Search results for: Isolated half bridge DC-DC converter
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1037

Search results for: Isolated half bridge DC-DC converter

377 Exchanges of Knowledge about Product Configurations using XML Topic Map

Authors: Namchul Do, Jihun Cho

Abstract:

Modeling product configurations needs large amounts of knowledge about technical and marketing restrictions on the product. Previous attempts to automate product configurations concentrate on representations and management of the knowledge for specific domains in fixed and isolated computing environments. Since the knowledge about product configurations is subject to continuous change and hard to express, these attempts often failed to efficiently manage and exchange the knowledge in collaborative product development. In this paper, XML Topic Map (XTM) is introduced to represent and exchange the knowledge about product configurations in collaborative product development. A product configuration model based on XTM along with its merger and inference facilities enables configuration engineers in collaborative product development to manage and exchange their knowledge efficiently. A prototype implementation is also presented to demonstrate the proposed model can be applied to engineering information systems to exchange the product configuration knowledge.

Keywords: Knowledge exchange, product configurations, XML topic map.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1329
376 Characterization of Novel Atrazine-Degrading Klebsiella sp. isolated from Thai Agricultural Soil

Authors: Sawangjit Sopid

Abstract:

Atrazine, a herbicide widely used in sugarcane and corn production, is a frequently detected groundwater contaminant. An atrazine-degrading bacterium, strain KB02, was obtained from long-term atrazine-treated sugarcane field soils in Kanchanaburi province of Thailand. Strain KB02 had a rod-to-coccus morphological cycle during growth. Sequence analysis of the PCR product indicated that the 16S rRNA gene in strain KB02 was ranging from 97-98% identical to the same region in Klebsiella sp. Based on biochemical, physiological analysis and 16S rDNA sequence analysis of one representative isolate, strain KB02, the isolates belong to the genus Klebsiella in the family Enterobacteriaceae. Interestingly that the various primers for atzA, B and C failed to amplify genomic DNA of strain KB02. Whereas the expected PCR product of atzA, B and C were obtained from the reference strain, Arthrobacter sp. strain KU001.

Keywords: Atrazine, atz gene, Biodegradation, bioremediation, Klebsiella

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1926
375 Evaluation of Evolution Strategy, Genetic Algorithm and their Hybrid on Evolving Simulated Car Racing Controllers

Authors: Hidehiko Okada, Jumpei Tokida

Abstract:

Researchers have been applying tional intelligence (AI/CI) methods to computer games. In this research field, further researchesare required to compare AI/CI methods with respect to each game application. In th our experimental result on the comparison of three evolutionary algorithms – evolution strategy, genetic algorithm, and their hybrid applied to evolving controller agents for the CIG 2007 Simulated Car Racing competition. Our experimental result shows that, premature convergence of solutions was observed in the case of ES, and GA outperformed ES in the last half of generations. Besides, a hybrid which uses GA first and ES next evolved the best solution among the whole solutions being generated. This result shows the ability of GA in globally searching promising areas in the early stage and the ability of ES in locally searching the focused area (fine-tuning solutions).

Keywords: Evolutionary algorithm, autonomous agent, neuroevolutions, simulated car racing.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1782
374 Complexity Reduction Approach with Jacobi Iterative Method for Solving Composite Trapezoidal Algebraic Equations

Authors: Mohana Sundaram Muthuvalu, Jumat Sulaiman

Abstract:

In this paper, application of the complexity reduction approach based on half- and quarter-sweep iteration concepts with Jacobi iterative method for solving composite trapezoidal (CT) algebraic equations is discussed. The performances of the methods for CT algebraic equations are comparatively studied by their application in solving linear Fredholm integral equations of the second kind. Furthermore, computational complexity analysis and numerical results for three test problems are also included in order to verify performance of the methods.

Keywords: Complexity reduction approach, Composite trapezoidal scheme, Jacobi method, Linear Fredholm integral equations

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1563
373 Numerical Simulation of Fiber Bragg Grating Spectrum for Mode-І Delamination Detection

Authors: O. Hassoon, M. Tarfoui, A. El Malk

Abstract:

Fiber Bragg optic sensor is embedded in composite material to detect and monitor the damage that occurs in composite structures. In this paper, we deal with the mode-Ι delamination to determine the material strength to crack propagation, using the coupling mode theory and T-matrix method to simulate the FBGs spectrum for both uniform and non-uniform strain distribution. The double cantilever beam test is modeled in FEM to determine the longitudinal strain. Two models are implemented, the first is the global half model, and the second is the sub-model to represent the FBGs with higher refined mesh. This method can simulate damage in composite structures and converting strain to a wavelength shifting in the FBG spectrum.

Keywords: Fiber Bragg grating, Delamination detection, DCB, FBG spectrum, Structure health monitoring.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6513
372 Safety Assessment of Traditional Ready-to-Eat Meat Products Vended at Retail Outlets in Kebbi and Sokoto States, Nigeria

Authors: M. I. Ribah, M. Jibir, Y. A. Bashar, S. S. Manga

Abstract:

Food safety is a significant and growing public health problem in the world and Nigeria as a developing country, since food-borne diseases are important contributors to the huge burden of sickness and death of humans. In Nigeria, traditional ready-to-eat meat products (RTE-MPs) like balangu, tsire, guru and dried meat products like kilishi, dambun nama, banda, were reported to be highly appreciated because of their eating qualities. The consumption of these products was considered as safe due to the treatments that are usually involved during their production process. However, during processing and handling, the products could be contaminated by pathogens that could cause food poisoning. Therefore, a hazard identification for pathogenic bacteria on some traditional RTE-MPs was conducted in Kebbi and Sokoto States, Nigeria. A total of 116 RTE-MPs (balangu-38, kilishi-39 and tsire-39) samples were obtained from retail outlets and analyzed using standard cultural microbiological procedures in general and selective enrichment media to isolate the target pathogens. A six-fold serial dilution was prepared and using the pour plating method, colonies were counted. Serial dilutions were selected based on the prepared pre-labeled Petri dishes for each sample. A volume of 10-12 ml of molten Nutrient agar cooled to 42-45°C was poured into each Petri dish and 1 ml each from dilutions of 102, 104 and 106 for every sample was respectively poured on a pre-labeled Petri plate after which colonies were counted. The isolated pathogens were identified and confirmed after series of biochemical tests. Frequencies and percentages were used to describe the presence of pathogens. The General Linear Model was used to analyze data on pathogen presence according to RTE-MPs and means were separated using the Tukey test at 0.05 confidence level. Of the 116 RTE-MPs samples collected, 35 (30.17%) samples were found to be contaminated with some tested pathogens. Prevalence results showed that Escherichia coli, salmonella and Staphylococcus aureus were present in the samples. Mean total bacterial count was 23.82×106 cfu/g. The frequency of individual pathogens isolated was; Staphylococcus aureus 18 (15.51%), Escherichia coli 12 (10.34%) and Salmonella 5 (4.31%). Also, among the RTE-MPs tested, the total bacterial counts were found to differ significantly (P < 0.05), with 1.81, 2.41 and 2.9×104 cfu/g for tsire, kilishi, and balangu, respectively. The study concluded that the presence of pathogenic bacteria in balangu could pose grave health risks to consumers, and hence, recommended good manufacturing practices in the production of balangu to improve the products’ safety.

Keywords: Ready-to-eat meat products, retail outlets, safety assessment, public health.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1152
371 3D Numerical Analysis of Stone Columns Reinforced with Horizontal and Vertical Geosynthetic Materials

Authors: R. Ziaie Moayed, A. Khalili

Abstract:

Improvement and reinforcement of soils with poor strength and engineering properties for constructing low height structures or structures such as liquid storage tanks, bridge columns, and heavy structures have necessitated applying particular techniques. Stone columns are among the well-known methods applied in such soils. This method provides an economically justified way for improving engineering properties of soft clay and loose sandy soils. Stone column implementation in these soils increases their bearing capacity and reduces the settlement of foundation build on them. In the present study, the finite difference based FLAC3D software was used to investigate the performance and effect of soil reinforcement through stone columns without lining and those with geosynthetic lining with different levels of stiffness in horizontal and vertical modes in clayey soils. The results showed that soil improvement using stone columns with lining in vertical and horizontal modes results in improvement of bearing capacity and foundation settlement.

Keywords: Bearing capacity, FLAC3D, geosynthetic, settlement, stone column.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1058
370 Applying Systematic Literature Review and Delphi Methods to Explore Digital Transformation Key Success Factors

Authors: Ayman El-Garem, Riham Adel

Abstract:

Digital transformation is about identifying the necessary changes of the entire business model, rethinking how to transform the traditional operations into digital ones that can create better value to its customers. Efforts are common across industries, but they often fail due to a lack of understanding of the factors required to focus on and change to be able to embark in digital transformation successfully. Further research is required to bridge the knowledge gap between academia and industry to support companies starting their digital transformation journey. To date there is no consensus on digital transformation key success factors. Therefore, the aim of this paper is to identify the success factors in digital transformation journey, throughout conducting a systematic literature review of 134 peer-reviewed articles to get better insights regarding the research progress in this field.  After completing the systematic literature review it will be followed by Delphi study to get experts consensus on the most significant factors affecting digital transformation implementation. The findings indicate that organizations undergoing digital transformation should focus mainly on (1) well managed digital transformation activities; (2) digital business strategy; (3) supportive culture; (4) top management support; (5) organizational change capabilities.

Keywords: Digital transformation, key success factors, literature review, Delphi study.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 643
369 Stability of Essential Oils in Pang-Rum by Gas Chromatography-Mass Spectrometry

Authors: K. Jarmkom, P. Eakwaropas, W. Khobjai, S. Techaeoi

Abstract:

Ancient Thai perfumed powder was used as a fragrance for clothing, food, and the body. Plant-based natural Thai perfume products are known as Pang-Rum. The objective of this study was to evaluate the stability of essential oils after six months of incubation. The chemical compositions were determined by gas chromatography-mass spectrometry (GC-MS), in terms of the qualitative composition of the isolated essential oil. The isolation of the essential oil of natural products by incubate sample for 5 min at 40 ºC is described. The volatile components were identified by percentage of total peak areas comparing their retention times of GC chromatograph with NIST mass spectral library. The results show no significant difference in the seven chromatograms of perfumed powder (Pang-Rum) both with binder and without binder. Further identification was done by GC-MS. Some components of Pang-Rum with/without binder were changed by temperature and time.

Keywords: GC-MS analysis, essential oils, stability, Pang-Rum.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 984
368 MLOps Scaling Machine Learning Lifecycle in an Industrial Setting

Authors: Yizhen Zhao, Adam S. Z. Belloum, Gonc¸alo Maia da Costa, Zhiming Zhao

Abstract:

Machine learning has evolved from an area of academic research to a real-world applied field. This change comes with challenges, gaps and differences exist between common practices in academic environments and the ones in production environments. Following continuous integration, development and delivery practices in software engineering, similar trends have happened in machine learning (ML) systems, called MLOps. In this paper we propose a framework that helps to streamline and introduce best practices that facilitate the ML lifecycle in an industrial setting. This framework can be used as a template that can be customized to implement various machine learning experiments. The proposed framework is modular and can be recomposed to be adapted to various use cases (e.g. data versioning, remote training on Cloud). The framework inherits practices from DevOps and introduces other practices that are unique to the machine learning system (e.g.data versioning). Our MLOps practices automate the entire machine learning lifecycle, bridge the gap between development and operation.

Keywords: Cloud computing, continuous development, data versioning, DevOps, industrial setting, MLOps, machine learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 998
367 Utilization and Characterizations of Olive Oil Industry By-Products

Authors: Sawsan Dacrory, Hussein Abou-Yousef, Samir Kamel, Ragab E. Abou-Zeid, Mohamed S. Abdel-Aziz, Mohamed Elbadry

Abstract:

A considerable amount of lignocellulosic by-product could be obtained from olive pulp during olive oil extraction industry. The major constituents of the olive pulp are husks and seeds. The separation of each portion of olive pulp (seeds and husks) was carried out by water flotation where seeds were sediment in the bottom. Both seeds and husks were dignified by 15% NaOH followed by complete lignin removal by using sodium chlorite in acidic medium. The isolated holocellulose, α-cellulose, hydrogel and CMC of both seeds and husk fractions were characterized by FTIR and SEM. The present study focused on the investigation of the chemical components of the lignocellulosic fraction of olive pulp and using them in medical application. Carboxymethyl cellulose (CMC) is produced and applied in the preparation of antimicrobial hydrogel.

Keywords: Carboxymethyl cellulose, cellulose, hydrogel olive pulp.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1449
366 A Low Complexity Frequency Offset Estimation for MB-OFDM based UWB Systems

Authors: Wang Xue, Liu Dan, Liu Ying, Wang Molin, Qian Zhihong

Abstract:

A low-complexity, high-accurate frequency offset estimation for multi-band orthogonal frequency division multiplexing (MB-OFDM) based ultra-wide band systems is presented regarding different carrier frequency offsets, different channel frequency responses, different preamble patterns in different bands. Utilizing a half-cycle Constant Amplitude Zero Auto Correlation (CAZAC) sequence as the preamble sequence, the estimator with a semi-cross contrast scheme between two successive OFDM symbols is proposed. The CRLB and complexity of the proposed algorithm are derived. Compared to the reference estimators, the proposed method achieves significantly less complexity (about 50%) for all preamble patterns of the MB-OFDM systems. The CRLBs turn out to be of well performance.

Keywords: CAZAC, Frequency Offset, Semi-cross Contrast, MB-OFDM, UWB

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1623
365 Packet Losses Interpretation in Mobile Internet

Authors: Hossam el-ddin Mostafa, Pavel Čičak

Abstract:

The mobile users with Laptops need to have an efficient access to i.e. their home personal data or to the Internet from any place in the world, regardless of their location or point of attachment, especially while roaming outside the home subnet. An efficient interpretation of packet losses problem that is encountered from this roaming is to the centric of all aspects in this work, to be over-highlighted. The main previous works, such as BER-systems, Amigos, and ns-2 implementation that are considered to be in conjunction with that problem under study are reviewed and discussed. Their drawbacks and limitations, of stopping only at monitoring, and not to provide an actual solution for eliminating or even restricting these losses, are mentioned. Besides that, the framework around which we built a Triple-R sequence as a costeffective solution to eliminate the packet losses and bridge the gap between subnets, an area that until now has been largely neglected, is presented. The results show that, in addition to the high bit error rate of wireless mobile networks, mainly the low efficiency of mobile-IP registration procedure is a direct cause of these packet losses. Furthermore, the output of packet losses interpretation resulted an illustrated triangle of the registration process. This triangle should be further researched and analyzed in our future work.

Keywords: Amigos, BER-systems, ns-2 implementation, packetlosses, registration process, roaming.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1446
364 Crack Width Evaluation for Flexural RC Members with Axial Tension

Authors: Sukrit Ghorai

Abstract:

Proof of controlling crack width is a basic condition for securing suitable performance in serviceability limit state. The cracking in concrete can occur at any time from the casting of time to the years after the concrete has been set in place. Most codes struggle with offering procedure for crack width calculation. There is lack in availability of design charts for designers to compute crack width with ease. The focus of the study is to utilize design charts and parametric equations in calculating crack width with minimum error. The paper contains a simplified procedure to calculate crack width for reinforced concrete (RC) sections subjected to bending with axial tensile force following the guidelines of Euro code [DS EN-1992-1-1 & DS EN-1992-1-2]. Numerical examples demonstrate the application of the suggested procedure. Comparison with parallel analytical tools supports the validity of result and show the percentage deviation of crack width in both the procedures. The technique is simple, user friendly and ready to evolve for a greater spectrum of section sizes and materials.

Keywords: Concrete structures, crack width calculation, serviceability limit state, structural design, bridge engineering.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6628
363 Is the Expansion of High-Tech Leaders Possible Within the New EU Members? A Case Study of Ammono S.A. and the High-Tech Financing System in Poland

Authors: Monika Dwilinska

Abstract:

Innovations, especially technological, are considered key-drivers for sustainable economic growth and competitiveness in the globalised world. As such they should also play an important role in the process of economical convergence inside the EU. Unfortunately, the problem of insufficient innovation performance concerns around half of the EU countries. Poland shows that a lack of a consistent high-tech financing system constitutes a serious obstacle for the development of innovative firms. In this article we will evaluate these questions referring to the example of Ammono S.A., a Polish company established to develop and commercialise an original technology for the production of bulk GaN crystals. We will focus on its efforts to accumulate the financial resources necessary at different stages of its development. The purpose of this article is to suggest possible ways to improve the national innovative system, which would make it more competent in generating high-tech leaders.

Keywords: High-tech financing, innovation, national innovative system

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1262
362 New Analysis Methods on Strict Avalanche Criterion of S-Boxes

Authors: Phyu Phyu Mar, Khin Maung Latt

Abstract:

S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers, as well as stream ciphers). S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. They are used for confusion in data security An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes each output bit with probability one half. If a function (cryptographic transformation) is complete, then each output bit depends on all of the input bits. Thus, if it were possible to find the simplest Boolean expression for each output bit in terms of the input bits, each of these expressions would have to contain all of the input bits if the function is complete. From some important properties of S-box, the most interesting property SAC (Strict Avalanche Criterion) is presented and to analyze this property three analysis methods are proposed.

Keywords: S-boxes, cryptosystems, strict avalanche criterion, function, analysis methods.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3894
361 Object-Centric Process Mining Using Process Cubes

Authors: Anahita Farhang Ghahfarokhi, Alessandro Berti, Wil M.P. van der Aalst

Abstract:

Process mining provides ways to analyze business processes. Common process mining techniques consider the process as a whole. However, in real-life business processes, different behaviors exist that make the overall process too complex to interpret. Process comparison is a branch of process mining that isolates different behaviors of the process from each other by using process cubes. Process cubes organize event data using different dimensions. Each cell contains a set of events that can be used as an input to apply process mining techniques. Existing work on process cubes assume single case notions. However, in real processes, several case notions (e.g., order, item, package, etc.) are intertwined. Object-centric process mining is a new branch of process mining addressing multiple case notions in a process. To make a bridge between object-centric process mining and process comparison, we propose a process cube framework, which supports process cube operations such as slice and dice on object-centric event logs. To facilitate the comparison, the framework is integrated with several object-centric process discovery approaches.

Keywords: Process mining, multidimensional process mining, multi-perspective business processes, OLAP, process cubes, process discovery.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1067
360 A Study on Websites of Public and Private Hospitals in Konya

Authors: H. Nur Gorkemli, Mehmet Fidan

Abstract:

After the first acquaintance with internet in April 1993, number of internet users increased rapidly in Turkey. Almost half of the population between 16-74 age group use internet in the country. Hospitals are one of the areas where the internet is intensively being used like many other businesses. As a part of public relations application, websites are important tools for hospitals to reach a wide range of target audience within and outside the organization. With their websites, hospitals have opportunities to give information about their organization, strengthen their image, compete with their rivals, interact with shareholders, reflect their transparency and meet with new audiences. This study examines web sites of totally 34 hospitals which are located in Konya. Institutions are categorized as public and private hospitals and then three main research categories are determined: content, visual and technical. Main and sub categories are examined by using content analysis method. Results are interpreted in scope of public and private institutions and as a whole.

Keywords: Health Communication, Hospital, Internet, Webpages, Websites

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1611
359 Pervasive Computing in Healthcare Systems

Authors: Elham Rastegari, Amirmasood Rahmani, Saeed Setayeshi

Abstract:

The hospital and the health-care center of a community, as a place for people-s life-care and health-care settings, must provide more and better services for patients or residents. After Establishing Electronic Medical Record (EMR) system -which is a necessity- in the hospital, providing pervasive services is a further step. Our objective in this paper is to use pervasive computing in a case study of healthcare, based on EMR database that coordinates application services over network to form a service environment for medical and health-care. Our method also categorizes the hospital spaces into 3 spaces: Public spaces, Private spaces and Isolated spaces. Although, there are many projects about using pervasive computing in healthcare, but all of them concentrate on the disease recognition, designing smart cloths, or provide services only for patient. The proposed method is implemented in a hospital. The obtained results show that it is suitable for our purpose.

Keywords: Pervasive computing, RFID, Health-care.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2976
358 Carbon Storage in Above-Ground Biomass of Tropical Deciduous Forest in Ratchaburi Province, Thailand

Authors: Ubonwan Chaiyo, Savitri Garivait, Kobsak Wanthongchai

Abstract:

The study site was located in Ratchaburi Province, Thailand. Four experimental plots in dry dipterocarp forest (DDF) and four plots in mixed deciduous forest (MDF) were set up to estimate the above-ground biomass of tree, sapling and bamboo. The allometry equations were used to investigate above-ground biomass of these vegetation. Seedling and other understory were determined using direct harvesting method. Carbon storage in above-ground biomass was calculated based on IPCC 2006. The results showed that the above-ground biomass of DDF at 20-40% slope, <20% slope and MDF at <20% slope were 91.96, 30.95 and 59.44 ton/ha, respectively. Bamboo covers about half of total aboveground biomass in MDF, which is a specific characteristic of this area. The carbon sequestration potential in above-ground biomass of plot slope range 20-40% DDF, <20% DDF and <20% MDF are 43.22, 14.55 and 27.94 ton C/ha, respectively.

Keywords: Carbon storage, aboveground biomass, tropical deciduous forest, dry dipterocarp forest, mixed deciduous forest.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2922
357 Placement of Implants in Palatum of a Teenager without Maxillary Incisor Teeth

Authors: Luan Mavriqi, Ilma Robo, Emin Kuzimi, Egresa Baca

Abstract:

The process of skeletal growth in an adolescent significantly affects the displacement of implants placed in the palatine suture. The problems caused by this process have an impact on the dental function and aesthetics of the affected data. If fixed prostheses are placed based on implants, the whole structure would impede maxillary growth. This is the significant difference between the maxilla and the mandible, as the lower jaw has no growth process that affects the movement of the implants or the latter to inhibit the growth of the jaw. In a teenager patient an accident occurred accompanied by loss of maxillary central incisors. The main complaint of patients is aesthetics and phonetics. Dental history of patients refers to the presence of a Maryland bridge that was accompanied by dissatisfaction on the part of the patient. Implant placement is not indicated as jaw augmentation may lead to displacement of the implant. The treatment plan includes the placement of implants in the palatum where this bone thickness allows as a procedure.in this article only the first stage of treatment is presented. Implant treatment is ongoing, will be followed by the second phase of treatment when the patient has reached the age of 18 years.

Keywords: Implants, palatum, adolescent, primary incisor teeth.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 352
356 Constant Order Predictor Corrector Method for the Solution of Modeled Problems of First Order IVPs of ODEs

Authors: A. A. James, A. O. Adesanya, M. R. Odekunle, D. G. Yakubu

Abstract:

This paper examines the development of one step, five hybrid point method for the solution of first order initial value problems. We adopted the method of collocation and interpolation of power series approximate solution to generate a continuous linear multistep method. The continuous linear multistep method was evaluated at selected grid points to give the discrete linear multistep method. The method was implemented using a constant order predictor of order seven over an overlapping interval. The basic properties of the derived corrector was investigated and found to be zero stable, consistent and convergent. The region of absolute stability was also investigated. The method was tested on some numerical experiments and found to compete favorably with the existing methods.

Keywords: Interpolation, Approximate Solution, Collocation, Differential system, Half step, Converges, Block method, Efficiency.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2302
355 The Induction of Antioxidant Enzyme Activities in Cabbage Seedlings by Heavy Metal Stress

Authors: J. Kumchai, J. Z. Huang, C. Y. Lee, F. C. Chen, S. W. Chin

Abstract:

Cabbage seedlings grown in vitro were exposed to excess levels of heavy metals, including Cd, Mo, and Zn. High metal levels affected plant growth at cotyledonary stage. Seedlings under Cd, Mo, and Zn treatments could not produce root hairs and true leaves. Under stress conditions, seedlings accumulated a higher amount of anthocyanins in their cotyledons than those in the control. The pigments isolated from Cd and Zn stressed seedling cotyledons appeared as pink, while under Mo stress, was dark pink or purple. Moreover, excess Mo stress increased antioxidant enzyme activities of APX, CAT, SOD. These results suggest that, under excess Mo stress, the induced antioxidant enzyme activity of cabbage seedlings may function as a protective mechanism to shield the plants from toxicity and exacerbated growth.

Keywords: Anthocyanin, antioxidant enzyme activity, heavy metal, growth inhibition.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2257
354 Malware Detection in Mobile Devices by Analyzing Sequences of System Calls

Authors: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

With the increase in popularity of mobile devices, new and varied forms of malware have emerged. Consequently, the organizations for cyberdefense have echoed the need to deploy more effective defensive schemes adapted to the challenges posed by these recent monitoring environments. In order to contribute to their development, this paper presents a malware detection strategy for mobile devices based on sequence alignment algorithms. Unlike the previous proposals, only the system calls performed during the startup of applications are studied. In this way, it is possible to efficiently study in depth, the sequences of system calls executed by the applications just downloaded from app stores, and initialize them in a secure and isolated environment. As demonstrated in the performed experimentation, most of the analyzed malicious activities were successfully identified in their boot processes.

Keywords: Android, information security, intrusion detection systems, malware, mobile devices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1264
353 GPU-Accelerated Triangle Mesh Simplification Using Parallel Vertex Removal

Authors: Thomas Odaker, Dieter Kranzlmueller, Jens Volkert

Abstract:

We present an approach to triangle mesh simplification designed to be executed on the GPU. We use a quadric error metric to calculate an error value for each vertex of the mesh and order all vertices based on this value. This step is followed by the parallel removal of a number of vertices with the lowest calculated error values. To allow for the parallel removal of multiple vertices we use a set of per-vertex boundaries that prevent mesh foldovers even when simplification operations are performed on neighbouring vertices. We execute multiple iterations of the calculation of the vertex errors, ordering of the error values and removal of vertices until either a desired number of vertices remains in the mesh or a minimum error value is reached. This parallel approach is used to speed up the simplification process while maintaining mesh topology and avoiding foldovers at every step of the simplification.

Keywords: Computer graphics, half edge collapse, mesh simplification, precomputed simplification, topology preserving.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2760
352 Numerical Simulation and Experiment of a Lifting Body with Leading-Edge Rotating Cylinder

Authors: A. Badarudin, C. S. Oon, S. N. Kazi, N. Nik-Ghazali, Y. J. Lee, W. T. Chong

Abstract:

An experimental and simulation flight test has been carried out to evaluate the longitudinal gliding characteristics of a lifting body with blunted half-cone geometry. The novelty here is the lifting body's pitch control mechanism, which consists of a pair of leading-edge rotating cylinders. Flight simulation uses aerodynamic data from computational fluid dynamics supported by wind-tunnel test. Flight test consists of releasing an aluminum lifting body model from a moving vehicle at the appropriate wind speed while measuring the lifting body's variation of altitude against time of flight. Results show that leading-edge rotating cylinder is able to give small amounts of improvement to the longitudinal stability and pitch control to the lifting body.

Keywords: Lifting body, pitch control, aerodynamic, rotating cylinder.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1898
351 Study and Evaluation of Added Stresses under Foundation due to Adjacent Structure

Authors: Alireza M. goltabar, Issa shooshpasha , Reza Shamstabar kami , Mostafa Habibi

Abstract:

Added stresses due to adjacent structure should be considered in foundation design and stress control in soil under the structure. This case is considered less than other cases in design and calculation whereas stresses in implementation are greater than analytical stress. Structure load are transmitted to earth by foundation and role of foundation is propagation of load on the continuous and half extreme soil. This act cause that, present stresses lessen to allowable strength of soil. Some researchers such as Boussinesq and westergaurd by using of some assumption studied on this issue, theorically. Target of this paper is study and evaluation of added stresses under structure due to adjacent structure. For this purpose, by using of assumption, theoric relation and numeral methods, effects of adjacent structure with 4 to 10 storeys on the main structure with 4 storeys are studied and effect of parameters and sensitivity of them are evaluated.

Keywords: stress, soil, adjacent structure, foundation, loading.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1429
350 Effects of a Nectandra Membranacea Extract on Labeling of Blood Constituents with Technetium-99m and on the Morphology of Red Blood Cells

Authors: Silvana R.F. Moreno, Jorge J. Carvalho, Ana L. Nascimento, Mario Pereira, Luiz Q. A. Caldas, Mário Bernardo-Filho

Abstract:

The aim of this in vitro study was to evaluate the possible interference of a Nectandra membranacea extract (i) on the labeling of blood cells (BC), (ii) on the labeling process of BC and plasma (P) proteins with technetium-99m (Tc-99m) and (iii) on the morphology of red blood cells (RBC). Blood samples were incubated with a Nectandra membranacea crude extract, stannous chloride, Tc- 99m (sodium pertechnetate) was added, and soluble (SF) and insoluble (IF) fractions were isolated. Morphometry studies were performed with blood samples incubated with Nectandra membranacea extract. The results show that the Nectandra membranacea extract does not promote significant alteration of the labeling of BC, IF-P and IF-BC. The Nectandra membranacea extract was able to alter the erythrocyte membrane morphology, but these morphological changes were not capable to interfere on the labeling of blood constituents with Tc-99m.

Keywords: in vitro study, Nectandra membranacea, red bloodcell, technetium-99m

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1627
349 Threshold Based Region Incrementing Secret Sharing Scheme for Color Images

Authors: P. Mohamed Fathimal, P. Arockia Jansi Rani

Abstract:

In this era of online communication, which transacts data in 0s and 1s, confidentiality is a priced commodity. Ensuring safe transmission of encrypted data and their uncorrupted recovery is a matter of prime concern. Among the several techniques for secure sharing of images, this paper proposes a k out of n region incrementing image sharing scheme for color images. The highlight of this scheme is the use of simple Boolean and arithmetic operations for generating shares and the Lagrange interpolation polynomial for authenticating shares. Additionally, this scheme addresses problems faced by existing algorithms such as color reversal and pixel expansion. This paper regenerates the original secret image whereas the existing systems regenerates only the half toned secret image.

Keywords: Threshold Secret Sharing Scheme, Access Control, Steganography, Authentication, Secret Image Sharing, XOR, Pixel Expansion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1105
348 Changes of in vitro Cytokine Production induced by δ-Lactams

Authors: Y. Baba hamed, A. Medjdoub, H. Merzouk, M. Narce

Abstract:

The aim of this work was to study the in vitro effects of δ-lactam 1 and its 4-chlorophenyl derivative 2, on the proliferative responses of human lymphocytes and Th1 and Th2 cytokine secretion. The possible protective role of vitamin E on intracellular stress oxidative induced by these compounds was also investigated. Peripheral blood lymphocytes were isolated using differential centrifugation on a density gradient of Histopaque. They were cultured with mitogen concanavalin A, vitamin E (10 μM) and with different concentrations of the compounds 1 and 2 (0.1 to 10 μM). Proliferation (MTT assay), IL-2, INFγ and IL-4 (Elisa kits), intracellular superoxide anion were determined. 1 and 2 were immunostimulant and increased cytokine secretion with a shift away from Th1 response to Th2. These properties were however accompanied by an increase in intracellular oxidative stress. The presence of vitamin E exhibited protective effects by reducing δ- lactam-induced superoxide anion generation in lymphocytes.

Keywords: Cytokines, δ-Lactams, In vitro Lymphocyte Proliferation, Superoxide Anion

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3845