Search results for: isolated nodes
200 RadMote: A Mobile Framework for Radiation Monitoring in Nuclear Power Plants
Authors: Javier Barbaran, Manuel Dıaz, Inaki Esteve, Bartolome Rubio
Abstract:
Wireless Sensor Networks (WSNs) have attracted the attention of many researchers. This has resulted in their rapid integration in very different areas such as precision agriculture,environmental monitoring, object and event detection and military surveillance. Due to the current WSN characteristics this technology is specifically useful in industrial areas where security, reliability and autonomy are basic, such as nuclear power plants, chemical plants, and others. In this paper we present a system based on WSNs to monitor environmental conditions around and inside a nuclear power plant, specifically, radiation levels. Sensor nodes, equipped with radiation sensors, are deployed in fixed positions throughout the plant. In addition, plant staff are also equipped with mobile devices with higher capabilities than sensors such as for example PDAs able to monitor radiation levels and other conditions around them. The system enables communication between PDAs, which form a Mobile Ad-hoc Wireless Network (MANET), and allows workers to monitor remote conditions in the plant. It is particularly useful during stoppage periods for inspection or in the event of an accident to prevent risk situations.Keywords: MANETs, Mobile computing, Radiation monitoring, Wireless Sensor Networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1972199 Phase-Averaged Analysis of Three-Dimensional Vorticity in the Wake of Two Yawed Side-By-Side Circular Cylinders
Authors: T. Zhou, S. F. Mohd. Razali, Y. Zhou, H. Wang, L. Cheng
Abstract:
Thewake flow behind two yawed side-by-sidecircular cylinders is investigated using athree-dimensional vorticity probe. Four yaw angles (α), namely, 0°, 15°, 30° and 45° and twocylinder spacing ratios T* of 1.7 and 3.0 were tested. For T* = 3.0, there exist two vortex streets and the cylinders behave as independent and isolated ones. The maximum contour value of the coherent streamwise vorticity ~* ωx is only about 10% of that of the spanwise vorticity ~* ωz . With the increase of α, ~* ωx increases whereas ~* ωz decreases. At α = 45°, ~* ωx is about 67% of ~* ωz .For T* = 1.7, only a single peak is detected in the energy spectrum. The spanwise vorticity contours have an organized pattern only at α = 0°. The maximum coherent vorticity contours of ~* ω x and ~* ωz for T* = 1.7 are about 30% and 7% of those for T* = 3.0.The independence principle (IP)in terms of Strouhal numbers is applicable in both wakes when α< 40°.
Keywords: Circular cylinder wake, vorticity, vortex shedding.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1749198 Malicious Route Defending Reliable-Data Transmission Scheme for Multi Path Routing in Wireless Network
Authors: S. Raja Ratna, R. Ravi
Abstract:
Securing the confidential data transferred via wireless network remains a challenging problem. It is paramount to ensure that data are accessible only by the legitimate users rather than by the attackers. One of the most serious threats to organization is jamming, which disrupts the communication between any two pairs of nodes. Therefore, designing an attack-defending scheme without any packet loss in data transmission is an important challenge. In this paper, Dependence based Malicious Route Defending DMRD Scheme has been proposed in multi path routing environment to prevent jamming attack. The key idea is to defend the malicious route to ensure perspicuous transmission. This scheme develops a two layered architecture and it operates in two different steps. In the first step, possible routes are captured and their agent dependence values are marked using triple agents. In the second step, the dependence values are compared by performing comparator filtering to detect malicious route as well as to identify a reliable route for secured data transmission. By simulation studies, it is observed that the proposed scheme significantly identifies malicious route by attaining lower delay time and route discovery time; it also achieves higher throughput.
Keywords: Attacker, Dependence, Jamming, Malicious.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1721197 Recognition of Noisy Words Using the Time Delay Neural Networks Approach
Authors: Khenfer-Koummich Fatima, Mesbahi Larbi, Hendel Fatiha
Abstract:
This paper presents a recognition system for isolated words like robot commands. It’s carried out by Time Delay Neural Networks; TDNN. To teleoperate a robot for specific tasks as turn, close, etc… In industrial environment and taking into account the noise coming from the machine. The choice of TDNN is based on its generalization in terms of accuracy, in more it acts as a filter that allows the passage of certain desirable frequency characteristics of speech; the goal is to determine the parameters of this filter for making an adaptable system to the variability of speech signal and to noise especially, for this the back propagation technique was used in learning phase. The approach was applied on commands pronounced in two languages separately: The French and Arabic. The results for two test bases of 300 spoken words for each one are 87%, 97.6% in neutral environment and 77.67%, 92.67% when the white Gaussian noisy was added with a SNR of 35 dB.
Keywords: Neural networks, Noise, Speech Recognition.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1903196 Influence of Silica Fume on High Strength Lightweight Concrete
Authors: H. Katkhuda, B. Hanayneh, N. Shatarat
Abstract:
The main objective of this paper is to determine the isolated effect of silica fume on tensile, compressive and flexure strengths on high strength lightweight concrete. Many experiments were carried out by replacing cement with different percentages of silica fume at different constant water-binder ratio keeping other mix design variables constant. The silica fume was replaced by 0%, 5%, 10%, 15%, 20% and 25% for a water-binder ratios ranging from 0.26 to 0.42. For all mixes, split tensile, compressive and flexure strengths were determined at 28 days. The results showed that the tensile, compressive and flexure strengths increased with silica fume incorporation but the optimum replacement percentage is not constant because it depends on the water–cementitious material (w/cm) ratio of the mix. Based on the results, a relationship between split tensile, compressive and flexure strengths of silica fume concrete was developed using statistical methods.Keywords: Silica fume, Lightweight, High strength concrete, and Strength.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3701195 Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring
Authors: Y. Harold Robinson, M. Rajaram, E. Golden Julie, S. Balaji
Abstract:
This paper describes the proficient way of choosing the cluster head based on dominating set algorithm in a wireless sensor network (WSN). The algorithm overcomes the energy deterioration problems by this selection process of cluster heads. Clustering algorithms such as LEACH, EEHC and HEED enhance scalability in WSNs. Dominating set algorithm keeps the first node alive longer than the other protocols previously used. As the dominating set of cluster heads are directly connected to each node, the energy of the network is saved by eliminating the intermediate nodes in WSN. Security and trust is pivotal in network messaging. Cluster head is secured with a unique key. The member can only connect with the cluster head if and only if they are secured too. The secured trust model provides security for data transmission in the dominated set network with the group key. The concept can be extended to add a mobile sink for each or for no of clusters to transmit data or messages between cluster heads and to base station. Data security id preferably high and data loss can be prevented. The simulation demonstrates the concept of choosing cluster heads by dominating set algorithm and trust evaluation using DSTE. The research done is rationalized.
Keywords: Wireless Sensor Networks, LEECH, EEHC, HEED, DSTE.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1368194 An Efficient Approach to Mining Frequent Itemsets on Data Streams
Authors: Sara Ansari, Mohammad Hadi Sadreddini
Abstract:
The increasing importance of data stream arising in a wide range of advanced applications has led to the extensive study of mining frequent patterns. Mining data streams poses many new challenges amongst which are the one-scan nature, the unbounded memory requirement and the high arrival rate of data streams. In this paper, we propose a new approach for mining itemsets on data stream. Our approach SFIDS has been developed based on FIDS algorithm. The main attempts were to keep some advantages of the previous approach and resolve some of its drawbacks, and consequently to improve run time and memory consumption. Our approach has the following advantages: using a data structure similar to lattice for keeping frequent itemsets, separating regions from each other with deleting common nodes that results in a decrease in search space, memory consumption and run time; and Finally, considering CPU constraint, with increasing arrival rate of data that result in overloading system, SFIDS automatically detect this situation and discard some of unprocessing data. We guarantee that error of results is bounded to user pre-specified threshold, based on a probability technique. Final results show that SFIDS algorithm could attain about 50% run time improvement than FIDS approach.Keywords: Data stream, frequent itemset, stream mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1386193 Comparison of Parameterization Methods in Recognizing Spoken Arabic Digits
Authors: Ali Ganoun
Abstract:
This paper proposes evaluation of sound parameterization methods in recognizing some spoken Arabic words, namely digits from zero to nine. Each isolated spoken word is represented by a single template based on a specific recognition feature, and the recognition is based on the Euclidean distance from those templates. The performance analysis of recognition is based on four parameterization features: the Burg Spectrum Analysis, the Walsh Spectrum Analysis, the Thomson Multitaper Spectrum Analysis and the Mel Frequency Cepstral Coefficients (MFCC) features. The main aim of this paper was to compare, analyze, and discuss the outcomes of spoken Arabic digits recognition systems based on the selected recognition features. The results acqired confirm that the use of MFCC features is a very promising method in recognizing Spoken Arabic digits.
Keywords: Speech Recognition, Spectrum Analysis, Burg Spectrum, Walsh Spectrum Analysis, Thomson Multitaper Spectrum, MFCC.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1547192 DC-to-DC Converters for Low-Voltage High-Power Renewable Energy Systems
Authors: Abdar Ali, Rizwan Ullah, Zahid Ullah
Abstract:
This paper focuses on the study of DC-to-DC converters, which are suitable for low-voltage high-power applications. The output voltages generated by renewable energy sources such as photovoltaic arrays and fuel cell stacks are generally low and required to be increased to high voltage levels. Development of DC-to-DC converters, which provide high step-up voltage conversion ratios with high efficiencies and low voltage stresses, is one of the main issues in the development of renewable energy systems. A procedure for three converters−conventional DC-to-DC converter, interleaved boost converter, and isolated flyback based converter, is illustrated for a given set of specifications. The selection among the converters for the given application is based on the voltage conversion ratio, efficiency, and voltage stresses.Keywords: Flyback converter, interleaved boost, photovoltaic array, fuel cell, switch stress, voltage conversion ratio, renewable energy.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2740191 Identification Characterization and Production of Phytase from Endophytic Fungi
Authors: Yetti Marlida , Rina Delfita , Neni Gusmanizar, Gita Ciptaan
Abstract:
Phytases are acid phosphatase enzymes, which efficiently cleave phosphate moieties from phytic acid, thereby generating myo-inositol and inorganic phosphate. Thirty four isolates of endophytic fungi to produce of phytases were isolated from leaf, stem and root fragments of soybean. Screening of 34 isolates of endophytic fungi identified the phytases produced by Rhizoctonia sp. and Fusarium verticillioides . The phytase production were the best induced by phytic acid and rice bran compared the others inducer in submerged fermentation medium used. The phytase produced by both Rhizoctonia sp. and F. verticillioides have pH optimum at 4.0 and 5.0 respectively. The characterization of phytase from Fusarium verticillioides showed that temperature optimum was 500C and stability until 600C, the pH optimum 5.0 and pH stability was 2.5 – 6.0, and substrate specificity were rice bran>soybean meal>corn> coconut cake, respectively.Keywords: endophytic fungus, phytase, soybean, Rhizoctoniasp., Fusarium verticillioides,
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2555190 Numerical Analysis and Influence of the Parameters on Slope Stability
Authors: Fahim Kahlouche, Alaoua Bouaicha, Sihem Chaîbeddra, Sid-Ali Rafa, Abdelhamid Benouali
Abstract:
A designing of a structure requires its realization on rough or sloping ground. Besides the problem of the stability of the landslide, the behavior of the foundations that are bearing the structure is influenced by the destabilizing effect of the ground’s slope. This article focuses on the analysis of the slope stability exposed to loading by introducing the different factors influencing the slope’s behavior on the one hand, and on the influence of this slope on the foundation’s behavior on the other hand. This study is about the elastoplastic modelization using FLAC 2D. This software is based on the finite difference method, which is one of the older methods of numeric resolution of differential equations system with initial and boundary conditions. It was developed for the geotechnical simulation calculation. The aim of this simulation is to demonstrate the notable effect of shear modulus « G », cohesion « C », inclination angle (edge) « β », and distance between the foundation and the head of the slope on the stability of the slope as well as the stability of the foundation. In our simulation, the slope is constituted by homogenous ground. The foundation is considered as rigid/hard; therefore, the loading is made by the application of the vertical strengths on the nodes which represent the contact between the foundation and the ground.Keywords: Slope, shallow foundation, numeric method, FLAC 2D.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1162189 Utilization and Characterizations of Olive Oil Industry By-Products
Authors: Sawsan Dacrory, Hussein Abou-Yousef, Samir Kamel, Ragab E. Abou-Zeid, Mohamed S. Abdel-Aziz, Mohamed Elbadry
Abstract:
A considerable amount of lignocellulosic by-product could be obtained from olive pulp during olive oil extraction industry. The major constituents of the olive pulp are husks and seeds. The separation of each portion of olive pulp (seeds and husks) was carried out by water flotation where seeds were sediment in the bottom. Both seeds and husks were dignified by 15% NaOH followed by complete lignin removal by using sodium chlorite in acidic medium. The isolated holocellulose, α-cellulose, hydrogel and CMC which prepared from cellulose of both seeds and husk fractions were characterized by FTIR and SEM. The present study focused on the investigation of the chemical components of the lignocellulosic fraction of olive pulp. Biofunctionlization of hydrogel was achieved through loading of silver nanoparticles AgNPs in to the prepared hydrogel. The antimicrobial activity of the loaded silver hydrogel against G-ve, and G+ve, and candida was demonstrated.Keywords: Antimicrobial hydrogel, carboxymethyl cellulose, cellulose, grafting, olive pulp.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2201188 Simulation Tools for Training in the Case of Energy Sector Crisis
Authors: H. Malachova, A. Oulehlova, D. Rezac
Abstract:
Crisis preparedness training is the best possible strategy for identifying weak points, understanding vulnerability, and finding possible strategies for mitigation of blackout consequences. Training represents an effective tool for developing abilities and skills to cope with crisis situations. This article builds on the results of the research carried out in the field of preparation, realization, process, and impacts of training on subjects of energy sector critical infrastructure as a part of crisis preparedness. The research has revealed that the subjects of energy sector critical infrastructure have not realized training and therefore are not prepared for the restoration of the energy supply and black start after blackout regardless of the fact that most subjects state blackout and subsequent black start as key dangers. Training, together with mutual communication and processed crisis documentation, represent a basis for successful solutions for dealing with emergency situations. This text presents the suggested model of SIMEX simulator as a tool which supports managing crisis situations, containing training environment. Training models, possibilities of constructive simulation making use of non-aggregated as well as aggregated entities and tools of communication channels of individual simulator nodes have been introduced by the article.
Keywords: Energetic critical infrastructure, preparedness, training, simulation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 786187 Improvement of Antibacterial Activity for Ceftazidime by Partially Purified Tannase from Penicillium expansum
Authors: Sahira N. Muslim, Alaa N. Mohammed, Saba Saadoon Khazaal, Batool Kadham Salman, Israa M. S. AL-Kadmy, Sraa N. Muslim, Ahmed S. Dwaish, Sawsan Mohammed Kareem, Sarah N. Aziz, Ruaa A. Jasim
Abstract:
Tannase has wide applications in food, beverage, brewing, cosmetics and chemical industries and one of the major applications of tannase is the production of gallic acid. Gallic acid is used for manufacturing of trimethoprim. In the present study, a local fungal strain of Penicillium expansum A4 isolated from spoilt apple samples gave the highest production level of tannase. Tannase was partially purified with a recovery yield of 92.52% and 6.32 fold of purification by precipitation using ammonium sulfate at 50% saturation. Tannase led to increased antimicrobial activity of ceftazidime against Pseudomonas aeruginosa and S. aureus and had a synergism effect at low concentrations of ceftazidime, and thus, tannase may be a useful adjuvant agent for the treatment of many bacterial infections in combination with ceftazidime.
Keywords: Ceftazidime, Penicillium expansum, tannase, antimicrobial activity.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 984186 A Budget and Deadline Constrained Fault Tolerant Load Balanced Scheduling Algorithm for Computational Grids
Authors: P. Keerthika, P. Suresh
Abstract:
Grid is an environment with millions of resources which are dynamic and heterogeneous in nature. A computational grid is one in which the resources are computing nodes and is meant for applications that involves larger computations. A scheduling algorithm is said to be efficient if and only if it performs better resource allocation even in case of resource failure. Resource allocation is a tedious issue since it has to consider several requirements such as system load, processing cost and time, user’s deadline and resource failure. This work attempts in designing a resource allocation algorithm which is cost-effective and also targets at load balancing, fault tolerance and user satisfaction by considering the above requirements. The proposed Budget Constrained Load Balancing Fault Tolerant algorithm with user satisfaction (BLBFT) reduces the schedule makespan, schedule cost and task failure rate and improves resource utilization. Evaluation of the proposed BLBFT algorithm is done using Gridsim toolkit and the results are compared with the algorithms which separately concentrates on all these factors. The comparison results ensure that the proposed algorithm works better than its counterparts.Keywords: Grid Scheduling, Load Balancing, fault tolerance, makespan, cost, resource utilization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2100185 Graph Codes-2D Projections of Multimedia Feature Graphs for Fast and Effective Retrieval
Authors: Stefan Wagenpfeil, Felix Engel, Paul McKevitt, Matthias Hemmje
Abstract:
Multimedia Indexing and Retrieval is generally de-signed and implemented by employing feature graphs. These graphs typically contain a significant number of nodes and edges to reflect the level of detail in feature detection. A higher level of detail increases the effectiveness of the results but also leads to more complex graph structures. However, graph-traversal-based algorithms for similarity are quite inefficient and computation intensive, espe-cially for large data structures. To deliver fast and effective retrieval, an efficient similarity algorithm, particularly for large graphs, is mandatory. Hence, in this paper, we define a graph-projection into a 2D space (Graph Code) as well as the corresponding algorithms for indexing and retrieval. We show that calculations in this space can be performed more efficiently than graph-traversals due to a simpler processing model and a high level of parallelisation. In consequence, we prove that the effectiveness of retrieval also increases substantially, as Graph Codes facilitate more levels of detail in feature fusion. Thus, Graph Codes provide a significant increase in efficiency and effectiveness (especially for Multimedia indexing and retrieval) and can be applied to images, videos, audio, and text information.
Keywords: indexing, retrieval, multimedia, graph code, graph algorithm
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 381184 Developing a Web-Based Workflow Management System in Cloud Computing Platforms
Authors: Wang Shuen-Tai, Lin Yu-Ching, Chang Hsi-Ya
Abstract:
Cloud computing is the innovative and leading information technology model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort. In this paper, we aim at the development of workflow management system for cloud computing platforms based on our previous research on the dynamic allocation of the cloud computing resources and its workflow process. We took advantage of the HTML5 technology and developed web-based workflow interface. In order to enable the combination of many tasks running on the cloud platform in sequence, we designed a mechanism and developed an execution engine for workflow management on clouds. We also established a prediction model which was integrated with job queuing system to estimate the waiting time and cost of the individual tasks on different computing nodes, therefore helping users achieve maximum performance at lowest payment. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud computing platform. This development also helps boost user productivity by promoting a flexible workflow interface that lets users design and control their tasks' flow from anywhere.Keywords: Web-based, workflow, HTML5, Cloud Computing, Queuing System.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2874183 Effect of Nitrogen and Carbon Sources on Growth and Lipid Production from Mixotrophic Growth of Chlorella sp. KKU-S2
Authors: Ratanaporn Leesing, Thidarat Papone, Mutiyaporn Puangbut
Abstract:
Mixotrophic cultivation of the isolated freshwater microalgae Chlorella sp. KKU-S2 in batch shake flask for biomass and lipid productions, different concentration of glucose as carbon substrate, different nitrogen source and concentrations were investigated. Using 1.0g/L of NaNO3 as nitrogen source, the maximum biomass yield of 10.04g/L with biomass productivity of 1.673g/L d was obtained using 40g/L glucose, while a biomass of 7.09, 8.55 and 9.45g/L with biomass productivity of 1.182, 1.425 and 1.575g/L d were found at 20, 30 and 50g/L glucose, respectively. The maximum lipid yield of 3.99g/L with lipid productivity of 0.665g/L d was obtained when 40g/L glucose was used. Lipid yield of 1.50, 3.34 and 3.66g/L with lipid productivity of 0.250, 0.557 and 0.610g/L d were found when using the initial concentration of glucose at 20, 30 and 50g/L, respectively. Process product yield (YP/S) of 0.078, 0.119, 0.158 and 0.094 were observed when glucose concentration was 20, 30, 40 and 50 g/L, respectively. The results obtained from the study shows that mixotrophic culture of Chlorella sp. KKU-S2 is a desirable cultivation process for microbial lipid and biomass production.
Keywords: Mixotrophic cultivation, microalgal lipid, Chlorella sp. KKU-S2.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2912182 Position Based Routing Protocol with More Reliability in Mobile Ad Hoc Network
Authors: Mahboobeh Abdoos, Karim Faez, Masoud Sabaei
Abstract:
Position based routing protocols are the kinds of routing protocols, which they use of nodes location information, instead of links information to routing. In position based routing protocols, it supposed that the packet source node has position information of itself and it's neighbors and packet destination node. Greedy is a very important position based routing protocol. In one of it's kinds, named MFR (Most Forward Within Radius), source node or packet forwarder node, sends packet to one of it's neighbors with most forward progress towards destination node (closest neighbor to destination). Using distance deciding metric in Greedy to forward packet to a neighbor node, is not suitable for all conditions. If closest neighbor to destination node, has high speed, in comparison with source node or intermediate packet forwarder node speed or has very low remained battery power, then packet loss probability is increased. Proposed strategy uses combination of metrics distancevelocity similarity-power, to deciding about giving the packet to which neighbor. Simulation results show that the proposed strategy has lower lost packets average than Greedy, so it has more reliability.Keywords: Mobile Ad Hoc Network, Position Based, Reliability, Routing.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1722181 Antimicrobial Potentials of Flavonoids Isolated from Tagetes erecta
Authors: N. Behidj-Benyounes, S. Bennaamane, F. Zohra Bissaad, N. Chebouti, H. Mohandkaci, N. Abdalaziz, S. Iddou
Abstract:
In this study, we are interested in a species of the family of Asteraceae (Tagetes erecta). This family is considered as a source of antimicrobial extracts with strong capacity. The extraction of the flavonoids is carried out by the method of liquid/liquid with the use of successive solvents. Afterwards, we evaluated the biological activity of the flavonoids on five pathogenic bacterial stocks such as Escherichia coli, Bacillus subtilis, Klebsiella pneumoniae, Pseudomonas aeruginosa and Staphylococcus aureus and two stocks of yeasts to knowing Candida albicans) and Saccharomyces cerevisiae, by employing the method of the aromatogramme starting from a solid disc. The result of the antimicrobial activity shows an action and a variable degree of sensitivity according to bacterial stocks tested. It will be noted that the flavonoids have an inhibiting effect on E. coli, B. subtilis, K. pneumoniae and S. aureus. But a resistance with respect to the extract by P. aeruginosa, C. albicans and S. cerevisiae is to be mentioned.
Keywords: Antimicrobial activity, flavonoids, microbial strains, Tagetes erecta L.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2603180 Transformational Leaders and Challenges in COVID-19 Virtual Work Environments
Authors: Valarie A. Williams
Abstract:
This paper is a nonempirical analysis of existing literature on virtual leadership, transformational leadership, and remote work cultures. This paper will provide insight into how virtual workplaces can utilize transformational leadership styles to overcome challenges that have become a reality due to the COVID-19 Pandemic. Many organizations were forced into remote work to remain viable. It investigates the obstacles of working from home and the challenges leaders face in coaching and development. Employees lack face-to-face interactions and begin to feel isolated. Leaders cannot have in-person meetings and conversations and struggle to engage and encourage employees. In acknowledging the different dynamics of virtual work environments, organizations can make the necessary adjustments to best support employees. This paper reviews prior research studies and applies what is known to assist with current obstacles. This paper addresses how transformational leadership will assist in overcoming challenges within virtual work environments.
Keywords: Challenges in remote work, transformational leadership, virtual leadership, virtual work environments.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 489179 Free Flapping Vibration of Rotating Inclined Euler Beams
Authors: Chih-Ling Huang, Wen-Yi Lin, Kuo-Mo Hsiao
Abstract:
A method based on the power series solution is proposed to solve the natural frequency of flapping vibration for the rotating inclined Euler beam with constant angular velocity. The vibration of the rotating beam is measured from the position of the corresponding steady state axial deformation. In this paper the governing equations for linear vibration of a rotating Euler beam are derived by the d'Alembert principle, the virtual work principle and the consistent linearization of the fully geometrically nonlinear beam theory in a rotating coordinate system. The governing equation for flapping vibration of the rotating inclined Euler beam is linear ordinary differential equation with variable coefficients and is solved by a power series with four independent coefficients. Substituting the power series solution into the corresponding boundary conditions at two end nodes of the rotating beam, a set of homogeneous equations can be obtained. The natural frequencies may be determined by solving the homogeneous equations using the bisection method. Numerical examples are studied to investigate the effect of inclination angle on the natural frequency of flapping vibration for rotating inclined Euler beams with different angular velocity and slenderness ratio.Keywords: Flapping vibration, Inclination angle, Natural frequency, Rotating beam.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2148178 High Efficiency, Selectivity against Cancer Cell Line of Purified L-Asparaginase from Pathogenic Escherichia coli
Authors: Hazim Saadoon Aljewari, Mohammed Ibraheem Nader, Abdul Hussain M. Alfaisal, NatthidaWeerapreeyakul, Sahapat
Abstract:
L-asparaginase was extracted from pathogenic Escherichia coli which was isolated from urinary tract infection patients. L-asparaginase was purified 96-fold by ultrafiltration, ion exchange and gel filtration giving 39.19% yield with final specific activity of 178.57 IU/mg. L-asparaginase showed 138,356±1,000 Dalton molecular weight with 31024±100 Dalton molecular mass. Kinetic properties of enzyme resulting 1.25×10-5 mM Km and 2.5×10-3 M/min Vmax. L-asparaginase showed a maximum activity at pH 7.5 when incubated at 37 ºC for 30 min and illustrated its full activity (100%) after 15 min incubation at 20-37 ºC, while 70% of its activity was lost when incubated at 60 ºC. L-asparaginase showed cytotoxicity to U937 cell line with IC50 0.5±0.19 IU/ml, and selectivity index (SI=7.6) about 8 time higher selectivity over the lymphocyte cells. Therefore, the local pathogenic E. coli strains may be used as a source of high yield of L-asparaginase to produce anti cancer agent with high selectivity.Keywords: L-asparaginase, Purification, Cytotoxicity, selectivity index
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2792177 Revised PLWAP Tree with Non-frequent Items for Mining Sequential Pattern
Authors: R. Vishnu Priya, A. Vadivel
Abstract:
Sequential pattern mining is a challenging task in data mining area with large applications. One among those applications is mining patterns from weblog. Recent times, weblog is highly dynamic and some of them may become absolute over time. In addition, users may frequently change the threshold value during the data mining process until acquiring required output or mining interesting rules. Some of the recently proposed algorithms for mining weblog, build the tree with two scans and always consume large time and space. In this paper, we build Revised PLWAP with Non-frequent Items (RePLNI-tree) with single scan for all items. While mining sequential patterns, the links related to the nonfrequent items are not considered. Hence, it is not required to delete or maintain the information of nodes while revising the tree for mining updated transactions. The algorithm supports both incremental and interactive mining. It is not required to re-compute the patterns each time, while weblog is updated or minimum support changed. The performance of the proposed tree is better, even the size of incremental database is more than 50% of existing one. For evaluation purpose, we have used the benchmark weblog dataset and found that the performance of proposed tree is encouraging compared to some of the recently proposed approaches.
Keywords: Sequential pattern mining, weblog, frequent and non-frequent items, incremental and interactive mining.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1893176 Multi Language Text Editor for Burushaski and Urdu through Unicode
Authors: Irfan Qadir Baig, Muhammad Sharif, Aman Ullah Khan
Abstract:
This paper introduces an isolated and unique ancient language Burushaski, spoken in Hunza, Nagar, Yasin and parts of Gilgit in the Northern Areas of Pakistan. It explains the working mechanism of Multi Language Text Editor for Urdu and Burushaski. It is developed under the use of ISO/IEC 10646 Unicode standards for Urdu and Burushaski open-type fonts. It gives an ample opportunity to this regional ancient language to have a modern Information technology for its promotion and preservation. The main objective of this research paper is to help preserve the heritage of such rare languages and give smart way of automation. It also facilitates to those who are interested in undertaking research on Burushaski or keen to trace fonatic relationship between the national Urdu language and Burushaski. Since this editor covers both Burushaski and Urdu so it can play an important role to introduce Burusho linguistic culture to the world at large. Precisely, as a result of this research paper, Burushaski publication through IT means would be possible.Keywords: Burushaski, Bri Naqsh, Unicode, Burusho, Hunza, Meshaski.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2050175 Effect of Integrity of the Earthing System on the Rise of Earth Potential
Authors: N. Ullah, A. Haddad, F. Van Der Linde
Abstract:
This paper investigates the effects of breaks in bonds, breaks in the earthing system and breaks in earth wire on the rise of the earth potential (EPR) in a substation and at the transmission tower bases using various models of an L6 tower. Different approaches were adopted to examine the integrity of the earthing system and the terminal towers. These effects were investigated to see the associated difference in the EPR magnitudes with respect to a healthy system at various locations. Comparisons of the computed EPR magnitudes were then made between the healthy and unhealthy system to detect any difference. The studies were conducted at power frequency for a uniform soil with different soil resistivities. It was found that full breaks in the double bond of the terminal towers increase the EPR significantly at the fault location, while they reduce EPR at the terminal tower bases. A fault on the isolated section of the grid can result in EPR values up to 8 times of those on a healthy system at higher soil resistivities, provided that the extended earthing system stays connected to the grid.Keywords: Bonding, earthing, EPR, integrity, system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1667174 Performance Evaluation of Distributed Deep Learning Frameworks in Cloud Environment
Authors: Shuen-Tai Wang, Fang-An Kuo, Chau-Yi Chou, Yu-Bin Fang
Abstract:
2016 has become the year of the Artificial Intelligence explosion. AI technologies are getting more and more matured that most world well-known tech giants are making large investment to increase the capabilities in AI. Machine learning is the science of getting computers to act without being explicitly programmed, and deep learning is a subset of machine learning that uses deep neural network to train a machine to learn features directly from data. Deep learning realizes many machine learning applications which expand the field of AI. At the present time, deep learning frameworks have been widely deployed on servers for deep learning applications in both academia and industry. In training deep neural networks, there are many standard processes or algorithms, but the performance of different frameworks might be different. In this paper we evaluate the running performance of two state-of-the-art distributed deep learning frameworks that are running training calculation in parallel over multi GPU and multi nodes in our cloud environment. We evaluate the training performance of the frameworks with ResNet-50 convolutional neural network, and we analyze what factors that result in the performance among both distributed frameworks as well. Through the experimental analysis, we identify the overheads which could be further optimized. The main contribution is that the evaluation results provide further optimization directions in both performance tuning and algorithmic design.
Keywords: Artificial Intelligence, machine learning, deep learning, convolutional neural networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1189173 A Codebook-based Redundancy Suppression Mechanism with Lifetime Prediction in Cluster-based WSN
Authors: Huan Chen, Bo-Chao Cheng, Chih-Chuan Cheng, Yi-Geng Chen, Yu Ling Chou
Abstract:
Wireless Sensor Network (WSN) comprises of sensor nodes which are designed to sense the environment, transmit sensed data back to the base station via multi-hop routing to reconstruct physical phenomena. Since physical phenomena exists significant overlaps between temporal redundancy and spatial redundancy, it is necessary to use Redundancy Suppression Algorithms (RSA) for sensor node to lower energy consumption by reducing the transmission of redundancy. A conventional algorithm of RSAs is threshold-based RSA, which sets threshold to suppress redundant data. Although many temporal and spatial RSAs are proposed, temporal-spatial RSA are seldom to be proposed because it is difficult to determine when to utilize temporal or spatial RSAs. In this paper, we proposed a novel temporal-spatial redundancy suppression algorithm, Codebookbase Redundancy Suppression Mechanism (CRSM). CRSM adopts vector quantization to generate a codebook, which is easily used to implement temporal-spatial RSA. CRSM not only achieves power saving and reliability for WSN, but also provides the predictability of network lifetime. Simulation result shows that the network lifetime of CRSM outperforms at least 23% of that of other RSAs.Keywords: Redundancy Suppression Algorithm (RSA), Threshold-based RSA, Temporal RSA, Spatial RSA and Codebookbase Redundancy Suppression Mechanism (CRSM)
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1405172 Malicious Vehicle Detection Using Monitoring Algorithm in Vehicular Adhoc Networks
Authors: S. Padmapriya
Abstract:
Vehicular Adhoc Networks (VANETs), a subset of Mobile Adhoc Networks (MANETs), refers to a set of smart vehicles used for road safety. This vehicle provides communication services among one another or with the Road Side Unit (RSU). Security is one of the most critical issues related to VANET as the information transmitted is distributed in an open access environment. As each vehicle is not a source of all messages, most of the communication depends on the information received from other vehicles. To protect VANET from malicious action, each vehicle must be able to evaluate, decide and react locally on the information received from other vehicles. Therefore, message verification is more challenging in VANET because of the security and privacy concerns of the participating vehicles. To overcome security threats, we propose Monitoring Algorithm that detects malicious nodes based on the pre-selected threshold value. The threshold value is compared with the distrust value which is inherently tagged with each vehicle. The proposed Monitoring Algorithm not only detects malicious vehicles, but also isolates the malicious vehicles from the network. The proposed technique is simulated using Network Simulator2 (NS2) tool. The simulation result illustrated that the proposed Monitoring Algorithm outperforms the existing algorithms in terms of malicious node detection, network delay, packet delivery ratio and throughput, thereby uplifting the overall performance of the network.
Keywords: VANET, security, malicious vehicle detection, threshold value, distrust value.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1233171 Cloning and Over Expression of an Aspergillus niger XP Phytase Gene (phyA) in Pichia pastoris
Authors: Ngo Thanh Xuan, Mai Thi Hang, Vu Nguyen Thanh
Abstract:
A. niger XP isolated from Vietnam produces very low amount of acidic phytase with optimal pH at 2.5 and 5.5. The phytase production of this strain was successfully improved through gene cloning and expression. A 1.4 - kb DNA fragment containing the coding region of the phyA gene was amplified by PCR and inserted into the expression vector pPICZαA with a signal peptide α- factor, under the control of AOX1 promoter. The recombined plasmid was transformed into the host strain P. pastoris KM71H and X33 by electroporation. Both host strains could efficiently express and secret phytase. The multicopy strains were screened for over expression of phytase. All the selected multicopy strains of P. pastoris X33 were examined for phytase activity, the maximum phytase yield of 1329 IU/ml was obtained after 4 days of incubation in medium BMM. The recombinant protein with MW of 97.4 KW showed to be the only one protein secreted in the culture broth. Multicopy transformant P. pastoris X33 supposed to be potential candidate for producing the commercial preparation of phytase.
Keywords: Aspergillus niger XP, cloning, over expression, Pichia pastoris, phyA , phytase.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2165