Search results for: global food security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3626

Search results for: global food security index

1676 Exploring Structure of Mobile Ecosystem: Inter-Industry Network Analysis Approach

Authors: Yongyoon Suh, Chulhyun Kim, Moon-soo Kim

Abstract:

As increasing importance of symbiosis and cooperation among mobile communication industries, the mobile ecosystem has been especially highlighted in academia and practice. The structure of mobile ecosystem is quite complex and the ecological role of actors is important to understand that structure. In this respect, this study aims to explore structure of mobile ecosystem in the case of Korea using inter-industry network analysis. Then, the ecological roles in mobile ecosystem are identified using centrality measures as a result of network analysis: degree of centrality, closeness, and betweenness. The result shows that the manufacturing and service industries are separate. Also, the ecological roles of some actors are identified based on the characteristics of ecological terms: keystone, niche, and dominator. Based on the result of this paper, we expect that the policy makers can formulate the future of mobile industry and healthier mobile ecosystem can be constructed.

Keywords: Mobile ecosystem, structure, ecological roles, network analysis, network index.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2063
1675 Algorithm for Information Retrieval Optimization

Authors: Kehinde K. Agbele, Kehinde Daniel Aruleba, Eniafe F. Ayetiran

Abstract:

When using Information Retrieval Systems (IRS), users often present search queries made of ad-hoc keywords. It is then up to the IRS to obtain a precise representation of the user’s information need and the context of the information. This paper investigates optimization of IRS to individual information needs in order of relevance. The study addressed development of algorithms that optimize the ranking of documents retrieved from IRS. This study discusses and describes a Document Ranking Optimization (DROPT) algorithm for information retrieval (IR) in an Internet-based or designated databases environment. Conversely, as the volume of information available online and in designated databases is growing continuously, ranking algorithms can play a major role in the context of search results. In this paper, a DROPT technique for documents retrieved from a corpus is developed with respect to document index keywords and the query vectors. This is based on calculating the weight (

Keywords: Internet ranking,

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1473
1674 Numerical Analysis and Design of Dielectric to Plasmonic Waveguides Couplers

Authors: Emanuela Paranhos Lima, Vitaly Félix Rodríguez Esquerre

Abstract:

In this work, efficient directional coupler composed of dielectric waveguides and metallic film has been analyzed in details by simulations using finite element method (FEM). The structure consists of a step-index fiber with dielectric core, silica cladding, and a metal nanowire parallel to the core. The results show that an efficient conversion of optical dielectric modes to long range plasmonic is possible. Low insertion losses in conjunction with short coupling length and a broadband operation can be achieved under certain conditions. This kind of couplers has potential applications for the design of photonic integrated circuits for signal routing between dielectric/plasmonic waveguides, sensing, lithography, and optical storage systems. A high efficient focusing of light in a very small region can be obtained.

Keywords: Directional coupler, finite element method, metallic nanowire, plasmonic, surface plasmon polariton.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 878
1673 Seasonal Variation of Polycyclic Aromatic Hydrocarbons Associated with PM10 in Győr, Hungary

Authors: A. Szabó Nagy, J. Szabó, Zs. Csanádi, J. Erdős

Abstract:

The main objective of this study was to assess the seasonal variation of atmospheric polycyclic aromatic hydrocarbon (PAH) concentrations associated with PM10 in an urban site of Győr, Hungary. A total of 112 PM10 aerosol samples were collected in the years of 2012 and 2013 and analyzed for PAHs by gas chromatography method. The total PAH concentrations (sum of the concentrations of 19 individual PAH compounds) ranged from 0.19 to 70.16 ng/m3 with the mean value of 12.29 ng/m3. Higher concentrations of both total PAHs and benzo[a]pyrene (BaP) were detected in samples collected in the heating seasons. Using BaPequivalent potency index on the carcinogenic PAH concentration data, the local population appears to be exposed to significantly higher cancer risk in the heating seasons. However, the comparison of the BaP and total PAH concentrations observed for Győr with other cities it was found that the PAH levels in Győr generally corresponded to the EU average.

Keywords: Air quality, benzo[a]pyrene, PAHs, polycyclic aromatic hydrocarbons.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5198
1672 Risk Assessment of Acrylamide Intake from Roasted Potatoes in Latvia

Authors: Irisa Murniece, Daina Karklina, Ruta Galoburda

Abstract:

From food consumption surveys has been found that potato consumption comparing to other European countries is one of the highest. Hence acrylamide (AA) intake coming from fried potatoes in population might be high as well. The aim of the research was to determine acrylamide content and estimate intake of acrylamide from roasted potatoes bred and cultivated in Latvia. Five common Latvian potato varieties were selected: Lenora, Brasla, Imanta, Zile, and Madara. A two-year research was conducted during two periods: just after harvesting and after six months of storage. Time and temperature (210 ± 5°C) was recorded during frying. AA was extracted from potatoes by solid phase extraction and AA content was determined by LC-MS/MS. estimated intake of acrylamide ranges from 0.012 to 0.496μgkg-1 BW per day.

Keywords: potato, roasting, variety, acrylamide, Latvia, risk assessment.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2058
1671 Gender Discrimination and Pay Gap on Tourism Labor Market

Authors: Alka Obadić

Abstract:

The research concentrates on the role of tourism in generating female employment and on impact of gender discrimination in tourism sector. Unfortunately, in many countries there are still some barriers to the inclusion of women at all hierarchical levels of tourism labor market. Research analysis focuses on EU countries where tourism is a main employer of women. The analysis shows that women represent over third persons employed in the non-financial business economy and almost two thirds in core tourism activities. Women's gross hourly earnings in accommodation and food services were below those of men in the European Union and only countries who recorded increase of gender pay gap from the beginning of crisis are Bulgaria and Croatia. Women in tourism industry are still overrepresented in lower status jobs with fewer opportunities for career progression and are often treated unequally.

Keywords: Employment, gender discrimination, tourism, women’s participation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3491
1670 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 724
1669 Stability Criteria for Neural Networks with Two Additive Time-varying Delay Components

Authors: Qingqing Wang, Shouming Zhong

Abstract:

This paper is concerned with the stability problem with two additive time-varying delay components. By choosing one augmented Lyapunov-Krasovskii functional, using some new zero equalities, and combining linear matrix inequalities (LMI) techniques, two new sufficient criteria ensuring the global stability asymptotic stability of DNNs is obtained. These stability criteria are present in terms of linear matrix inequalities and can be easily checked. Finally, some examples are showed to demonstrate the effectiveness and less conservatism of the proposed method.

Keywords: Neural networks, Globally asymptotic stability, LMI approach, Additive time-varying delays.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1561
1668 Block Activity in Metric Neural Networks

Authors: Mario Gonzalez, David Dominguez, Francisco B. Rodriguez

Abstract:

The model of neural networks on the small-world topology, with metric (local and random connectivity) is investigated. The synaptic weights are random, driving the network towards a chaotic state for the neural activity. An ordered macroscopic neuron state is induced by a bias in the network connections. When the connections are mainly local, the network emulates a block-like structure. It is found that the topology and the bias compete to influence the network to evolve into a global or a block activity ordering, according to the initial conditions.

Keywords: Block attractor, random interaction, small world, spin glass.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1334
1667 Homotopy Analysis Method for Hydromagnetic Plane and Axisymmetric Stagnation-point Flow with Velocity Slip

Authors: Jing Zhu, Liancun Zheng, Xinxin Zhang

Abstract:

This work is focused on the steady boundary layer flow near the forward stagnation point of plane and axisymmetric bodies towards a stretching sheet. The no slip condition on the solid boundary is replaced by the partial slip condition. The analytical solutions for the velocity distributions are obtained for the various values of the ratio of free stream velocity and stretching velocity, slip parameter, the suction and injection velocity parameter, magnetic parameter and dimensionality index parameter in the series forms with the help of homotopy analysis method (HAM). Convergence of the series is explicitly discussed. Results show that the flow and the skin friction coefficient depend heavily on the velocity slip factor. In addition, the effects of all the parameters mentioned above were more pronounced for plane flows than for axisymmetric flows.

Keywords: slip flow, axisymmetric flow, homotopy analysismethod, stagnation-point.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1697
1666 Introducing the Main Factors of Accidents on the Roads of Iran and Studying its Causes and Strategies Applied to Decrease it

Authors: Eshagh Rasouli Sarabi, Mir Saeed Moosavi

Abstract:

Road transportation system is the most important method of transporting the goods. Considering the most suitable geographical situation of Iran to transport the goods between Europe and Asia and placement of this country in direction of international corridors (east- west) , (north-south) and Asian land transport to infrastructure development “A.L.T.I.D" and Transport corridor Europe - Caucasus - Asia “T.R.A.C.E.C.A", noticing the security of road transportation system in this country is so important. In this paper the main factors of accidents on the roads of Iran are categorized regarding the rate of accidents occurred. Then apart from studying the main reasons of accidents of every category, the main factors of these events are studied and its strategies in Iran are introduced.

Keywords: Road, Transportation, Accident, Factors

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1740
1665 Analysis of Periodic Solution of Delay Fuzzy BAM Neural Networks

Authors: Qianhong Zhang, Lihui Yang, Daixi Liao

Abstract:

In this paper, by employing a new Lyapunov functional and an elementary inequality analysis technique, some sufficient conditions are derived to ensure the existence and uniqueness of periodic oscillatory solution for fuzzy bi-directional memory (BAM) neural networks with time-varying delays, and all other solutions of the fuzzy BAM neural networks converge the uniqueness periodic solution. These criteria are presented in terms of system parameters and have important leading significance in the design and applications of neural networks. Moreover an example is given to illustrate the effectiveness and feasible of results obtained.

Keywords: Fuzzy BAM neural networks, Periodic solution, Global exponential stability, Time-varying delays

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1510
1664 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: Context, exception, default, IDS, Non-monotonic Description Logic JClassicδє, vulnerability.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1426
1663 The RK1GL2X3 Method for Initial Value Problems in Ordinary Differential Equations

Authors: J.S.C. Prentice

Abstract:

The RK1GL2X3 method is a numerical method for solving initial value problems in ordinary differential equations, and is based on the RK1GL2 method which, in turn, is a particular case of the general RKrGLm method. The RK1GL2X3 method is a fourth-order method, even though its underlying Runge-Kutta method RK1 is the first-order Euler method, and hence, RK1GL2X3 is considerably more efficient than RK1. This enhancement is achieved through an implementation involving triple-nested two-point Gauss- Legendre quadrature.

Keywords: RK1GL2X3, RK1GL2, RKrGLm, Runge-Kutta, Gauss-Legendre, initial value problem, local error, global error.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1312
1662 A New Approach to ECG Biometric Systems: A Comparitive Study between LPC and WPD Systems

Authors: Justin Leo Cheang Loong, Khazaimatol S Subari, Rosli Besar, Muhammad Kamil Abdullah

Abstract:

In this paper, a novel method for a biometric system based on the ECG signal is proposed, using spectral coefficients computed through linear predictive coding (LPC). ECG biometric systems have traditionally incorporated characteristics of fiducial points of the ECG signal as the feature set. These systems have been shown to contain loopholes and thus a non-fiducial system allows for tighter security. In the proposed system, incorporating non-fiducial features from the LPC spectrum produced a segment and subject recognition rate of 99.52% and 100% respectively. The recognition rates outperformed the biometric system that is based on the wavelet packet decomposition (WPD) algorithm in terms of recognition rates and computation time. This allows for LPC to be used in a practical ECG biometric system that requires fast, stringent and accurate recognition.

Keywords: biometric, ecg, linear predictive coding, wavelet packet decomposition

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2892
1661 The Effect of Lime Stabilization on E. coli Destruction and Heavy Metal Bioavailability in Sewage Sludge for Agricultural Utilization

Authors: G. Petruzzelli, F. Pedron, M. Grifoni, A. Pera, I. Rosellini, B. Pezzarossa

Abstract:

The addition of lime as Ca(OH)2 to sewage sludge to destroy pathogens (Escherichia coli), was evaluated also in relation to heavy metal bioavailability. The obtained results show that the use of calcium hydroxide at the dose of 3% effectively destroyed pathogens ensuring the stability at high pH values over long period and the duration of the sewage sludge stabilization. In general, lime addition decreased the total extractability of heavy metals indicating a reduced bioavailability of these elements. This is particularly important for a safe utilization in agricultural soils to reduce the possible transfer of heavy metals to the food chain.

Keywords: Biological sludge, Ca(OH)2, copper, pathogens, sanitation, zinc.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2649
1660 Transcutaneous Inductive Powering Links Based on ASK Modulation Techniques

Authors: S. M. Abbas, M. A. Hannan, S. A. Samad, A. Hussain

Abstract:

This paper presented a modified efficient inductive powering link based on ASK modulator and proposed efficient class- E power amplifier. The design presents the external part which is located outside the body to transfer power and data to the implanted devices such as implanted Microsystems to stimulate and monitoring the nerves and muscles. The system operated with low band frequency 10MHZ according to industrial- scientific – medical (ISM) band to avoid the tissue heating. For external part, the modulation index is 11.1% and the modulation rate 7.2% with data rate 1 Mbit/s assuming Tbit = 1us. The system has been designed using 0.35-μm fabricated CMOS technology. The mathematical model is given and the design is simulated using OrCAD P Spice 16.2 software tool and for real-time simulation, the electronic workbench MULISIM 11 has been used.

Keywords: Implanted devices, ASK techniques, Class-E power amplifier, Inductive powering and low-frequency ISM band.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2369
1659 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: Proxy signature, fault tolerance, RSA, key agreement protocol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1476
1658 Agrowaste: Phytosterol from Durian Seed

Authors: D. Mohd Nazrul Hisham, J. Mohd Lip, R. Suri, H. Mohamed Shafit, Z.Kharis, K. Shazlin, A. Normah, M.F. Nurul Nabilah

Abstract:

Presence of phytosterol compound in Durian seed (Durio zibethinus) or known as King of fruits has been discovered from screening work using reagent test. Further analysis work has been carried out using mass spectrometer in order to support the priliminary finding. Isolation and purification of the major phytosterol has been carried out using an open column chromatography. The separation was monitored using thin layer chromatography (TLC). Major isolated compounds and purified phytosterol were identified using mass spectrometer and nuclear magnetic resonance (NMR). This novel finding could promote utilization of durian seeds as a functional ingredient in food products through production of standardized extract based on phytosterol content.

Keywords: Agrowaste, durian, seed, phytosterol

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2914
1657 Bioactivity Evaluation of Cucurbitin Derived Enzymatic Hydrolysates

Authors: Ž. Vaštag, Lj. Popović, S. Popović

Abstract:

After cold pressing of pumpkin oil, the defatted oil cake (PUOC) was utilised as raw material for processing of bio-functional hydrolysates. In this study, the in vitro bioactivity of an alcalase (AH) and a pepsin hydrolysate (PH) prepared from the major pumpkin 12S globulin (cucurbitin) are compared. The hydrolysates were produced at optimum reaction conditions (temperature, pH) for the enzymes, during 60min. The bioactivity testing included antioxidant and angiotensin I converting enzyme inhibitory activity assays. The hydrolysates showed high potential as natural antioxidants and possibly antihypertensive agents in functional food or nutraceuticals. Additionally, preliminary studies have shown that both hydrolysates could exhibit modest α-amylase inhibitory activity, which indicates on their hypoglycemic potential.

Keywords: Cucurbitin, alcalase, pepsin, protein hydrolysates, in vitro bioactivity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2563
1656 ATC in Competitive Electricity Market Using TCSC

Authors: S. K. Gupta, Richa Bansal

Abstract:

In a deregulated power system structure, power producers and customers share a common transmission network for wheeling power from the point of generation to the point of consumption. All parties in this open access environment may try to purchase the energy from the cheaper source for greater profit margins, which may lead to overloading and congestion of certain corridors of the transmission network. This may result in violation of line flow, voltage and stability limits and thereby undermine the system security. Utilities therefore need to determine adequately their available transfer capability (ATC) to ensure that system reliability is maintained while serving a wide range of bilateral and multilateral transactions. This paper presents power transfer distribution factor based on AC load flow for the determination and enhancement of ATC. The study has been carried out for IEEE 24 bus Reliability Test System.

Keywords: Available Transfer Capability, FACTS devices, Power Transfer Distribution Factors.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2354
1655 Changes to Oxidative Stress Levels Following Exposure to Formaldehyde in Lymphocytes

Authors: Malinee Pongsavee

Abstract:

Formaldehyde is the illegal chemical substance used for food preservation in fish and vegetable. It can promote carcinogenesis. Superoxide dismutases are the important antioxidative enzymes that catalyze the dismutation of superoxide anion into oxygen and hydrogen peroxide. The resultant level of oxidative stress in formaldehyde-treated lymphocytes was investigated. The formaldehyde concentrations of 0, 20, 40, 60, 80 and 120μmol/L were treated in human lymphocytes for 12 hours. After 12 treated hours, the superoxide dismutase activity change was measured in formaldehyde-treated lymphocytes. The results showed that the formaldehyde concentrations of 60, 80 and 120μmol/L significantly decreased superoxide dismutase activities in lymphocytes (P < 0.05). The change of superoxide dismutase activity in formaldehyde-treated lymphocytes may be the biomarker for detect cellular injury, such as damage to DNA, due to formaldehyde exposure.

Keywords: Formaldehyde, lymphocytes, superoxide dismutase activity.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2222
1654 Aflatoxins Aggravate the Incidence of Salmonellosis Outbreak in Fattening Calves: A Case Study

Authors: Abdel-Rahman A., El Okle O. S.

Abstract:

Fever, bloody diarrhea and high mortality rate were the main clinical finding in a group of fattening calves. Analysis of corn silage revealed presence of aflatoxins at level of 370 ppb. This level of aflatoxins in the feed of cattle is somewhat low to be the main cause of reported signs. Leukocytopenia, anemia, decreased lymphocytic activity and lowered phagocytic index are the main hematological and immunological alterations in diseased calves. Bacteriological investigation revealed isolation of pathogenic Salmonella typhimurium from the rectal swabs of diseased calves. Our results suggested that, long duration of exposure to aflatoxins even at small concentrations may considered as predisposing factor for the incidence of natural infectious outbreaks as salmonellosis due to its immunosuppressive effect. We can conclude that the veterinarians and owners must be given an attention to the relation between aflatoxicosis and salmonellosis under field condition. We are recommended that the treatment program during similar outbreaks must be including anti-aflatoxins preparations beside the antimicrobial therapy.

Keywords: Aflatoxins, Calves, Salmonellosis.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2125
1653 A New Group Key Management Protocol for Wireless Ad-Hoc Networks

Authors: Rony H. Rahman, Lutfar Rahman

Abstract:

Ad hoc networks are characterized by multi-hop wireless connectivity and frequently changing network topology. Forming security association among a group of nodes in ad-hoc networks is more challenging than in conventional networks due to the lack of central authority, i.e. fixed infrastructure. With that view in mind, group key management plays an important building block of any secure group communication. The main contribution of this paper is a low complexity key management scheme that is suitable for fully self-organized ad-hoc networks. The protocol is also password authenticated, making it resilient against active attacks. Unlike other existing key agreement protocols, ours make no assumption about the structure of the underlying wireless network, making it suitable for “truly ad-hoc" networks. Finally, we will analyze our protocol to show the computation and communication burden on individual nodes for key establishment.

Keywords: Ad-hoc Networks, Group Key Management, Key Management Protocols, Password Authentication

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1754
1652 An Ecological Model for Three Species with Crowley–Martin Functional Response

Authors: Randhir Singh Baghel, Govind Shay Sharma

Abstract:

In this paper, we explore an ecosystem that contains a three-species food chain. The first and second species are in competition with one another for resources. However, the third species plays an important role in providing non-linear Crowley-Martin functional support for the first species. Additionally, the third species consumes the second species in a linear fashion, taking advantage of the available resources. This intricate balance ensures the survival of all three species in the ecosystem. A set of non-linear isolated first-order differential equations establish this model. We examine the system's stability at all potential equilibrium locations using the perturbed technique. Furthermore, by spending a lot of time observing the species in their natural habitat, the numerical illustrations at suitable parameter values for the model are shown.

Keywords: Competition, predator, response function, local stability, numerical simulations.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 213
1651 Application of Sensory Thermography on Workers of a Wireless Industry in Mexico

Authors: Claudia Camargo, Enrique J. de la Vega, Jesús E. Olguín, Juan A. López, Sandra K. Enríquez

Abstract:

This study focuses on the application of sensory thermography, as a non-invasive method to evaluate the musculoskeletal injuries that industry workers performing Highly Repetitive Movements (HRM) may acquire. It was made at a wireless company having the target of analyze temperatures in worker’s wrists, elbows and shoulders in workstations during their activities, this thru sensorial thermography with the goal of detecting maximum temperatures (Tmax) that could indicate possible injuries. The tests were applied during 3 hours for only 2 workers that work in workstations where there’s been the highest index of injuries and accidents. We were made comparisons for each part of the body that were study for both because of the similitude between the activities of the workstations; they were requiring both an immediate evaluation. The Tmax was recorder during the test of the worker 2, in the left wrist, reaching a temperature of 35.088ºC and with a maximum increase of 1.856°C

Keywords: Highly Repetitive Movements (HRM), Maximum temperatures (Tmax), Worker.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1564
1650 An Analysis of Compression Methods and Implementation of Medical Images in Wireless Network

Authors: C. Rajan, K. Geetha, S. Geetha

Abstract:

The motivation of image compression technique is to reduce the irrelevance and redundancy of the image data in order to store or pass data in an efficient way from one place to another place. There are several types of compression methods available. Without the help of compression technique, the file size is knowingly larger, usually several megabytes, but by doing the compression technique, it is possible to reduce file size up to 10% as of the original without noticeable loss in quality. Image compression can be lossless or lossy. The compression technique can be applied to images, audio, video and text data. This research work mainly concentrates on methods of encoding, DCT, compression methods, security, etc. Different methodologies and network simulations have been analyzed here. Various methods of compression methodologies and its performance metrics has been investigated and presented in a table manner.

Keywords: Image compression techniques, encoding, DCT, lossy compression, lossless compression, JPEG.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1185
1649 Stop Forced Child Marriage: A Comparative Global Law Analysis

Authors: Michelle J. Miller

Abstract:

Millions of girls are forcibly married during the transitional period between puberty and adulthood. At a stage of vulnerability cultural practices, religious rights and social standards place her in a position where she is catapult into womanhood. An advocate against forced child marriage could argue that child rights, cultural rights, religious rights, right to marry, right to life, right to health, right to education, right to be free from slavery, right to be free from torture, right to consent to marriage are all violated by the practice of child marriage. The author is this advocate and this paper will present how some of these rights are violated and establish the need for change.

Keywords: Child marriage, forced child marriage, child rights, protection, religious rights, cultural rights, right to life, human rights.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3250
1648 Identification of MIMO Systems Using Neuro-Fuzzy Models with a Shuffled Frog Leaping Algorithm

Authors: Sana Bouzaida, Anis Sakly, Faouzi M'Sahli

Abstract:

In this paper, a TSK-type Neuro-fuzzy Inference System that combines the features of fuzzy sets and neural networks has been applied for the identification of MIMO systems. The procedure of adapting parameters in TSK model employs a Shuffled Frog Leaping Algorithm (SFLA) which is inspired from the memetic evolution of a group of frogs when seeking for food. To demonstrate the accuracy and effectiveness of the proposed controller, two nonlinear systems have been considered as the MIMO plant, and results have been compared with other learning methods based on Particle Swarm Optimization algorithm (PSO) and Genetic Algorithm (GA).

Keywords: Identification, Shuffled frog Leaping Algorithm (SFLA), TSK-type neuro-fuzzy model.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1768
1647 Effect of Three Sand Types on Potato Vegetative Growth and Yield

Authors: Shatha A. Yousif, Qasim M. Zamil, Hasan Y. Al Muhi, Jamal A. Al Shammari

Abstract:

Potato (Solanum tuberosum L.) is one of the major vegetable crops that are grown world –wide because of its economic importance. This experiment investigated the effect of local sands (River Base, Al-Ekader and Karbala) on number and total weight of minitubers. Statistical analysis revealed that there were no significant differences among sand cultures in number of stem/plant, chlorophyll index and tubers dry weight. River Base sand had the highest plant height (74.9 cm), leaf number/plant number (39.3), leaf area (84.4 dcm2⁄plant), dry weight/plant (26.31), tubers number/plant (8.5), tubers weight/plant (635.53 gm) and potato tuber yields/trove (28.60 kg), whereas the Karbala sand had lower performance. All the characters had positive and significant correlation with yields except the traits number of stem and tuber dry weight.

Keywords: Correlation, Potato, Sand Culture, Yield.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2646