Search results for: power control.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6083

Search results for: power control.

953 Lifetime Maximization in Wireless Ad Hoc Networks with Network Coding and Matrix Game

Authors: Jain-Shing Liu

Abstract:

In this paper, we present a matrix game-theoretic cross-layer optimization formulation to maximize the network lifetime in wireless ad hoc networks with network coding. To this end, we introduce a cross-layer formulation of general NUM (network utility maximization) that accommodates routing, scheduling, and stream control from different layers in the coded networks. Specifically, for the scheduling problem and then the objective function involved, we develop a matrix game with the strategy sets of the players corresponding to hyperlinks and transmission modes, and design the payoffs specific to the lifetime. In particular, with the inherit merit that matrix game can be solved with linear programming, our cross-layer programming formulation can benefit from both game-based and NUM-based approaches at the same time by cooperating the programming model for the matrix game with that for the other layers in a consistent framework. Finally, our numerical example demonstrates its performance results on a well-known wireless butterfly network to verify the cross-layer optimization scheme.

Keywords: Cross-layer design, Lifetime maximization, Matrix game, Network coding

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1694
952 Security Enhanced RFID Middleware System

Authors: Jieun Song, Taesung Kim, Sokjoon Lee, Howon Kim

Abstract:

Recently, the RFID (Radio Frequency Identification) technology attracts the world market attention as essential technology for ubiquitous environment. The RFID market has focused on transponders and reader development. But that concern has shifted to RFID software like as high-valued e-business applications, RFID middleware and related development tools. However, due to the high sensitivity of data and service transaction within the RFID network, security consideration must be addressed. In order to guarantee trusted e-business based on RFID technology, we propose a security enhanced RFID middleware system. Our proposal is compliant with EPCglobal ALE (Application Level Events), which is standard interface for middleware and its clients. We show how to provide strengthened security and trust by protecting transported data between middleware and its client, and stored data in middleware. Moreover, we achieve the identification and service access control against illegal service abuse. Our system enables secure RFID middleware service and trusted e-business service.

Keywords: RFID Middleware, ALE (Application Level Events), Security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2067
951 Enhancing Temporal Extrapolation of Wind Speed Using a Hybrid Technique: A Case Study in West Coast of Denmark

Authors: B. Elshafei, X. Mao

Abstract:

The demand for renewable energy is significantly increasing, major investments are being supplied to the wind power generation industry as a leading source of clean energy. The wind energy sector is entirely dependable and driven by the prediction of wind speed, which by the nature of wind is very stochastic and widely random. This s0tudy employs deep multi-fidelity Gaussian process regression, used to predict wind speeds for medium term time horizons. Data of the RUNE experiment in the west coast of Denmark were provided by the Technical University of Denmark, which represent the wind speed across the study area from the period between December 2015 and March 2016. The study aims to investigate the effect of pre-processing the data by denoising the signal using empirical wavelet transform (EWT) and engaging the vector components of wind speed to increase the number of input data layers for data fusion using deep multi-fidelity Gaussian process regression (GPR). The outcomes were compared using root mean square error (RMSE) and the results demonstrated a significant increase in the accuracy of predictions which demonstrated that using vector components of the wind speed as additional predictors exhibits more accurate predictions than strategies that ignore them, reflecting the importance of the inclusion of all sub data and pre-processing signals for wind speed forecasting models.

Keywords: Data fusion, Gaussian process regression, signal denoise, temporal extrapolation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 501
950 Transient Solution of an Incompressible Viscous Flow in a Channel with Sudden Expansion/Contraction

Authors: Durga C. Dalal, Swapan K. Pandit

Abstract:

In this paper, a numerical study has been made to analyze the transient 2-D flows of a viscous incompressible fluid through channels with forward or backward constriction. Problems addressed include flow through sudden contraction and sudden expansion channel geometries with rounded and increasingly sharp reentrant corner. In both the cases, numerical results are presented for the separation and reattachment points, streamlines, vorticity and flow patterns. A fourth order accurate compact scheme has been employed to efficiently capture steady state solutions of the governing equations. It appears from our study that sharpness of the throat in the channel is one of the important parameters to control the strength and size of the separation zone without modifying the general flow patterns. The comparison between the two cases shows that the upstream geometry plays a significant role on vortex growth dynamics.

Keywords: Forward and backward constriction, HOC scheme, Incompressible viscous flows, Separation and reattachment points.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1696
949 Risk of Plastic Shrinkage Cracking in Recycled Aggregate Concrete

Authors: M. Eckert, M. Oliveira

Abstract:

The intensive use of natural aggregates, near cities and towns, associated to the increase of the global population, leads to its depletion and increases the transport distances. The uncontrolled deposition of construction and demolition waste in landfills and city outskirts, causes pollution and takes up space. The use of recycled aggregates in concrete preparation would contribute to mitigate the problem. However, it arises the problem that the high water absorption of recycled aggregate decreases the bleeding rate of concrete, and when this gets lower than the evaporation rate, plastic shrinkage cracking occurs. This phenomenon can be particularly problematic in hot and windy curing environments. Cracking facilitates the flow of liquid and gas into concrete which attacks the reinforcement and degrades the concrete. These factors reduce the durability of concrete structures and consequently the lifetime of buildings. A ring test was used, cured in a wind tunnel, to evaluate the plastic shrinkage cracking sensitivity of recycled aggregate concrete, in order to implement preventive means to control this phenomenon. The role of several aggregate properties on the concrete segregation and cracking mechanisms were also discussed.

Keywords: Recycled Aggregate, Plastic Shrinkage Cracking; Wind Tunnel, Durability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1028
948 Electricity Load Modeling: An Application to Italian Market

Authors: Giovanni Masala, Stefania Marica

Abstract:

Forecasting electricity load plays a crucial role regards decision making and planning for economical purposes. Besides, in the light of the recent privatization and deregulation of the power industry, the forecasting of future electricity load turned out to be a very challenging problem. Empirical data about electricity load highlights a clear seasonal behavior (higher load during the winter season), which is partly due to climatic effects. We also emphasize the presence of load periodicity at a weekly basis (electricity load is usually lower on weekends or holidays) and at daily basis (electricity load is clearly influenced by the hour). Finally, a long-term trend may depend on the general economic situation (for example, industrial production affects electricity load). All these features must be captured by the model. The purpose of this paper is then to build an hourly electricity load model. The deterministic component of the model requires non-linear regression and Fourier series while we will investigate the stochastic component through econometrical tools. The calibration of the parameters’ model will be performed by using data coming from the Italian market in a 6 year period (2007- 2012). Then, we will perform a Monte Carlo simulation in order to compare the simulated data respect to the real data (both in-sample and out-of-sample inspection). The reliability of the model will be deduced thanks to standard tests which highlight a good fitting of the simulated values.

Keywords: ARMA-GARCH process, electricity load, fitting tests, Fourier series, Monte Carlo simulation, non-linear regression.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1486
947 Performance Analysis of Cluster Based Dual Tired Network Model with INTK Security Scheme in a Wireless Sensor Network

Authors: D. Satish Kumar, S. Karthik

Abstract:

A dual tiered network model is designed to overcome the problem of energy alert and fault tolerance. This model minimizes the delay time and overcome failure of links. Performance analysis of the dual tiered network model is studied in this paper where the CA and LS schemes are compared with DEO optimal. We then evaluate  the Integrated Network Topological Control and Key Management (INTK) Schemes, which was proposed to add security features of the wireless sensor networks. Clustering efficiency, level of protections, the time complexity is some of the parameters of INTK scheme that were analyzed. We then evaluate the Cluster based Energy Competent n-coverage scheme (CEC n-coverage scheme) to ensure area coverage for wireless sensor networks.

Keywords: CEC n-coverage scheme, Clustering efficiency, Dual tired network, Wireless sensor networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1672
946 On Mobile Checkpointing using Index and Time Together

Authors: Awadhesh Kumar Singh

Abstract:

Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence, checkpointing protocols having lesser number of synchronization messages and fewer checkpoints are preferred in mobile environment. There are two different approaches, although not orthogonal, to checkpoint mobile computing systems namely, time-based and index-based. Our protocol is a fusion of these two approaches, though not first of its kind. In the present exposition, an index-based checkpointing protocol has been developed, which uses time to indirectly coordinate the creation of consistent global checkpoints for mobile computing systems. The proposed algorithm is non-blocking, adaptive, and does not use any control message. Compared to other contemporary checkpointing algorithms, it is computationally more efficient because it takes lesser number of checkpoints and does not need to compute dependency relationships. A brief account of important and relevant works in both the fields, time-based and index-based, has also been included in the presentation.

Keywords: Checkpointing, forced checkpoint, mobile computing, recovery, time-coordinated.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1488
945 Authentication Protocol for Wireless Sensor Networks

Authors: Sunil Gupta, Harsh Kumar Verma, AL Sangal

Abstract:

Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.

Keywords: Authentication, Key management, Wireless Sensornetwork, Elliptic curve cryptography (ECC).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3824
944 Proportion and Factors Associated with Presumptive Tuberculosis among Suspected Pediatric TB Patients

Authors: Naima Nur, Safa Islam, Saeema Islam, Md. Faridul Alam

Abstract:

The study addresses the increasing challenge of pediatric presumptive tuberculosis, emphasizing the need to understand the factors associated with it. The research aims to determine the proportion of presumptive TB and factors associated with it among suspected pediatric tuberculosis patients. A cross-sectional study was conducted at ICDDR-Bangladesh, collecting specimens from suspected pediatric patients and using logistic regression for data analysis. The study found a high proportion of presumptive TB (85.7%) but no statistically significant differences between presumptive and non-presumptive TB. Theoretical importance of the study highlights the importance of identifying factors associated with presumptive TB for better control and management strategies. Specimens were collected from 84 suspected pediatric patients diagnosed with TB based on clinical symptoms/radiological findings. Microbiological tests like smear-microscopy, culture, and GeneXpert were used to isolate presumptive TB and confirmed TB. The proportion of presumptive TB was 85.7% among suspected pediatric TB patients. Among various factors that were not found to be associated with the presumptive TB. The study concludes that despite a high proportion of presumptive TB, no significant differences were found between presumptive and non-presumptive TB cases.

Keywords: Presumptive tuberculosis, confirmed tuberculosis, patient's characteristics, diagnosis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 85
943 Evaluation of Some Prominent Biomarkers in Rural Type – 2 Diabetes Mellitus Cases in Kanyakumari District, Tamil Nadu, India

Authors: Murugan. A., Jerlin Nirmala. F .

Abstract:

Life is beautiful. But, it is decided by genes, environment and the individual and shattered by the natural and / or the invited problems. Most of the global rural helpless masses are struggling for their survival since; they are neglected in all aspects of life including health. Amidst a countless number of miserable diseases in man, diabetes is becoming a dreaded killer and ramifying the entire globe in a jet speed. Diabetes control continues as a Herculean task to the scientific community and the modern society in the 21st century also. T2DM is not pertaining to any age and it can develop even during the childhood. This multifactorial disease abruptly changes the activities of certain vital biomarkers in the present rural T2DM cases. A remarkable variation in the levels of biomarkers like AST, ALT, GGT, ALP, LDH, HbA1C, C- peptide, fasting sugar, post-prandial sugar, sodium, potassium, BUN, creatinine and insulin show the rampant nature of T2DM in this physically active rural agrarian community.

Keywords: Alanine aminotransferase, Aspartate aminotransferase, Blood urea nitrogen, Glycated haemoglobin, Thyroid stimulating hormone

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1581
942 Self-Organizing Map Network for Wheeled Robot Movement Optimization

Authors: Boguslaw Schreyer

Abstract:

The paper investigates the application of the Kohonen’s Self-Organizing Map (SOM) to the wheeled robot starting and braking dynamic states. In securing wheeled robot stability as well as minimum starting and braking time, it is important to ensure correct torque distribution as well as proper slope of braking and driving moments. In this paper, a correct movement distribution has been formulated, securing optimum adhesion coefficient and good transversal stability of a wheeled robot. A neural tuner has been proposed to secure the above properties, although most of the attention is attached to the SOM network application. If the delay of the torque application or torque release is not negligible, it is important to change the rising and falling slopes of the torque. The road/surface condition is also paramount in robot dynamic states control. As the road conditions may randomly change in time, application of the SOM network has been suggested in order to classify the actual road conditions.

Keywords: SOM network, torque distribution, torque slope, wheeled robots.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 590
941 Effect of Domestic Treated Wastewater use on Three Varieties of Amaranth (Amaranthus spp.) under Semi Arid Conditions

Authors: El Youssfi L., Choukr-Allah R., Zaafrani M., Mediouni T., Sarr F, Hirich A.

Abstract:

An experiment was implemented in a filed in the south of Morocco to evaluate the effects of domestic treated wastewater use for irrigation of amaranth crop under semi-arid conditions. Three varieties (A0020, A0057 & A211) were tested and irrigated using domestic treated wastewater EC1 (0,92 dS/m) as control, EC3 (3dS/m) and EC6 (6dS/m) obtained by adding sea water. In term of growth, an increase of the EC level of applied irrigation water reduced significantly the plant-s height, leaf area, fresh and dry weight measured at vegetative, flowering and maturity stage for all varieties. Even with the application of the EC6, yields were relatively higher in comparison with the once obtained in normal cultivation conditions. A significant accumulation of nitrate, chloride and sodium in soil layers during the crop cycle was noted. The use of treated waste water for its irrigation is proved to be possible. The variety A211 had showed to be less sensitive to salinity stress and it could be more promising its introduction to study area.

Keywords: Amaranth, salinity, semi-arid, treated waste water.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2017
940 Drug Combinations with Steroid Dispensing in Drugstores: A Study in the Center Area of Bangkok, Thailand

Authors: P. Thongmuang

Abstract:

The purposes of this research were 1) to survey the number of drugstores that unlawful dispense of asthma prescription drugs, in form of drug combinations in the Phaya Thai district of Bangkok, 2) to find the steroids contained in that drug combinations, 3) to find a means for informing general public about the dangers of drugs and for a campaign to stop dispensing them. Researcher collected drug combinations from 69 drugstores in Phaya Thai district from Feb 15, 2012 to Mar 15, 2012. The survey found 30.43%, 21, drug stores, sold asthma drug combinations to customers without a prescription. These collected samples were tested for steroid contamination by using Immunochromatography kits. Eleven samples, 52.38%, were found contaminated with steroids. In short, there should be control and inspection of drugstores in the distribution of steroid medications. To improve the knowledge of self health maintenance and drug usage among public, Thai Government and Department of Public Health should educate people about the side effects of using drug combinations and steroids.

Keywords: Dispensing, Drug Combinations, Steroids

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2058
939 Feature Analysis of Predictive Maintenance Models

Authors: Zhaoan Wang

Abstract:

Research in predictive maintenance modeling has improved in the recent years to predict failures and needed maintenance with high accuracy, saving cost and improving manufacturing efficiency. However, classic prediction models provide little valuable insight towards the most important features contributing to the failure. By analyzing and quantifying feature importance in predictive maintenance models, cost saving can be optimized based on business goals. First, multiple classifiers are evaluated with cross-validation to predict the multi-class of failures. Second, predictive performance with features provided by different feature selection algorithms are further analyzed. Third, features selected by different algorithms are ranked and combined based on their predictive power. Finally, linear explainer SHAP (SHapley Additive exPlanations) is applied to interpret classifier behavior and provide further insight towards the specific roles of features in both local predictions and global model behavior. The results of the experiments suggest that certain features play dominant roles in predictive models while others have significantly less impact on the overall performance. Moreover, for multi-class prediction of machine failures, the most important features vary with type of machine failures. The results may lead to improved productivity and cost saving by prioritizing sensor deployment, data collection, and data processing of more important features over less importance features.

Keywords: Automated supply chain, intelligent manufacturing, predictive maintenance machine learning, feature engineering, model interpretation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2004
938 Sound Exposure Effects towards Ross Broilers Growth Rate

Authors: Rashidah Ghazali, Herlina Abdul Rahim, Mashitah Shikh Maidin, Shafishuhaza Sahlan, Noramli Abdul Razak

Abstract:

Sound exposure effects have been investigated by broadcasting a group of broilers with sound of Quran verses (Group B) whereas the other group is the control broilers (Group C). The growth rate comparisons in terms of weight and raw meat texture measured by shear force have been investigated. Twenty-seven broilers were randomly selected from each group on Day 24 and weight measurement was carried out every week till the harvest day (Day 39).Group B showed a higher mean weight on Day 24 (1.441 ± 0.013 kg) than Group C. Significant difference in the weight on Day 39 existed for Group B compared to Group C (p < 0.05). However, there was no significant (p >0.05) difference of shear force in the same muscles (breast and drumstick raw meat) of both groups but the shear force of the breast meat for Group B and C broilers was lower (p < 0.05) than that of their drumstick meat. Thus, broadcasting the sound of Quran verses in the coop can be applied to improve the growth rate of broilers for producing better quality poultry.

Keywords: Broilers, sound, shear force, weight.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3134
937 An Energy Efficient Cluster Formation Protocol with Low Latency In Wireless Sensor Networks

Authors: A. Allirani, M. Suganthi

Abstract:

Data gathering is an essential operation in wireless sensor network applications. So it requires energy efficiency techniques to increase the lifetime of the network. Similarly, clustering is also an effective technique to improve the energy efficiency and network lifetime of wireless sensor networks. In this paper, an energy efficient cluster formation protocol is proposed with the objective of achieving low energy dissipation and latency without sacrificing application specific quality. The objective is achieved by applying randomized, adaptive, self-configuring cluster formation and localized control for data transfers. It involves application - specific data processing, such as data aggregation or compression. The cluster formation algorithm allows each node to make independent decisions, so as to generate good clusters as the end. Simulation results show that the proposed protocol utilizes minimum energy and latency for cluster formation, there by reducing the overhead of the protocol.

Keywords: Sensor networks, Low latency, Energy sorting protocol, data processing, Cluster formation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2741
936 War Heritage: Different Perceptions of the Dominant Discourse among Visitors to the "Adem Jashari" Memorial Complex in Prekaz, Kosovo

Authors: Zana Llonçari Osmani, Nita Llonçari

Abstract:

The paper delves into the significance of the Prekaz Memorial in Kosovo's national identity formation, particularly regarding the traumatic events of the 1998-99 War. The spatial layout and architectural features of the Memorial are analysed, focusing on its role as a place of remembrance and hope. Through qualitative surveys and critical discourse analysis, the essay explores visitor perceptions of the Memorial's narrative and design elements. Factors such as geographical, emotional, and temporal proximity to the war influence visitors' interpretations, with varying degrees of emphasis on loss, sacrifice, and patriotism. It highlights the Memorial's ability to evoke emotions of pride and sadness among visitors, underscoring the power of authentic artefacts in shaping collective memory. However, the paper also criticizes the Memorial's dominant discourse and advocates for a more inclusive approach to memorialization, one that acknowledges all facets of history and ensures that no story is left untold or forgotten. Despite its success in solidifying its place in society, the essay calls for the Memorial's evolution towards a more comprehensive and dynamic dialogue to resonate with future generations. The essay stresses the importance of memorialization efforts in honouring the past, fostering healing, and promoting inclusive dialogue. It argues for a broader narrative scope that encompasses diverse perspectives, thus ensuring the vitality and relevance of historical memory for generations to come.

Keywords: Critical discourse analysis, memorialisation, national discourse, public rhetoric, war tourism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 63
935 Open Educational Resource in Online Mathematics Learning

Authors: Haohao Wang

Abstract:

Technology, multimedia in Open Educational Resources, can contribute positively to student performance in an online instructional environment. Student performance data of past four years were obtained from an online course entitled Applied Calculus (MA139). This paper examined the data to determine whether multimedia (independent variable) had any impact on student performance (dependent variable) in online math learning, and how students felt about the value of the technology. Two groups of student data were analyzed, group 1 (control) from the online applied calculus course that did not use multimedia instructional materials, and group 2 (treatment) of the same online applied calculus course that used multimedia instructional materials. For the MA139 class, results indicate a statistically significant difference (p = .001) between the two groups, where group 1 had a final score mean of 56.36 (out of 100), group 2 of 70.68. Additionally, student testimonials were discussed in which students shared their experience in learning applied calculus online with multimedia instructional materials.

Keywords: Online learning, Open Educational Resources, Multimedia, Technology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2114
934 Induction of Hsp70 and Antioxidant Status in Porcine Granulosa Cells in Response to Deoxynivalenol and Zearalenone Exposure in vitro

Authors: Marcela Capcarova, Adriana Kolesarova, Marina Medvedova, Peter Petruska, Alexander V. Sirotkin

Abstract:

The aim of this study was to determine the activity of superoxide dismutase (SOD), glutathione peroxidase (GPx), total antioxidant status (TAS) and accumulation of Hsp70 in porcine ovarian granulosa cells after deoxynivalenol (DON) and zearalenone (ZEA) exposure in vitro. Porcine ovarian granulosa cells were incubated with DON/ZEA administrations as follows: group A (10/10 ng/mL), group B (100/100 ng/mL), group C (1000/1000 ng/mL), and the control group without any additions for 24h. In this study mycotoxins developed stress reaction of porcine ovarian granulosa cells and increased accumulation of Hsp70 what resulted in increasing activities of SOD and GPx in groups with lower doses of mycotoxins. High dose of DON and ZEA had opposite effect on GPx activity than the lower doses. Slight increase in TAS of porcine granulosa cells was observed after mycotoxins exposure. These results contribute towards the understanding of cellular stress and its response.

Keywords: Deoxynivalenol, zearalenone, antioxidants, Hsp70, granulosa cells.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2459
933 Fast Factored DCT-LMS Speech Enhancement for Performance Enhancement of Digital Hearing Aid

Authors: Sunitha. S.L., V. Udayashankara

Abstract:

Background noise is particularly damaging to speech intelligibility for people with hearing loss especially for sensorineural loss patients. Several investigations on speech intelligibility have demonstrated sensorineural loss patients need 5-15 dB higher SNR than the normal hearing subjects. This paper describes Discrete Cosine Transform Power Normalized Least Mean Square algorithm to improve the SNR and to reduce the convergence rate of the LMS for Sensory neural loss patients. Since it requires only real arithmetic, it establishes the faster convergence rate as compare to time domain LMS and also this transformation improves the eigenvalue distribution of the input autocorrelation matrix of the LMS filter. The DCT has good ortho-normal, separable, and energy compaction property. Although the DCT does not separate frequencies, it is a powerful signal decorrelator. It is a real valued function and thus can be effectively used in real-time operation. The advantages of DCT-LMS as compared to standard LMS algorithm are shown via SNR and eigenvalue ratio computations. . Exploiting the symmetry of the basis functions, the DCT transform matrix [AN] can be factored into a series of ±1 butterflies and rotation angles. This factorization results in one of the fastest DCT implementation. There are different ways to obtain factorizations. This work uses the fast factored DCT algorithm developed by Chen and company. The computer simulations results show superior convergence characteristics of the proposed algorithm by improving the SNR at least 10 dB for input SNR less than and equal to 0 dB, faster convergence speed and better time and frequency characteristics.

Keywords: Hearing Impairment, DCT Adaptive filter, Sensorineural loss patients, Convergence rate.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2171
932 Remittances and the Changing Roles of Women in Laos

Authors: N. Southiseng, J. Walsh

Abstract:

Prior to 1975, women in Laos suffered from having reduced levels of power over decision-making in their families and in their communities. This has had a negative impact on their ability to develop their own identities. Their roles were identified as being responsible for household activities and making preparations for their marriage. Many women lost opportunities to get educated and access the outdoor work that might have empowered them to improve their situations. So far, no accurate figures of either emigrants or return migrants have been compiled but it appears that most of them were women, and it was women who most and more frequently remitted money home. However, very few recent studies have addressed the relationship between remittances and the roles of women in Laos. This study, therefore, aims at redressing to some extent the deficiencies in knowledge. Qualitative techniques were used to gather data, including individual in-depth interviews and direct observation in combination with the content analysis method. Forty women in Vientiane Municipality and Savannakhet province were individually interviewed. It was found that the monetary remittance was typically used for family security and well-being; on fungible activities; on economic and business activities; and on community development, especially concerning hospitality and providing daily household necessities. Remittances played important roles in improving many respondents- livelihoods and positively changed their identities in families and communities. Women became empowered as they were able to start commercial businesses, rather than taking care of (just) housework, children and elders. Interviews indicated that 92.5% of the respondents their quality of lives improved, 90% felt happier in their families and 82.5% felt conflicts in their families were reduced.

Keywords: Laos, Monetary Remittances, Social Remittance, Women's Empowerment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2141
931 Numerical Study of a Butterfly Valve for Vibration Analysis and Reduction

Authors: Malik I. Al-Amayreh, Mohammad I. Kilani, Ahmed S. Al-Salaymeh

Abstract:

This work presents a Computational Fluid Dynamics (CFD) simulation of a butterfly valve used to control the flow of combustible gas mixture in an industrial process setting.The work uses CFD simulation to analyze the flow characteristics in the vicinity of the valve, including the pressure distributions and Frequency spectrum of the pressure pulsations downstream the valves and the vortex shedding allow predicting the torque fluctuations acting on the valve shaft and the possibility of generating mechanical vibration and resonance.These fluctuations are due to aerodynamic torque resulting from fluid turbulence and vortex shedding in the valve vicinity. The valve analyzed is located in a pipeline between two opposing 90o elbows, which exposes the valve and the surrounding structure to the turbulence generated upstream and downstream the elbows at either end of the pipe.CFD simulations show that the best location for the valve from a vibration point of view is in the middle of the pipe joining the elbows.

Keywords: Butterfly Valve Vibration Analysis, Computational Fluid Dynamics, Fluid Flow Circuit Design, Fluid Mechanics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3816
930 Impregnation of Cupper into Kanuma Volcanic Ash Soil to Improve Mercury Sorption Capacity

Authors: Jatindra N. Bhakta, Yukihiro Munekage

Abstract:

The present study attempted to improve the Mercury (Hg) sorption capacity of kanuma volcanic ash soil (KVAS) by impregnating the cupper (Cu). Impregnation was executed by 1 and 5% Cu powder and sorption characterization of optimum Hg removing Cu impregnated KVAS was performed under different operational conditions, contact time, solution pH, sorbent dosage and Hg concentration using the batch operation studies. The 1% Cu impregnated KVAS pronounced optimum improvement (79%) in removing Hg from water compare to control. The present investigation determined the equilibrium state of maximum Hg adsorption at 6 h contact period. The adsorption revealed a pH dependent response and pH 3.5 showed maximum sorption capacity of Hg. Freundlich isotherm model is well fitted with the experimental data than that of Langmuir isotherm. It can be concluded that the Cu impregnation improves the Hg sorption capacity of KVAS and 1% Cu impregnated KVAS could be employed as cost-effective adsorbent media for treating Hg contaminated water.

Keywords: Cupper, impregnation, isotherm, kanuma volcanic ash soil, mercury, sorption

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1664
929 Laser Surface Hardening Considering Coupled Thermoelasticity using an Eulerian Formulations

Authors: Me. Sistaninia, G.H.Farrahi, Ma. Sistaninia

Abstract:

Thermoelastic temperature, displacement, and stress in heat transfer during laser surface hardening are solved in Eulerian formulation. In Eulerian formulations the heat flux is fixed in space and the workpiece is moved through a control volume. In the case of uniform velocity and uniform heat flux distribution, the Eulerian formulations leads to a steady-state problem, while the Lagrangian formulations remains transient. In Eulerian formulations the reduction to a steady-state problem increases the computational efficiency. In this study also an analytical solution is developed for an uncoupled transient heat conduction equation in which a plane slab is heated by a laser beam. The thermal result of the numerical model is compared with the result of this analytical model. Comparing the results shows numerical solution for uncoupled equations are in good agreement with the analytical solution.

Keywords: Coupled thermoelasticity, Finite element, Laser surface hardening, Eulerian formulation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1565
928 The Association of Matrix Metalloproteinase-3 Gene -1612 5A/6A Polymorphism with Susceptibility to Coronary Artery Stenosis in an Iranian Population

Authors: M. Seifi, S. Fallah, M. Firoozrai

Abstract:

Matrix metalloproteinase-3 (MMP3) is key member of the MMP family, and is known to be present in coronary atherosclerotic. Several studies have demonstrated that MMP-3 5A/6A polymorphism modify each transcriptional activity in allele specific manner. We hypothesized that this polymorphism may play a role as risk factor for development of coronary stenosis. The aim of our study was to estimate MMP-3 (5A/6A) gene polymorphism on interindividual variability in risk for coronary stenosis in an Iranian population.DNA was extracted from white blood cells and genotypes were obtained from coronary stenosis cases (n=95) and controls (n=100) by PCR (polymerase chain reaction) and restriction fragment length polymorphism techniques. Significant differences between cases and controls were observed for MMP3 genotype frequencies (X2=199.305, p< 0.001); the 6A allele was less frequently seen in the control group, compared to the disease group (85.79 vs. 78%, 6A/6A+5A/6A vs. 5A/5A, P≤0.001). These data imply the involvement of -1612 5A/6A polymorphism in coronary stenosis, and suggest that probably the 6A/6A MMP-3 genotype is a genetic susceptibility factor for coronary stenosis.

Keywords: Coronary artery stenosis, matrixmetalloproteinase-3, polymorphism, polymerase chain reaction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1258
927 Study of the Effectiveness of Outrigger System for High-Rise Composite Buildings for Cyclonic Region

Authors: S. Fawzia, A. Nasir, T. Fatima

Abstract:

The demands of taller structures are becoming imperative almost everywhere in the world in addition to the challenges of material and labor cost, project time line etc. This paper conducted a study keeping in view the challenging nature of high-rise construction with no generic rules for deflection minimizations and frequency control. The effects of cyclonic wind and provision of outriggers on 28-storey, 42-storey and 57-storey are examined in this paper and certain conclusions are made which would pave way for researchers to conduct further study in this particular area of civil engineering. The results show that plan dimensions have vital impacts on structural heights. Increase of height while keeping the plan dimensions same, leads to the reduction in the lateral rigidity. To achieve required stiffness increase of bracings sizes as well as introduction of additional lateral resisting system such as belt truss and outriggers is required.

Keywords: Cyclonic wind regions, dynamic wind loads, Alongwind effects, Crosswind response, Fundamental frequency of vibration.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2934
926 In vitro Antioxidant Activity of Two Selected Herbal Medicines

Authors: S. Vinotha, I. Thabrew, S. Sri Ranjani

Abstract:

Hot aqueous and methanol extracts of the two selected herbal medicines such are Vellarugu chooranam (V.C) and Amukkirai Chooranam (A.C) were examined for total phenolic and flavonoid contents and in vitro antioxidant activity using four different methods. The total phenolic and flavonoid contents in methanol extract of V.C were found to be higher (44.41±1.26mg GAE/g; 174.44±9.32mg QE/g) than in the methanol extract of A.C (20.56±0.67mg GAE/g; 7.21±0.85mg QE/g). Hot methanol and aqueous extracts of both medicines showed low antioxidant activity in DPPH, ABTS, and FRAP methods and Iron chelating activity not found at highest possible concentration. V.C contains higher concentrations of total phenolic and flavonoid contents than A.C and can also exert greater antioxidant activity than A.C, although the activities demonstrated were lower than the positive control Trolox. The in vitro antioxidant activity was not related with the total phenolic and flavonoid contents of the methanol and aqueous extracts of both herbal medicines (A.C and V.C).

Keywords: Activity, Different extracts, Herbal medicine, in vitro antioxidant.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2682
925 An Algorithm for Secure Visible Logo Embedding and Removing in Compression Domain

Authors: Hongyuan Li, Guang Liu, Yuewei Dai, Zhiquan Wang

Abstract:

Digital watermarking is the process of embedding information into a digital signal which can be used in DRM (digital rights managements) system. The visible watermark (often called logo) can indicate the owner of the copyright which can often be seen in the TV program and protects the copyright in an active way. However, most of the schemes do not consider the visible watermark removing process. To solve this problem, a visible watermarking scheme with embedding and removing process is proposed under the control of a secure template. The template generates different version of watermarks which can be seen visually the same for different users. Users with the right key can completely remove the watermark and recover the original image while the unauthorized user is prevented to remove the watermark. Experiment results show that our watermarking algorithm obtains a good visual quality and is hard to be removed by the illegally users. Additionally, the authorized users can completely remove the visible watermark and recover the original image with a good quality.

Keywords: digital watermarking, visible and removablewatermark, secure template, JPEG compression

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1536
924 Numerical Investigation of Indoor Air Quality and Thermal Comfort in a Ventilated Room

Authors: Ramy H. Mohammed

Abstract:

Understanding the behavior of airflow in a room is essential for building designers to provide the most efficient design of ventilation system, and having acceptable indoor air quality. This trend is the motive to solve the relationship between airflow parameters and thermal comfort. This paper investigates airflow characteristics, indoor air quality (IAQ), and the thermal comfort (TC) in a ventilated room with a displacement ventilation system using three dimensional CFD code [AirPak 2.0.6]. After validation of the code, a numerical study is executed for a typical room with dimensions of 5m by 3m by 3m height according to a variety of supply air velocities, supply air temperature and supply air relative humidity. The finite volume method and the indoor zero equation turbulence models are employed for solving the governing equations numerically. The temperature field and the mean age of air (MAA) in the modeled room for a displacement ventilation system are determined according to a variety of the above parameters. The variable air volume (VAV) systems with different supply air velocity are applicable to control room air temperature for a displacement ventilation system.

Keywords: Displacement ventilation, AirPak, Indoor zero equation, MAA.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3128