Search results for: location identification
708 Modification by the River Vaslui of the Hydrological Regime and Its Economic Implications (Romania)
Authors: Gheorghe Romanescu, IonuŃ V. Jora, Cristian Constantin Stoleriu
Abstract:
The influence of human activities produced by dams along the river beds is minor, but the location of accumulation of water directly influences the hydrological regime. The most important effect of the influence of damming on the way water flows decreases the frequency of floods. The water rate controls the water flow of the dams. These natural reservoirs become dysfunctional and, as a result, a new distribution of flow in the downstream sector, where maximum flow is, brings about, in this case, higher values. In addition to fishing, middle and lower courses of rivers located by accumulation also have a role in mitigating flood waves, thus providing flood protection. The Vaslui also ensures a good part of the needs of the town water supply. The most important lake is Solesti, close to the Vaslui River, opened in 1974. A hydrological regime of accumulation is related to an anthropogenic and natural drainage system. The design conditions and their manoeuvres drain or fill the water courses.
Keywords: Hydraulic works, hydrological regime, average flow, repeat flow.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1480707 A Descriptive Study of Self-Compassion in Polytechnic Students in Indonesia
Authors: Emma Dwi Ariyani, Dini Hadiani
Abstract:
This article reports the descriptive analysis of self-compassion in polytechnic students. It has been long believed that self-compassion can improve students’ motivation in completing their studies. This research was conducted with the aim to see the degree of self-compassion in polytechnic students in Indonesia by using Neff's Self-Compassion Scale (short form) measurement tool consisting of 12 items. The research method used was descriptive study with survey technique on 255 students. The results showed that 78% of students had low self-compassion and 22% had high self-compassion. This revealed that polytechnic students still criticize themselves harshly, make a poor judgment and bad self-appraisal, and they also cannot accept their imperfection and consider it as a self-judgment. The students also tend to think that they are the only ones that experience failure and suffering. This can lead to a sense of isolation (self-isolation). Furthermore, the students are often too concerned with aspects that are not liked both in themselves and in life (over-identification). Improving the students’ level of self-compassion can be done by building an educational climate that not only criticizes the students but provides feedback as well. This should focus on the students’ real behavior rather than the students’ general character.
Keywords: Descriptive study, polytechnic students, Indonesia, self-compassion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1012706 Innovation Strategies and Challenges in Emerging Economies: The Case of Research and Technology Organizations in Turkey
Authors: F. Demir
Abstract:
Innovation is highly critical for every company, especially for technology-based organizations looking to sustain their competitive advantage. However, this is not an easy task. Regardless of the size of the enterprise, market and location, all organizations face numerous challenges. Even though huge barriers to innovation exist in different countries, firm- and industry-specific challenges can be distinguished. This paper examines innovation strategies and obstacles to innovation in research and technology organizations (RTO) of Turkey. From the most important to the least, nine different challenges are ranked according the results of this survey. The findings reveal that to take the lead in innovation, financial constraint is the biggest challenge, which is consistent with the related literature. It ranked number one in this study. Beyond that, based on a sample of 40 RTOs, regional challenges such as underdeveloped regional innovation ecosystem plays a significant role in hampering innovation. Most of the organizations (55%) embrace an incremental approach to innovation, while only few pursue radical shifts. About 40% of the RTOs focus on product innovation, and 27.5% of them concentrate on technological innovation, while a very limited number aim for operational excellence and customer engagement as the focus of their strategic innovation efforts.
Keywords: Innovation strategies, innovation challenges, emerging economies, research and technology organizations.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1307705 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.
Keywords: Attack modeling, crime commission process, crime script, situational crime prevention.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 707704 Hit-or-Miss Transform as a Tool for Similar Shape Detection
Authors: Osama Mohamed Elrajubi, Idris El-Feghi, Mohamed Abu Baker Saghayer
Abstract:
This paper describes an identification of specific shapes within binary images using the morphological Hit-or-Miss Transform (HMT). Hit-or-Miss transform is a general binary morphological operation that can be used in searching of particular patterns of foreground and background pixels in an image. It is actually a basic operation of binary morphology since almost all other binary morphological operators are derived from it. The input of this method is a binary image and a structuring element (a template which will be searched in a binary image) while the output is another binary image. In this paper a modification of Hit-or-Miss transform has been proposed. The accuracy of algorithm is adjusted according to the similarity of the template and the sought template. The implementation of this method has been done by C language. The algorithm has been tested on several images and the results have shown that this new method can be used for similar shape detection.
Keywords: Hit-or/and-Miss Operator/Transform, HMT, binary morphological operation, shape detection, binary images processing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5127703 Implementing a Prototype System for Power Facility Management using RFID/WSN
Authors: Young-Il Kim, Bong-Jae Yi, Jae-Ju Song, Jin-Ho Shin, Jung-Il Lee
Abstract:
Firstly, research and development on RFID focuses on manufacturing and retail sectors, because it can improve supply chain efficiency. But, now a variety of field is considered the next research area for Radio Frequency Identification (RFID). Although RFID is infancy, RFID technology has great potential in power industry to significantly reduce cost, and improve quality of power supply. To complement the limitation of RFID, we adopt the WSN (Wireless Sensor Network) technology. However, relevant experience is limited, the challenge will be to derive requirement from business practice and to determine whether it is possible or not. To explore this issue, we conduct a case study on implementing power facility management system using RFID/WSN in Korea Electric Power Corporation (KEPCO). In this paper we describe requirement from power industry. And we introduce design and implementation of the test bed.Keywords: Power Facility Management, RFID/WSN, Transmission Tower, Underground Tunnel, ZigBee.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1900702 Confirming the Identity of the Individual Using Remote Assessment in E-learning
Authors: Olaf Hallan Graven, Lachlan MacKinnon
Abstract:
One major issue that is regularly cited as a block to the widespread use of online assessments in eLearning, is that of the authentication of the student and the level of confidence that an assessor can have that the assessment was actually completed by that student. Currently, this issue is either ignored, in which case confidence in the assessment and any ensuing qualification is damaged, or else assessments are conducted at central, controlled locations at specified times, losing the benefits of the distributed nature of the learning programme. Particularly as we move towards constructivist models of learning, with intentions towards achieving heutagogic learning environments, the benefits of a properly managed online assessment system are clear. Here we discuss some of the approaches that could be adopted to address these issues, looking at the use of existing security and biometric techniques, combined with some novel behavioural elements. These approaches offer the opportunity to validate the student on accessing an assessment, on submission, and also during the actual production of the assessment. These techniques are currently under development in the DECADE project, and future work will evaluate and report their use..Keywords: E-learning, remote identification, assessment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1437701 TiO2-Zeolite Y Catalyst Prepared Using Impregnation and Ion-Exchange Method for Sonocatalytic Degradation of Amaranth Dye in Aqueous Solution
Authors: Atheel Hassan Alwash, Ahmad Zuhairi Abdullah, Norli Ismail
Abstract:
Characteristics and sonocatalytic activity of zeolite Y catalysts loaded with TiO2 using impregnation and ion exchange methods for the degradation of amaranth dye were investigated. The Ion-exchange method was used to encapsulate the TiO2 into the internal pores of the zeolite while the incorporation of TiO2 mostly on the external surface of zeolite was carried out using the impregnation method. Different characterization techniques were used to elucidate the physicochemical properties of the produced catalysts. The framework of zeolite Y remained virtually unchanged after the encapsulation of TiO2 while the crystallinity of zeolite decreased significantly after the incorporation of 15 wt% of TiO2. The sonocatalytic activity was enhanced by TiO2 incorporation with maximum degradation efficiencies of 50% and 68% for the encapsulated titanium and titanium loaded onto the zeolite, respectively after 120min of reaction. Catalysts characteristics and sonocatalytic behaviors were significantly affected by the preparation method and the location of TiO2 introduced with zeolite structure. Behaviors in the sonocatalytic process were successfully correlated with the characteristics of the catalysts used.Keywords: Sonocatalytic degradation, TiO2 loaded, ionexchange, impregnation, amaranth dye, process behavior.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4320700 Conceptual Analysis of Correspondence between Plantar Pressure and Corrective Insoles
Authors: Diana Cotoros, Mihaela Baritz, Anca Stanciu
Abstract:
Some theoretical and experimental aspects related to the conceptual analyses concerning the direct correspondence identification between the shape, area and orientation of plantar pressure and obtaining adequate corrective insoles by rapid prototyping are presented in this paper. In the first part of the paper there is the theoretical-correlative concept, which is the fundament of correspondence deduction between plantar surface characteristics and respectively corrective insoles. In the second part of the paper the experimental equipment used to analyze and perform the correspondence stages and then the integral ones between the analyzed foot shapes and the ones with corrective insoles is presented. In the final parte the results used to adapt the insoles obtained by rapid prototyping but also some specific aspects and conclusions of the conceptual analysis of direct and rapid correspondence are shown.Keywords: Insoles, plantar surface, rapid prototyping, correspondence concept
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2069699 Some Characteristics and Identification of Fungi Contaminated by Alkomos Cement Factory
Authors: Abdulmajeed Bashir Mlitan, Ethan Hack
Abstract:
Soil samples were collected from and around Alkomos cement factory, Alkomos town, Libya. Soil physiochemical properties were determined. In addition, olive leaves were scanned for their fungal content. This work can conclude that the results obtained for the examined physiochemical characteristics of soil in the area studied prove that cement dust from the Alkomos cement factory in Libya has had a significant impact on the soil. The affected soil properties are pH and total calcium content. These characteristics were found to be higher than those in similar soils from the same area. The increment of soil pH in the same area may be a result of precipitation of cement dust over the years. Different responses were found in each season and each site. For instance, the dominance of fungi of soil and leaves was lowest at 100 m from the factory and the evenness and diversity increased at this site compared to the control area and 250 m from the factory.Keywords: Pollution, Soil Microbial, Alkomos, Libya.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1327698 Urban Growth, Sewerage Network and Flooding Risk: Flooding of November 10, 2001 in Algiers
Authors: Boualem El Kechebour, Djilali Benouar
Abstract:
The objective of this work is to present a expertise on flooding hazard analysis and how to reduce the risk. The analysis concerns the disaster induced by the flood on November 10/11, 2001 in the Bab El Oued district of the city of Algiers.The study begins by an expertise of damages in related with the urban environment and the history of the urban growth of the site. After this phase, the work is focalized on the identification of the existing correlations between the development of the town and its vulnerability. The final step consists to elaborate the interpretations on the interactions between the urban growth, the sewerage network and the vulnerability of the urban system.In conclusion, several recommendations are formulated permitting the mitigation of the risk in the future. The principal recommendations concern the new urban operations and the existing urbanized sites.Keywords: urban growth, sewerage network, vulnerability of town, flooding risk, mitigation
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1648697 Developing New Media Credibility Scale: A Multidimensional Perspective
Authors: Hanaa Farouk Saleh
Abstract:
The main purposes of this study are to develop a scale that reflects emerging theoretical understandings of new media credibility, based on the evolution of credibility studies in western researches, identification of the determinants of credibility in the media and its components by comparing traditional and new media credibility scales and building accumulative scale to test new media credibility. This approach was built on western researches using conceptualizations of media credibility, which focuses on four principal components: Source (journalist), message (article), medium (newspaper, radio, TV, web, etc.), and organization (owner of the medium), and adding user and cultural context as key components to assess new media credibility in particular. This study’s value lies in its contribution to the conceptualization and development of new media credibility through the creation of a theoretical measurement tool. Future studies should explore this scale to test new media credibility, which represents a promising new approach in the efforts to define and measure credibility of all media types.Keywords: Credibility scale, media credibility components, new media credibility scale, scale development.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2880696 Cryptography Over Elliptic Curve Of The Ring Fq[e], e4 = 0
Authors: Chillali Abdelhakim
Abstract:
Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be inestimable building blocks for cryptographic applications. They are at the heart of numerous protocols such as key agreements, public-key cryptosystems, digital signatures, identification schemes, publicly verifiable secret sharings, hash functions and bit commitments. The search for new groups with intractable DLP is therefore of great importance.The goal of this article is to study elliptic curves over the ring Fq[], with Fq a finite field of order q and with the relation n = 0, n ≥ 3. The motivation for this work came from the observation that several practical discrete logarithm-based cryptosystems, such as ElGamal, the Elliptic Curve Cryptosystems . In a first time, we describe these curves defined over a ring. Then, we study the algorithmic properties by proposing effective implementations for representing the elements and the group law. In anther article we study their cryptographic properties, an attack of the elliptic discrete logarithm problem, a new cryptosystem over these curves.
Keywords: Elliptic Curve Over Ring, Discrete Logarithm Problem.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3583695 Formation of Protective Silicide-Aluminide Coating on Gamma-TiAl Advanced Material
Authors: S. Nouri
Abstract:
In this study, the Si-aluminide coating was prepared on gamma-TiAl [Ti-45Al-2Nb-2Mn-1B (at. %)] via liquid-phase slurry procedure. The high temperature oxidation resistance of this diffusion coating was evaluated at 1100 °C for 400 hours. The results of the isothermal oxidation showed that the formation of Si-aluminide coating can remarkably improve the high temperature oxidation of bare gamma-TiAl alloy. The identification of oxide scale microstructure showed that the formation of protective Al2O3+SiO2 mixed oxide scale along with a continuous, compact and uniform layer of Ti5Si3 beneath the surface oxide scale can act as an oxygen diffusion barrier during the high temperature oxidation. The other possible mechanisms related to the formation of Si-aluminide coating and oxide scales were also discussed.
Keywords: Gamma-TiAl alloy, Si-aluminide coating, slurry procedure, high temperature oxidation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 671694 Food Deserts and the Sociology of Space: Distance to Food Retailers and Food Insecurity in an Urban American Neighborhood
Authors: Brian J. Thomas
Abstract:
Recent changes in food retailing structure have led to the development of large supercenters in suburban areas of the United States. These changes have led some authors to suggest that there are food deserts in some urban areas, where food is difficult to access, especially for disadvantaged consumers. This study tests the food desert hypothesis by comparing the distance from food retailers to food secure and food insecure households in one urban, Midwest neighborhood. This study utilizes GIS to compare household survey respondent locations against the location of various types of area food retailers. Results of this study indicate no apparent difference between food secure and insecure households in the reported importance of distance on the decision to shop at various retailers. However, there were differences in the spatial relationship between households and retailers. Food insecure households tended to be located slightly farther from large food retailers and slightly closer to convenience stores. Furthermore, food insecure households reported traveling slightly farther to their primary food retailer. The differences between the two groups was, however, relatively small.
Keywords: Food desert, food retailer, food security, sociology.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6226693 Application of Remote Sensing in Development of Green Space
Authors: Mehdi Saati, Mohammad Bagheri, Fatemeh Zamanian
Abstract:
One of the most important parameters to develop and manage urban areas is appropriate selection of land surface to develop green spaces in these areas. In this study, in order to identify the most appropriate sites and areas cultivated for ornamental species in Jiroft, Landsat Enhanced Thematic Mapper Plus (ETM+) images due to extract the most important effective climatic and adaphic parameters for growth ornamental species were used. After geometric and atmospheric corrections applied, to enhance accuracy of multi spectral (XS) bands, the fusion of Landsat XS bands by IRS-1D panchromatic band (PAN) was performed. After field sampling to evaluate the correlation between different factors in surface soil sampling location and different bands digital number (DN) of ETM+ sensor on the same points, correlation tables formed using the best computational model and the map of physical and chemical parameters of soil was produced. Then the accuracy of them was investigated by using kappa coefficient. Finally, according to produced maps, the best areas for cultivation of recommended species were introduced.Keywords: Locate ornamental species, Remote Sensing, Adaphic parameters, ETM+, Jiroft
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2470692 Identify Features and Parameters to Devise an Accurate Intrusion Detection System Using Artificial Neural Network
Authors: Saman M. Abdulla, Najla B. Al-Dabagh, Omar Zakaria
Abstract:
The aim of this article is to explain how features of attacks could be extracted from the packets. It also explains how vectors could be built and then applied to the input of any analysis stage. For analyzing, the work deploys the Feedforward-Back propagation neural network to act as misuse intrusion detection system. It uses ten types if attacks as example for training and testing the neural network. It explains how the packets are analyzed to extract features. The work shows how selecting the right features, building correct vectors and how correct identification of the training methods with nodes- number in hidden layer of any neural network affecting the accuracy of system. In addition, the work shows how to get values of optimal weights and use them to initialize the Artificial Neural Network.
Keywords: Artificial Neural Network, Attack Features, MisuseIntrusion Detection System, Training Parameters.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2282691 Computational Identification of MicroRNAs and their Targets in two Species of Evergreen Spruce Tree (Picea)
Authors: Muhammad Y.K. Barozai, Ifthikhar A. Baloch, M. Din
Abstract:
MicroRNAs (miRNAs) are small, non-coding and regulatory RNAs about 20 to 24 nucleotides long. Their conserved nature among the various organisms makes them a good source of new miRNAs discovery by comparative genomics approach. The study resulted in 21 miRNAs of 20 pre-miRNAs belonging to 16 families (miR156, 157, 158, 164, 165, 168, 169, 172, 319, 390, 393, 394, 395, 400, 472 and 861) in evergreen spruce tree (Picea). The miRNA families; miR 157, 158, 164, 165, 168, 169, 319, 390, 393, 394, 400, 472 and 861 are reported for the first time in the Picea. All 20 miRNA precursors form stable minimum free energy stem-loop structure as their orthologues form in Arabidopsis and the mature miRNA reside in the stem portion of the stem loop structure. Sixteen (16) miRNAs are from Picea glauca and five (5) belong to Picea sitchensis. Their targets consist of transcription factors, growth related, stressed related and hypothetical proteins.Keywords: BLAST, Comparative Genomics, Micro-RNAs, Spruce
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2053690 In silico Analysis of Isoniazid Resistance in Mycobacterium tuberculosis
Authors: A. Nusrath Unissa, Sameer Hassan, Luke Elizabeth Hanna
Abstract:
Altered drug binding may be an important factor in isoniazid (INH) resistance, rather than major changes in the enzyme’s activity as a catalase or peroxidase (KatG). The identification of structural or functional defects in the mutant KatGs responsible for INH resistance remains as an area to be explored. In this connection, the differences in the binding affinity between wild-type (WT) and mutants of KatG were investigated, through the generation of three mutants of KatG, Ser315Thr [S315T], Ser315Asn [S315N], Ser315Arg [S315R] and a WT [S315]) with the help of software-MODELLER. The mutants were docked with INH using the software-GOLD. The affinity is lower for WT than mutant, suggesting the tight binding of INH with the mutant protein compared to WT type. These models provide the in silico evidence for the binding interaction of KatG with INH and implicate the basis for rationalization of INH resistance in naturally occurring KatG mutant strains of Mycobacterium tuberculosis.
Keywords: Mycobacterium tuberculosis, KatG, INH resistance, Mutants, Modeling, Docking.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2989689 Ecological Risk Assessment of Poly Aromatic Hydrocarbons in the North Port, Malaysia
Authors: Belin Tavakoly Sany, Aishah Salleh, Abdul Halim Sulaiman, Ghazaleh Monazami Tehrani
Abstract:
The pollution of sediments sampled from the North Port by polycyclic aromatic hydrocarbons (PAHs) was investigated. Concentrations of PAHs estimated in the port sediments ranged from 199 to 2851.2 μg/kg dw. The highest concentration was found which is closed to the Berth line, this locations affected by intensive shipping activities and Land based runoff and they were dominated by the high molecular weight PAHs (4–6- rings). Source identification showed that PAHs originated mostly from the pyrogenic source either from the combustion of fossil fuels, grass, wood and coal (majority of the samples). Ecological Risk Assessment on the port sediments presented that slightly adverse ecological effects to biological community are expected to occur at the vicinity of the stations 1 and 4. Thus PAHs are not considered as pollutants of concern in the North Port.Keywords: PAHs, North Port, Ecological Risk, sediment
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1841688 The Antimicrobial Activity of the Essential Oil of Salvia officinalis Harvested in Boumerdes
Authors: N. Meziou-Chebouti, A. Merabet, N. Behidj, F-Z. Bissaad
Abstract:
The Algeria by its location offers a rich and diverse vegetation. A large number of aromatic and medicinal plants grow spontaneously. The interest in these plants has continued to grow in recent years. Their particular properties due to the essential oil fraction can be utilized to treat microbial infections. To this end, and in the context of the valuation of the Algerian flora, we became interested in the species of the family Lamiaceae which is one of the most used as a global source of spices. The plant on which we have based our choice is a species of sage "Salvia officinalis" from the Isser localized region within the province of Boumerdes. This work focuses on the study of the antimicrobial activity of essential oil extracted from the leaves of Salvia officinalis. The extraction is carried out by essential oil hydrodistillation and reveals a yield of 1.06℅. The study of the antimicrobial activity of the essential oil by the method of at aromatogramme shown that Gram positive bacteria are most susceptible (Staphylococcus aureus and Bacillus subtilis) with a strong inhibition of growth. The yeast Candida albicans fungus Aspergillus niger and have shown moderately sensitive.
Keywords: Aromatogram, anti-microbial activity, essential oil, Salvia officinalis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1854687 Statistical Analysis of the Factors that Influence the Properties of Blueberries from Cultivar Bluecrop
Authors: Raquel P. F. Guiné, Susana R. Matos, Daniela V. T. A. Costa, Fernando J. Gonçalves
Abstract:
Because blueberries are worldwide recognized as a good source of beneficial components, their consumption has increased in the past decades, and so have the scientific works about their properties. Hence, this work was undertaken to evaluate the effect of some production and conservation factors on the properties of blueberries from cultivar Bluecrop. The physical and chemical analyses were done according to established methodologies and then all data was treated using software SPSS for assessment of the possible differences among the factors investigated and/or the correlations between the variables at study. The results showed that location of production influenced some of the berries properties (caliber, sugars, antioxidant activity, color and texture) and that the age of the bushes was correlated with moisture, sugars and acidity, as well as lightness. On the other hand, altitude of the farm only was correlated to sugar content. With regards to conservation, it influenced only anthocyanins content and DPPH antioxidant activity. Finally, the type of extract and the order of extraction had a pronounced influence on all the phenolic properties evaluated.Keywords: Antioxidant activity, blueberry, conservation, geographical origin, phenolic compounds, statistical analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2128686 Grid-Connected Photovoltaic System: System Overview and Sizing Principles
Authors: Najiya Omar, Hamed Aly, Timothy Little
Abstract:
The optimal size of a photovoltaic (PV) array is considered a critical factor in designing an efficient PV system due to the dependence of the PV cell performance on temperature. A high temperature can lead to voltage losses of solar panels, whereas a low temperature can cause voltage overproduction. There are two possible scenarios of the inverter’s operation in which they are associated with the erroneous calculations of the number of PV panels: 1) If the number of the panels is scant and the temperature is high, the minimum voltage required to operate the inverter will not be reached. As a result, the inverter will shut down. 2) Comparably, if the number of panels is excessive and the temperature is low, the produced voltage will be more than the maximum limit of the inverter which can cause the inverter to get disconnected or even damaged. This article aims to assess theoretical and practical methodologies to calculate size and determine the topology of a PV array. The results are validated by applying an experimental evaluation for a 100 kW Grid-connected PV system for a location in Halifax, Nova Scotia and achieving a satisfactory system performance compared to the previous work done.
Keywords: Sizing PV panels, grid-connected PV, topology of PV array, theoretical and practical methodologies.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 820685 Spatial Analysis of Park and Ride Users’ Dynamic Accessibility to Train Station: A Case Study in Perth
Authors: Ting (Grace) Lin, Jianhong (Cecilia) Xia, Todd Robinson
Abstract:
Accessibility analysis, examining people’s ability to access facilities and destinations, is a fundamental assessment for transport planning, policy making, and social exclusion research. Dynamic accessibility which measures accessibility in real-time traffic environment has been an advanced accessibility indicator in transport research. It is also a useful indicator to help travelers to understand travel time daily variability, assists traffic engineers to monitor traffic congestions, and finally develop effective strategies in order to mitigate traffic congestions. This research involved real-time traffic information by collecting travel time data with 15-minute interval via the TomTom® API. A framework for measuring dynamic accessibility was then developed based on the gravity theory and accessibility dichotomy theory through space and time interpolation. Finally, the dynamic accessibility can be derived at any given time and location under dynamic accessibility spatial analysis framework.
Keywords: Dynamic accessibility, space-time continuum, transport research, TomTom® API.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1083684 Numerical Investigation of Heat Transfer in a Channel with Delta Winglet Vortex Generators at Different Reynolds Numbers
Authors: N. K. Singh
Abstract:
In this study the augmentation of heat transfer in a rectangular channel with triangular vortex generators is evaluated. The span wise averaged Nusselt number, mean temperature and total heat flux are compared with and without vortex generators in the channel at a blade angle of 30° for Reynolds numbers 800, 1200, 1600, and 2000. The use of vortex generators increases the span wise averaged Nusselt number compared to the case without vortex generators considerably. At a particular blade angle, increasing the Reynolds number results in an enhancement in the overall performance and span wise averaged Nusselt number was found to be greater at particular location for larger Reynolds number. The total heat flux from the bottom wall with vortex generators was found to be greater than that without vortex generators and the difference increases with increase in Reynolds number.
Keywords: Heat transfer, channel with vortex generators, numerical simulation, effect of Reynolds number on heat transfer.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2438683 Assessing Land Cover Change Trajectories in Olomouc, Czech Republic
Authors: Mukesh Singh Boori, Vít Voženílek
Abstract:
Olomouc is a unique and complex landmark with widespread forestation and land use. This research work was conducted to assess important and complex land use change trajectories in Olomouc region. Multi-temporal satellite data from 1991, 2001 and 2013 were used to extract land use/cover types by object oriented classification method. To achieve the objectives, three different aspects were used: (1) Calculate the quantity of each transition; (2) Allocate location based landscape pattern (3) Compare land use/cover evaluation procedure. Land cover change trajectories shows that 16.69% agriculture, 54.33% forest and 21.98% other areas (settlement, pasture and water-body) were stable in all three decade. Approximately 30% of the study area maintained as a same land cove type from 1991 to 2013. Here broad scale of political and socioeconomic factors was also affect the rate and direction of landscape changes. Distance from the settlements was the most important predictor of land cover change trajectories. This showed that most of landscape trajectories were caused by socio-economic activities and mainly led to virtuous change on the ecological environment.
Keywords: Remote Sensing, land use/cover, Change trajectories, Image classification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2866682 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.
Keywords: Authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 615681 A Comparative Study of Turbulence Models Performance for Turbulent Flow in a Planar Asymmetric Diffuser
Authors: Samy M. El-Behery, Mofreh H. Hamed
Abstract:
This paper presents a computational study of the separated flow in a planer asymmetric diffuser. The steady RANS equations for turbulent incompressible fluid flow and six turbulence closures are used in the present study. The commercial software code, FLUENT 6.3.26, was used for solving the set of governing equations using various turbulence models. Five of the used turbulence models are available directly in the code while the v2-f turbulence model was implemented via User Defined Scalars (UDS) and User Defined Functions (UDF). A series of computational analysis is performed to assess the performance of turbulence models at different grid density. The results show that the standard k-ω, SST k-ω and v2-f models clearly performed better than other models when an adverse pressure gradient was present. The RSM model shows an acceptable agreement with the velocity and turbulent kinetic energy profiles but it failed to predict the location of separation and attachment points. The standard k-ε and the low-Re k- ε delivered very poor results.
Keywords: Turbulence models, turbulent flow, wall functions, separation, reattachment, diffuser.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3769680 Quantifying Mobility of Urban Inhabitant Based on Social Media Data
Authors: Yuyun, Fritz Akhmad Nuzir, Bart Julien Dewancker
Abstract:
Check-in locations on social media provide information about an individual’s location. The millions of units of data generated from these sites provide knowledge for human activity. In this research, we used a geolocation service and users’ texts posted on Twitter social media to analyze human mobility. Our research will answer the questions; what are the movement patterns of a citizen? And, how far do people travel in the city? We explore the people trajectory of 201,118 check-ins and 22,318 users over a period of one month in Makassar city, Indonesia. To accommodate individual mobility, the authors only analyze the users with check-in activity greater than 30 times. We used sampling method with a systematic sampling approach to assign the research sample. The study found that the individual movement shows a high degree of regularity and intensity in certain places. The other finding found that the average distance an urban inhabitant can travel per day is as far as 9.6 km.
Keywords: Mobility, check-in, distance, Twitter.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 799679 Microorganisms Isolated from Surgical Wounds Infection and Treatment with Different Natural Products and Medications
Authors: Amany S. Youssef, Suzan A.M. El Feky, Samy A. El-Asser, Rasha A.M. Abd Allah
Abstract:
Surgical site infections (SSIs) are the most common nosocomial infection in surgical patients resulting in significant increases in postoperative morbidity and mortality. The commonly causative bacteria developed resistance to virtually all antibiotics available. The aim of this study was to isolation and identification the most common bacteria that cause SSIs in Medical Research Institute, and to compare their sensitivity to selected group of antibiotics and natural products (garlic, oregano, olive, and Nigella sativa oils). The isolated pathogens collected from infected surgical wounds were identified, and their sensitivities to the antibiotics commonly available for clinical use, and also to the different concentrations of the used natural products were investigated. The results indicate to the potential therapeutic effect of the tested natural products in treatment of surgical wound infections.Keywords: Surgical wounds, multi-resistant bacteria, bacterial sensitivity, natural oils.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2024