Search results for: sulphate attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 776

Search results for: sulphate attack

536 Aerosol Chemical Composition in Urban Sites: A Comparative Study of Lima and Medellin

Authors: Guilherme M. Pereira, Kimmo Teinïla, Danilo Custódio, Risto Hillamo, Célia Alves, Pérola de C. Vasconcellos

Abstract:

South American large cities often present serious air pollution problems and their atmosphere composition is influenced by a variety of emissions sources. The South American Emissions Megacities, and Climate project (SAEMC) has focused on the study of emissions and its influence on climate in the South American largest cities and it also included Lima (Peru) and Medellin (Colombia), sites where few studies of the genre were done. Lima is a coastal city with more than 8 million inhabitants and the second largest city in South America. Medellin is a 2.5 million inhabitants city and second largest city in Colombia; it is situated in a valley. The samples were collected in quartz fiber filters in high volume samplers (Hi-Vol), in 24 hours of sampling. The samples were collected in intensive campaigns in both sites, in July, 2010. Several species were determined in the aerosol samples of Lima and Medellin. Organic and elemental carbon (OC and EC) in thermal-optical analysis; biomass burning tracers (levoglucosan - Lev, mannosan - Man and galactosan - Gal) in high-performance anion exchange ion chromatography with mass spectrometer detection; water soluble ions in ion chromatography. The average particulate matter was similar for both campaigns, the PM10 concentrations were above the recommended by World Health Organization (50 µg m⁻³ – daily limit) in 40% of the samples in Medellin, while in Lima it was above that value in 15% of the samples. The average total ions concentration was higher in Lima (17450 ng m⁻³ in Lima and 3816 ng m⁻³ in Medellin) and the average concentrations of sodium and chloride were higher in this site, these species also had better correlations (Pearson’s coefficient = 0,63); suggesting a higher influence of marine aerosol in the site due its location in the coast. Sulphate concentrations were also much higher at Lima site; which may be explained by a higher influence of marine originated sulphate. However, the OC, EC and monosaccharides average concentrations were higher at Medellin site; this may be due to the lower dispersion of pollutants due to the site’s location and a larger influence of biomass burning sources. The levoglucosan average concentration was 95 ng m⁻³ for Medellin and 16 ng m⁻³ and OC was well correlated with levoglucosan (Pearson’s coefficient = 0,86) in Medellin; suggesting a higher influence of biomass burning over the organic aerosol in this site. The Lev/Man ratio is often related to the type of biomass burned and was close to 18, similar to the observed in previous studies done at biomass burning impacted sites in the Amazon region; backward trajectories also suggested the transport of aerosol from that region. Biomass burning appears to have a larger influence on the air quality in Medellin, in addition the vehicular emissions; while Lima showed a larger influence of marine aerosol during the study period.

Keywords: aerosol transport, atmospheric particulate matter, biomass burning, SAEMC project

Procedia PDF Downloads 234
535 Evolution of Bombings against Transportation Infrastructure

Authors: Jonathan K. Hill

Abstract:

The transportation networks throughout Africa remain the only transportation infrastructure system in the world that is attacked by terrorists at a high frequency, so the international community can learn from each attack. The targeting of transportation should be recognized as a direct attack against a civilian population, so the international community should work to better understand the types of attacks utilized, the types of improvised explosive device designs adapted to transportation targets, and the ways the various modes of transportation have been attacked throughout the continent. Some countries have seen grenade attacks that have resulted in only injuries, while some countries have experienced large vehicle bombings that have resulted in hundreds of injuries and numerous deaths. With insurgencies, explosive devices have been small, complex, and generally target an enemy of the insurgency. With terrorist bombings, the explosive devices have been large, brazen, and targeted at civilian populations. And, these civilian populations are easily targeted within the transportation system. The presentation provided by Assess Africa LLC is titled ‘Evolution of Bombings Against Transportation Infrastructure’ and covers improvised explosive device characteristics, how improvised explosive devices have been adapted to transportation targets in Africa, analyses recent incidents, and provides some advice for effective protective measures. A main component of the improvised explosive device characteristics portion of the presentation focuses on the link between explosive device components, the intelligence network, and the bomb-builder’s network. By understanding the components, how the use of various components can be linked to a terrorist group’s capabilities, and how the bomb-builder acquires materials, the analysis of improvised explosive device attacks takes on a new direction – one that focuses on defeating the network instead of merely reviewing incidents of the past.

Keywords: Africa, bombings, critical infrastructure protection, transportation security

Procedia PDF Downloads 390
534 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 194
533 An Investigation of Tetraspanin Proteins’ Role in UPEC Infection

Authors: Fawzyah Albaldi

Abstract:

Urinary tract infections (UTIs) are the most prevalent of infectious diseases and > 80% are caused by uropathogenic E. coli (UPEC). Infection occurs following adhesion to urothelial plaques on bladder epithelial cells, whose major protein constituent are the uroplakins (UPs). Two of the four uroplakins (UPIa and UPIb) are members of the tetraspanin superfamily. The UPEC adhesin FimH is known to interact directly with UPIa. Tetraspanins are a diverse family of transmembrane proteins that generally act as “molecular organizers” by binding different proteins and lipids to form tetraspanin enriched microdomains (TEMs). Previous work by our group has shown that TEMs are involved in the adhesion of many pathogenic bacteria to human cells. Adhesion can be blocked by tetraspanin-derived synthetic peptides, suggesting that tetraspanins may be valuable drug targets. In this study, we investigate the role of tetraspanins in UPEC adherence to bladder epithelial cells. Human bladder cancer cell lines (T24, 5637, RT4), commonly used as in-vitro models to investigate UPEC infection, along with primary human bladder cells, were used in this project. The aim was to establish a model for UPEC adhesion/infection with the objective of evaluating the impact of tetraspanin-derived reagents on this process. Such reagents could reduce the progression of UTI, particularly in patients with indwelling catheters. Tetraspanin expression on the bladder cells was investigated by q-PCR and flow cytometry, with CD9 and CD81 generally highly expressed. Interestingly, despite these cell lines being used by other groups to investigate FimH antagonists, uroplakin proteins (UPIa, UPIb and UPIII) were poorly expressed at the cell surface, although some were present intracellularly. Attempts were made to differentiate the cell lines, to induce cell surface expression of these UPs, but these were largely unsuccessful. Pre-treatment of bladder epithelial cells with anti-CD9 monoclonal antibody significantly decreased UPEC infection, whilst anti-CD81 had no effects. A short (15aa) synthetic peptide corresponding to the large extracellular region (EC2) of CD9 also significantly reduced UPEC adherence. Furthermore, we demonstrated specific binding of that fluorescently tagged peptide to the cells. CD9 is known to associate with a number of heparan sulphate proteoglycans (HSPGs) that have also been implicated in bacterial adhesion. Here, we demonstrated that unfractionated heparin (UFH)and heparin analogs significantly inhibited UPEC adhesion to RT4 cells, as did pre-treatment of the cells with heparinases. Pre-treatment with chondroitin sulphate (CS) and chondroitinase also significantly decreased UPEC adherence to RT4 cells. This study may shed light on a common pathogenicity mechanism involving the organisation of HSPGs by tetraspanins. In summary, although we determined that the bladder cell lines were not suitable to investigate the role of uroplakins in UPEC adhesion, we demonstrated roles for CD9 and cell surface proteoglycans in this interaction. Agents that target these may be useful in treating/preventing UTIs.

Keywords: UTIs, tspan, uroplakins, CD9

Procedia PDF Downloads 84
532 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 506
531 3D Numerical Studies and Design Optimization of a Swallowtail Butterfly with Twin Tail

Authors: Arunkumar Balamurugan, G. Soundharya Lakshmi, V. Thenmozhi, M. Jegannath, V. R. Sanal Kumar

Abstract:

Aerodynamics of insects is of topical interest in aeronautical industries due to its wide applications on various types of Micro Air Vehicles (MAVs). Note that the MAVs are having smaller geometric dimensions operate at significantly lower speeds on the order of 10 m/s and their Reynolds numbers range is approximately 1,50,000 or lower. In this paper, numerical study has been carried out to capture the flow physics of a biological inspired Swallowtail Butterfly with fixed wing having twin tail at a flight speed of 10 m/s. Comprehensive numerical simulations have been carried out on swallow butterfly with twin tail flying at a speed of 10 m/s with uniform upper and lower angles of attack in both lateral and longitudinal position for identifying the best wing orientation with better aerodynamic efficiency. Grid system in the computational domain is selected after a detailed grid refinement exercises. Parametric analytical studies have been carried out with different lateral and longitudinal angles of attack for finding the better aerodynamic efficiency at the same flight speed. The results reveal that lift coefficient significantly increases with marginal changes in the longitudinal angle and vice versa. But in the case of drag coefficient the conventional changes have been noticed, viz., drag increases at high longitudinal angles. We observed that the change of twin tail section has a significant impact on the formation of vortices and aerodynamic efficiency of the MAV’s. We concluded that for every lateral angle there is an exact longitudinal orientation for the existence of an aerodynamically efficient flying condition of any MAV. This numerical study is a pointer towards for the design optimization of Twin tail MAVs with flapping wings.

Keywords: aerodynamics of insects, MAV, swallowtail butterfly, twin tail MAV design

Procedia PDF Downloads 371
530 Diversity of Microbial Ground Improvements

Authors: V. Ivanov, J. Chu, V. Stabnikov

Abstract:

Low cost, sustainable, and environmentally friendly microbial cements, grouts, polysaccharides and bioplastics are useful in construction and geotechnical engineering. Construction-related biotechnologies are based on activity of different microorganisms: urease-producing, acidogenic, halophilic, alkaliphilic, denitrifying, iron- and sulphate-reducing bacteria, cyanobacteria, algae, microscopic fungi. The bio-related materials and processes can be used for the bioaggregation, soil biogrouting and bioclogging, biocementation, biodesaturation of water-satured soil, bioencapsulation of soft clay, biocoating, and biorepair of the concrete surface. Altogether with the most popular calcium- and urea based biocementation, there are possible and often are more effective such methods of ground improvement as calcium- and magnesium based biocementation, calcium phosphate strengthening of soil, calcium bicarbonate biocementation, and iron- or polysaccharide based bioclogging. The construction-related microbial biotechnologies have a lot of advantages over conventional construction materials and processes.

Keywords: ground improvement, biocementation, biogrouting, microorganisms

Procedia PDF Downloads 197
529 Thermodynamics of Chlorination of Acid-Soluble Titanium Slag in Molten Salt for Preparation of TiCl4

Authors: Li Liang

Abstract:

Chinese titanium iron ore reserves with high calcium and magnesium accounted for more than 90% of the total reserves, and acid-soluble titanium slag which is produced by titanium iron ore always used to produce titanium dioxide through sulphate process. To broad the application range of acid-soluble titanium slag, the feasibility and thermodynamics of chlorinated reaction for preparation TiCl4 by titanium slag chlorination in molten slat were conducted in this paper. The analysis results show that TiCl4 can be obtained by chlorinate the acid-dissolved titanium slag with carbon. Component’s thermodynamics reaction trend is: CaO>MnO>FeO(FeCl2)>MgO>V2O5>Fe2O3>FeO(FeCl3)>TiO2>Al2O3>SiO2 in the standard state. Industrial experimental results are consistent with the thermodynamics analysis, the content of TiCl4 is more than 98% in the production. Fe, Si, V, Al, and other impurity content can satisfy the requirements of production.

Keywords: thermodynamics, acid-soluble titanium slag, preparation of TiCl4, chlorination

Procedia PDF Downloads 558
528 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks

Authors: Emhemed Shaklawoon, Ibrahim Althomali

Abstract:

We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.

Keywords: cloud computing, privacy, cyber attacks, defend the cloud

Procedia PDF Downloads 395
527 Synergetic effect of the Sodium Hydrosulfide and Ammonium Sulfate as Activators in the Flotation of Copper-cobalt Bearing Oxide Minerals from the Kamoya Mineralization in the Democratic Republic of Congo (DRC).

Authors: Craig Nsakabwebwe Kabange

Abstract:

The current study investigated the synergetic effect of two activators, mainly sodium hydrosulfide (NaHS) and ammonium sulfate (NH₄)₂SO₄, as sulphidizersin the flotation of oxide minerals. A series of flotation tests were conducted on copper-cobalt samples originating from the Kamoyaopen pitin the DRCat an adjusted pH value of 9.5. The results revealed that in the presence of NaHS (5000g/t), an increase in the recovery values of both metals to a maximum of 87% copper and 78.1% cobalt could be achieved. However, the addition of (NH4)₂SO4 to theNaHS-containing pulp had a negative effect on the recoveries, shifting it from 87 to 49.1% for copper and from78.1 to 49.2% forcobalt. The recovery trend for the two metals waskept below 50% with an increase in the concentration of(NH₄)₂SO4. A satisfactory result was obtained at a NaHS - (NH₄)₂SO₄ concentration ratio of 1/1, which delivered 89.5 % Cu recovery and 79.2% Co recovery.

Keywords: ammonium sulphate, sodium hydrosulphide, sulphidizer, activator

Procedia PDF Downloads 82
526 Laminar Separation Bubble Prediction over an Airfoil Using Transition SST Turbulence Model on Moderate Reynolds Number

Authors: Younes El Khchine, Mohammed Sriti

Abstract:

A parametric study has been conducted to analyse the flow around S809 airfoil of a wind turbine in order to better understand the characteristics and effects of laminar separation bubble (LSB) on aerodynamic design for maximizing wind turbine efficiency. Numerical simulations were performed at low Reynolds numbers by solving the Unsteady Reynolds Averaged Navier-Stokes (URANS) equations based on C-type structural mesh and using the γ-Reθt turbulence model. A two-dimensional study was conducted for the chord Reynolds number of 1×10⁵ and angles of attack (AoA) between 0 and 20.15 degrees. The simulation results obtained for the aerodynamic coefficients at various angles of attack (AoA) were compared with XFoil results. A sensitivity study was performed to examine the effects of Reynolds number and free-stream turbulence intensity on the location and length of the laminar separation bubble and the aerodynamic performances of wind turbines. The results show that increasing the Reynolds number leads to a delay in the laminar separation on the upper surface of the airfoil. The increase in Reynolds number leads to an accelerated transition process, and the turbulent reattachment point moves closer to the leading edge owing to an earlier reattachment of the turbulent shear layer. This leads to a considerable reduction in the length of the separation bubble as the Reynolds number is increased. The increase in the level of free-stream turbulence intensity leads to a decrease in separation bubble length and an increase in the lift coefficient while having negligible effects on the stall angle. When the AoA increased, the bubble on the suction airfoil surface was found to move upstream to the leading edge of the airfoil, that causes earlier laminar separation.

Keywords: laminar separation bubble, turbulence intensity, S809 airfoil, transition model, Reynolds number

Procedia PDF Downloads 42
525 Catered Lunch Suspected Outbreak in a Garment Factory, Sleman District, Yogyakarta, Indonesia, 2017

Authors: Rieski Prihastuti, Meliana Depo, Trisno A. Wibowo, Misinem

Abstract:

On October 19, 2017, Yogyakarta Islamic Hospital reported 38 garment employees with nausea, vomiting, headache, abdominal pain, and diarrhea after they had lunch on October 18, 2017, to Sleman District Health Office. Objectives of this study were to ensure the outbreak and identify source and route of transmission. Case-control study was conducted to analyze food items that caused the outbreak. A case was defined as a person who got symptoms such as abdominal pain, diarrhea, nausea with/without vomiting, fever, and headache after they had lunch on October 18, 2017. Samples included leftover lunch box, vomit, tap water and drinking water had been sent to the laboratory. Data were analyzed descriptively as frequency table and analyzed by using chi-square in bivariate analysis. All of 196 garment employee was included in this study. The common symptoms of this outbreak were abdominal pain (84.4%), diarrhea (72.8%), nausea (61.6%), headache (52.8%), vomiting (12.8%), and fever (6.4%) with median incubation period 13 hours (range 1-34 hours). Highest attack rate and odds ratio was found in grilled chicken (Attack Rate 58,49%) with Odds Ratio 11,023 (Confidence Interval 95% 1.383 - 87.859; p value 0,005). Almost all samples showed mold, except drinking water. Based on its sign and symptoms, also incubation period, diarrheal Bacillus cereus and Clostridium perfringens were suspected to be the causative agent of the outbreak. Limitation of this study was improper sample handling and no sample of food handler and stools in the food caterer. Outbreak investigation training needed to be given to the hospital worker, and monitoring should be done to the food caterer to prevent another outbreak.

Keywords: disease outbreak, foodborne disease, food poisoning, outbreak

Procedia PDF Downloads 124
524 Internal Corrosion Rupture of a 6-in Gas Line Pipe

Authors: Fadwa Jewilli

Abstract:

A sudden leak of a 6-inch gas line pipe after being in service for one year was observed. The pipe had been designed to transport dry gas. The failure had taken place in 6 o’clock position at the stage discharge of the flow process. Laboratory investigations were conducted to find out the cause of the pipe rupture. Visual and metallographic observations confirmed that the pipe split was due to a crack initiated in circumferential and then turned into longitudinal direction. Sever wall thickness reduction was noticed on the internal pipe surface. Scanning electron microscopy observations at the fracture surface revealed features of ductile fracture mode. Corrosion product analysis showed the traces of iron carbonate and iron sulphate. The laboratory analysis resulted in the conclusion that the pipe failed due to the effect of wet fluid (condensate) caused severe wall thickness dissolution resulted in pipe could not stand the continuation at in-service working condition.

Keywords: gas line pipe, corrosion prediction ductile fracture, ductile fracture, failure analysis

Procedia PDF Downloads 45
523 Numerical Study of Laminar Separation Bubble Over an Airfoil Using γ-ReθT SST Turbulence Model on Moderate Reynolds Number

Authors: Younes El Khchine

Abstract:

A parametric study has been conducted to analyse the flow around S809 airfoil of a wind turbine in order to better understand the characteristics and effects of laminar separation bubble (LSB) on aerodynamic design for maximizing wind turbine efficiency. Numerical simulations were performed at low Reynolds numbers by solving the Unsteady Reynolds Averaged Navier-Stokes (URANS) equations based on C-type structural mesh and using the γ-Reθt turbulence model. A two-dimensional study was conducted for the chord Reynolds number of 1×105 and angles of attack (AoA) between 0 and 20.15 degrees. The simulation results obtained for the aerodynamic coefficients at various angles of attack (AoA) were compared with XFoil results. A sensitivity study was performed to examine the effects of Reynolds number and free-stream turbulence intensity on the location and length of the laminar separation bubble and the aerodynamic performances of wind turbines. The results show that increasing the Reynolds number leads to a delay in the laminar separation on the upper surface of the airfoil. The increase in Reynolds number leads to an accelerated transition process, and the turbulent reattachment point moves closer to the leading edge owing to an earlier reattachment of the turbulent shear layer. This leads to a considerable reduction in the length of the separation bubble as the Reynolds number is increased. The increase in the level of free-stream turbulence intensity leads to a decrease in separation bubble length and an increase in the lift coefficient while having negligible effects on the stall angle. When the AoA increased, the bubble on the suction airfoil surface was found to move upstream to the leading edge of the airfoil, causing earlier laminar separation.

Keywords: laminar separation bubble, turbulence intensity, s809 airfoil, transition model, Reynolds number

Procedia PDF Downloads 41
522 Process Modified Geopolymer Concrete: A Sustainable Material for Green Construction Technology

Authors: Dibyendu Adak, Saroj Mandal

Abstract:

The fly ash based geopolymer concrete generally requires heat activation after casting, which has been considered as an important limitation for its practical application. Such limitation can be overcome by a modification in the process at the time of mixing of ingredients (fly and activator fluid) for geopolymer concrete so that curing can be made at ambient temperature. This process modified geopolymer concrete shows an appreciable improvement in structural performance compared to conventional heat cured geopolymer concrete and control cement concrete. The improved durability performance based on water absorption, sulphate test, and RCPT is also noted. The microstructural properties analyzed through Field Emission Scanning Electron Microscope (FESEM) with Energy Dispersive X-ray Spectroscopy (EDS) and X-ray Diffraction (XRD) techniques show the better interaction of fly ash and activator solution at early ages for the process modified geopolymer concrete. This accelerates the transformation of the amorphous phase of fly ash to the crystalline phase.

Keywords: fly ash, geopolymer concrete, process modification, structural properties, durability, micro-structures

Procedia PDF Downloads 131
521 Numerical Study of Laminar Separation Bubble Over an Airfoil Using γ-ReθT SST Turbulence Model on Moderate Reynolds Number

Authors: Younes El Khchine, Mohammed Sriti

Abstract:

A parametric study has been conducted to analyse the flow around S809 airfoil of wind turbine in order to better understand the characteristics and effects of laminar separation bubble (LSB) on aerodynamic design for maximizing wind turbine efficiency. Numerical simulations were performed at low Reynolds number by solving the Unsteady Reynolds Averaged Navier-Stokes (URANS) equations based on C-type structural mesh and using γ-Reθt turbulence model. Two-dimensional study was conducted for the chord Reynolds number of 1×105 and angles of attack (AoA) between 0 and 20.15 degrees. The simulation results obtained for the aerodynamic coefficients at various angles of attack (AoA) were compared with XFoil results. A sensitivity study was performed to examine the effects of Reynolds number and free-stream turbulence intensity on the location and length of laminar separation bubble and aerodynamic performances of wind turbine. The results show that increasing the Reynolds number leads to a delay in the laminar separation on the upper surface of the airfoil. The increase in Reynolds number leads to an accelerate transition process and the turbulent reattachment point move closer to the leading edge owing to an earlier reattachment of the turbulent shear layer. This leads to a considerable reduction in the length of the separation bubble as the Reynolds number is increased. The increase of the level of free-stream turbulence intensity leads to a decrease in separation bubble length and an increase the lift coefficient while having negligible effects on the stall angle. When the AoA increased, the bubble on the suction airfoil surface was found to moves upstream to leading edge of the airfoil that causes earlier laminar separation.

Keywords: laminar separation bubble, turbulence intensity, S809 airfoil, transition model, Reynolds number

Procedia PDF Downloads 45
520 Separation of Urinary Proteins with Sodium Dodecyl Sulphate Polyacrylamide Gel Electrophoresis in Patients with Secondary Nephropathies

Authors: Irena Kostovska, Katerina Tosheska Trajkovska, Svetlana Cekovska, Julijana Brezovska Kavrakova, Hristina Ampova, Sonja Topuzovska, Ognen Kostovski, Goce Spasovski, Danica Labudovic

Abstract:

Background: Proteinuria is an important feature of secondary nephropathies. The quantitative and qualitative analysis of proteinuria plays an important role in determining the types of proteinuria (glomerular, tubular and mixed), in the diagnosis and prognosis of secondary nephropathies. The damage of the glomerular basement membrane is responsible for a proteinuria characterized by the presence of large amounts of protein with high molecular weights such as albumin (69 kilo Daltons-kD), transferrin (78 kD) and immunoglobulin G (150 kD). An insufficiency of proximal tubular function is the cause of a proteinuria characterized by the presence of proteins with low molecular weight (LMW), such as retinol binding protein (21 kD) and α1-microglobulin (31 kD). In some renal diseases, a mixed glomerular and tubular proteinuria is frequently seen. Sodium dodecyl sulphate polyacrylamide gel electrophoresis (SDS-PAGE) is the most widely used method of analyzing urine proteins for clinical purposes. The main aim of the study is to determine the type of proteinuria in the most common secondary nephropathies such as diabetic, hypertensive nephropathy and preeclampsia. Material and methods: In this study were included 90 subjects: subjects with diabetic nephropathy (n=30), subjects with hypertensive nephropahty (n=30) and pregnant women with preeclampsia (n=30). We divided all subjects according to UM/CR into three subgroups: macroalbuminuric (UM/CR >300 mg/g), microalbuminuric (UM/CR 30-300 mg/g) and normolabuminuric (UM/CR<30 mg/g). In all subjects, we measured microalbumin and creatinine in urine with standard biochemical methods. Separation of urinary proteins was performed by SDS-PAGE, in several stages: linear gel preparation (4-22%), treatment of urinary samples before their application on the gel, electrophoresis, gel fixation, coloring with Coomassie blue, and identification of the separated protein fractions based on standards with exactly known molecular weight. Results: According to urinary microalbumin/creatinin ratio in group of subject with diabetic nephropathy, nine patients were macroalbuminuric, while 21 subject were microalbuminuric. In group of subjects with hypertensive nephropathy, we found macroalbuminuria (n=4), microalbuminuria (n=20) and normoalbuminuria (n=6). All pregnant women with preeclampsia were macroalbuminuric. Electrophoretic separation of urinary proteins showed that in macroalbuminric patients with diabetic nephropathy 56% have mixed proteinuria, 22% have glomerular proteinuria and 22% have tubular proteinuria. In subgroup of subjects with diabetic nephropathy and microalbuminuria, 52% have glomerular proteinuria, 8% have tubular proteinuria, and 40% of subjects have normal electrophoretic findings. All patients with maroalbuminuria and hypertensive nephropathy have mixed proteinuria. In subgroup of patients with microalbuminuria and hypertensive nephropathy, we found: 32% with mixed proteinuria, 27% with normal findings, 23% with tubular, and 18% with glomerular proteinuria. In all normoalbuminruic patiens with hypertensive nephropathy, we detected normal electrophoretic findings. In group of subjects pregnant women with preeclampsia, we found: 81% with mixed proteinuria, 13% with glomerular, and 8% with tubular proteinuria. Conclusion: By SDS PAGE method, we detected that in patients with secondary nephropathies the most common type of proteinuria is mixed proteinuria, indicating both loss of glomerular permeability and tubular function. We can conclude that SDS PAGE is high sensitive method for detection of renal impairment in patients with secondary nephropathies.

Keywords: diabetic nephropathy, preeclampsia, hypertensive nephropathy, SDS PAGE

Procedia PDF Downloads 117
519 Argumentation Frameworks and Theories of Judging

Authors: Sonia Anand Knowlton

Abstract:

With the rise of artificial intelligence, computer science is becoming increasingly integrated in virtually every area of life. Of course, the law is no exception. Through argumentation frameworks (AFs), computer scientists have used abstract algebra to structure the legal reasoning process in a way that allows conclusions to be drawn from a formalized system of arguments. In AFs, arguments compete against each other for logical success and are related to one another through the binary operation of the attack. The prevailing arguments make up the preferred extension of the given argumentation framework, telling us what set of arguments must be accepted from a logical standpoint. There have been several developments of AFs since its original conception in the early 90’s in efforts to make them more aligned with the human reasoning process. Generally, these developments have sought to add nuance to the factors that influence the logical success of competing arguments (e.g., giving an argument more logical strength based on the underlying value it promotes). The most cogent development was that of the Extended Argumentation Framework (EAF), in which attacks can themselves be attacked by other arguments, and the promotion of different competing values can be formalized within the system. This article applies the logical structure of EAFs to current theoretical understandings of judicial reasoning to contribute to theories of judging and to the evolution of AFs simultaneously. The argument is that the main limitation of EAFs, when applied to judicial reasoning, is that they require judges to themselves assign values to different arguments and then lexically order these values to determine the given framework’s preferred extension. Drawing on John Rawls’ Theory of Justice, the examination that follows is whether values are lexical and commensurable to this extent. The analysis that follows then suggests a potential extension of the EAF system with an approach that formalizes different “planes of attack” for competing arguments that promote lexically ordered values. This article concludes with a summary of how these insights contribute to theories of judging and of legal reasoning more broadly, specifically in indeterminate cases where judges must turn to value-based approaches.

Keywords: computer science, mathematics, law, legal theory, judging

Procedia PDF Downloads 36
518 Isolation of Vibrio harveyi and Vibrio alginolyticus Strains from Cultured Seabass (Dicentrarchus labrax L.) and Seabream (Sparus auratus L.) in Egypt

Authors: M. Khallaf, R. Khalil, H. Ghetas

Abstract:

In the present study, V. harveyi and V. alginolyticus were isolated from cultured seabass and seabream at Damietta Governorate, Egypt, during summer season. Isolates were biochemically and molecularly identified using primers for Vhh and Collagenase genes. The most prominent clinical observations of diseased fish were exophthalmia, abdominal distension, and multifocal cutaneous hemorrhagic ulceration on the dorsal musculature and caudal peduncle. Physicochemical characteristics of water samples indicated that the unionized ammonia, nitrate, and hydrogen sulphate concentrations were higher than the acceptable limits. Heavy metals concentrations in water samples exhibited higher concentrations than the permissible levels for fish culture, which was considered as chemical stressors that increase the prevalence of these bacterial diseases. Immune parameters were lower in diseased seabass and seabream than apparently healthy fish. Lesions of different fish organs were identified histopathologically.

Keywords: seabass, seabream, Vibrio alginolyticus, Vibrio harveyi

Procedia PDF Downloads 94
517 A Distributed Mobile Agent Based on Intrusion Detection System for MANET

Authors: Maad Kamal Al-Anni

Abstract:

This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the  signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness  for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).

Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)

Procedia PDF Downloads 164
516 Patterns of Libido, Sexual Activity and Sexual Performance in Female Migraineurs

Authors: John Farr Rothrock

Abstract:

Although migraine traditionally has been assumed to convey a relative decrease in libido, sexual activity and sexual performance, recent data have suggested that the female migraine population is far from homogenous in this regard. We sought to determine the levels of libido, sexual activity and sexual performance in the female migraine patient population both generally and according to clinical phenotype. In this single-blind study, a consecutive series of sexually active new female patients ages 25-55 initially presenting to a university-based headache clinic and having a >1 year history of migraine were asked to complete anonymously a survey assessing their sexual histories generally and as they related to their headache disorder and the 19-item Female Sexual Function Index (FSFI). To serve as 2 separate control groups, 100 sexually active females with no history of migraine and 100 female migraineurs from the general (non-clinic) population but matched for age, marital status, educational background and socioeconomic status completed a similar survey. Over a period of 3 months, 188 consecutive migraine patients were invited to participate. Twenty declined, and 28 of the remaining 160 potential subjects failed to meet the inclusion criterion utilized for “sexually active” (ie, heterosexual intercourse at a frequency of > once per month in each of the preceding 6 months). In all groups younger age (p<.005), higher educational level attained (p<.05) and higher socioeconomic status (p<.025) correlated with a higher monthly frequency of intercourse and a higher likelihood of intercourse resulting in orgasm. Relative to the 100 control subjects with no history of migraine, the two migraine groups (total n=232) reported a lower monthly frequency of intercourse and recorded a lower FSFI score (both p<.025), but the contribution to this difference came primarily from the chronic migraine (CM) subgroup (n=92). Patients with low frequency episodic migraine (LFEM) and mid frequency episodic migraine (MFEM) reported a higher FSFI score, higher monthly frequency of intercourse, higher likelihood of intercourse resulting in orgasm and higher likelihood of multiple active sex partners than controls. All migraine subgroups reported a decreased likelihood of engaging in intercourse during an active migraine attack, but relative to the CM subgroup (8/92=9%), a higher proportion of patients in the LFEM (12/49=25%), MFEM (14/67=21%) and high frequency episodic migraine (HFEM: 6/14=43%) subgroups reported utilizing intercourse - and orgasm specifically - as a means of potentially terminating a migraine attack. In the clinic vs no-clinic groups there were no significant differences in the dependent variables assessed. Research subjects with LFEM and MFEM may report a level of libido, frequency of intercourse and likelihood of orgasm-associated intercourse that exceeds what is reported by age-matched controls free of migraine. Many patients with LFEM, MFEM and HFEM appear to utilize intercourse/orgasm as a means to potentially terminate an acute migraine attack.

Keywords: migraine, female, libido, sexual activity, phenotype

Procedia PDF Downloads 52
515 Water Equivalent from the Point of View of Fast Neutron Removal Cross-Section

Authors: Mohammed Alrajhi

Abstract:

Radiological properties of gel dosimeters and phantom materials are often evaluated in terms of effective atomic number, electron density, photon mass attenuation coefficient, photon mass energy absorption coefficient and total stopping power of electrons. To evaluate the water equivalence of such materials for fast neutron attenuation 19 different types of gel dosimeters and phantom materials were considered. Macroscopic removal cross-sections for fast neutrons (ΣR cm-1) have been calculated for a range of ferrous-sulphate and polymeric gel dosimeters using Nxcom Program. The study showed that the value of ΣR/ρ (cm2.g-1) for all polymer gels were in close agreement (1.5- 2.8%) with that of water. As such, the slight differences in ΣR/ρ between water and gels are small and may be considered negligible. Also, the removal cross-section of the studied phantom materials were very close (~ ±1.5%) to that of water except bone (cortical) which had about 38% variation. Finally, the variation of removal cross-section with hydrogen content was studied.

Keywords: cross-section, neutron, photon, coefficient, mathematics

Procedia PDF Downloads 349
514 Silver Nanoparticles-Enhanced Luminescence Spectra of Silicon Nanocrystals

Authors: Khamael M. Abualnaja, Lidija Šiller, Benjamin R. Horrocks

Abstract:

Metal-enhanced luminescence of silicon nano crystals (SiNCs) was determined using two different particle sizes of silver nano particles (AgNPs). SiNCs have been characterized by scanning electron microscopy (SEM), high resolution transmission electron microscopy (HRTEM), Fourier transform infrared spectroscopy (FTIR) and X-ray photo electron spectroscopy (XPS). It is found that the SiNCs are crystalline with an average diameter of 65 nm and FCC lattice. AgNPs were synthesized using photochemical reduction of AgNO3 with sodium dodecyl sulphate (SDS). The enhanced luminescence of SiNCs by AgNPs was evaluated by confocal Raman microspectroscopy. Enhancement up to ×9 and ×3 times were observed for SiNCs that mixed with AgNPs which have an average particle size of 100 nm and 30 nm, respectively. Silver NPs-enhanced luminescence of SiNCs occurs as a result of the coupling between the excitation laser light and the plasmon bands of AgNPs; thus this intense field at AgNPs surface couples strongly to SiNCs.

Keywords: silver nanoparticles, surface enhanced raman spectroscopy (SERS), silicon nanocrystals, luminescence

Procedia PDF Downloads 396
513 Optimization of Process Parameters for Peroxidase Production by Ensifer Species

Authors: Ayodeji O. Falade, Leonard V. Mabinya, Uchechukwu U. Nwodo, Anthony I. Okoh

Abstract:

Given the high utility of peroxidase in several industrial processes, the search for novel microorganisms with enhanced peroxidase production capacity is of keen interest. This study investigated the process conditions for optimum peroxidase production by Ensifer sp, new ligninolytic proteobacteria with peroxidase production potential. Also, some agricultural residues were valorized for peroxidase production under solid state fermentation. Peroxidase production was optimum at an initial medium pH 7, incubation temperature of 30 °C and agitation speed of 100 rpm using alkali lignin fermentation medium supplemented with guaiacol as the most effective inducer and ammonium sulphate as the best inorganic nitrogen. Optimum peroxidase production by Ensifer sp. was attained at 48 h with specific productivity of 12.76 ± 1.09 U mg⁻¹. Interestingly, probable laccase production was observed with optimum specific productivity of 12.76 ± 0.45 U mg⁻¹ at 72 h. The highest peroxidase yield was observed with sawdust as solid substrate under solid state fermentation. In conclusion, Ensifer sp. possesses the capacity for enhanced peroxidase production that can be exploited for various biotechnological applications.

Keywords: catalase-peroxidase, enzyme production, peroxidase, polymerase chain reaction, proteobacteria

Procedia PDF Downloads 271
512 The Investigation of Precipitation Conditions of Chevreul’s Salt

Authors: Turan Çalban, Fatih Sevim, Oral Laçin

Abstract:

In this study, the precipitation conditions of Chevreul’s salt were evaluated. The structure of Chevreul’s salt was examined by considering the previous studies. Thermodynamically, the most important precipitation parameters were pH, temperature, and sulphite-copper(II) ratio. The amount of Chevreul’s salt increased with increasing the temperature and sulphite-copper(II) ratio at the certain range, while it increased with decreasing the pH value at the chosen range. The best solution medium for recovery of Chevreul’s salt is sulphur dioxide gas-water system. Moreover, the soluble sulphite salts are used as efficient precipitating reagents. Chevreul’s salt is generally used to produce the highly pure copper powders from synthetic copper sulphate solutions and impure leach solutions. When the pH of the initial ammoniacal solution is greater than 8.5, ammonia in the medium is not free, and Chevreul’s salt from solution does not precipitate. In contrast, copper ammonium sulphide is precipitated. The pH of the initial solution containing ammonia for precipitating of Chevreul’s salt must be less than 8.5.

Keywords: Chevreul's salt, production, copper sulfites, copper compound

Procedia PDF Downloads 220
511 Evaluating Water Quality Index of Euphrates River South-West Part of Iraq, Najaf, Alhadaria by Using GIS Technique

Authors: Ali Abojassim, Nabeel Kadhim, Adil Jaber, Ali Hussein

Abstract:

Water quality index (WQI) is valuable and unique rating to depict the total water quality status in a single term that is helpful for the selection of appropriate treatment technique to meet the concerned issues. Fifteen surface water samples were collected from the Euphrates river within AlHaydria is sub district of AL-Najaf (Iraq). The quality of surface water were evaluated by testing various physicochemical parameters such as pH, Total Dissolved Solid (TDS), , Calcium, Chloride, Sulphate and Electrical conductivity. The WQI for all samples were found in the range of 25.92 to 47.22. The highest value of WQI was observed in the Ali Hajj Hassan(SW4,SW8), El Haj Abdel Sayed (SW 10 to SW 12)and Hasan alsab(SW 14) sampling locations. Most of the water samples within study area were found good to moderate categories. most of the water samples for study area were found good as well as moderate categories

Keywords: water quality index, GIS, physicochemical parameters, Iraq Standards for irrigation purpose 2012

Procedia PDF Downloads 121
510 Mild Hypothermia Versus Normothermia in Patients Undergoing Cardiac Surgery: A Propensity Matched Analysis

Authors: Ramanish Ravishankar, Azar Hussain, Mahmoud Loubani, Mubarak Chaudhry

Abstract:

Background and Aims: Currently, there are no strict guidelines in cardiopulmonary bypass temperature management in cardiac surgery not involving the aortic arch. This study aims to compare patient outcomes undergoing mild hypothermia and normothermia. The aim of this study was to compare patient outcomes between mild hypothermia and normothermia undergoing on-pump cardiac surgery not involving the aortic arch. Methods: This was a retrospective cohort study from January 2015 until May 2023. Patients who underwent cardiac surgery with cardiopulmonary bypass temperatures ≥32oC were included and stratified into mild hypothermia (32oC – 35oC) and normothermia (>35oC) cohorts. Propensity matching was applied through the nearest neighbour method (1:1) using the risk factors detailed in the EuroScore using RStudio. The primary outcome was mortality. Secondary outcomes included post-op stay, intensive care unit readmission, re-admission, stroke, and renal complications. Patients who had major aortic surgery and off-pump operations were excluded. Results: Each cohort had 1675 patients. There was a significant increase in overall mortality with the mild hypothermia cohort (3.59% vs. 2.32%; p=0.04912). There was also a greater stroke incidence (2.09% vs. 1.13%; p=0.0396) and transient ischaemic attack (TIA) risk (3.1% vs. 1.49%; p=0.0027). There was no significant difference in renal complications (9.13% vs. 7.88%; p=0.2155). Conclusions: Patient’s who underwent mild hypothermia during cardiopulmonary bypass have a significantly greater mortality, stroke, and transient ischaemic attack incidence. Mild hypothermia does not appear to provide any benefit over normothermia and does not appear to provide any neuroprotective benefits. This shows different results to that of other major studies; further trials and studies need to be conducted to reach a consensus.

Keywords: cardiac surgery, therapeutic hypothermia, neuroprotection, cardiopulmonary bypass

Procedia PDF Downloads 43
509 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications

Procedia PDF Downloads 189
508 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network

Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour

Abstract:

Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.

Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network

Procedia PDF Downloads 140
507 Analysis of the Impact of Suez Canal on the Robustness of Global Shipping Networks

Authors: Zimu Li, Zheng Wan

Abstract:

The Suez Canal plays an important role in global shipping networks and is one of the most frequently used waterways in the world. The 2021 canal obstruction by ship Ever Given in March 2021, however, completed blocked the Suez Canal for a week and caused significant disruption to world trade. Therefore, it is very important to quantitatively analyze the impact of the accident on the robustness of the global shipping network. However, the current research on maritime transportation networks is usually limited to local or small-scale networks in a certain region. Based on the complex network theory, this study establishes a global shipping complex network covering 2713 nodes and 137830 edges by using the real trajectory data of the global marine transport ship automatic identification system in 2018. At the same time, two attack modes, deliberate (Suez Canal Blocking) and random, are defined to calculate the changes in network node degree, eccentricity, clustering coefficient, network density, network isolated nodes, betweenness centrality, and closeness centrality under the two attack modes, and quantitatively analyze the actual impact of Suez Canal Blocking on the robustness of global shipping network. The results of the network robustness analysis show that Suez Canal blocking was more destructive to the shipping network than random attacks of the same scale. The network connectivity and accessibility decreased significantly, and the decline decreased with the distance between the port and the canal, showing the phenomenon of distance attenuation. This study further analyzes the impact of the blocking of the Suez Canal on Chinese ports and finds that the blocking of the Suez Canal significantly interferes withChina's shipping network and seriously affects China's normal trade activities. Finally, the impact of the global supply chain is analyzed, and it is found that blocking the canal will seriously damage the normal operation of the global supply chain.

Keywords: global shipping networks, ship AIS trajectory data, main channel, complex network, eigenvalue change

Procedia PDF Downloads 140