Abstract:

Smoking of meat enhances the taste and look of meat, it also increases its longevity, and helps preserve the meat by slowing down the spoilage of fat and growth of bacteria. The Lean meat from the forequarter of beef carcass was obtained from the Maiduguri abattoir. The meat was cut into four portions with weight ranging from 525-545 g. The meat was cut into bits measuring about 8 cm in length, 3.5 cm in thickness and weighed 64.5 g. Meat samples were washed, cured with various concentration of sodium chloride, sodium nitrate, citric acid and clove for 30 min, drained and smoked in a smoking kiln at a temperature range of 55-600°C, for 8 hr a day for 3 days. The products were stored at ambient temperature and evaluated microbiologically and organoleptically. In terms of processing and storage there were increases in pH, free fatty acid content, a decrease in water holding capacity and microbial count of the cured smoked meat. The panelists rated control samples significantly (p < 0.05) higher in terms of colour, texture, taste and overall acceptability. The following organisms were isolated and identified during storage: Bacillus specie, Bacillus subtilis, streptococcus, Pseudomonas, Aspergillus niger, Candida and Penicillium specie. The study forms a basis for new product development for meat industry.

Keywords: citric acid, cloves, smoked meat, bioengineering

Procedia PDF Downloads 413
15909 Chipless RFID Capacity Enhancement Using the E-pulse Technique

Authors: Haythem H. Abdullah, Hesham Elkady

Abstract:

With the fast increase in radio frequency identification (RFID) applications such as medical recording, library management, etc., the limitation of active tags stems from its need to external batteries as well as passive or active chips. The chipless RFID tag reduces the cost to a large extent but at the expense of utilizing the spectrum. The reduction of the cost of chipless RFID is due to the absence of the chip itself. The identification is done by utilizing the spectrum in such a way that the frequency response of the tags consists of some resonance frequencies that represent the bits. The system capacity is decided by the number of resonators within the pre-specified band. It is important to find a solution to enhance the spectrum utilization when using chipless RFID. Target identification is a process that results in a decision that a specific target is present or not. Several target identification schemes are present, but one of the most successful techniques in radar target identification in the oscillatory region is the extinction pulse technique (E-Pulse). The E-Pulse technique is used to identify targets via its characteristics (natural) modes. By introducing an innovative solution for chipless RFID reader and tag designs, the spectrum utilization goes to the optimum case. In this paper, a novel capacity enhancement scheme based on the E-pulse technique is introduced to improve the performance of the chipless RFID system.

Keywords: chipless RFID, E-pulse, natural modes, resonators

Procedia PDF Downloads 41
15908 Performance Analysis of PAPR Reduction in OFDM Systems based on Partial Transmit Sequence (PTS) Technique

Authors: Alcardo Alex Barakabitze, Tan Xiaoheng

Abstract:

Orthogonal Frequency Division Multiplexing (OFDM) is a special case of Multi-Carrier Modulation (MCM) technique which transmits a stream of data over a number of lower data rate subcarriers. OFDM splits the total transmission bandwidth into a number of orthogonal and non-overlapping subcarriers and transmit the collection of bits called symbols in parallel using these subcarriers. This paper explores the Peak to Average Power Reduction (PAPR) using the Partial Transmit Sequence technique. We provide the distribution analysis and the basics of OFDM signals and then show how the PAPR increases as the number of subcarriers increases. We provide the performance analysis of CCDF and PAPR expressed in decibels through MATLAB simulations. The simulation results show that, in PTS technique, the performance of PAPR reduction in OFDM systems improves significantly as the number of sub-blocks increases. However, by keeping the same number of sub-blocks variation, oversampling factor and the number of OFDM blocks’ iteration for generating the CCDF, the OFDM systems with 128 subcarriers have an improved performance in PAPR reduction compared to OFDM systems with 256, 512 or >512 subcarriers.

Keywords: OFDM, peak to average power reduction (PAPR), bit error rate (BER), subcarriers, wireless communications

Procedia PDF Downloads 488
15907 Meteosat Second Generation Image Compression Based on the Radon Transform and Linear Predictive Coding: Comparison and Performance

Authors: Cherifi Mehdi, Lahdir Mourad, Ameur Soltane

Abstract:

Image compression is used to reduce the number of bits required to represent an image. The Meteosat Second Generation satellite (MSG) allows the acquisition of 12 image files every 15 minutes. Which results a large databases sizes. The transform selected in the images compression should contribute to reduce the data representing the images. The Radon transform retrieves the Radon points that represent the sum of the pixels in a given angle for each direction. Linear predictive coding (LPC) with filtering provides a good decorrelation of Radon points using a Predictor constitute by the Symmetric Nearest Neighbor filter (SNN) coefficients, which result losses during decompression. Finally, Run Length Coding (RLC) gives us a high and fixed compression ratio regardless of the input image. In this paper, a novel image compression method based on the Radon transform and linear predictive coding (LPC) for MSG images is proposed. MSG image compression based on the Radon transform and the LPC provides a good compromise between compression and quality of reconstruction. A comparison of our method with other whose two based on DCT and one on DWT bi-orthogonal filtering is evaluated to show the power of the Radon transform in its resistibility against the quantization noise and to evaluate the performance of our method. Evaluation criteria like PSNR and the compression ratio allows showing the efficiency of our method of compression.

Keywords: image compression, radon transform, linear predictive coding (LPC), run lengthcoding (RLC), meteosat second generation (MSG)

Procedia PDF Downloads 387
15906 Phytoplankton Community Structure in the Moroccan Coast of the Mediterranean Sea: Case Study of Saiidia, Three Forks Cape

Authors: H. Idmoussi, L. Somoue, O. Ettahiri, A. Makaoui, S. Charib, A. Agouzouk, A. Ben Mhamed, K. Hilmi, A. Errhif

Abstract:

The study on the composition, abundance, and distribution of phytoplankton was conducted along the Moroccan coast of the Mediterranean Sea (Saiidia - Three Forks Cape) in April 2018. Samples were collected at thirteen stations using Niskin bottles within two layers (surface and deep layers). The identification and enumeration of phytoplankton were carried out according to the Utermöhl method (1958). A total number of 54 phytoplankton species were identified over the entire survey area. Thirty-six species could be found both in the surface and the deep layers while eleven species were observed only in the surface layer and seven in the deep layer. The phytoplankton throughout the study area was dominated by diatoms represented mainly by Nitzschia sp., Pseudonitzschia sp., Chaetoceros sp., Cylindrotheca closterium, Leptocylindrus minimus, Leptocylindrus danicus, Dactyliosolen fragilissimus. Dinoflagellates were dominated by Gymnodinium sp., Scrippsiella sp., Gyrodinium spirale, Noctulica sp, Prorocentrum micans. Euglenophyceae, Silicoflagellates and Raphidophyceae were present in low numbers. Most of the phytoplankton were concentrated in the surface layer, particularly towards the Three Forks Cape (25200 cells·l⁻¹). Shannon species diversity (ranging from 2 and 4 Bits) and evenness index (broadly > 0.7) suggested that phytoplankton community is generally diversified and structured in the studied area.

Keywords: abundance, diversity, Mediterranean Sea, phytoplankton

Procedia PDF Downloads 127
15905 Evaluation of the Effects of Lead on Some Physiological and Hormonal Biomarkeurs among Workers

Authors: Mansouri Ouarda, Adbdennour Cherif, Boukarma Ziad

Abstract:

Environmental and biological monitoring are used for the evaluation of exposure to industrial chemicals, and provide a tool for assessing workers’ exposure to chemicals. The organs or tissues where the first biological effects can be observed with increasing amounts of lead toxicity. This study aims at evaluating the effect of the metal element-trace; lead, on the sex hormones in male workers, exposed to this metal on the level of the manufacturing plant of lead accumulators. The results indicate a significant reduction of the testosterone concentration in exposed workers compared to the control. However, the rate of LH was strongly increased at the individuals exposed to Pb. A significant difference concerning the rate of FSH, the hormone Prolactin and cortisol was recorded. The indicators of the lead poisoning indicate a very highly significant increase in the value of Pbs which vary between (142-796 µg/L) among which 50% of the workers present a high lead poisoning and the value of PPZ which vary between (43-554µg/L). The biochemical parameters show a significant increase in the rate of the créatinine, the urea and the acid urique. The hepatic results show no significant differentiation in the rate of TGO and TGP between both groups of study. However the rates of the enzyme phosphatase alkaline, triglyceride, and cholesterol a significant difference were registered.

Keywords: hormons, parameters, physilogical, Pbs, PPZ

Procedia PDF Downloads 352
15904 Sustainable Development, China’s Emerging Role via One Belt, One Road

Authors: Saeid Rabiei Majd, Motahareh Alvandi, Mehrad Rabiei

Abstract:

The rapid economic and technological development of any country depends on access to cheap sources of energy. Competition for access to petroleum resources is always accompanied by numerous environmental risks. These factors have caused more attention to environmental issues and sustainable development in petroleum contracts and activities. Nowadays, a sign of developed countries is adhering to the principles and rules of international environmental law and sustainable development of commercial contracts. China has entered into play through the massive project plan, One Belt, One Road. China is becoming a new emerging power in the world. China's bilateral investment treaties have an impact on environmental rights and sustainable development through regional and international foreign direct investment. The aim of this research is to examine China's key position to promote and improve environmental principles and international law and sustainable development in the energy sector in the world through the initiative, One Belt, One Road. Based on this hypothesis, it seems that in the near future, China's investment bilateral investment treaties will become popular investment model used in global trade, especially in the field of energy and sustainable development. They will replace the European and American models. The research method is including literature review, analytical and descriptive methods.

Keywords: principles of sustainable development, oil and gas law, Chinas BITs, One Belt One Road, environmental rights

Procedia PDF Downloads 279
15903 Low Term Aerobic Training Is Not Associated with Anti-Inflammatory in Obese Women

Authors: Zohreh Afsharmand, Sokhanguei Yahya

Abstract:

A growing body of literature suggests that that low-grade systemic inflammation associated to obesity plays a key role in the pathogenic mechanism of several disorders. In this study, the effect of 6 weeks aerobic training on IL-6 and IL-1B as inflammatory cytokine were investigated in adult obese women. For this purpose, 26 sedentary adult obese women were divided into exercise and control groups (n=12). Pre and post training of mentioned cytokines were measured in two groups. Student’s t-tests for paired samples were performed to determine whether there were significant within-group changes in the outcomes. A p value less than 0.05 was considered statistically significant. There were no statistically significant differences between the exercise and control groups with regard to anthropometrical markers or inflammatory cytokines. Despite the significant decrease in all anthropometrical markers, no significant differences were found in serum IL-6 and IL-1B by aerobic training with compared to baseline. Our findings indicate that aerobic training intervention for a short time is not associated with the anti-inflammatory property in obese women.

Keywords: aerobic training, cytokine, inflammation, obesity

Procedia PDF Downloads 314
15902 A Pilot Study on the Predictors of Child-Parent Relationship

Authors: Selen Demirtas-Zorbaz

Abstract:

This study aimed to determine if there is any relation between child–parent relationships and parental self-efficacy. The participants of this study are 208 parents, and 82,5% of them are mothers. The children’s age range are differed from 4 to 13 (x̄=7,8). The results showed that there is a significant positive correlation between positive relationship with parents and parental self-efficacy (r=0.52, p < .01); and significant negative correlation between conflict with parents and parental self-efficacy (r=-0.28, p < .01). Also, findings reveal that there was no significant correlation between the time spent with the child and conflict with parents (r=-0.08, p>.05). It was also found that there was no significant correlation between the time spends with the child and positive relationship with parents (r=0.08, p > 0.5). In addition to this; regression analysis’ results indicated that parental self-efficacy is significant predictors of conflict (β=-.268, t=-4.002, p < .001) and positive relationship with parents (β =.519, t= 8.733, p < .001) whereas time spent with children is not (β =-.070, t=-1,045, p > .05 for conflict; β =.061, t=1.023, p > .05 for positive relationship with parents).

Keywords: child-parent relationship, conflict with parents, positive relationship with parents, parental efficacy

Procedia PDF Downloads 267
15901 Estimation of Rock Strength from Diamond Drilling

Authors: Hing Hao Chan, Thomas Richard, Masood Mostofi

Abstract:

The mining industry relies on an estimate of rock strength at several stages of a mine life cycle: mining (excavating, blasting, tunnelling) and processing (crushing and grinding), both very energy-intensive activities. An effective comminution design that can yield significant dividends often requires a reliable estimate of the material rock strength. Common laboratory tests such as rod, ball mill, and uniaxial compressive strength share common shortcomings such as time, sample preparation, bias in plug selection cost, repeatability, and sample amount to ensure reliable estimates. In this paper, the authors present a methodology to derive an estimate of the rock strength from drilling data recorded while coring with a diamond core head. The work presented in this paper builds on a phenomenological model of the bit-rock interface proposed by Franca et al. (2015) and is inspired by the now well-established use of the scratch test with PDC (Polycrystalline Diamond Compact) cutter to derive the rock uniaxial compressive strength. The first part of the paper introduces the phenomenological model of the bit-rock interface for a diamond core head that relates the forces acting on the drill bit (torque, axial thrust) to the bit kinematic variables (rate of penetration and angular velocity) and introduces the intrinsic specific energy or the energy required to drill a unit volume of rock for an ideally sharp drilling tool (meaning ideally sharp diamonds and no contact between the bit matrix and rock debris) that is found well correlated to the rock uniaxial compressive strength for PDC and roller cone bits. The second part describes the laboratory drill rig, the experimental procedure that is tailored to minimize the effect of diamond polishing over the duration of the experiments, and the step-by-step methodology to derive the intrinsic specific energy from the recorded data. The third section presents the results and shows that the intrinsic specific energy correlates well to the uniaxial compressive strength for the 11 tested rock materials (7 sedimentary and 4 igneous rocks). The last section discusses best drilling practices and a method to estimate the rock strength from field drilling data considering the compliance of the drill string and frictional losses along the borehole. The approach is illustrated with a case study from drilling data recorded while drilling an exploration well in Australia.

Keywords: bit-rock interaction, drilling experiment, impregnated diamond drilling, uniaxial compressive strength

Procedia PDF Downloads 106
15900 Associations of Vitamin D Receptor Polymorphisms with Coronary Artery Diseases

Authors: Elham Sharif, Nasser Rizk, Sirin Abu Aqel, Ofelia Masoud

Abstract:

Background: Previous studies have investigated the association of rs1544410, rs7975232 and rs731236 polymorphisms in vitamin D receptor gene and its impact on diseases such as cancer, diabetes and hypertension in different ethnic backgrounds. Aim: The aim of this study is to investigate the association between VDR polymorphisms using three SNP’s (rs1544410, rs7975232 and rs731236) and the severity of the significant lesion in coronary arteries among angiographically diagnosed CAD. Methods: A prospective-retrospective study was conducted on 192 CAD patients enrolled from the cardiology department-Heart Hospital HMC, grouped in 96 subjects with significant stenosis and 96 with non-significant stenosis with a mean age between 30 and 75 years old. Genotyping was performed for the following SNPs rs1544410, rs7975232 and rs731236 using TaqMan assay by the Real Time PCR, ABI 7500 in Health Sciences Labs at Qatar University Biomedical Research Center. Results: The results showed that both groups have matched age and gender distribution but patients with the significant stenosis have significantly higher; BMI (p=0.047); smoking status (p=0.039); FBS (p= 0.031); CK-MB (p=0.025) and Troponin (p=0.002) than the patients with non–significant lesion. Among the traditional risk factors, smoking increases the odds of the severe stenotic lesion in CAD patients by 1.984, with 95% CI between 1.024 – 7.063, with p= 0.042.HWE showed deviations of the rs1544410 and rs731236 among the study subjects. The most frequent genotype in distribution of rs7975232 is the AA among the significant stenosis patients, while the heterozygous AC was the frequent genotype in distribution among the non-significant stenosis group. The carriers of CC genotype in rs7975232 increased the risk of having significant coronary arteries stenotic lesion by 1.83 with 95% CI (1.020 – 3.280), p=0.043. No association was found between the rs7975232 with vitamin D and VDBP. Conclusion: There is a significant association between rs7975232 and the severity of CAD lesion. The carrier of CC genotype in rs7975232 increased the risk of having significant coronary arteries atherosclerotic lesion especially in patients with smoking history independent of vitamin D.

Keywords: vitamin D, vitamin D receptor, polymorphism, coronary harat disease

Procedia PDF Downloads 290
15899 Design and Identification of Mycobacterium tuberculosis Glutamate Racemase (MurI) Inhibitors

Authors: Prasanthi Malapati, R. Reshma, Vijay Soni, Perumal Yogeeswari, Dharmarajan Sriram

Abstract:

In the present study, we attempted to develop Mycobacterium tuberculosis (Mtb) inhibitors by exploring the pharmaceutically underexploited enzyme targets which are majorly involved in cell wall biosynthesis of mycobacteria. For this purpose, glutamate racemase (coded by MurI gene) was selected. This enzyme racemize L-glutamate to D-glutamate required for the construction of peptidoglycan in the bacterial cell wall synthesis process. Furthermore this enzyme is neither expressed nor its product, D-glutamate is normally found in mammals, and hence designing inhibitors against this enzyme will not affect the host system as well act as potential antitubercular drugs. A library of BITS in house compounds were screened against Mtb MurI enzyme. Based on docking score, interactions and synthetic feasibility one hit lead was identified. Further optimization of lead was attempted and its derivatives were synthesized. Forty eight derivatives of 2-phenylbenzo[d]oxazole and 2-phenylbenzo[d]thiazole were synthesized and evaluated for Mtb MurI inhibition study, in vitro activities against Mtb, cytotoxicity against RAW 264.7 cell line. Chemical derivatization of the lead resulted in compounds NR-1213 AND NR-1124 as the potent M. tuberculosis glutamate racemase inhibitors with IC50 of 4-5µM which are remarkable and were found to be non-cytotoxic. Molecular dynamics, dormant models and cardiotoxicity studies of the most active molecules are in process.

Keywords: cell wall biosynthesis, dormancy, glutamate racemase, tuberculosis

Procedia PDF Downloads 242
15898 The Effects of Multiple Levels of Intelligence in an Algebra 1 Classroom

Authors: Abigail Gragg

Abstract:

The goal of this research study was to adjudicate if implementing Howard Gardner’s multiple levels of intelligence would enhance student achievement levels in an Algebra 1 College Preparatory class. This was conducted within every class by incorporating one level of the eight levels of intelligence into small group work in stations. Every class was conducted utilizing small-group instruction. Achievement levels were measured through various forms of collected data that expressed student understandings in class through formative assessments versus student understandings on summative assessments. The data samples included: assessments (i.e. summative and formative assessments), observable data, video recordings, a daily log book, student surveys, and checklists kept during the observation periods. Formative assessments were analyzed during each class period to measure in-class understanding. Summative assessments were dissected per question per accuracy to review the effects of each intelligence implemented. The data was collated into a coding workbook for further analysis to conclude the resulting themes of the research. These themes include 1) there was no correlation to multiple levels of intelligence enhancing student achievement, 2) bodily-kinesthetic intelligence showed to be the intelligence that had the most improvement on test questions and 3) out of all of the bits of intelligence, interpersonal intelligence enhanced student understanding in class.

Keywords: stations, small group instruction, multiple levels of intelligence, Mathematics, Algebra 1, student achievement, secondary school, instructional Pedagogies

Procedia PDF Downloads 64
15897 A Verification Intellectual Property for Multi-Flow Rate Control on Any Single Flow Bus Functional Model

Authors: Pawamana Ramachandra, Jitesh Gupta, Saranga P. Pogula

Abstract:

In verification of high volume and complex packet processing IPs, finer control of flow management aspects (for example, rate, bits/sec etc.) per flow class (or a virtual channel or a software thread) is needed. When any Software/Universal Verification Methodology (UVM) thread arbitration is left to the simulator (e.g., Verilog Compiler Simulator (VCS) or Incisive Enterprise Simulator core simulation engine (NCSIM)), it is hard to predict its pattern of resulting distribution of bandwidth by the simulator thread arbitration. In many cases, the patterns desired in a test scenario may not be accomplished as the simulator might give a different distribution than what was required. This can lead to missing multiple traffic scenarios, specifically deadlock and starvation related. We invented a component (namely Flow Manager Verification IP) to be intervening between the application (test case) and the protocol VIP (with UVM sequencer) to control the bandwidth per thread/virtual channel/flow. The Flow Manager has knobs visible to the UVM sequence/test to configure the required distribution of rate per thread/virtual channel/flow. This works seamlessly and produces rate stimuli to further harness the Design Under Test (DUT) with asymmetric inputs compared to the programmed bandwidth/Quality of Service (QoS) distributions in the Design Under Test.

Keywords: flow manager, UVM sequencer, rated traffic generation, quality of service

Procedia PDF Downloads 66
15896 Short-Term Effects of Seed Dressing With Azorhizobium Caulinodans on Establishment, Development and Yield of Early Maturing Maize ( Zea Mays L.) In Zimbabwe

Authors: Gabriel Vusanimuzi Nkomo

Abstract:

The majority of soils in communal areas of Zimbabwe are sandy and inherently infertile and sustainable cultivation is not feasible without addition of plant nutrients. Most farmers find it difficult to raise the capital required for investments in mineral fertilizer and find it cheaper to use low nutrition animal manure. An experiment was conducted to determine the effects of nitrokara biofertiliser on early growth, development and maize yield while also comparing nitrokara biofertiliser on availability of nitrogen and phosphorous in soil. The experiment was conducted at Africa University Farm. The experiment had six treatments (nitrokara +300kg/ha Compound D, nitrokara+ 300kg/ha Compound D(7N;14P;7K) + 75kg/ha Ammonium Nitrate(AN), nitrokara +300kg/ha Compound D +150kg AN, nitrokara +300kg/ha Compound D +225kg/ha AN, nitrokara +300kg/ha Compound D + 300 kg/ha AN and 0 nitrokara+300kg/ha Compound D +0 AN). Early maturing SC 403 maize (Zea mays) was inoculated with nitrokara and a compound mineral fertilizer at 300 kg/ha at planting while ammonium nitrate was applied at 45 days after planting. There were no significant differences (P > 0.05) on emergence % from 5days up to 10 days after planting using maize seed inoculated with nitrokara. Emergence percentage varied with the number of days. At 5 days the emergence % was 62% to a high of 97 % at 10 days after emergence among treatments. There were no significant differences (P > 0.05) on plant biomass on treatments 1 to 6 at 4 weeks after planting as well as at 8 weeks after planting. There were no significant differences among the treatments on the availability of nitrogen after 6 weeks (P > 0.05). However at 8 and 10 weeks after planting there were significant differences among treatments on nitrogen availability (P < 0.05). There were no significant differences among the treatments at week 6 after planting on soil pH (p > 0.05). However there were significant differences among treatments pH at weeks 9 and 12 (p < 0.05). There were significant differences among treatments on phosphorous availability at 6, 8 and 10 weeks after planting (p < 0.05). There were no significant differences among treatments on stem diameter at 3 and 6 weeks after planting (p > 0.05).However at 9 and 12 weeks after planting there were significant differences among treatments on stem diameter (p < 0.05).There were no significant differences among treatments on plant height from week 3 up to week 6 on plant height (P > 0.05).However there were significant differences among treatments at week 9 and 12 (p < 0.05). There were significant differences among treatments on days to early, 50% and 100% anthesis (P < 0.05). There were significant differences during early, 50% and 100% days to silking among the treatments (P < 0.05).Also there were significant differences during early, 50% and 100% days to silking among the treatments (P < 0.05).The study revealed that inoculation of nitrokara biofertiliser at planting with subsequent addition of ammonium nitrate has a positive effect on maize crop development and yield.

Keywords: nitrokara, biofertiliser, symbiotic, plant biomass, inoculated

Procedia PDF Downloads 514
15895 Approximately Similarity Measurement of Web Sites Using Genetic Algorithms and Binary Trees

Authors: Doru Anastasiu Popescu, Dan Rădulescu

Abstract:

In this paper, we determine the similarity of two HTML web applications. We are going to use a genetic algorithm in order to determine the most significant web pages of each application (we are not going to use every web page of a site). Using these significant web pages, we will find the similarity value between the two applications. The algorithm is going to be efficient because we are going to use a reduced number of web pages for comparisons but it will return an approximate value of the similarity. The binary trees are used to keep the tags from the significant pages. The algorithm was implemented in Java language.

Keywords: Tag, HTML, web page, genetic algorithm, similarity value, binary tree

Procedia PDF Downloads 329
15894 Entomological Study of Pests of Olive Trees in the Region of Batna - Algeria

Authors: Smail Chafaa, Abdelkrim Si Bachir

Abstract:

Our work aims to study the insect diversity based on bioclimatic levels of pests in olive cultures (Olea europea L.) in the area of Batna (arid and semi arid north eastern Algeria) during the period from January 2011 to May 2011. Several sampling techniques were used, those of hunting on sight, visual inspection, hatches traps, colored traps, Japanese umbrella and sweep net. We have identified in total, 2311 individuals with results in inventory 206 species divided to 74 families and 11 orders, including Coleoptera order is quantitatively the most represented with 47.1%. The most dominant diet in our inventory is the phytophagous. Between the herbivorous insects that we have listed and which are the main olive pest of olive cultivation; we quote the olive fly (Bactrocera oleae), cochineal purple olive (Parlatoria oleae) the psyllid olive (Euphyllura olivina) and olive Trips (Liothrips oleae). The distribution of species between stations shows that Boumia resort with the most number of species (113) compared to other resorts and beetles are also better represented in three groves. Total wealth is high in Boumia station compared with the others stations. The values of (H') exceeding 3.9 bits for all the stations studied indicate a specific wealth and diversity of ecological nests in insect species. The values of equitability are near the unit; that suggests a balance between the numbers of insect populations sampled in the various stations.

Keywords: entomology, olive, grove, batna, Algeria

Procedia PDF Downloads 311
15893 A Factor-Analytical Approach on Identities in Environmentally Significant Behavior

Authors: Alina M. Udall, Judith de Groot, Simon de Jong, Avi Shankar

Abstract:

There are many ways in which environmentally significant behavior can be explained. Dominant psychological theories, namely, the theory of planned behavior, the norm-activation theory, its extension, the value-belief-norm theory, and the theory of habit do not explain large parts of environmentally significant behaviors. A new and rapidly growing approach is to focus on how consumer’s identities predict environmentally significant behavior. Identity may be relevant because consumers have many identities that are assumed to guide their behavior. Therefore, we assume that many identities will guide environmentally significant behavior. Many identities can be relevant for environmentally significant behavior. In reviewing the literature, over 200 identities have been studied making it difficult to establish the key identities for explaining environmentally significant behavior. Therefore, this paper first aims to establish the key identities previously used for explaining environmentally significant behavior. Second, the aim is to test which key identities explain environmentally significant behavior. To address the aims, an online survey study (n = 578) is conducted. First, the exploratory factor analysis reveals 15 identity factors. The identity factors are namely, environmentally concerned identity, anti-environmental self-identity, environmental place identity, connectedness with nature identity, green space visitor identity, active ethical identity, carbon off-setter identity, thoughtful self-identity, close community identity, anti-carbon off-setter identity, environmental group member identity, national identity, identification with developed countries, cyclist identity, and thoughtful organisation identity. Furthermore, to help researchers understand and operationalize the identities, the article provides theoretical definitions for each of the identities, in line with identity theory, social identity theory, and place identity theory. Second, the hierarchical regression shows only 10 factors significantly uniquely explain the variance in environmentally significant behavior. In order of predictive power the identities are namely, environmentally concerned identity, anti-environmental self-identity, thoughtful self-identity, environmental group member identity, anti-carbon off-setter identity, carbon off-setter identity, connectedness with nature identity, national identity, and green space visitor identity. The identities explain over 60% of the variance in environmentally significant behavior, a large effect size. Based on this finding, the article reveals a new, theoretical framework showing the key identities explaining environmentally significant behavior, to help improve and align the field.

Keywords: environmentally significant behavior, factor analysis, place identity, social identity

Procedia PDF Downloads 417
15892 An Online Master's Degree Program for the Preparation of Adapted Physical Education Teachers for Children with Significant Developmental Disabilities

Authors: Jiabei Zhang

Abstract:

Online programs developed for preparing qualified teachers have significantly increased over the years in the United States of America (USA). However, no online graduate programs for training adapted physical education (APE) teachers for children with significant developmental disabilities are currently available in the USA. The purpose of this study was to develop an online master’s degree program for the preparation of APE teachers to serve children with significant developmental disabilities. The characteristics demonstrated by children with significant developmental disabilities, the competencies required for certified APE teachers, and the evidence-based positive behavioral interventions (PBI) documented for teaching children with significant developmental disabilities were fully reviewed in this study. An online graduate program with 14 courses for 42 credit hours (3 credit hours per course) was then developed for training APE teachers to serve children with significant developmental disabilities. Included in this online program are five components: (a) 2 capstone courses, (b) 4 APE courses, (c) 4 PBI course, (d) 2 elective courses, and (e) 2 capstone courses. All courses will be delivered online through Desire2Learn administered by the Extended University Programs at Western Michigan University (WMU). An applicant who has a bachelor’s degree in physical education or special education is eligible for this proposed program. A student enrolled in this program is expected to complete all courses in 2.5 years while staying in their local area. This program will be submitted to the WMU curriculum committee for approval in the fall of 2018.

Keywords: adapted physical education, online program, teacher preparation, and significant disabilities

Procedia PDF Downloads 115
15891 Lecturers Attitudes towards the Use of Information and Communication Technology

Authors: Sujata Gupta Kedar, Fasiha Fayaz

Abstract:

This paper presents various studies being carried out by various researchers globally on the attitude of lecturers towards the advent of information technology and e-learning. An effort has been made in this paper to study the various trends being presented by researchers and draw some general conclusions. These show the effect of the lecturer’s gender, age and educational background on their attitude towards the e-learning. Also the favorable attitude of teachers' towards using new technology in teaching will certainly make teachers use them in appropriate situations in teaching and thus measuring of teachers attitude towards using new technology in teaching is very much needed. The sample of 50 males and 50 females were studied from different colleges of Bangalore “Attitudes towards using new technology scale” by Dr. Rajasekar was used. It was seen that male and female had no significant difference in hardware and software use, whereas both had favorable attitude. And there was a significant difference at 1% level among female lecturers belonging to arts faculty. There is no significant difference between the gender and age, because higher the age lower the score is. Irrespective of teaching experience males had no significant difference, whereas females are significant at 1% level, which says that higher the teaching experience of lecturers less knowledge they have towards the use of ICT, as the younger generation is more expose to technology.

Keywords: e-learning, ICT, attitudes, lecturers, communication technology

Procedia PDF Downloads 434