Search results for: high gain
3334 The Effect of Lime Stabilization on E. coli Destruction and Heavy Metal Bioavailability in Sewage Sludge for Agricultural Utilization
Authors: G. Petruzzelli, F. Pedron, M. Grifoni, A. Pera, I. Rosellini, B. Pezzarossa
Abstract:
The addition of lime as Ca(OH)2 to sewage sludge to destroy pathogens (Escherichia coli), was evaluated also in relation to heavy metal bioavailability. The obtained results show that the use of calcium hydroxide at the dose of 3% effectively destroyed pathogens ensuring the stability at high pH values over long period and the duration of the sewage sludge stabilization. In general, lime addition decreased the total extractability of heavy metals indicating a reduced bioavailability of these elements. This is particularly important for a safe utilization in agricultural soils to reduce the possible transfer of heavy metals to the food chain.Keywords: Biological sludge, Ca(OH)2, copper, pathogens, sanitation, zinc.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26563333 Doping of Conveyor Belt Materials with Nanostructured Fillers to Adapt Innovative Performance Characteristics
Authors: S. Falkenberg, L. Overmeyer
Abstract:
The “conveyor belt" as a product represents a complex high performance component with a wide range of different applications. Further development of these highly complex components demands an integration of new technologies and new enhanced materials. In this context nanostructured fillers appear to have a more promising effect on the performance of the conveyor belt composite than conventional micro-scaled fillers. Within the project “DotTrans" nanostructured fillers, for example silicon dioxide, are used to optimize performance parameters of conveyor belt systems. The objective of the project includes operating parameters like energy consumption or friction characteristics as well as adaptive parameters like cut or wear resistance.Keywords: Conveyor belt, nanostructured fillers, wear resistance, friction characteristics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21463332 Improved MARS Ciphering Using a Metamorphic-Enhanced Function
Authors: Moataz M. Naguib, Hatem Khater, A. Baith Mohamed
Abstract:
MARS is a shared-key (symmetric) block cipher algorithm supporting 128-bit block size and a variable key size of between 128 and 448 bits. MARS has a several rounds of cryptographic core that is designed to take advantage of the powerful results for improving security/performance tradeoff over existing ciphers. In this work, a new function added to improve the ciphering process it is called, Meta-Morphic function. This function use XOR, Rotating, Inverting and No-Operation logical operations before and after encryption process. The aim of these operations is to improve MARS cipher process and makes a high confusion criterion for the Ciphertext.
Keywords: AES, MARS, Metamorphic, Cryptography, Block Cipher.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20433331 A New Method Presentation for Fault Location in Power Transformers
Authors: Hossein Mohammadpour, Rahman Dashti
Abstract:
Power transformers are among the most important and expensive equipments in the electric power systems. Consequently the transformer protection is an essential part of the system protection. This paper presents a new method for locating transformer winding faults such as turn-to-turn, turn-to-core, turn-totransformer body, turn-to-earth, and high voltage winding to low voltage winding. In this study the current and voltage signals of input and output terminals of the transformer are measured, which the Fourier transform of measured signals and harmonic analysis determine the fault's location.Keywords: turn-to-turn faults, short circuit, Fourier transform, harmonic analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25903330 Bioactivity Evaluation of Cucurbitin Derived Enzymatic Hydrolysates
Authors: Ž. Vaštag, Lj. Popović, S. Popović
Abstract:
After cold pressing of pumpkin oil, the defatted oil cake (PUOC) was utilised as raw material for processing of bio-functional hydrolysates. In this study, the in vitro bioactivity of an alcalase (AH) and a pepsin hydrolysate (PH) prepared from the major pumpkin 12S globulin (cucurbitin) are compared. The hydrolysates were produced at optimum reaction conditions (temperature, pH) for the enzymes, during 60min. The bioactivity testing included antioxidant and angiotensin I converting enzyme inhibitory activity assays. The hydrolysates showed high potential as natural antioxidants and possibly antihypertensive agents in functional food or nutraceuticals. Additionally, preliminary studies have shown that both hydrolysates could exhibit modest α-amylase inhibitory activity, which indicates on their hypoglycemic potential.
Keywords: Cucurbitin, alcalase, pepsin, protein hydrolysates, in vitro bioactivity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25713329 A Four Method Framework for Fighting Software Architecture Erosion
Authors: Sundus Ayyaz, Saad Rehman, Usman Qamar
Abstract:
Software Architecture is the basic structure of software that states the development and advancement of a software system. Software architecture is also considered as a significant tool for the construction of high quality software systems. A clean design leads to the control, value and beauty of software resulting in its longer life while a bad design is the cause of architectural erosion where a software evolution completely fails. This paper discusses the occurrence of software architecture erosion and presents a set of methods for the detection, declaration and prevention of architecture erosion. The causes and symptoms of architecture erosion are observed with the examples of prescriptive and descriptive architectures and the practices used to stop this erosion are also discussed by considering different types of software erosion and their affects. Consequently finding and devising the most suitable approach for fighting software architecture erosion and in some way reducing its affect is evaluated and tested on different scenarios.
Keywords: Software Architecture, Architecture Erosion, Prescriptive Architecture, Descriptive Architecture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21543328 Application of Artificial Intelligence to Schedule Operability of Waterfront Facilities in Macro Tide Dominated Wide Estuarine Harbour
Authors: A. Basu, A. A. Purohit, M. M. Vaidya, M. D. Kudale
Abstract:
Mumbai, being traditionally the epicenter of India's trade and commerce, the existing major ports such as Mumbai and Jawaharlal Nehru Ports (JN) situated in Thane estuary are also developing its waterfront facilities. Various developments over the passage of decades in this region have changed the tidal flux entering/leaving the estuary. The intake at Pir-Pau is facing the problem of shortage of water in view of advancement of shoreline, while jetty near Ulwe faces the problem of ship scheduling due to existence of shallower depths between JN Port and Ulwe Bunder. In order to solve these problems, it is inevitable to have information about tide levels over a long duration by field measurements. However, field measurement is a tedious and costly affair; application of artificial intelligence was used to predict water levels by training the network for the measured tide data for one lunar tidal cycle. The application of two layered feed forward Artificial Neural Network (ANN) with back-propagation training algorithms such as Gradient Descent (GD) and Levenberg-Marquardt (LM) was used to predict the yearly tide levels at waterfront structures namely at Ulwe Bunder and Pir-Pau. The tide data collected at Apollo Bunder, Ulwe, and Vashi for a period of lunar tidal cycle (2013) was used to train, validate and test the neural networks. These trained networks having high co-relation coefficients (R= 0.998) were used to predict the tide at Ulwe, and Vashi for its verification with the measured tide for the year 2000 & 2013. The results indicate that the predicted tide levels by ANN give reasonably accurate estimation of tide. Hence, the trained network is used to predict the yearly tide data (2015) for Ulwe. Subsequently, the yearly tide data (2015) at Pir-Pau was predicted by using the neural network which was trained with the help of measured tide data (2000) of Apollo and Pir-Pau. The analysis of measured data and study reveals that: The measured tidal data at Pir-Pau, Vashi and Ulwe indicate that there is maximum amplification of tide by about 10-20 cm with a phase lag of 10-20 minutes with reference to the tide at Apollo Bunder (Mumbai). LM training algorithm is faster than GD and with increase in number of neurons in hidden layer and the performance of the network increases. The predicted tide levels by ANN at Pir-Pau and Ulwe provides valuable information about the occurrence of high and low water levels to plan the operation of pumping at Pir-Pau and improve ship schedule at Ulwe.Keywords: Artificial neural network, back-propagation, tide data, training algorithm.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17133327 Effects of Centrifugation, Encapsulation Method and Different Coating Materials on the Total Antioxidant Activity of the Microcapsules of Powdered Cherry Laurels
Authors: B. Cilek Tatar, G. Sumnu, M. Oztop, E. Ayaz
Abstract:
Encapsulation protects sensitive food ingredients against heat, oxygen, moisture and pH until they are released to the system. It can mask the unwanted taste of nutrients that are added to the foods for fortification purposes. Cherry laurels (Prunus laurocerasus) contain phenolic compounds which decrease the proneness to several chronic diseases such as types of cancer and cardiovascular diseases. The objective of this research was to study the effects of centrifugation, different coating materials and homogenization methods on microencapsulation of powders obtained from cherry laurels. In this study, maltodextrin and mixture of maltodextrin:whey protein with a ratio of 1:3 (w/w) were chosen as coating materials. Total solid content of coating materials was kept constant as 10% (w/w). Capsules were obtained from powders of freeze-dried cherry laurels through encapsulation process by silent crusher homogenizer or microfluidization. Freeze-dried cherry laurels were core materials and core to coating ratio was chosen as 1:10 by weight. To homogenize the mixture, high speed homogenizer was used at 4000 rpm for 5 min. Then, silent crusher or microfluidizer was used to complete encapsulation process. The mixtures were treated either by silent crusher for 1 min at 75000 rpm or microfluidizer at 50 MPa for 3 passes. Freeze drying for 48 hours was applied to emulsions to obtain capsules in powder form. After these steps, dry capsules were grounded manually into a fine powder. The microcapsules were analyzed for total antioxidant activity with DPPH (1,1-diphenyl-2-picrylhydrazyl) radical scavenging method. Prior to high speed homogenization, the samples were centrifuged (4000 rpm, 1 min). Centrifugation was found to have positive effect on total antioxidant activity of capsules. Microcapsules treated by microfluidizer were found to have higher total antioxidant activities than those treated by silent crusher. It was found that increasing whey protein concentration in coating material (using maltodextrin:whey protein 1:3 mixture) had positive effect on total antioxidant activity for both silent crusher and microfluidization methods. Therefore, capsules prepared by microfluidization of centrifuged mixtures can be selected as the best conditions for encapsulation of cherry laurel powder by considering their total antioxidant activity. In this study, it was shown that capsules prepared by these methods can be recommended to be incorporated into foods in order to enhance their functionality by increasing antioxidant activity.
Keywords: Antioxidant activity, cherry laurel, microencapsulation, microfluidization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 13093326 Thermal Performance of a Pair of Synthetic Jets Equipped in Microchannel
Authors: J. Mohammadpour, G. E. Lau, S. Cheng, A. Lee
Abstract:
Numerical study was conducted using two synthetic jet actuators attached underneath a micro-channel. By fixing the oscillating frequency and diaphragm amplitude, the effects on the heat transfer within the micro-channel were investigated with two synthetic jets being in-phase and 180° out-of-phase at different orifice spacing. There was a significant benefit identified with two jets being 180° out-of-phase with each other at the orifice spacing of 2 mm. By having this configuration, there was a distinct pattern of vortex forming which disrupts the main channel flow as well as promoting thermal mixing at high velocity within the channel. Therefore, this configuration achieved higher cooling performance compared to the other cases studied in terms of the reduction in the maximum temperature and cooling uniformity in the silicon wafer.Keywords: Synthetic jets, microchannel, electronic cooling, computational fluid dynamics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8143325 Modeling and Investigation of Elongation in Free Explosive Forming of Aluminum Alloy Plate
Authors: R. Alipour, F.Najarian
Abstract:
Because of high ductility, aluminum alloys, have been widely used as an important base of metal forming industries. But the main week point of these alloys is their low strength so in forming them with conventional methods like deep drawing, hydro forming, etc have been always faced with problems like fracture during of forming process. Because of this, recently using of explosive forming method for forming of these plates has been recommended. In this paper free explosive forming of A2024 aluminum alloy is numerically simulated and during it, explosion wave propagation process is studied. Consequences of this simulation can be effective in prediction of quality of production. These consequences are compared with an experimental test and show the superiority of this method to similar methods like hydro forming and deep drawing.
Keywords: Free explosive forming, CEL, Johnson cook.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23083324 Hybrid Power – Application for Tourism in Isolated Areas
Authors: Aurelian Octavian Ciucâ, Ioan Bitir-Istrate, Mircea Scripcariu
Abstract:
The rapidly increasing costs of power line extensions and fossil fuel, combined with the desire to reduce carbon dioxide emissions pushed the development of hybrid power system suited for remote locations, the purpose in mind being that of autonomous local power systems. The paper presents the suggested solution for a “high penetration" hybrid power system, it being determined by the location of the settlement and its “zero policy" on carbon dioxide emissions. The paper focuses on the technical solution and the power flow management algorithm of the system, taking into consideration local conditions of development.Keywords: Renewable energy, hybrid power system, wind turbine, photovoltaic panels, bio-diesel cogeneration, bio-fuel.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16203323 Performance Evaluation of Routing Protocols for High Density Ad Hoc Networks Based on Energy Consumption by GlomoSim Simulator
Abstract:
Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR), Ad Hoc On-Demand Distance Vector Routing (AODV), location-aided routing (LAR1).Our evaluation is based on energy consumption in mobile ad hoc networks. The performance differentials are analyzed using varying network load, mobility, and network size. We simulate protocols with GLOMOSIM simulator. Based on the observations, we make recommendations about when the performance of either protocol can be best.
Keywords: Ad hoc Network, energy consumption, Glomosim, routing protocols.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21353322 The Use of Complex Contourlet Transform on Fusion Scheme
Authors: Dipeng Chen, Qi Li
Abstract:
Image fusion aims to enhance the perception of a scene by combining important information captured by different sensors. Dual-Tree Complex Wavelet (DT-CWT) has been thouroughly investigated for image fusion, since it takes advantages of approximate shift invariance and direction selectivity. But it can only handle limited direction information. To allow a more flexible directional expansion for images, we propose a novel fusion scheme, referred to as complex contourlet transform (CCT). It successfully incorporates directional filter banks (DFB) into DT-CWT. As a result it efficiently deal with images containing contours and textures, whereas it retains the property of shift invariance. Experimental results demonstrated that the method features high quality fusion performance and can facilitate many image processing applications.Keywords: Complex contourlet transform, Complex wavelettransform, Fusion.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15973321 English Classroom for SLA of Students and Small and Medium Entrepreneurs in Thailand
Authors: S. Yordchim, G. Anugkakul, T. Gibbs
Abstract:
The English competence of Thai people was examined in the context of knowledge of English in everyday life for Small and Medium Entrepreneurs (SMEs), and also integrated with Second language acquisition (SLA) students’ classroom. Second language acquisition was applied to the results of the questionnaires and interview forms. Levels of the need on English used for SME entrepreneurs in Thailand, satisfaction on joining the street classroom project were shown to be significantly high for some certain language functions and satisfaction. Finding suggests that the language functions on etiquette for professional use is essential and useful because lesson learned can be used in the real situation for their career. Implications for the climate of the street classroom are discussed.
Keywords: English classroom, second language acquisition, Small and Medium Entrepreneurs, Thai students.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22113320 Lipase Catalyzed Synthesis of Aromatic Esters of Sugar Alcohols
Authors: R. Croitoru, L. A. M. van den Broek, A. E. Frissen, C. M. Davidescu, F. Peter, C. G. Boeriu
Abstract:
Commercially available lipases (Candida antarctica lipase B, Novozyme 435, Thermomyces lanuginosus lipase, and Lipozyme TL IM), as well as sol-gel immobilized lipases, have been screened for their ability to acylate regioselectively xylitol, sorbitol, and mannitol with a phenolic ester in a binary mixture of t-butanol and dimethylsulfoxide. HPLC and MALDI-TOF MS analysis revealed the exclusive formation of monoesters for all studied sugar alcohols. The lipases immobilized by the sol-gel entrapment method proved to be efficient catalysts, leading to high conversions (up to 60%) in the investigated acylation reactions. From a sequence of silane precursors with different nonhydrolyzable groups in their structure, the presence of octyl and i-butyl group was most beneficial for the catalytic activity of sol-gel entrapped lipases in the studied process.
Keywords: Lipase, phenolic ester, specificity, sugar alcohol, transesterification.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22293319 New Fourth Order Explicit Group Method in the Solution of the Helmholtz Equation
Authors: Norhashidah Hj. Mohd Ali, Teng Wai Ping
Abstract:
In this paper, the formulation of a new group explicit method with a fourth order accuracy is described in solving the two dimensional Helmholtz equation. The formulation is based on the nine-point fourth order compact finite difference approximation formula. The complexity analysis of the developed scheme is also presented. Several numerical experiments were conducted to test the feasibility of the developed scheme. Comparisons with other existing schemes will be reported and discussed. Preliminary results indicate that this method is a viable alternative high accuracy solver to the Helmholtz equation.
Keywords: Explicit group method, finite difference, Helmholtz equation, five-point formula, nine-point formula.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20833318 Modeling and Simulation of Photovoltaic based LED Lighting System
Authors: Ankit R Patel, Ankit A Patel, Mahesh A Patel, Dhaval R Vyas
Abstract:
Although lighting systems powered by Photovoltaic (PV) cells have existed for many years, they are not widely used, especially in lighting for buildings, due to their high initial cost and low conversion efficiency. One of the technical challenges facing PV powered lighting systems has been how to use dc power generated by the PV module to energize common light sources that are designed to operate efficiently under ac power. Usually, the efficiency of the dc light sources is very poor compared to ac light sources. Rapid developments in LED lighting systems have made this technology a potential candidate for PV powered lighting systems. This study analyzed the efficiency of each component of PV powered lighting systems to identify optimum system configurations for different applications.Keywords: Energy Efficiency, LED, Modeling of systems, Photovoltaic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32043317 Why do Clawback Provisions Affect Financial Reporting Quality? - An Analysis of Trigger Effects
Authors: Yu-Chun Lin
Abstract:
We identify clawback triggers from firms- proxy statements (Form DEF 14A) and use the likelihood of restatements to proxy for financial reporting quality. Based on a sample of 578 U.S. firms that voluntarily adopt clawback provisions during 2003-2009, when restatement-based triggers could be decomposed into two types: fraud and unintentional error, and we do observe the evidence that using fraud triggers is associated with high financial reporting quality. The findings support that fraud triggers can enhance deterrent effect of clawback provision by establishing a viable disincentive against fraud, misconduct, and otherwise harmful acts. These results are robust to controlling for the compensation components, to different sample specifications and to a number of sensitivity.Keywords: Accruals quality, Clawback provisions, Compensation, Restatements.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25933316 Synthesis of Novel Nanostructured Catalysts for Pyrolysis of Biomass
Authors: Phuong T. Dang, Hy G. Le, Giang T. Pham, Hong T. M. Vu, Kien T, Nguyen, Canh D. Dao, Giang H. Le, Hoa T. K. Tran, Quang K. Nguyen, Tuan A. Vu
Abstract:
Nanostructured catalysts were successfully prepared by acidification of diatomite and regeneration of FCC spent catalysts. The obtained samples were characterized by IR, XRD, SEM, EDX, MAS-NMR (27Al and 29Si), NH3-TPD and tested in catalytic pyrolysis of biomass (rice straw). The results showed that the similar bio-oil yield of 41.4% can be obtained by pyrolysis with catalysts at 450oC as compared to that of the pyrolysis without catalyst at 550oC. The bio-oil yield reached a maximum of 42.55% at the pyrolysis temperature of 500oC with catalytic content of 20%. Moreover, by catalytic pyrolysis, bio-oil quality was better as reflected in higher ratio of H/C, lower ratio of O/C. This clearly indicated high application potential of these new nanostructured catalysts in the production of bio-oil with low oxygenated compounds.
Keywords: Acidified diatomite, biomass, catalytic pyrolysis, bio-oil, nanostructured catalysts, regenerated FCC catalyst.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26543315 Features of Following the Customs and Traditions in Turkestan in the Late XIXth and Early XXth Centuries
Authors: M. Nogaibayeva, Zh. Kumganbayev
Abstract:
This article discusses the customs and traditions in Turkestan in the late XIXth and early XXth centuries. Having a long history, Turkestan is well-known as the birthplace of many nations and nationalities. The name of Turkestan is also given to it for a reason - the land of the Turkic peoples who inhabited Central Asia and united under together. Currently, nations and nationalities of the Turkestan region formed their own sovereign states, and every year they prove their country names in the world community. Political, economic importance of Turkestan, which became the gold wire between Asia and Europe was always very high. So systematically various aggressive actions were made by several great powers. As a result of expansionary policy of colonization of the Russian Empire - the Turkestan has appeared.Keywords: Turkestan, Turkic people, Asia and Europe, Russian Empire, democracy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17513314 Advanced Deployable/Retractable Solar Panel System for Satellite Applications
Authors: Zane Brough, Claudio Paoloni
Abstract:
Modern low earth orbit (LEO) satellites that require multi-mission flexibility are highly likely to be repositioned between different operational orbits. While executing this process the satellite may experience high levels of vibration and environmental hazards, exposing the deployed solar panel to dangerous stress levels, fatigue and space debris, hence it is desirable to retract the solar array before satellite repositioning to avoid damage or failure.
A novel concept of deployable/retractable hybrid solar array systemcomposed of both rigid and flexible solar panels arranged within a petal formation, aimed to provide a greater power to volume ratio while dramatically reducing mass and cost is proposed.
Keywords: Deployable Solar Panel, Satellite, Retractable Solar Panel, Hybrid Solar Panel.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 46753313 Influence of High Temperature and Humidity on Polymer Composites Used in Relining of Sewage
Authors: Parastou Kharazmi, Folke Björk
Abstract:
Some of the main causes for degradation of polymeric materials are thermal aging, hydrolysis, oxidation or chemical degradation by acids, alkalis or water. The first part of this paper provides a brief summary of advances in technology, methods and specification of composite materials for relining as a rehabilitation technique for sewage systems. The second part summarizes an investigation on frequently used composite materials for relining in Sweden, the rubber filled epoxy composite and reinforced polyester composite when they were immersed in deionized water or in dry conditions, and elevated temperatures up to 80°C in the laboratory. The tests were conducted by visual inspection, microscopy, Dynamic Mechanical Analysis (DMA), Differential Scanning Calorimetry (DSC) as well as mechanical testing, three point bending and tensile testing.
Keywords: Composite, epoxy, polyester, relining, sewage.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17033312 Modeling HIV/AIDS Prevention by Defense
Authors: Farai Nyabadza
Abstract:
The functional response of an infective is the relationship between an infected individual-s infection rate and the abundance of the number of susceptibles that one can potentially be infected. In this paper, we consider defensive attitudes for HIV prevention (primary prevention) while at the same time emphasizing on offensive attitudes that reduce infection for those infected (secondary prevention). We look at how defenses can protect an uninfected individual in the case where high risk groups such as commercial sex workers and those who deliberately go out to look for partners. We propose an infection cycle that begins with a search, then an encounter, a proposal and contact. The infection cycle illustrates the various steps an infected individual goes through to successfully infect a susceptible. For heterogeneous transmission of HIV, there will be no infection unless there is contact. The ability to avoid an encounter, detection, proposal and contact constitute defense.Keywords: Functional response, Infection cycle, Prevention, Defences, SSS equation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15263311 Cooperative CDD Scheme Based on Hierarchical Modulation in OFDM System
Authors: Seung-Jun Yu, Yeong-Seop Ahn, Young-Min Ko, Hyoung-Kyu Song
Abstract:
In order to achieve high data rate and increase the spectral efficiency, multiple input multiple output (MIMO) system has been proposed. However, multiple antennas are limited by size and cost. Therefore, recently developed cooperative diversity scheme, which profits the transmit diversity only with the existing hardware by constituting a virtual antenna array, can be a solution. However, most of the introduced cooperative techniques have a common fault of decreased transmission rate because the destination should receive the decodable compositions of symbols from the source and the relay. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation. This scheme is free from the rate loss and allows seamless cooperative communication.Keywords: MIMO, Cooperative communication, CDD, Hierarchical modulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21983310 A Case Study of Key-Dependent Permutations in Feistel Ciphers
Authors: Hani Almimi, Ola Osabi, Azman Samsudin
Abstract:
Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposals is the key- dependent S-box which was implemented in some of the high-profile ciphers. In this paper a key-dependent permutation box is proposed and implemented on DES as a case study. The new modified DES, MDES, was tested against Diehard Tests, avalanche test, and performance test. The results showed that in general MDES is more resistible to attacks than DES with negligible overhead. Therefore, it is believed that the proposed key-dependent permutation should be considered as a valuable primitive that can help strengthen the security of Substitution-Permutation Network which is a core design in many Feistel based block ciphers.
Keywords: Block Cipher, Feistel Structure, DES, Diehard Tests, Avalanche Effect.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20103309 The Effect of Education Level on Psychological Empowerment and Burnout-The Mediating Role of Workplace Learning Behaviors
Authors: Sarit Rashkovits, Yael Livne
Abstract:
The study investigates the relationship between education level, workplace learning behaviors, psychological empowerment and burnout in a sample of 191 teachers. We hypothesized that education level will positively affect psychological state of increased empowerment and decreased burnout, and we purposed that these effects will be mediated by workplace learning behaviors. We used multiple regression analyses to test the model that included also the 6 following control variables: The teachers' age, gender, and teaching tenure; the schools' religious level, the pupils' needs: regular/ special needs, and the class level: elementary/ high school. The results support the purposed mediating model.Keywords: Education level, Learning behaviors, Psychological empowerment, Burnout.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27373308 The use of ICT for Learning Guidance for Junior High School in Indonesia
Authors: Tri Prasetyaningrum, Suyoto
Abstract:
In this paper, we will be present Guidance and Councelling (GC) class action research. The research was done because a fact that some students are still learning ways such as in elementary school. The research objective is to enhance the value of “academic performance report" grade by using ICT as GC Learning Guidance services. The research method was carried out with two cycles. First cycle is applying Learning Guidance services indirectly and not programmed. Second cycle into two implementing Learning Guidance services indirectly, programmed and using ICTs primarily mobile phones and computer media applications i.e. “m-NingBK©: Learning Guidance" and “screen saver: Learning Guidance". A research subject is a class VII student who has the lowest value of “academic performance report". The result is by using an indirect GC services with ICT there were significant changes.Keywords: ICT, Learning Guidance, action research and Guidance and Councelling
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16913307 Iterative Way to Acquire Information Technology for Defense and Aerospace
Authors: Ahmet Denker, Hakan Gürkan
Abstract:
Defense and Aerospace environment is continuously striving to keep up with increasingly sophisticated Information Technology (IT) in order to remain effective in today-s dynamic and unpredictable threat environment. This makes IT one of the largest and fastest growing expenses of Defense. Hundreds of millions of dollars spent a year on IT projects. But, too many of those millions are wasted on costly mistakes. Systems that do not work properly, new components that are not compatible with old ones, trendy new applications that do not really satisfy defense needs or lost through poorly managed contracts. This paper investigates and compiles the effective strategies that aim to end exasperation with low returns and high cost of Information Technology acquisition for defense; it tries to show how to maximize value while reducing time and expenditure.Keywords: Iterative process, acquisition management, project management, software economics, requirement analysis.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14003306 On the Analysis of IP Traffic Distribution in the Network of Suranaree University of Technology
Authors: Paramet Nualmuenwai, Chutima Prommak
Abstract:
This paper presents the IP traffic analysis. The traffic was collected from the network of Suranaree University of Technology using the software based on the Simple Network Management Protocol (SNMP). In particular, we analyze the distribution of the aggregated traffic during the hours of peak load and light load. The traffic profiles including the parameters described the traffic distributions were derived. From the statistical analysis applying three different methods, including the Kolmogorov Smirnov test, Anderson Darling test, and Chi-Squared test, we found that the IP traffic distribution is a non-normal distribution and the distributions during the peak load and the light load are different. The experimental study and analysis show high uncertainty of the IP traffic.Keywords: IP traffic analysis, IP traffic distribution, Traffic uncertainty
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15173305 Multivariate Analysis of Students’ Performance in Math Courses and Specific Engineering Courses
Authors: H. Naccache, R. Hleiss
Abstract:
The aim of this research is to study the relationship between the performance of engineering students in different math courses and their performance in specific engineering courses. The considered courses are taken mainly by engineering students during the first two years of their major. Several factors are being studied, such as gender and final grades in the math and specific engineering courses. Participants of this study comprised a sample of more than thousands of engineering students at Lebanese University during their tertiary academic years. A significant relationship tends to appear between these factors and the performance of students in engineering courses. Moreover, female students appear to outperform their male counterparts in both the math and engineering courses, and a high correlation was found between their grades in math courses and their grades in specific engineering courses. The results and implications of the study were being discussed.
Keywords: Education, engineering, math, performance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1529