Search results for: food security status
968 Enhance Performance of Secure Image Using Wavelet Compression
Authors: Goh Han Keat, Azman Samsudin Zurinahni Zainol
Abstract:
The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.
Keywords: Embedded Zerotree Wavelet (EZW), Imagecompression, Wavelet encoder, Entropy encoder, Encryption.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1670967 Comparison between Different Classifications of Periodontal Diseases and Their Advantages
Authors: Ilma Robo, Saimir Heta, Merilda Tarja, Sonila Kapaj, Eduart Kapaj, Geriona Lasku
Abstract:
The classification of periodontal diseases has changed significantly in favor of simplifying the protocol of diagnosis and periodontal treatment. This review study aims to highlight the latest publications in the new periodontal disease classification, talking about the most significant differences versus the old classification with the tendency to express the advantages or disadvantages of clinical application. The aim of the study also includes the growing tendency to link the way of classification of periodontal diseases with predetermined protocols of periodontal treatment of the diagnoses included in the classification. The new classification of periodontal diseases is rather comprehensive in its subdivisions, as the disease is viewed in its entirety, with the biological dimensions of the disease, the degree of aggravation and progression of the disease, in relation to risk factors, predisposition to patient susceptibility and impact of periodontal disease to the general health status of the patient.
Keywords: Periodontal diseases, clinical application, periodontal treatment, oral diagnosis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 596966 Remote Monitoring and Control System of Potentiostat Based on the Internet of Things
Authors: Liang Zhao, Guangwen Wang, Guichang Liu
Abstract:
Constant potometer is an important component of pipeline anti-corrosion systems in the chemical industry. Based on Internet of Things (IoT) technology, Programmable Logic Controller (PLC) technology and database technology, this paper developed a set of a constant potometer remote monitoring management system. The remote monitoring and remote adjustment of the working status of the constant potometer are realized. The system has real-time data display, historical data query, alarm push management, user permission management, and supporting Web access and mobile client application (APP) access. The actual engineering project test results show the stability of the system, which can be widely used in cathodic protection systems.
Keywords: Internet of Things, pipe corrosion protection, potentiostat, remote monitoring.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 971965 Importance of Macromineral Ratios and Products in Association with Vitamin D in Pediatric Obesity Including Metabolic Syndrome
Authors: Mustafa M. Donma, Orkide Donma
Abstract:
Metabolisms of macrominerals, those of calcium, phosphorus and magnesium, are closely associated with the metabolism of vitamin D. Particularly magnesium, the second most abundant intracellular cation, is related to biochemical and metabolic processes in the body, such as those of carbohydrates, proteins and lipids. The status of each mineral was investigated in obesity to some extent. Their products and ratios may possibly give much more detailed information about the matter. The aim of this study is to investigate possible relations between each macromineral and some obesity-related parameters. This study was performed on 235 children, whose ages were between 06-18 years. Aside from anthropometric measurements, hematological analyses were performed. TANITA body composition monitor using bioelectrical impedance analysis technology was used to establish some obesity-related parameters including basal metabolic rate (BMR), total fat, mineral and muscle masses. World Health Organization body mass index (BMI) percentiles for age and sex were used to constitute the groups. The values above 99th percentile were defined as morbid obesity. Those between 95th and 99th percentiles were included into the obese group. The overweight group comprised of children whose percentiles were between 95 and 85. Children between the 85th and 15th percentiles were defined as normal. Metabolic syndrome (MetS) components (waist circumference, fasting blood glucose, triacylglycerol, high density lipoprotein cholesterol, systolic pressure, diastolic pressure) were determined. High performance liquid chromatography was used to determine Vitamin D status by measuring 25-hydroxy cholecalciferol (25-hydroxy vitamin D3, 25(OH)D). Vitamin D values above 30.0 ng/ml were accepted as sufficient. SPSS statistical package program was used for the evaluation of data. The statistical significance degree was accepted as p < 0.05. The important points were the correlations found between vitamin D and magnesium as well as phosphorus (p < 0.05) that existed in the group with normal BMI values. These correlations were lost in the other groups. The ratio of phosphorus to magnesium was even much more highly correlated with vitamin D (p < 0.001). The negative correlation between magnesium and total fat mass (p < 0.01) was confined to the MetS group showing the inverse relationship between magnesium levels and obesity degree. In this group, calcium*magnesium product exhibited the highest correlation with total fat mass (p < 0.001) among all groups. Only in the MetS group was a negative correlation found between BMR and calcium*magnesium product (p < 0.05). In conclusion, magnesium is located at the center of attraction concerning its relationships with vitamin D, fat mass and MetS. The ratios and products derived from macrominerals including magnesium have pointed out stronger associations other than each element alone. Final considerations have shown that unique correlations of magnesium as well as calcium*magnesium product with total fat mass have drawn attention particularly in the MetS group, possibly due to the derangements in some basic elements of carbohydrate as well as lipid metabolism.Keywords: Macrominerals, metabolic syndrome, pediatric obesity, vitamin D.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 803964 RFID Logistic Management with Cold Chain Monitoring – Cold Store Case Study
Authors: Mira Trebar
Abstract:
Logistics processes of perishable food in the supply chain include the distribution activities and the real time temperature monitoring to fulfil the cold chain requirements. The paper presents the use of RFID (Radio Frequency Identification) technology as an identification tool of receiving and shipping activities in the cold store. At the same time, the use of RFID data loggers with temperature sensors is presented to observe and store the temperatures for the purpose of analyzing the processes and having the history data available for traceability purposes and efficient recall management.
Keywords: Logistics, warehouse, RFID device, cold chain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3712963 Energy Requirement for Cutting Corn Stalks (Single Cross 704 Var.)
Authors: M. Azadbakht, A. Rezaei Asl, K. Tamaskani Zahedi
Abstract:
Corn is cultivated in most countries because of high consumption, quality, and food value. This study evaluated needed energy for cutting corn stems in different levels of cutting height and moisture content. For this reason, test device was fabricated and then calibrated. The device works on the principle of conservation of energy. The results were analyzed using split plot design and SAS software. The results showed that effect of height and moisture content and their interaction effect on cutting energy are significant (P<1%). The maximum cutting energy was 3.22 kJ in 63 (w.b.%) moisture content and the minimum cutting energy was 1.63 kJ in 83.25 (w.b.%) moisture content.
Keywords: Cutting energy, Corn stalk, Cutting height, Moisture content, Impact cutting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3141962 Ethics Perception of Pharmaceutical Companies
Authors: Blandina Šramová, Gabriela Kučeráková
Abstract:
The paper is intended to declare and apply ethics, i. e. moral principles, rules in marketing environment. Ethical behavior of selected pharmaceutical companies in the Slovak Republic is the object of our research. The aim of our research is to determine perception of ethical behavior of the pharmaceutical industry in Slovakia by the medicine representatives in comparison with the assessment of doctors and patients. The experimental sample included 90 participants who were divided into three groups: medicine representatives of the pharmaceutical companies (N=30), doctors (N=30) and patients (N=30). The research method was a Questionnaire of ethical behavior, created by us, that describes individual areas included in the Code of ethics of the pharmaceutical industry in Slovakia. The results showed influence of professional status on ethical behavior perception, not gender. Higher perception was indicated at patients rather than doctors and medicine representatives.Keywords: Ethics, corporate social responsibility, marketing, pharmaceutical industry.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2939961 Occupants- Behavior and Spatial Implications of Riverfront Residential in Yogyakarta, Indonesia
Authors: Hastuti Saptorini
Abstract:
The urbanization phenomenon in Yogyakarta Special Province, Indonesia, encouraged people move to the city for getting jobs in the informal sectors. They live in some temporary houses in the three main riverbanks: Gadjahwong, Code, and Winongo. Triggered by its independent status they use it as the space for accommodating domestic, social and economy activities because of the non standardized room size of their houses, where are recognized as the environmental hazards. This recognition makes the ambivalent perception when was related to the twelfth point of the philosophy of community development concept: the empowering individuals and communities. Its spatial implication have actually described the territory and the place making phenomena. By analyzing some data collected the author-s fundamental research funded by The General Directorate of Higher Education of Indonesia, this paper will discuss how do the spatial implications of the occupants- behavior and the numerous perceptions of those phenomena.Keywords: occupants' behavior, socio-economic-cultural activities, spatial implication
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1666960 Sewage Sludge Management in Egypt: Current Status and Perspectives towards a Sustainable Agricultural Use
Authors: M. Ghazy, T. Dockhorn, N. Dichtl
Abstract:
The present disposal routes of sewage sludge represent a critical environmental issue in Egypt. Recently, there has been an increasing concern about sewage sludge management due to the environmental risks, which resulted from the fast expansion of wastewater treatment plants without equal attention in dealing with the produced sludge. This paper discusses the current situation of sewage sludge management in Egypt presenting a brief overview of the existing wastewater treatment plants, sludge production and characteristics as well as options of beneficial use and potential demand of sewage sludge under Egyptian conditions. The characteristics of sewage sludge are discussed considering the results of own sampling and analysis as well as previous studies. Furthermore, alternative treatment scenarios for sewage sludge, which have been recently developed in Egypt, are discussed and perspectives for a sustainable agricultural use are outlined.
Keywords: Beneficial use, Egypt, Monetary value, Stabilization processes, Sewage sludge, Sludge management
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4453959 Open Source Library Management System Software: A Review
Authors: Sangsuree Vasupongayya, Kittisak Keawneam, Kittipong Sengloilaun, Patt Emmawat
Abstract:
Library management systems are commonly used in all educational related institutes. Many commercial products are available. However, many institutions may not be able to afford the cost of using commercial products. Therefore, an alternative solution in such situations would be open source software. This paper is focusing on reviewing open source library management system packages currently available. The review will focus on the abilities to perform four basic components which are traditional services, interlibrary load management, managing electronic materials and basic common management system such as security, alert system and statistical reports. In addition, environment, basic requirement and supporting aspects of each open source package are also mentioned.Keywords: open source, library management, review.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7351958 Oxidantantioxidant Status in Calves Supplemented with Green Tea Extract
Authors: Ibrahim I. Elshahawy
Abstract:
The objective of the present study was to investigate the effect of green tea extract on serum oxidant and antioxidant profile, liver and kidney function. 40 Friesian calves are included in this study and allocated into two groups: Group I (n=20) clinically healthy calves showing no clinical abnormalities, not receiving any treatment and served as control; group II (n=20) received green tea extract (GTE) for 30 days. Non-significant changes in blood urea nitrogen (BUN) were detected between groups, on contrary, serum creatinine and activities of liver enzymes aspartate transaminase (AST) and alanine transaminase (ALT) were significantly different between two groups. There were significant increases in the mean values of serum antioxidative parameters (total antioxidant capacity, catalase, superoxide dismutase, reduced glutathione and glutathione peroxidase) in group II. Whereas, the activity of lipid peroxidase significantly decreased in GTE treated calves when compared to control.
Keywords: Green tea extract, antioxidants, oxidants, calves.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1130957 The Portuguese Press Portrait of “Environmental Refugees“
Authors: Inês Vieira
Abstract:
The migration-environment nexus has gained increased interest from the social research field over the last years. While straightly connected to human security issues, this theme has pervaded through the media to the public sphere. Therefore, it is important to observe how did the discussions over environmentally induced migrations develop from the scientific basis to the media attention, passing through some political voices, and in which ways might these messages be interpreted within the broader public discourses. To achieve this purpose, the analysis of the press entries between 2004 and 2010 in three of the main Portuguese newspapers shall be presented, specially reflecting upon the events, protagonists, topics, geographical attributions and terms/expressions used to define those who migrate due to environmental degradation or disasters.
Keywords: Climate refugees, environmental refugees, environmentally induced migrations, Portuguese written press
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1566956 An Edit-Distance Algorithm to Detect Correlated Attacks in Distributed Systems
Authors: Sule Simsek
Abstract:
Intrusion detection systems (IDS)are crucial components of the security mechanisms of today-s computer systems. Existing research on intrusion detection has focused on sequential intrusions. However, intrusions can also be formed by concurrent interactions of multiple processes. Some of the intrusions caused by these interactions cannot be detected using sequential intrusion detection methods. Therefore, there is a need for a mechanism that views the distributed system as a whole. L-BIDS (Lattice-Based Intrusion Detection System) is proposed to address this problem. In the L-BIDS framework, a library of intrusions and distributed traces are represented as lattices. Then these lattices are compared in order to detect intrusions in the distributed traces.Keywords: Attack graph, distributed, edit-distance, misuse detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1387955 Distributed Denial of Service Attacks in Mobile Adhoc Networks
Authors: Gurjinder Kaur, Yogesh Chaba, V. K. Jain
Abstract:
The aim of this paper is to explore the security issues that significantly affect the performance of Mobile Adhoc Networks (MANET)and limit the services provided to their intended users. The MANETs are more vulnerable to Distributed Denial of Service attacks (DDoS) because of their properties like shared medium, dynamic topologies etc. A DDoS attack is a coordinated attempt made by malicious users to flood the victim network with the large amount of data such that the resources of the victim network are exhausted resulting in the deterioration of the network performance. This paper highlights the effects of different types of DDoS attacks in MANETs and categorizes them according to their behavior.Keywords: Distributed Denial, Mobile Adhoc Networks
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2434954 Consideration Factors of Moving to a New Destination for Coastland Residents Under Global Warming
Authors: Ya-Fen Lee, Yun-Yao Chi, Cing-Hong Hung
Abstract:
Because of the global warming and the rising sea level, residents living in southwestern coastland, Taiwan are faced with the submerged land and may move to higher elevation area. It is desirable to discuss the key consideration factor for selecting the migration location under five dimensions of ಯ security”, “health”, “convenience”, “comfort” and “socio-economic” based on the document reviews. This paper uses the Structural Equation Modeling (SEM) and the questionnaire survey. The analysis results show that the convenience is the most key factor for residents in Taiwan.
Keywords: Global warming, migration, structural equation modelling, questionnaire survey.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1366953 Investigating Cultural, Artistic and Architectural Consequences of Mongolian Invasion of Iran and Establishment of Ilkhanate Dynasty
Authors: Hamid Mamani, Negin Sharifi, Nangkula Utaberta
Abstract:
Social, culture and artistic status of a society in various historical eras is affected by numerous, and sometimes imposed, factors that better understanding requires analysis of such conditions. Throughout history Iran has been involved with determining and significant events that examining each of these events can improve the understanding of social conditions of this country in the intended time. Mongolian conquest of Iran is one of most significant events in the history of Iran with consequences that never left Iranian societies. During this tragic invasion and subsequent devastating wars, which led to establishment of Ilkhanate dynasty, numerous cultural and artistic changes occurred both in Mongolian conquerors and Iranian society. This study examines these changes with a glimpse towards art and architecture as important part of cultural aspects and social communication.Keywords: Art and Architecture, Exchanging cultures, Ilkhanates, War
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2305952 Consumption Insurance against the Chronic Illness: Evidence from Thailand
Authors: Yuthapoom Thanakijborisut
Abstract:
This paper studies consumption insurance against the chronic illness in Thailand. The study estimates the impact of household consumption in the chronic illness on consumption growth. Chronic illness is the health care costs of a person or a household’s decision in treatment for the long term; the causes and effects of the household’s ability for smooth consumption. The chronic illnesses are measured in health status when at least one member within the household faces the chronic illness. The data used is from the Household Social Economic Panel Survey conducted during 2007 and 2012. The survey collected data from approximately 6,000 households from every province, both inside and outside municipal areas in Thailand. The study estimates the change in household consumption by using an ordinary least squares (OLS) regression model. The result shows that the members within the household facing the chronic illness would reduce the consumption by around 4%. This case indicates that consumption insurance in Thailand is quite sufficient against chronic illness.
Keywords: Consumption insurance, chronic illness, health care, Thailand.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1097951 A Study on the Introduction of Wastewater Reuse Facility in Military Barracks by Cost-Benefit Analysis
Authors: D. G. Jung, J. B. Lim, J. H. Kim, J. J. Kim
Abstract:
The international society focuses on the environment protection and natural energy sources control for the global cooperation against weather change and sustainable growth. The study presents the overview of the water shortage status and the necessity of wastewater reuse facility in military facilities and for the possibility of the introduction, compares the economics by means of cost-benefit analysis. The military features such as the number of users of military barracks and the water use were surveyed by the design principles by facility types, the application method of wastewater reuse facility was selected, the feed water, its application and the volume of reuse volume were defined and the expectation was estimated, confirming the possibility of introducing a wastewater reuse possibility by means of cost-benefit analysis.Keywords: military barracks, wastewater reuse facility, cost-benefit analysis
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1448950 Networked Radar System to Increase Safety of Urban Railroad Crossing
Authors: S. Saponara, L. Fanucci, R. Cassettari, P. Ruggiero, M. Righetto
Abstract:
The paper presents an innovative networked radar system for detection of obstacles in a railway level crossing scenario. This Monitoring System (MS) is able to detect moving or still obstacles within the railway level crossing area automatically, avoiding the need of human presence for surveillance. The MS is also connected to the National Railway Information and Signaling System to communicate in real-time the level crossing status. The architecture is compliant with the highest Safety Integrity Level (SIL4) of the CENELEC standard. The number of radar sensors used is configurable at set-up time and depends on how large the level crossing area can be. At least two sensors are expected and up four can be used for larger areas. The whole processing chain that elaborates the output sensor signals, as well as the communication interface, is fully-digital, was designed in VHDL code and implemented onto a Xilinx Virtex 6.
Keywords: Radar for safe mobility, railroad crossing, railway, transport safety.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3089949 A Combined Cipher Text Policy Attribute-Based Encryption and Timed-Release Encryption Method for Securing Medical Data in Cloud
Authors: G. Shruthi, Purohit Shrinivasacharya
Abstract:
The biggest problem in cloud is securing an outsourcing data. A cloud environment cannot be considered to be trusted. It becomes more challenging when outsourced data sources are managed by multiple outsourcers with different access rights. Several methods have been proposed to protect data confidentiality against the cloud service provider to support fine-grained data access control. We propose a method with combined Cipher Text Policy Attribute-based Encryption (CP-ABE) and Timed-release encryption (TRE) secure method to control medical data storage in public cloud.Keywords: Attribute, encryption, security, trapdoor.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 758948 Dynamical Analysis of a Harvesting Model of Phytoplankton-Zooplankton Interaction
Authors: Anuj K. Sharma, Amit Sharma, Kulbhushan Agnihotri
Abstract:
In this work, we propose and analyze a model of Phytoplankton-Zooplankton interaction with harvesting considering that some species are exploited commercially for food. Criteria for local stability, instability and global stability are derived and some threshold harvesting levels are explored to maintain the population at an appropriate equilibrium level even if the species are exploited continuously.Further,biological and bionomic equilibria of the system are obtained and an optimal harvesting policy is also analysed using the Pantryagin’s Maximum Principle.Finally analytical findings are also supported by some numerical simulations.
Keywords: Phytoplankton-Zooplankton, Global stability, Bionomic Equilibrium, Pontrying-Maximum Principal.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2272947 Fuzzy Fingerprint Vault using Multiple Polynomials
Authors: Daesung Moon, Woo-Yong Choi, Kiyoung Moon
Abstract:
Fuzzy fingerprint vault is a recently developed cryptographic construct based on the polynomial reconstruction problem to secure critical data with the fingerprint data. However, the previous researches are not applicable to the fingerprint having a few minutiae since they use a fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use an adaptive degree of the polynomial considering the number of minutiae extracted from each user. Also, we apply multiple polynomials to avoid the possible degradation of the security of a simple solution(i.e., using a low-degree polynomial). Based on the experimental results, our method can make the possible attack difficult 2192 times more than using a low-degree polynomial as well as verify the users having a few minutiae.
Keywords: Fuzzy vault, fingerprint recognition multiple polynomials.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1546946 Image Authenticity and Perceptual Optimization via Genetic Algorithm and a Dependence Neighborhood
Authors: Imran Usman, Asifullah Khan, Rafiullah Chamlawi, Abdul Majid
Abstract:
Information hiding for authenticating and verifying the content integrity of the multimedia has been exploited extensively in the last decade. We propose the idea of using genetic algorithm and non-deterministic dependence by involving the un-watermarkable coefficients for digital image authentication. Genetic algorithm is used to intelligently select coefficients for watermarking in a DCT based image authentication scheme, which implicitly watermark all the un-watermarkable coefficients also, in order to thwart different attacks. Experimental results show that such intelligent selection results in improvement of imperceptibility of the watermarked image, and implicit watermarking of all the coefficients improves security against attacks such as cover-up, vector quantization and transplantation.
Keywords: Digital watermarking, fragile watermarking, geneticalgorithm, Image authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1517945 Improved MARS Ciphering Using a Metamorphic-Enhanced Function
Authors: Moataz M. Naguib, Hatem Khater, A. Baith Mohamed
Abstract:
MARS is a shared-key (symmetric) block cipher algorithm supporting 128-bit block size and a variable key size of between 128 and 448 bits. MARS has a several rounds of cryptographic core that is designed to take advantage of the powerful results for improving security/performance tradeoff over existing ciphers. In this work, a new function added to improve the ciphering process it is called, Meta-Morphic function. This function use XOR, Rotating, Inverting and No-Operation logical operations before and after encryption process. The aim of these operations is to improve MARS cipher process and makes a high confusion criterion for the Ciphertext.
Keywords: AES, MARS, Metamorphic, Cryptography, Block Cipher.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2041944 Fermentative Production of Dextran using Food Industry Wastes
Authors: Marzieh Moosavi-Nasab, Mohsen Gavahian, Ali R. Yousefi, Hamed Askari
Abstract:
Dextran is a D-glucose polymer which is produced by Leuconostoc mesenteroides grown in a sucrose-rich media. The organism was obtained from the Persian Type Culture Collection (PTCC) and was transferred in MRS broth medium at 30°C and pH 6.8 for 24 h. After preparation of inoculums, organisms were inoculated into five liquid fermentation media containing either molasses or cheese whey or different combinations of cheese whey and molasses. After certain fermentation period, the produced dextran was separated and dried. Dextran yield was calculated and significant differences in different media were observed. Furthermore, FT-IR analysis was performed and the results showed that there were no significant differences in the produced dextran structures.Keywords: Dextran, Leuconostoc mesenteroides, Molasses, Whey
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3669943 Current Status of 5A Lab6 Hollow Cathode Life Tests in Lanzhou Institute of Physics, China
Authors: Yanhui Jia, Ning Guo, Juan Li, Yunkui Sun, Wei Yang, Tianping Zhang, Lin Ma, Wei Meng, Hai Geng
Abstract:
The current statuses of lifetime test of LaB6 hollow cathode at the Lanzhou Institute of Physics (LIP), China, was described. 5A LaB6 hollow cathode was design for LIPS-200 40mN Xenon ion thruster, and it could be used for LHT-100 80 mN Hall thruster, too. Life test of the discharge and neutralizer modes of LHC-5 hollow cathode were stared in October 2011, and cumulative operation time reached 17,300 and 16,100 hours in April 2015, respectively. The life of cathode was designed more than 11,000 hours. Parameters of discharge and key structure dimensions were monitored in different stage of life test indicated that cathodes were health enough. The test will continue until the cathode cannot work or operation parameter is not in normally. The result of the endurance test of cathode demonstrated that the LaB6 hollow cathode is satisfied for the required of thruster in life and performance.Keywords: LaB6, hollow cathode, thruster, lifetime test, electric propulsion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2193942 A Fuzzy Implementation for Optimization of Storage Locations in an Industrial AS/RS
Authors: C. Senanayake, S. Veera Ragavan
Abstract:
Warehousing is commonly used in factories for the storage of products until delivery of orders. As the amount of products stored increases it becomes tedious to be carried out manually. In recent years, the manual storing has converted into fully or partially computer controlled systems, also known as Automated Storage and Retrieval Systems (AS/RS). This paper discusses an ASRS system, which was designed such that the best storage location for the products is determined by utilizing a fuzzy control system. The design maintains the records of the products to be/already in store and the storage/retrieval times along with the availability status of the storage locations. This paper discusses on the maintenance of the above mentioned records and the utilization of the concept of fuzzy logic in order to determine the optimum storage location for the products. The paper will further discuss on the dynamic splitting and merging of the storage locations depending on the product sizes.Keywords: ASRS, fuzzy control systems, MySQL database, dynamic splitting and merging.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2141941 A Intelligent Inference Model about Complex Systems- Stability: Inspiration from Nature
Authors: Naiqin Feng, Yuhui Qiu, Yingshan Zhang, Fang Wang
Abstract:
A logic model for analyzing complex systems- stability is very useful to many areas of sciences. In the real world, we are enlightened from some natural phenomena such as “biosphere", “food chain", “ecological balance" etc. By research and practice, and taking advantage of the orthogonality and symmetry defined by the theory of multilateral matrices, we put forward a logic analysis model of stability of complex systems with three relations, and prove it by means of mathematics. This logic model is usually successful in analyzing stability of a complex system. The structure of the logic model is not only clear and simple, but also can be easily used to research and solve many stability problems of complex systems. As an application, some examples are given.Keywords: Complex system, logic model, relation, stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1327940 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System
Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi
Abstract:
Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.
Keywords: Proxy signature, fault tolerance, improved RSA, key agreement.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1258939 Support Services for Students with Special Education Needs in Colleges and Universities
Authors: Hsiu-Fen Chen, Fang-Liu Su, Ya-Wen Chang
Abstract:
purpose of this study was to investigate the current status of support services for students with special education needs (SEN) at colleges and universities in Taiwan. Seventy-two college and universities received a questionnaire on its resource room operation process and four resource room staffs each from different areas were interviewed through semi- structured interview forms. The main findings were (1) most colleges and universities did offer sufficient administrative resources; (2) more efforts on preventions for SEN students and establishment of disability awareness should be made for all campus faculties ; (3) more comprehensive services were required to help students to have better transition into post-school life; (4) most schools provided basic administrative resource requirements but qualities of the resource room programs needed to be enhanced; and (5) most resource room staffs lacked of professional knowledge in counseling the SEN students which needed to be strengthened in the future.
Keywords: support services, students with special education needs, higher education, resource room program
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1483