Search results for: juxtaposition of past and present
1892 Disparity in Socio-Economic Development and Its Implications on Communal Conflicts: A Study on India's North-Eastern Region
Authors: Debasis Neogi
Abstract:
India-s North-Eastern part, comprising of seven states, is a lowly developed, tribal population dominated region in India. Inspite of the common Mongoloid origin and lifestyle of majority of the population residing here, sharp differences exist in the status of their socio-economic development. The present paper, through a state-wise analysis, makes an attempt to find out the extent of this disparity, especially on the socio-economic front. It illustrates the situations prevailing in health, education, economic and social cohesion sector. Discussion on the implications of such disparity on social stability finds that the causes of frequent insurgency activities, that have been penetrating the region for a long time, thereby creating communal conflicts, can be traced in the economic deprivation and disparity. In the last section, the paper makes policy prescription and suggests how by taking care of disparity and deprivation both poverty and the problem of communal conflicts can be controlled.
Keywords: Disparity, development, deprivation, communal conflicts.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 47391891 Learner Awareness Levels Questionnaire: Development and Preliminary Validation of the English and Malay Versions to Measure How and Why Students Learn
Authors: S. Chee Choy, Pauline Swee Choo Goh, Yow Lin Liew
Abstract:
The purpose of this study is to evaluate the English version and a Malay translation of the 21-item Learner Awareness Questionnaire for its application to assess student learning in higher education. The Learner Awareness Questionnaire, originally written in English, is a quantitative measure of how and why students learn. The questionnaire gives an indication of the process and motives to learn using four scales: survival, establishing stability, approval and loving to learn. Data in the present study came from 680 university students enrolled in various programmes in Malaysia. The Malay version of the questionnaire supported a similar four factor structure and internal consistency to the English version. The four factors of the Malay version also showed moderate to strong correlations with those of the English versions. The results suggest that the Malay version of the questionnaire is similar to the English version. However, further refinement to the questions is needed to strengthen the correlations between the two questionnaires.Keywords: Student learning, learner awareness, instrument validation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22611890 Intelligent Maximum Power Point Tracking Using Fuzzy Logic for Solar Photovoltaic Systems Under Non-Uniform Irradiation Conditions
Authors: P. Selvam, S. Senthil Kumar
Abstract:
Maximum Power Point Tracking (MPPT) has played a vital role to enhance the efficiency of solar photovoltaic (PV) power generation under varying atmospheric temperature and solar irradiation. However, it is hard to track the maximum power point using conventional linear controllers due to the natural inheritance of nonlinear I-V and P-V characteristics of solar PV systems. Fuzzy Logic Controller (FLC) is suitable for nonlinear system control applications and eliminating oscillations, circuit complexities present in the conventional perturb and observation and incremental conductance methods respectively. Hence, in this paper, FLC is proposed for tracking exact MPPT of solar PV power generation system under varying solar irradiation conditions. The effectiveness of the proposed FLC-based MPPT controller is validated through simulation and analysis using MATLAB/Simulink.
Keywords: Fuzzy logic controller, maximum power point tracking, photovoltaic.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15871889 Behavior of RC Buildings to Tsunami Action
Authors: Carlos H. Cuadra
Abstract:
The present report describes the characteristics of damages and behavior of reinforced concrete buildings during the tsunami action. The discussion is based on the field damage survey in selected cities located on the coast of the zone affected by the Great East Japan Earthquake on March 11, 2011. This earthquake is the most powerful know earthquake that has hit Japan with a magnitude 9.0 and with epicenter located at 129 km of Sendai city (off the coast). The earthquake triggered a destructive tsunami with run up height of up to 40 meters that mainly affect cities located on the Pacific Ocean coast of the Tohoku region (north-east region of Japan). Reinforced concrete buildings in general resist the tsunami without collapse however the non-structural elements like panels and ceilings were severely damaged. The analysis of damages has permitted to understand the behavior of RC buildings under tsunami attack, and has also permitted to establish recommendations for their use to take refuge from tsunami in places where natural topography makes impossible to reach hilltops or other safer places.Keywords: tsunami, RC buildings, East Japan Earthquake, seismic damage
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14851888 Resources and Strategies towards the Development of a Sustainable Construction Materials Industry in Botswana
Authors: G. Malumbela, E. U. Masuku
Abstract:
The economy of Botswana has increased extensively since its independence. In contrast to this increase, the construction industry which is one of the key indicators of a developing nation continues to be highly dependent on imported building material products from the neighbouring countries of South Africa, Namibia, Zimbabwe, and Zambia. Only two companies in the country currently blend cement. Even then, the overwhelming majority of raw materials used in the blends are imported. Furthermore, there are no glass manufacturers in Botswana. The ceramic industry is limited to the manufacture of clay bricks notwithstanding a few studios on crockery and sanitary ware which nonetheless use imported clay. This paper presents natural resources and industrial waste products in Botswana that can be used for the development of sustainable building materials. It also investigates at the distribution and cost of other widely used building materials in the country. Finally, the present paper looks at projects and national strategies aimed at a country-wide development of a sustainable building materials industry together with their successes and hitches.Keywords: Botswana construction industry, construction materials, natural resources, sustainable materials.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19651887 A Phenomic Algorithm for Reconstruction of Gene Networks
Authors: Rio G. L. D'Souza, K. Chandra Sekaran, A. Kandasamy
Abstract:
The goal of Gene Expression Analysis is to understand the processes that underlie the regulatory networks and pathways controlling inter-cellular and intra-cellular activities. In recent times microarray datasets are extensively used for this purpose. The scope of such analysis has broadened in recent times towards reconstruction of gene networks and other holistic approaches of Systems Biology. Evolutionary methods are proving to be successful in such problems and a number of such methods have been proposed. However all these methods are based on processing of genotypic information. Towards this end, there is a need to develop evolutionary methods that address phenotypic interactions together with genotypic interactions. We present a novel evolutionary approach, called Phenomic algorithm, wherein the focus is on phenotypic interaction. We use the expression profiles of genes to model the interactions between them at the phenotypic level. We apply this algorithm to the yeast sporulation dataset and show that the algorithm can identify gene networks with relative ease.
Keywords: Evolutionary computing, gene expression analysis, gene networks, microarray data analysis, phenomic algorithms.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19261886 Order Reduction of Linear Dynamic Systems using Stability Equation Method and GA
Authors: G. Parmar, R. Prasad, S. Mukherjee
Abstract:
The authors present an algorithm for order reduction of linear dynamic systems using the combined advantages of stability equation method and the error minimization by Genetic algorithm. The denominator of the reduced order model is obtained by the stability equation method and the numerator terms of the lower order transfer function are determined by minimizing the integral square error between the transient responses of original and reduced order models using Genetic algorithm. The reduction procedure is simple and computer oriented. It is shown that the algorithm has several advantages, e.g. the reduced order models retain the steady-state value and stability of the original system. The proposed algorithm has also been extended for the order reduction of linear multivariable systems. Two numerical examples are solved to illustrate the superiority of the algorithm over some existing ones including one example of multivariable system.
Keywords: Genetic algorithm, Integral square error, Orderreduction, Stability equation method.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 31911885 Small and Medium-Sized Enterprises, Flash Flooding and Organisational Resilience Capacity: Qualitative Findings on Implications of the Catastrophic 2017 Flash Flood Event in Mandra, Greece
Authors: Antonis Skouloudis, Georgios Deligiannakis, Panagiotis Vouros, Konstantinos Evangelinos, Ioannis Nikolaou
Abstract:
On November 15th, 2017, a catastrophic flash flood devastated the city of Mandra in Central Greece, resulting in 24 fatalities and extensive damages to the built environment and infrastructure. It was Greece’s deadliest and most destructive flood event for the past 40 years. In this paper, we examine the consequences of this event to small and medium-sized enterprises (SMEs) operating in Mandra during the flood event, which were affected by the floodwaters to varying extents. In this context, we conducted semi-structured interviews with business owners-managers of 45 SMEs located in flood inundated areas and are still active nowadays, based on an interview guide that spanned 27 topics. The topics pertained to the disaster experience of the business and business owners-managers, knowledge and attitudes towards climate change and extreme weather, aspects of disaster preparedness and related assistance needs. Our findings reveal that the vast majority of the affected businesses experienced heavy damages in equipment and infrastructure or total destruction, which resulted in business interruption from several weeks up to several months. Assistance from relatives or friends helped for the damage repairs and business recovery, while state compensations were deemed insufficient compared to the extent of the damages. Most interviewees pinpoint flooding as one of the most critical risks, and many connect it with the climate crisis. However, they are either not willing or unable to apply property-level prevention measures in their businesses due to cost considerations or complex and cumbersome bureaucratic processes. In all cases, the business owners are fully aware of the flood hazard implications, and since the recovery from the event, they have engaged in basic mitigation measures and contingency plans in case of future flood events. Such plans include insurance contracts whenever possible (as the vast majority of the affected SMEs were uninsured at the time of the 2017 event) as well as simple relocations of critical equipment within their property. The study offers fruitful insights on latent drivers and barriers of SMEs’ resilience capacity to flash flooding. In this respect, findings such as ours, highlighting tensions that underpin behavioural responses and experiences, can feed into: a) bottom-up approaches for devising actionable and practical guidelines, manuals and/or standards on business preparedness to flooding, and, ultimately, b) policy-making for an enabling environment towards a flood-resilient SME sector.
Keywords: Flash flood, small and medium-sized enterprises, organisational resilience capacity, disaster preparedness, qualitative study.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4951884 Influence of the Low Frequency Ultrasound on the Cadmium (II) Biosorption by an Ecofriendly Biocomposite (Extraction Solid Waste of Ammi visnaga / Calcium Alginate): Kinetic Modeling
Authors: L. Nouri Taiba, Y. Bouhamidi, F. Kaouah, Z. Bendjama, M. Trari
Abstract:
In the present study, an ecofriendly biocomposite namely calcium alginate immobilized Ammi Visnaga (Khella) extraction waste (SWAV/CA) was prepared by electrostatic extrusion method and used on the cadmium biosorption from aqueous phase with and without the assistance of ultrasound in batch conditions. The influence of low frequency ultrasound (37 and 80 KHz) on the cadmium biosorption kinetics was studied. The obtained results show that the ultrasonic irradiation significantly enhances and improves the efficiency of the cadmium removal. The Pseudo first order, Pseudo-second-order, Intraparticle diffusion, and Elovich models were evaluated using the non-linear curve fitting analysis method. Modeling of kinetic results shows that biosorption process is best described by the pseudo-second order and Elovich, in both the absence and presence of ultrasound.Keywords: Biocomposite, biosorption, cadmium, non-linear analysis, ultrasound.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15961883 Comparative Study on the Antioxidant Activity of Leaf Extract and Carotenoids Extract from Ipomoea batatas var. Oren (Sweetpotato) Leaves
Authors: Seow-Mun Hue, Amru Nasrulhaq Boyce, Chandran Somasundram
Abstract:
Ipomoea batatas (Sweetpotato) is currently ranked sixth in the total world food production and are planted mainly for their storage roots. The present study was undertaken to evaluate and compare the antioxidant properties of the leaf and carotenoids extract from the Ipomoea batatas var. Oren leaves. Total flavonoids in the leaf extract was 144.6 ± 40.5 μg/g compared to 114.86 ± 4.35 μg/g catechin equivalent in the carotenoids extract. Total polyphenols in the leaf extracts (3.470 ± 0.024 GAE g/100g DW) was slightly higher compared to carotenoids extract (2.994 ± 0.078 GAE g/100g DW). The carotenoids extract marked a higher radical scavenging capacity with the IC50= 491.86 μg/ml compared to leaf extract (IC50= 545.39 μg/ml). Concentration-dependent reducing activity was observed for both extracts. Thus, the carotenoids extraction process retained most of the antioxidant capacity from the leaves and can be made into potential natural yellow dye with antioxidant property.Keywords: antioxidants, carotenoids extract, Ipomoea batatas, sweetpotato leaves
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 32291882 Orbit Propagator and Geomagnetic Field Estimator for NanoSatellite: The ICUBE Mission
Authors: Lv Meibo, Naqvi Najam Abbas, Hina Arshad, Li YanJun
Abstract:
This research contribution is drafted to present the orbit design, orbit propagator and geomagnetic field estimator for the nanosatellites specifically for the upcoming CUBESAT, ICUBE-1 of the Institute of Space Technology (IST), Islamabad, Pakistan. The ICUBE mission is designed for the low earth orbit at the approximate height of 700KM. The presented research endeavor designs the Keplarian elements for ICUBE-1 orbit while incorporating the mission requirements and propagates the orbit using J2 perturbations, The attitude determination system of the ICUBE-1 consists of attitude determination sensors like magnetometer and sun sensor. The Geomagnetic field estimator is developed according to the model of International Geomagnetic Reference Field (IGRF) for comparing the magnetic field measurements by the magnetometer for attitude determination. The output of the propagator namely the Keplarians position and velocity vectors and the magnetic field vectors are compared and verified with the same scenario generated in the Satellite Tool Kit (STK).
Keywords: CUBESAT, Geomagnetic Field, ICUBE-1, Orbit Propagator, Satellite.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 36111881 Performance Analysis of a Flexible Manufacturing Line Operated Under Surplus-based Production Control
Authors: K. K. Starkov, A. Y. Pogromsky, I. J. B. F. Adan, J. E. Rooda
Abstract:
In this paper we present our results on the performance analysis of a multi-product manufacturing line. We study the influence of external perturbations, intermediate buffer content and the number of manufacturing stages on the production tracking error of each machine in the multi-product line operated under a surplusbased production control policy. Starting by the analysis of a single machine with multiple production stages (one for each product type), we provide bounds on the production error of each stage. Then, we extend our analysis to a line of multi-stage machines, where similarly, bounds on each production tracking error for each product type, as well as buffer content are obtained. Details on performance of the closed-loop flow line model are illustrated in numerical simulations.
Keywords: Flexible manufacturing systems, tracking systems, discrete time systems, production control, boundary conditions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15161880 Self-Supervised Pretraining on Paired Sequences of fMRI Data for Transfer Learning to Brain Decoding Tasks
Authors: Sean Paulsen, Michael Casey
Abstract:
In this work, we present a self-supervised pretraining framework for transformers on functional Magnetic Resonance Imaging (fMRI) data. First, we pretrain our architecture on two self-supervised tasks simultaneously to teach the model a general understanding of the temporal and spatial dynamics of human auditory cortex during music listening. Our pretraining results are the first to suggest a synergistic effect of multitask training on fMRI data. Second, we finetune the pretrained models and train additional fresh models on a supervised fMRI classification task. We observe significantly improved accuracy on held-out runs with the finetuned models, which demonstrates the ability of our pretraining tasks to facilitate transfer learning. This work contributes to the growing body of literature on transformer architectures for pretraining and transfer learning with fMRI data, and serves as a proof of concept for our pretraining tasks and multitask pretraining on fMRI data.
Keywords: Transfer learning, fMRI, self-supervised, brain decoding, transformer, multitask training.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1521879 Reading Strategy Awareness of English Major Students
Authors: Hsin-Yi Lien
Abstract:
The study explored the role of metacognition in foreign language anxiety on a sample of 411 Taiwanese students of English as a Foreign Language. The reading strategy inventory was employed to evaluate the tertiary learners’ level of metacognitive awareness and a semi-structured background questionnaire was also used to examine the learners’ perceptions of their English proficiency and satisfaction of their current English learning. In addition, gender and academic level differences in employment of reading strategies were investigated. The results showed the frequency of reading strategy use increase slightly along with academic years and males and females actually employ different reading strategies. The EFL tertiary learners in the present study utilized cognitive strategies more frequently than metacognitive strategies or support strategies. Male students use metacognitive strategy more often while female students use cognitive and support strategy more frequently.
Keywords: Cognitive strategy, gender differences, metacognitive strategy, support strategy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34271878 Multimodal Database of Emotional Speech, Video and Gestures
Authors: Tomasz Sapiński, Dorota Kamińska, Adam Pelikant, Egils Avots, Cagri Ozcinar, Gholamreza Anbarjafari
Abstract:
People express emotions through different modalities. Integration of verbal and non-verbal communication channels creates a system in which the message is easier to understand. Expanding the focus to several expression forms can facilitate research on emotion recognition as well as human-machine interaction. In this article, the authors present a Polish emotional database composed of three modalities: facial expressions, body movement and gestures, and speech. The corpora contains recordings registered in studio conditions, acted out by 16 professional actors (8 male and 8 female). The data is labeled with six basic emotions categories, according to Ekman’s emotion categories. To check the quality of performance, all recordings are evaluated by experts and volunteers. The database is available to academic community and might be useful in the study on audio-visual emotion recognition.Keywords: Body movement, emotion recognition, emotional corpus, facial expressions, gestures, multimodal database, speech.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 11251877 A Hybrid System of Hidden Markov Models and Recurrent Neural Networks for Learning Deterministic Finite State Automata
Authors: Pavan K. Rallabandi, Kailash C. Patidar
Abstract:
In this paper, we present an optimization technique or a learning algorithm using the hybrid architecture by combining the most popular sequence recognition models such as Recurrent Neural Networks (RNNs) and Hidden Markov models (HMMs). In order to improve the sequence/pattern recognition/classification performance by applying a hybrid/neural symbolic approach, a gradient descent learning algorithm is developed using the Real Time Recurrent Learning of Recurrent Neural Network for processing the knowledge represented in trained Hidden Markov Models. The developed hybrid algorithm is implemented on automata theory as a sample test beds and the performance of the designed algorithm is demonstrated and evaluated on learning the deterministic finite state automata.Keywords: Hybrid systems, Hidden Markov Models, Recurrent neural networks, Deterministic finite state automata.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 28851876 Examining Effects of Electronic Market Functions on Decrease in Product Unit Cost and Response Time to Customer
Authors: Maziyar Nouraee
Abstract:
Electronic markets in recent decades contribute remarkably in business transactions. Many organizations consider traditional ways of trade non-economical and therefore they do trade only through electronic markets. There are different categorizations of electronic markets functions. In one classification, functions of electronic markets are categorized into classes as information, transactions, and value added. In the present paper, effects of the three classes on the two major elements of the supply chain management are measured. The two elements are decrease in the product unit cost and reduction in response time to the customer. The results of the current research show that among nine minor elements related to the three classes of electronic markets functions, six factors and three factors influence on reduction of the product unit cost and reduction of response time to the customer, respectively.
Keywords: Electronic Commerce, Electronic Market, B2B Trade, Supply Chain Management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20091875 Analysis of Lightweight Register Hardware Threat
Authors: Yang Luo, Beibei Wang
Abstract:
In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.
Keywords: Side-channel analysis, hardware threat, register transfer level, dynamic power.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9931874 Flexure of Cantilever Thick Beams Using Trigonometric Shear Deformation Theory
Authors: Yuwaraj M. Ghugal, Ajay G. Dahake
Abstract:
A trigonometric shear deformation theory for flexure of thick beams, taking into account transverse shear deformation effects, is developed. The number of variables in the present theory is same as that in the first order shear deformation theory. The sinusoidal function is used in displacement field in terms of thickness coordinate to represent the shear deformation effects. The noteworthy feature of this theory is that the transverse shear stresses can be obtained directly from the use of constitutive relations with excellent accuracy, satisfying the shear stress free conditions on the top and bottom surfaces of the beam. Hence, the theory obviates the need of shear correction factor. Governing differential equations and boundary conditions are obtained by using the principle of virtual work. The thick cantilever isotropic beams are considered for the numerical studies to demonstrate the efficiency of the. Results obtained are discussed critically with those of other theories.
Keywords: Trigonometric shear deformation, thick beam, flexure, principle of virtual work, equilibrium equations, stress.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 30931873 Dynamic Analysis of Transmission Line Towers
Authors: Srikanth L., Neelima Satyam D.
Abstract:
The transmission line towers are one of the important life line structures in the distribution of power from the source to the various places for several purposes. The predominant external loads which act on these towers are wind and earthquake loads. In this present study tower is analyzed using Indian Standards IS: 875:1987(Wind Load), IS: 802:1995(Structural steel), IS:1893:2002 (Earthquake) and dynamic analysis of tower has been performed considering ground motion of 2001 Bhuj Earthquake (India). The dynamic analysis was performed considering a tower system consisting two towers spaced 800m apart and 35m height each. This analysis has been performed using numerical time stepping finite difference method which is central difference method were employed by a developed MATLAB program to get the normalized ground motion parameters includes acceleration, frequency, velocity which are important in designing the tower. The tower is analyzed using response spectrum analysis.
Keywords: Response Spectra, Dynamic Analysis, Central Difference Method, Transmission Tower.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 40891872 A Comparison of Real Valued Transforms for Image Compression
Authors: Shivali D. Kulkarni, Ameya K. Naik, Nitin S. Nagori
Abstract:
In this paper we present simulation results for the application of a bandwidth efficient algorithm (mapping algorithm) to an image transmission system. This system considers three different real valued transforms to generate energy compact coefficients. First results are presented for gray scale and color image transmission in the absence of noise. It is seen that the system performs its best when discrete cosine transform is used. Also the performance of the system is dominated more by the size of the transform block rather than the number of coefficients transmitted or the number of bits used to represent each coefficient. Similar results are obtained in the presence of additive white Gaussian noise. The varying values of the bit error rate have very little or no impact on the performance of the algorithm. Optimum results are obtained for the system considering 8x8 transform block and by transmitting 15 coefficients from each block using 8 bits.Keywords: Additive white Gaussian noise channel, mapping algorithm, peak signal to noise ratio, transform encoding.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15021871 Efficacy and Stability of Ceramic Powder to Inactivate Avian Influenza Virus
Authors: Chanathip Thammakarn, Misato Tsujimura, Keisuke Satoh, Tomomi Hasegawa, Miho Tamura, Akinobu Kawamura, Yuki Ishida, Atsushi Suguro, Hakimullah Hakim, Sakchai Ruenphet, , Kazuaki Takehara
Abstract:
This experiment aims to demonstrate the efficacy of ceramic powder derived from various sources to inactivate avian influenza virus and its possibility to use in the environment. The ceramics used in the present experiment were derived from chicken feces (CF), scallop shell (SS), polyvinyl chloride (PVC) and soybean (SB). All ceramics were mixed with low pathogenic AIV (LPAIV) H7N1, and then kept at room temperature. The recovered virus was titrated onto Madin-Darby canine kidney (MDCK) cells. All ceramics were assessed the inactivation stability in the environment by keeping under sunlight and under wet-dry condition until reached 7 week or 7 resuspension times respectively. The results indicate that all ceramics have excellent efficacy to inactivate LPAIV. This efficacy can be maintained under the simulated condition. The ceramics are expected to be the good materials for application in the biosecurity system at farms.
Keywords: Avian Influenza, Ceramics, Efficacy, Stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18261870 Effect of Entomopathogenic Fungi on the Food Consumption of Acrididae Species
Authors: S. Kumar, R. Sultana
Abstract:
This study was conducted to evaluate the effect of Aspergillus species on acridid populations which are major agricultural pests of rice, sugarcane, wheat, maize and fodder crops in Pakistan. Three and replicates i.e. Aspergillus flavus, A. fumigatus and A. niger, excluding the control, were held under laboratory conditions. It was observed that consumption faecal production of acridids was significantly reduced after the pathogenic application of Aspergillus. In the control replicate, the mortality ratio for stage (N4-N6) was maximum on day 2nd i.e. [F10.7 = 18.33, P < 0.05] followed by [F4.20 = 07.85, P < 0.05] and [F3.77 = 06.11, P < 0.05] on 4th and 3rd day, respectively. Similarly, it was a minimum i.e. [F0.48 = 84.65, P < 0.05] on the 1st day. It was also noted that faecal production of Acridid nymphs was not significantly affected when treated with conidial concentration in H2O formulation; however, it was significantly reduced after the contamination with conidial concentration in oil. The high morality of acridids after contamination of Aspergillus supports their use as bio-control agent for reducing pest population. The present study recommends that exploration and screening must be conducted to provide additional pathogens for evaluation as potential biological control against grasshoppers and locusts.
Keywords: Acridid, agriculture, Aspergillus, formulation, Grasshoppers.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8801869 Extending the Aspect Oriented Programming Joinpoint Model for Memory and Type Safety
Authors: Amjad Nusayr
Abstract:
Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory is have a valid pointer or a reference with a valid type. Aspect Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and Database transaction managing. In this paper we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.
Keywords: Aspect oriented programming, programming languages, software security, memory and type safety.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4151868 Face Image Coding Using Face Prototyping
Authors: Jaroslav Polec, Lenka Krulikovská, Natália Helešová, Tomáš Hirner
Abstract:
In this paper we present a novel approach for face image coding. The proposed method makes a use of the features of video encoders like motion prediction. At first encoder selects appropriate prototype from the database and warps it according to features of encoding face. Warped prototype is placed as first I frame. Encoding face is placed as second frame as P frame type. Information about features positions, color change, selected prototype and data flow of P frame will be sent to decoder. The condition is both encoder and decoder own the same database of prototypes. We have run experiment with H.264 video encoder and obtained results were compared to results achieved by JPEG and JPEG2000. Obtained results show that our approach is able to achieve 3 times lower bitrate and two times higher PSNR in comparison with JPEG. According to comparison with JPEG2000 the bitrate was very similar, but subjective quality achieved by proposed method is better.
Keywords: Triangulation, H.264, Model-based coding, Average face
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17251867 Enabling Remote Desktop in a Virtualized Environment for Cloud Services
Authors: Shuen-Tai Wang, Yu-Ching Lin, Hsi-Ya Chang
Abstract:
Cloud computing is the innovative and leading information technology model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. This paper presents our development on enabling an individual user's desktop in a virtualized environment, which is stored on a remote virtual machine rather than locally. We present the initial work on the integration of virtual desktop and application sharing with virtualization technology. Given the development of remote desktop virtualization, this proposed effort has the potential to positively provide an efficient, resilience and elastic environment for online cloud service. Users no longer need to burden the cost of software licenses and platform maintenances. Moreover, this development also helps boost user productivity by promoting a flexible model that lets users access their desktop environments from virtually anywhere.
Keywords: Cloud Computing, Virtualization, Virtual Desktop, Elastic Environment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22071866 Determination of the Content of Teachers’ Presentism through a Web-Based Delphi Method
Authors: Tsai-Hsiu Lin
Abstract:
Presentism is one of the orientations of teachers’ teaching culture. However, there are few researchers to explore it in Taiwan. The objective of this study is to establish an expert-based determination of the content of teachers’ presentism in Taiwan. The author reviewed the works of Jackson, Lortie, and Hargreaves and employed Hargreaves’ three forms of teachers’ presentism as a framework to design the questionnaire of this study. The questionnaire of teachers’ presentism comprised of 42 statements. A three-round web-based Delphi survey was proposed to 14 participants (two teacher educators, two educational administrators, three school principals, and seven schoolteachers), 13 participants (92.86%) completed the three-rounds of the study. The participants were invited to indicate the importance of each statement. The Delphi study used means and standard deviation to present information concerning the collective judgments of respondents. Finally, the author obtained consensual results for 67% (28/42). However, the outcome of this study could be the result of identifying a series of general statements rather than an in-depth exposition of the topic.
Keywords: Delphi Technique, teachers’ presentism, sociology of teaching, teaching culture.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 8651865 A Methodology for Data Migration between Different Database Management Systems
Authors: Bogdan Walek, Cyril Klimes
Abstract:
In present days the area of data migration is very topical. Current tools for data migration in the area of relational database have several disadvantages that are presented in this paper. We propose a methodology for data migration of the database tables and their data between various types of relational database systems (RDBMS). The proposed methodology contains an expert system. The expert system contains a knowledge base that is composed of IFTHEN rules and based on the input data suggests appropriate data types of columns of database tables. The proposed tool, which contains an expert system, also includes the possibility of optimizing the data types in the target RDBMS database tables based on processed data of the source RDBMS database tables. The proposed expert system is shown on data migration of selected database of the source RDBMS to the target RDBMS.
Keywords: Expert system, fuzzy, data migration, database, relational database, data type, relational database management system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 34921864 Grooving Method to Postpone Debonding of FRP Sheets Used for Shear Strengthening
Authors: Davood Mostofinejad, Seyed Amirali Mostafavizadeh, Amirhomayoon Tabatabaei Kashani
Abstract:
One of the most common practices for strengthening the reinforced concrete structures is the application of FRP (Fiber Reinforce Plastic) sheets to increase the flexural and shear strengths of the member. The elastic modulus of FRP is considerably higher than that of concrete. This will result in debonding between the FRP sheets and concrete surface. With conventional surface preparation of concrete, the ultimate capacity of the FRP sheets can hardly be achieved. New methods for preparation of the bonding surface have shown improvements in reducing the premature debonding of FRP sheets from concrete surface. The present experimental study focuses on the application of grooving method to postpone debonding of the FRP sheets attached to the side faces of concrete beams for shear strengthening. Comparison has also been made with conventional surface preparation method. This study clearly shows the efficiency of grooving method compared to surface preparation method, in preventing the debonding phenomenon and in increasing the load carrying capacity of FRP.Keywords: FRP composite, grooving, rehabilitation, reinforced concrete, shear strengthening, surface preparation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22521863 Deep Web Content Mining
Authors: Shohreh Ajoudanian, Mohammad Davarpanah Jazi
Abstract:
The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased difficulty of extracting potentially useful knowledge. Web content mining confronts this problem gathering explicit information from different web sites for its access and knowledge discovery. Query interfaces of web databases share common building blocks. After extracting information with parsing approach, we use a new data mining algorithm to match a large number of schemas in databases at a time. Using this algorithm increases the speed of information matching. In addition, instead of simple 1:1 matching, they do complex (m:n) matching between query interfaces. In this paper we present a novel correlation mining algorithm that matches correlated attributes with smaller cost. This algorithm uses Jaccard measure to distinguish positive and negative correlated attributes. After that, system matches the user query with different query interfaces in special domain and finally chooses the nearest query interface with user query to answer to it.Keywords: Content mining, complex matching, correlation mining, information extraction.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2278