CINXE.COM

Search results for: firewall potential

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: firewall potential</title> <meta name="description" content="Search results for: firewall potential"> <meta name="keywords" content="firewall potential"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="firewall potential" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="firewall potential"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 11479</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: firewall potential</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11479</span> Methods for Restricting Unwanted Access on the Networks Using Firewall</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bhagwant%20Singh">Bhagwant Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Sikander%20Singh%20Cheema"> Sikander Singh Cheema</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper examines firewall mechanisms routinely implemented for network security in depth. A firewall can't protect you against all the hazards of unauthorized networks. Consequently, many kinds of infrastructure are employed to establish a secure network. Firewall strategies have already been the subject of significant analysis. This study's primary purpose is to avoid unnecessary connections by combining the capability of the firewall with the use of additional firewall mechanisms, which include packet filtering and NAT, VPNs, and backdoor solutions. There are insufficient studies on firewall potential and combined approaches, but there aren't many. The research team's goal is to build a safe network by integrating firewall strength and firewall methods. The study's findings indicate that the recommended concept can form a reliable network. This study examines the characteristics of network security and the primary danger, synthesizes existing domestic and foreign firewall technologies, and discusses the theories, benefits, and disadvantages of different firewalls. Through synthesis and comparison of various techniques, as well as an in-depth examination of the primary factors that affect firewall effectiveness, this study investigated firewall technology's current application in computer network security, then introduced a new technique named "tight coupling firewall." Eventually, the article discusses the current state of firewall technology as well as the direction in which it is developing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=firewall%20strategies" title="firewall strategies">firewall strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=firewall%20potential" title=" firewall potential"> firewall potential</a>, <a href="https://publications.waset.org/abstracts/search?q=packet%20filtering" title=" packet filtering"> packet filtering</a>, <a href="https://publications.waset.org/abstracts/search?q=NAT" title=" NAT"> NAT</a>, <a href="https://publications.waset.org/abstracts/search?q=VPN" title=" VPN"> VPN</a>, <a href="https://publications.waset.org/abstracts/search?q=proxy%20services" title=" proxy services"> proxy services</a>, <a href="https://publications.waset.org/abstracts/search?q=firewall%20techniques" title=" firewall techniques"> firewall techniques</a> </p> <a href="https://publications.waset.org/abstracts/148108/methods-for-restricting-unwanted-access-on-the-networks-using-firewall" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/148108.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11478</span> Lightweight Hardware Firewall for Embedded System Based on Bus Transactions</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ziyuan%20Wu">Ziyuan Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Yulong%20Jia"> Yulong Jia</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiang%20Zhang"> Xiang Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Wanting%20Zhou"> Wanting Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=Lei%20Li"> Lei Li</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Internet of Things (IoT) is a rapidly evolving field involving a large number of interconnected embedded devices. In the design of embedded System-on-Chip (SoC), the key issues are power consumption, performance, and security. However, the easy-to-implement software and untrustworthy third-party IP cores may threaten the safety of hardware assets. Considering that illegal access and malicious attacks against SoC resources pass through the bus that integrates IPs, we propose a Lightweight Hardware Firewall (LHF) to protect SoC, which monitors and disallows the offending bus transactions based on physical addresses. Furthermore, under the LHF architecture, this paper refines two types of firewalls: Destination Hardware Firewall (DHF) and Source Hardware Firewall (SHF). The former is oriented to fine-grained detection and configuration, whose core technology is based on the method of dynamic grading units. In addition, we design the SHF based on static entries to achieve lightweight. Finally, we evaluate the hardware consumption of the proposed method by both Field-Programmable Gate Array (FPGA) and IC. Compared with the exciting efforts, LHF introduces a bus latency of zero clock cycles for every read or write transaction implemented on Xilinx Kintex-7 FPGAs. Meanwhile, the DC synthesis results based on TSMC 90nm show that the area is reduced by about 25% compared with the previous method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=IoT" title="IoT">IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=SoC" title=" SoC"> SoC</a>, <a href="https://publications.waset.org/abstracts/search?q=bus%20architecture" title=" bus architecture"> bus architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=lightweight%20hardware%20firewall" title=" lightweight hardware firewall"> lightweight hardware firewall</a>, <a href="https://publications.waset.org/abstracts/search?q=FPGA" title=" FPGA"> FPGA</a> </p> <a href="https://publications.waset.org/abstracts/179081/lightweight-hardware-firewall-for-embedded-system-based-on-bus-transactions" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179081.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">61</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11477</span> Performance Analysis of Traffic Classification with Machine Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Htay%20Htay%20Yi">Htay Htay Yi</a>, <a href="https://publications.waset.org/abstracts/search?q=Zin%20May%20Aye"> Zin May Aye</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=false%20negative%20rate" title="false negative rate">false negative rate</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20system" title=" intrusion detection system"> intrusion detection system</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning%20methods" title=" machine learning methods"> machine learning methods</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a> </p> <a href="https://publications.waset.org/abstracts/133091/performance-analysis-of-traffic-classification-with-machine-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133091.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11476</span> Some Issues with Extension of an HPC Cluster</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pil%20Seong%20Park">Pil Seong Park</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Homemade HPC clusters are widely used in many small labs, because they are easy to build and cost-effective. Even though incremental growth is an advantage of clusters, it results in heterogeneous systems anyhow. Instead of adding new nodes to the cluster, we can extend clusters to include some other Internet servers working independently on the same LAN, so that we can make use of their idle times, especially during the night. However extension across a firewall raises some security problems with NFS. In this paper, we propose a method to solve such a problem using SSH tunneling, and suggest a modified structure of the cluster that implements it. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=extension%20of%20HPC%20clusters" title="extension of HPC clusters">extension of HPC clusters</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=NFS" title=" NFS"> NFS</a>, <a href="https://publications.waset.org/abstracts/search?q=SSH%20tunneling" title=" SSH tunneling"> SSH tunneling</a> </p> <a href="https://publications.waset.org/abstracts/8521/some-issues-with-extension-of-an-hpc-cluster" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/8521.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">426</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11475</span> A Generalization of the Secret Sharing Scheme Codes Over Certain Ring</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ibrahim%20%C3%96zbek">Ibrahim Özbek</a>, <a href="https://publications.waset.org/abstracts/search?q=Erdo%C4%9Fan%20Mehmet%20%C3%96zkan"> Erdoğan Mehmet Özkan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this study, we generalize (k,n) threshold secret sharing scheme on the study Ozbek and Siap to the codes over the ring Fq+ αFq. In this way, it is mentioned that the method obtained in that article can also be used on codes over rings, and new advantages to be obtained. The method of securely sharing the key in cryptography, which Shamir first systematized and Massey carried over to codes, became usable for all error-correcting codes. The firewall of this scheme is based on the hardness of the syndrome decoding problem. Also, an open study area is left for those working for other rings and code classes. All codes that correct errors with this method have been the working area of this method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=secret%20sharing%20scheme" title="secret sharing scheme">secret sharing scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=linear%20codes" title=" linear codes"> linear codes</a>, <a href="https://publications.waset.org/abstracts/search?q=algebra" title=" algebra"> algebra</a>, <a href="https://publications.waset.org/abstracts/search?q=finite%20rings" title=" finite rings"> finite rings</a> </p> <a href="https://publications.waset.org/abstracts/164183/a-generalization-of-the-secret-sharing-scheme-codes-over-certain-ring" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164183.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">74</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11474</span> A Survey on Genetic Algorithm for Intrusion Detection System</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Prikhil%20Agrawal">Prikhil Agrawal</a>, <a href="https://publications.waset.org/abstracts/search?q=N.%20Priyanka"> N. Priyanka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=genetic%20algorithm%20%28GA%29" title="genetic algorithm (GA)">genetic algorithm (GA)</a>, <a href="https://publications.waset.org/abstracts/search?q=intrusion%20detection%20system%20%28IDS%29" title=" intrusion detection system (IDS)"> intrusion detection system (IDS)</a>, <a href="https://publications.waset.org/abstracts/search?q=dataset" title=" dataset"> dataset</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a> </p> <a href="https://publications.waset.org/abstracts/71298/a-survey-on-genetic-algorithm-for-intrusion-detection-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71298.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">297</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11473</span> The Study of Security Techniques on Information System for Decision Making</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tejinder%20Singh">Tejinder Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20systems" title="information systems">information systems</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20integrity" title=" data integrity"> data integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=TCP%2FIP%20network" title=" TCP/IP network"> TCP/IP network</a>, <a href="https://publications.waset.org/abstracts/search?q=vulnerability" title=" vulnerability"> vulnerability</a>, <a href="https://publications.waset.org/abstracts/search?q=decision" title=" decision"> decision</a>, <a href="https://publications.waset.org/abstracts/search?q=data" title=" data"> data</a> </p> <a href="https://publications.waset.org/abstracts/37151/the-study-of-security-techniques-on-information-system-for-decision-making" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37151.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">307</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11472</span> Static Properties of Ge and Sr Isotopes in the Cluster Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20Reza%20Shojaei">Mohammad Reza Shojaei</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahdeih%20Mirzaeinia"> Mahdeih Mirzaeinia</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We have studied the cluster structure of even-even stable isotopes of Ge and Sr. The Schrodinger equation has been solved using the generalized parametric Nikiforov-Uvarov method with a phenomenological potential. This potential is the sum of the attractive Yukawa-like potential, a Manning-Rosen-type potential, and the repulsive Yukawa potential for interaction between the cluster and the core. We have shown that the available experimental data of the first rotational band energies can be well described by assuming a binary system of the α cluster and the core and using an analytical solution. Our results were consistent with experimental values. Hence, this model can be applied to study the other even-even isotopes <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cluser%20model" title="cluser model">cluser model</a>, <a href="https://publications.waset.org/abstracts/search?q=NU%20method" title=" NU method"> NU method</a>, <a href="https://publications.waset.org/abstracts/search?q=ge%20and%20Sr" title=" ge and Sr"> ge and Sr</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20central" title=" potential central"> potential central</a> </p> <a href="https://publications.waset.org/abstracts/156406/static-properties-of-ge-and-sr-isotopes-in-the-cluster-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/156406.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">76</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11471</span> Volatility Transmission among European Bank CDS</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aida%20Alemany">Aida Alemany</a>, <a href="https://publications.waset.org/abstracts/search?q=Laura%20Ballester"> Laura Ballester</a>, <a href="https://publications.waset.org/abstracts/search?q=Ana%20Gonz%C3%A1lez-Urteaga"> Ana González-Urteaga</a> </p> <p class="card-text"><strong>Abstract:</strong></p> From 2007 subprime crisis to the recent Eurozone debt crisis the European banking industry has experienced a terrible financial instability situation with increasing levels of CDS spreads (used as a proxy of credit risk). This paper investigates whether volatility transmission channels in European banking markets have changed after three significant crises’ events during the period January 2006 to March 2013. The global financial crisis is characterized by a unidirectional volatility shocks spillovers effect in credit risk from inside to outside the Eurozone. By contrast, the Eurozone debt crisis is revealed to be local in nature with the euro as the key element suggesting a market fragmentation between distressed peripheral and non-distressed core Eurozone countries, whereas retaining the local currency have acted as a firewall. With these findings we are able to shed light on the impact of the different crises on the European banking credit risk dynamics. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CDS%20spreads" title="CDS spreads">CDS spreads</a>, <a href="https://publications.waset.org/abstracts/search?q=credit%20risk" title=" credit risk"> credit risk</a>, <a href="https://publications.waset.org/abstracts/search?q=volatility%20spillovers" title=" volatility spillovers"> volatility spillovers</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20crisis" title=" financial crisis"> financial crisis</a> </p> <a href="https://publications.waset.org/abstracts/21226/volatility-transmission-among-european-bank-cds" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21226.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">467</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11470</span> Discerning of Antimicrobial Potential of Phenylpropanoic Acid Derived Oxadiazoles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Neeraj%20Kumar%20Fuloria">Neeraj Kumar Fuloria</a>, <a href="https://publications.waset.org/abstracts/search?q=Shivkanya%20Fuloria"> Shivkanya Fuloria</a>, <a href="https://publications.waset.org/abstracts/search?q=Amit%20%20Singh"> Amit Singh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> 2-Phenyl propionic acid and oxadiazoles possess antimicrobial potential. 2-Phenyl propane hydrazide (1), on cyclization with aromatic acids offered 2-aryl-5-(1-phenylethyl)-1,3,4-oxadiazole derivatives (1A-E). The PPA derived oxadiazoles were characterized by elemental analysis and spectral studies. The compounds were screened for antimicrobial potential. The compound 1D bearing strong electron withdrawing group showed maximum antimicrobial potential. Other compounds also displayed antimicrobial potential to a certain extent. The SAR of newer oxadiazoles indicated that substitution of strong electronegative group in the PPA derived oxadiazoles enhanced their antimicrobial potential. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antimicrobial" title="antimicrobial">antimicrobial</a>, <a href="https://publications.waset.org/abstracts/search?q=imines" title=" imines"> imines</a>, <a href="https://publications.waset.org/abstracts/search?q=oxadiazoles" title=" oxadiazoles"> oxadiazoles</a>, <a href="https://publications.waset.org/abstracts/search?q=PPA" title=" PPA"> PPA</a> </p> <a href="https://publications.waset.org/abstracts/67533/discerning-of-antimicrobial-potential-of-phenylpropanoic-acid-derived-oxadiazoles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67533.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">340</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11469</span> Interactions between Water-Stress and VA Mycorrhizal Inoculation on Plant Growth and Leaf-Water Potential in Tomato</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Parisa%20Alizadeh%20Oskuie">Parisa Alizadeh Oskuie</a>, <a href="https://publications.waset.org/abstracts/search?q=Shahram%20Baghban%20Ciruse"> Shahram Baghban Ciruse</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The influence of arbuscular mycorrhizal (AM) fungus(Glomus mossea) on plant growth and leaf-water potential of tomato (lycopersicum esculentum L.cv.super star) were studied in potted culture water stress stress period of 3 months in greenhouse conditions with the soil matric potential maintained at Fc1, Fc2, Fc3, and Fc4 respectively (0.8,0.7,0.6,0.5 Fc). Seven-day-old seedlings of tomato were transferred to pots containing Glomus mossea or non-AMF. AM colonization significantly stimulated shoot dry matter and leaf-water potential but water stress significantly decreased leaf area, shoot dry matter colonization and leaf-water potential. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=leaf-water%20potential" title="leaf-water potential">leaf-water potential</a>, <a href="https://publications.waset.org/abstracts/search?q=plant%20growth" title=" plant growth"> plant growth</a>, <a href="https://publications.waset.org/abstracts/search?q=tomato" title=" tomato"> tomato</a>, <a href="https://publications.waset.org/abstracts/search?q=VA%20mycorrhiza" title=" VA mycorrhiza"> VA mycorrhiza</a>, <a href="https://publications.waset.org/abstracts/search?q=water-stress" title=" water-stress "> water-stress </a> </p> <a href="https://publications.waset.org/abstracts/16478/interactions-between-water-stress-and-va-mycorrhizal-inoculation-on-plant-growth-and-leaf-water-potential-in-tomato" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16478.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">424</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11468</span> Radiative Reactions Analysis at the Range of Astrophysical Energies </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20Amar">A. Amar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Analysis of the elastic scattering of protons on <sup>10</sup>B nuclei has been done in the framework of the optical model and single folding model at the beam energies up to 17 MeV. We could enhance the optical potential parameters using Esis88 Code, as well as SPI GENOA Code. Linear relationship between volume real potential (V<sub>0</sub>) and proton energy (E<sub>p</sub>) has been obtained. Also, surface imaginary potential W<sub>D</sub> is proportional to the proton energy (E<sub>p</sub>) in the range 0.400 and 17 MeV. The radiative reaction <sup>10</sup>B(p,&gamma;)<sup>11</sup>C has been analyzed using potential model. A comparison between <sup>10</sup>B(p,&gamma;)<sup>11</sup>C and <sup>6</sup>Li(p,&gamma;)<sup>7</sup>Be has been made. Good agreement has been found between theoretical and experimental results in the whole range of energy. The radiative resonance reaction <sup>7</sup>Li(p,&gamma;)<sup>8</sup>Be has been studied. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=elastic%20scattering%20of%20protons%20on%2010B%20nuclei" title="elastic scattering of protons on 10B nuclei">elastic scattering of protons on 10B nuclei</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20potential%20parameters" title=" optical potential parameters"> optical potential parameters</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20model" title=" potential model"> potential model</a>, <a href="https://publications.waset.org/abstracts/search?q=radiative%20reaction" title=" radiative reaction"> radiative reaction</a> </p> <a href="https://publications.waset.org/abstracts/88571/radiative-reactions-analysis-at-the-range-of-astrophysical-energies" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/88571.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">210</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11467</span> Remote Sensing Study of Wind Energy Potential in Agsu District</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=U.%20F.%20Mammadova">U. F. Mammadova</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Natural resources is the main self-supplying way which is being studied in the paper. Ecologically clean and independent clean energy stock is wind one. This potential is first studied by applying remote sensing way. In any coordinate of the district, wind energy potential has been determined by measuring the potential by applying radar technique which gives a possibility to reveal 2 D view. At several heights, including 10,50,100,150,200 ms, the measurements have been realized. The achievable power generation for m2 in the district was calculated. Daily, hourly, and monthly wind energy potential data were graphed and schemed in the paper. The energy, environmental, and economic advantages of wind energy for the Agsu district were investigated by analyzing radar spectral measurements after the remote sensing process. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wind%20potential" title="wind potential">wind potential</a>, <a href="https://publications.waset.org/abstracts/search?q=spectral%20radar%20analysis" title=" spectral radar analysis"> spectral radar analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=ecological%20clean%20energy" title=" ecological clean energy"> ecological clean energy</a>, <a href="https://publications.waset.org/abstracts/search?q=ecological%20safety" title=" ecological safety"> ecological safety</a> </p> <a href="https://publications.waset.org/abstracts/155823/remote-sensing-study-of-wind-energy-potential-in-agsu-district" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/155823.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11466</span> Constraining the Potential Nickel Laterite Area Using Geographic Information System-Based Multi-Criteria Rating in Surigao Del Sur</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reiner-Ace%20P.%20Mateo">Reiner-Ace P. Mateo</a>, <a href="https://publications.waset.org/abstracts/search?q=Vince%20Paolo%20F.%20Obille"> Vince Paolo F. Obille</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The traditional method of classifying the potential mineral resources requires a significant amount of time and money. In this paper, an alternative way to classify potential mineral resources with GIS application in Surigao del Sur. The three (3) analog map data inputs integrated to GIS are geologic map, topographic map, and land cover/vegetation map. The indicators used in the classification of potential nickel laterite integrated from the analog map data inputs are a geologic indicator, which is the presence of ultramafic rock from the geologic map; slope indicator and the presence of plateau edges from the topographic map; areas of forest land, grassland, and shrublands from the land cover/vegetation map. The potential mineral of the area was classified from low up to very high potential. The produced mineral potential classification map of Surigao del Sur has an estimated 4.63% low nickel laterite potential, 42.15% medium nickel laterite potential, 43.34% high nickel laterite potential, and 9.88% very high nickel laterite from its ultramafic terrains. For the validation of the produced map, it was compared with known occurrences of nickel laterite in the area using a nickel mining tenement map from the area with the application of remote sensing. Three (3) prominent nickel mining companies were delineated in the study area. The generated potential classification map of nickel-laterite in Surigao Del Sur may be of aid to the mining companies which are currently in the exploration phase in the study area. Also, the currently operating nickel mines in the study area can help to validate the reliability of the mineral classification map produced. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=mineral%20potential%20classification" title="mineral potential classification">mineral potential classification</a>, <a href="https://publications.waset.org/abstracts/search?q=nickel%20laterites" title=" nickel laterites"> nickel laterites</a>, <a href="https://publications.waset.org/abstracts/search?q=GIS" title=" GIS"> GIS</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20sensing" title=" remote sensing"> remote sensing</a>, <a href="https://publications.waset.org/abstracts/search?q=Surigao%20del%20Sur" title=" Surigao del Sur"> Surigao del Sur</a> </p> <a href="https://publications.waset.org/abstracts/147543/constraining-the-potential-nickel-laterite-area-using-geographic-information-system-based-multi-criteria-rating-in-surigao-del-sur" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/147543.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">123</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11465</span> A Literature Review on the Role of Local Potential for Creative Industries </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maya%20Irjayanti">Maya Irjayanti</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Local creativity utilization has been a strategic investment to be expanded as a creative industry due to its significant contribution to the national gross domestic product. Many developed and developing countries look toward creative industries as an agenda for the economic growth. This study aims to identify the role of local potential for creative industries from various empirical studies. The method performed in this study will involve a peer-reviewed journal articles and conference papers review addressing local potential and creative industries. The literature review analysis will include several steps: material collection, descriptive analysis, category selection, and material evaluation. Finally, the outcome expected provides a creative industries clustering based on the local potential of various nations. In addition, the finding of this study will be used as future research reference to explore a particular area with well-known aspects of local potential for creative industry products. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=business" title="business">business</a>, <a href="https://publications.waset.org/abstracts/search?q=creativity" title=" creativity"> creativity</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20potential" title=" local potential"> local potential</a>, <a href="https://publications.waset.org/abstracts/search?q=local%20wisdom" title=" local wisdom"> local wisdom</a> </p> <a href="https://publications.waset.org/abstracts/77650/a-literature-review-on-the-role-of-local-potential-for-creative-industries" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/77650.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">385</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11464</span> Market Integration in the ECCAS Sub-Region</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mouhamed%20Mbouandi%20Njikam">Mouhamed Mbouandi Njikam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work assesses the trade potential of countries in the Economic Community of Central Africa States (ECCAS). The gravity model of trade is used to evaluate the trade flows of member countries, and to compute the trade potential index of ECCAS during 1995-2010. The focus is on the removal of tariffs and non-tariff barriers in the sub-region. Estimates from the gravity model are used for the calculation of the sub-region’s commercial potential. Its three main findings are: (i) the background research shows a low level of integration in the sub-region and open economies; (ii) a low level of industrialization and diversification are the main factors reducing trade potential in the sub-region; (iii) the trade creation predominate on the deflections of trade between member countries. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=gravity%20model" title="gravity model">gravity model</a>, <a href="https://publications.waset.org/abstracts/search?q=ECCAS" title=" ECCAS"> ECCAS</a>, <a href="https://publications.waset.org/abstracts/search?q=trade%20flows" title=" trade flows"> trade flows</a>, <a href="https://publications.waset.org/abstracts/search?q=trade%20potential" title=" trade potential"> trade potential</a>, <a href="https://publications.waset.org/abstracts/search?q=regional%20cooperation" title=" regional cooperation"> regional cooperation</a> </p> <a href="https://publications.waset.org/abstracts/12819/market-integration-in-the-eccas-sub-region" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12819.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">426</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11463</span> Enabling UDP Multicast in Cloud IaaS: An Enterprise Use Case</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Patrick%20J.%20Kerpan">Patrick J. Kerpan</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryan%20C.%20Koop"> Ryan C. Koop</a>, <a href="https://publications.waset.org/abstracts/search?q=Margaret%20M.%20Walker"> Margaret M. Walker</a>, <a href="https://publications.waset.org/abstracts/search?q=Chris%20P.%20Swan"> Chris P. Swan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The User Datagram Protocol (UDP) multicast is a vital part of data center networking that is being left out of major cloud computing providers' network infrastructure. Enterprise users rely on multicast, and particularly UDP multicast to create and connect vital business operations. For example, UPD makes a variety of business functions possible from simultaneous content media updates, High-Performance Computing (HPC) grids, and video call routing for massive open online courses (MOOCs). Essentially, UDP multicast's technological slight is causing a huge effect on whether companies choose to use (or not to use) public cloud infrastructure as a service (IaaS). Allowing the ‘chatty’ UDP multicast protocol inside a cloud network could have a serious impact on the performance of the cloud as a whole. Cloud IaaS providers solve the issue by disallowing all UDP multicast. But what about enterprise use cases for multicast applications in organizations that want to move to the cloud? To re-allow multicast traffic, enterprises can build a layer 3 - 7 network over the top of a data center, private cloud, or public cloud. An overlay network simply creates a private, sealed network on top of the existing network. Overlays give complete control of the network back to enterprise cloud users the freedom to manage their network beyond the control of the cloud provider’s firewall conditions. The same logic applies if for users who wish to use IPsec or BGP network protocols inside or connected into an overlay network in cloud IaaS. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=protocols" title=" protocols"> protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=UDP%20multicast" title=" UDP multicast"> UDP multicast</a>, <a href="https://publications.waset.org/abstracts/search?q=virtualization" title=" virtualization"> virtualization</a> </p> <a href="https://publications.waset.org/abstracts/32008/enabling-udp-multicast-in-cloud-iaas-an-enterprise-use-case" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/32008.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">590</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11462</span> Correlation between Potential Intelligence Explanatory Study in the Perspective of Multiple Intelligence Theory by Using Dermatoglyphics and Culture Approaches </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Efnie%20Indrianie">Efnie Indrianie</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Potential Intelligence constitutes one essential factor in every individual. This intelligence can be a provision for the development of Performance Intelligence if it is supported by surrounding environment. Fingerprint analysis is a method in recognizing this Potential Intelligence. This method is grounded on pattern and number of finger print outlines that are assumed symmetrical with the number of nerves in our brain, in which these areas have their own function among another. These brain’s functions are later being transposed into intelligence components in accordance with the Multiple Intelligences theory. This research tested the correlation between Potential Intelligence and the components of its Performance Intelligence. Statistical test results that used Pearson correlation showed that five components of Potential Intelligence correlated with Performance Intelligence. Those five components are Logic-Math, Logic, Linguistic, Music, Kinesthetic, and Intrapersonal. Also, this research indicated that cultural factor had a big role in shaping intelligence. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=potential%20intelligence" title="potential intelligence">potential intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=performance%20intelligence" title=" performance intelligence"> performance intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20intelligences" title=" multiple intelligences"> multiple intelligences</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprint" title=" fingerprint"> fingerprint</a>, <a href="https://publications.waset.org/abstracts/search?q=environment" title=" environment"> environment</a>, <a href="https://publications.waset.org/abstracts/search?q=brain" title=" brain"> brain</a> </p> <a href="https://publications.waset.org/abstracts/9449/correlation-between-potential-intelligence-explanatory-study-in-the-perspective-of-multiple-intelligence-theory-by-using-dermatoglyphics-and-culture-approaches" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9449.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">535</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11461</span> The Role of Ionic Strength and Mineral Size to Zeta Potential for the Adhesion of P. putida to Mineral Surfaces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Fathiah%20Mohamed%20Zuki">Fathiah Mohamed Zuki</a>, <a href="https://publications.waset.org/abstracts/search?q=Robert%20George%20Edyvean"> Robert George Edyvean</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Electrostatic interaction energy (∆EEDL) is a part of the Extended Derjaguin-Landau-Verwey-Overbeek (XDLVO) theory, which, together with van der Waals (∆EVDW) and acid base (∆EAB) interaction energies, has been extensively used to investigate the initial adhesion of bacteria to surfaces. Electrostatic or electrical double layer interaction energy is considerably affected by surface potential, however it cannot be determined experimentally and is usually replaced by zeta (ζ) potential via electrophoretic mobility. This paper focuses on the effect of ionic concentration as a function of pH and the effect of mineral grain size on ζ potential. It was found that both ionic strength and mineral grain size play a major role in determining the value of ζ potential for the adhesion of P. putida to hematite and quartz surfaces. Higher ζ potential values lead to higher electrostatic interaction energies and eventually to higher total XDLVO interaction energy resulting in bacterial repulsion. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=XDLVO" title="XDLVO">XDLVO</a>, <a href="https://publications.waset.org/abstracts/search?q=electrostatic%20interaction%20energy" title=" electrostatic interaction energy"> electrostatic interaction energy</a>, <a href="https://publications.waset.org/abstracts/search?q=zeta%20potential" title=" zeta potential"> zeta potential</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20putida" title=" P. putida"> P. putida</a>, <a href="https://publications.waset.org/abstracts/search?q=mineral" title=" mineral "> mineral </a> </p> <a href="https://publications.waset.org/abstracts/24721/the-role-of-ionic-strength-and-mineral-size-to-zeta-potential-for-the-adhesion-of-p-putida-to-mineral-surfaces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24721.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">446</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11460</span> A Comparative Case Study on the Relationship between Solar Energy Potential and Block Typology and Density in Shanghai Context </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Dan%20Zhu">Dan Zhu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jie%20Shi"> Jie Shi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study explores the relationship between solar potential and block typology and density by analyzing sixteen existing typical street blocks with different topologies and densities in Shanghai, a representative high-density urban in China. Several indicators are proposed to quantify, and a methodology is conducted to evaluate and compare the solar potential both on façade and roof across various selected urban forms. 1) The importance of appropriate solar energy indicators and geometric parameters to be used in comparative studies, and 2) the relationship between urban typology, density, and solar performance are discussed. In this way, the results reveal the key design attributes contributing to increasing solar potential. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=block%20typology" title="block typology">block typology</a>, <a href="https://publications.waset.org/abstracts/search?q=geometric%20parameters" title=" geometric parameters"> geometric parameters</a>, <a href="https://publications.waset.org/abstracts/search?q=high-density%20urban" title=" high-density urban"> high-density urban</a>, <a href="https://publications.waset.org/abstracts/search?q=solar%20potential" title=" solar potential"> solar potential</a> </p> <a href="https://publications.waset.org/abstracts/53311/a-comparative-case-study-on-the-relationship-between-solar-energy-potential-and-block-typology-and-density-in-shanghai-context" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/53311.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">336</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11459</span> Adsorption of Bovine Serum Albumine on CeO2</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Roman%20Marsalek">Roman Marsalek</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Preparation of nano-particles of cerium oxide and adsorption of bovine serum albumine on them were studied. Particle size distribution and influence of pH on zeta potential of prepared CeO2 were determined. Average size of prepared cerium oxide nano-particles was 9 nm. The simultaneous measurements of the bovine serum albumine adsorption and zeta potential determination of the (adsorption) suspensions were carried out. The adsorption isotherms were found to be of typical Langmuir type; values of the bovine serum albumin adsorption capacities were calculated. Increasing of pH led to decrease of zeta potential and decrease of adsorption capacity of cerium oxide nano-particles. The maximum adsorption capacity was found for strongly acid suspension (am=118 mg/g). The samples of nanoceria with positive zeta potential adsorbed more bovine serum albumine on the other hand, the samples with negative zeta potential showed little or no protein adsorption. Surface charge or better say zeta potential of CeO2 nano-particles plays the key role in adsorption of proteins on such type of materials. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=adsorption" title="adsorption">adsorption</a>, <a href="https://publications.waset.org/abstracts/search?q=BSA" title=" BSA"> BSA</a>, <a href="https://publications.waset.org/abstracts/search?q=cerium%20oxide%20nanoparticles" title=" cerium oxide nanoparticles"> cerium oxide nanoparticles</a>, <a href="https://publications.waset.org/abstracts/search?q=zeta%20potential" title=" zeta potential"> zeta potential</a>, <a href="https://publications.waset.org/abstracts/search?q=albumin" title=" albumin "> albumin </a> </p> <a href="https://publications.waset.org/abstracts/11701/adsorption-of-bovine-serum-albumine-on-ceo2" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11701.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">369</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11458</span> An Exploratory Study of Potential Cruisers Preferences Using Choice Experiment and Latent Class Modelling</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Renuka%20Mahadevan">Renuka Mahadevan</a>, <a href="https://publications.waset.org/abstracts/search?q=Sharon%20Chang"> Sharon Chang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This exploratory study is based on potential cruisers’ monetary valuation of cruise attributes. Using choice experiment, monetary trade-offs between four different cruise attributes are examined with Australians as a case study. We found 50% of the sample valued variety of onboard cruise activities the least while 30% were willing to pay A$87 for cruise-organised activities per day, and the remaining 20% regarded an ocean view to be most valuable at A$125. Latent class modelling was then applied and results revealed that potential cruisers’ valuation of the attributes can be used to segment the market into adventurers, budget conscious and comfort lovers. Evidence showed that socio demographics are not as insightful as lifestyle preferences in developing cruise packages and pricing that would appeal to potential cruisers. Marketing also needs to counter the mindset of potential cruisers’ belief that cruises are often costly and that cruising can be done later in life. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=latent%20class%20modelling" title="latent class modelling">latent class modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=choice%20experiment" title=" choice experiment"> choice experiment</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20cruisers" title=" potential cruisers"> potential cruisers</a>, <a href="https://publications.waset.org/abstracts/search?q=market%20segmentation" title=" market segmentation"> market segmentation</a>, <a href="https://publications.waset.org/abstracts/search?q=willingness%20to%20pay" title=" willingness to pay"> willingness to pay</a> </p> <a href="https://publications.waset.org/abstracts/172088/an-exploratory-study-of-potential-cruisers-preferences-using-choice-experiment-and-latent-class-modelling" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172088.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">81</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11457</span> Understanding the Influence of Sensory Attributes on Wine Price</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jingxian%20An">Jingxian An</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Yu"> Wei Yu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The commercial value (retail price) of wine is mostly determined by the wine quality, ageing potential, and oak influence. This paper reveals that wine quality, ageing potential, and oak influence are favourably correlated, hence positively influencing the commercial value of Pinot noir wines. Oak influence is the most influential of these three sensory attributes on the price set by wine traders and estimated by experienced customers. In the meanwhile, this study gives winemakers with chemical instructions for raising total phenolics, which can improve wine quality, ageing potential, and oak influence, all of which can increase a wine’s economic worth. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=retail%20price" title="retail price">retail price</a>, <a href="https://publications.waset.org/abstracts/search?q=ageing%20potential" title=" ageing potential"> ageing potential</a>, <a href="https://publications.waset.org/abstracts/search?q=wine%20quality" title=" wine quality"> wine quality</a>, <a href="https://publications.waset.org/abstracts/search?q=oak%20influence" title=" oak influence"> oak influence</a> </p> <a href="https://publications.waset.org/abstracts/154270/understanding-the-influence-of-sensory-attributes-on-wine-price" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154270.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">134</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11456</span> Modified Single-Folded Potentials for the Alpha-²⁴Mg and Alpha-²⁸Si Elastic Scattering</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20N.%20A.%20Abdullah">M. N. A. Abdullah</a>, <a href="https://publications.waset.org/abstracts/search?q=Pritha%20Roy"> Pritha Roy</a>, <a href="https://publications.waset.org/abstracts/search?q=R.%20R.%20Shil"> R. R. Shil</a>, <a href="https://publications.waset.org/abstracts/search?q=D.%20R.%20Sarker"> D. R. Sarker</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Alpha-nucleus interaction is obscured because it produces enhanced cross-sections at large scattering angles known as anomaly in large angle scattering (ALAS). ALAS is prominent in the elastic scattering of α-particles as well as in non-elastic processes involving α-particles for incident energies up to 50 MeV and for targets of mass A ≤ 50. The Woods-Saxon type of optical model potential fails to describe the processes in a consistent manner. Folded potential is a good candidate and often used to construct the potential which is derived from the microscopic as well as semi-microscopic folding calculations. The present work reports the analyses of the elastic scattering of α-particles from ²⁴Mg and ²⁸Si at Eα=22-100 MeV and 14.4-120 MeV incident energies respectively in terms of the modified single-folded (MSF) potential. To derive the MSF potential, we take the view that the nucleons in the target nuclei ²⁴Mg and ²⁸Si are primarily in α-like clusters and the rest of the time in unclustered nucleonic configuration. The MSF potential, found in this study, does not need any renormalization over the whole range of incident α energies, and the renormalization factor has been found to be exactly 1 for both the targets. The best-fit parameters yield 4Aα = 21 and AN = 3 for α-²⁴Mg potential, and 4Aα = 26 and AN = 2 for α-²⁸Si potential in time-average pictures. The root-mean-square radii of both ²⁴Mg and ²⁸Si are also deduced, and the results obtained from this work agree well with the outcomes of other studies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=elastic%20scattering" title="elastic scattering">elastic scattering</a>, <a href="https://publications.waset.org/abstracts/search?q=optical%20model" title=" optical model"> optical model</a>, <a href="https://publications.waset.org/abstracts/search?q=folded%20potential" title=" folded potential"> folded potential</a>, <a href="https://publications.waset.org/abstracts/search?q=renormalization" title=" renormalization"> renormalization</a> </p> <a href="https://publications.waset.org/abstracts/76022/modified-single-folded-potentials-for-the-alpha-24mg-and-alpha-28si-elastic-scattering" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/76022.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">224</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11455</span> Carbon Sequestering and Structural Capabilities of Eucalyptus Cloeziana</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Holly%20Sandberg">Holly Sandberg</a>, <a href="https://publications.waset.org/abstracts/search?q=Christina%20McCoy"> Christina McCoy</a>, <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Mansy"> Khaled Mansy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Eucalyptus Cloeziana, commonly known as Gympie Messmate, is a fast-growing hardwood native to Australia. Its quick growth makes it advantageous for carbon sequestering, while its strength class lends itself to structural applications. Market research shows that the demand for timber is growing, especially mass timber. An environmental product declaration, or EPD, for eucalyptus Cloeziana in the Australian market has been evaluated and compared to the EPD’s of steel and Douglas fir of the same region. An EPD follows a product throughout its life cycle, stating values for global warming potential, ozone depletion potential, acidification potential, eutrophication potential, photochemical ozone creation potential, and abiotic depletion potential. This paper highlights the market potential, as well as the environmental benefits and challenges to using Gympie Messmate as a structural building material. In addition, a case study is performed to compare steel, Douglas fir, and eucalyptus in terms of embodied carbon and structural weight within a single structural bay. Comparisons among the three materials highlight both the differences in structural capabilities as well as environmental impact. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=eucalyptus" title="eucalyptus">eucalyptus</a>, <a href="https://publications.waset.org/abstracts/search?q=timber" title=" timber"> timber</a>, <a href="https://publications.waset.org/abstracts/search?q=construction" title=" construction"> construction</a>, <a href="https://publications.waset.org/abstracts/search?q=structural" title=" structural"> structural</a>, <a href="https://publications.waset.org/abstracts/search?q=material" title=" material"> material</a> </p> <a href="https://publications.waset.org/abstracts/142348/carbon-sequestering-and-structural-capabilities-of-eucalyptus-cloeziana" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/142348.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">184</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11454</span> The Concept of Anchor Hazard Potential Map</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sao-Jeng%20Chao">Sao-Jeng Chao</a>, <a href="https://publications.waset.org/abstracts/search?q=Chia-Yun%20Wei"> Chia-Yun Wei</a>, <a href="https://publications.waset.org/abstracts/search?q=Si-Han%20Lai"> Si-Han Lai</a>, <a href="https://publications.waset.org/abstracts/search?q=Cheng-Yu%20Huang"> Cheng-Yu Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yu-Han%20Teng"> Yu-Han Teng</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In Taiwan, the landforms are mainly dominated by mountains and hills. Many road sections of the National Highway are impossible to avoid problems such as slope excavation or slope filling. In order to increase the safety of the slope, various slope protection methods are used to stabilize the slope, especially the soil anchor technique is the most common. This study is inspired by the soil liquefaction potential map. The concept of the potential map is widely used. The typhoon, earth-rock flow, tsunami, flooded area, and the recent discussion of soil liquefaction have safety potential concepts. This paper brings the concept of safety potential to the anchored slope. Because the soil anchor inspection is only the concept of points, this study extends the concept of the point to the surface, using the Quantum GIS program to present the slope damage area, and depicts the slope appearance and soil anchor point with the slope as-built drawing. The soil anchor scores are obtained by anchor inspection data, and the low, medium and high potential areas are remitted by interpolation. Thus, the area where the anchored slope may be harmful is judged and relevant maintenance is provided. The maintenance units can thus prevent judgment and deal with the anchored slope as soon as possible. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anchor" title="anchor">anchor</a>, <a href="https://publications.waset.org/abstracts/search?q=slope" title=" slope"> slope</a>, <a href="https://publications.waset.org/abstracts/search?q=potential%20map" title=" potential map"> potential map</a>, <a href="https://publications.waset.org/abstracts/search?q=lift-off%20test" title=" lift-off test"> lift-off test</a>, <a href="https://publications.waset.org/abstracts/search?q=existing%20load" title=" existing load"> existing load</a> </p> <a href="https://publications.waset.org/abstracts/113806/the-concept-of-anchor-hazard-potential-map" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/113806.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11453</span> Application of Remote Sensing and GIS for Delineating Groundwater Potential Zones of Ariyalur, Southern Part of India</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Gnanachandrasamy">G. Gnanachandrasamy</a>, <a href="https://publications.waset.org/abstracts/search?q=Y.%20Zhou"> Y. Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Venkatramanan"> S. Venkatramanan</a>, <a href="https://publications.waset.org/abstracts/search?q=T.%20Ramkumar"> T. Ramkumar</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Wang"> S. Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The natural resources of groundwater are the most precious resources around the world that balances are shrinking day by day. In connection, there is an urgency need for demarcation of potential groundwater zone. For these rationale integration of geographical information system (GIS) and remote sensing techniques (RS) for the hydrological studies have become a dramatic change in the field of hydrological research. These techniques are provided to locate the potential zone of groundwater. This research has been made to indent groundwater potential zone in Ariyalur of the southern part of India with help of GIS and remote sensing techniques. To identify the groundwater potential zone used by different thematic layers of geology, geomorphology, drainage, drainage density, lineaments, lineaments density, soil and slope with inverse distance weighting (IDW) methods. From the overall result reveals that the potential zone of groundwater in the study area classified into five classes named as very good (12.18 %), good (22.74 %), moderate (32.28 %), poor (27.7 %) and very poor (5.08 %). This technique suggested that very good potential zone of groundwater occurred in patches of northern and central parts of Jayamkondam, Andimadam and Palur regions in Ariyalur district. The result exhibited that inverse distance weighting method offered in this research is an effective tool for interpreting groundwater potential zones for suitable development and management of groundwater resources in different hydrogeological environments. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=GIS" title="GIS">GIS</a>, <a href="https://publications.waset.org/abstracts/search?q=groundwater%20potential%20zone" title=" groundwater potential zone"> groundwater potential zone</a>, <a href="https://publications.waset.org/abstracts/search?q=hydrology" title=" hydrology"> hydrology</a>, <a href="https://publications.waset.org/abstracts/search?q=remote%20sensing" title=" remote sensing"> remote sensing</a> </p> <a href="https://publications.waset.org/abstracts/79645/application-of-remote-sensing-and-gis-for-delineating-groundwater-potential-zones-of-ariyalur-southern-part-of-india" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/79645.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">203</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11452</span> Identifying Factors for Evaluating Livability Potential within a Metropolis: A Case of Kolkata </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Arpan%20Paul">Arpan Paul</a>, <a href="https://publications.waset.org/abstracts/search?q=Joy%20Sen"> Joy Sen</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Livability is a holistic concept whose factors include many complex characteristics and levels of interrelationships among them. It has been considered as people&rsquo;s need for public amenities and is recognized as a major element to create social welfare. The concept and principles of livability are essential for recognizing the significance of community well-being. The attributes and dimensions of livability are also important aspects to measure the overall quality of environment. Livability potential is mainly considered as the capacity to develop into the overall well-being of an urban area in future. The intent of the present study is to identify the prime factors to evaluate livability potential within a metropolis. For ground level case study, the paper has selected Kolkata Metropolitan Area (KMA) as it has wide physical, social, and economic variations within it. The initial part of the study deals with detailed literature review on livability and its significance of evaluating its potential within a metropolis. The next segment is dedicated for identifying the primary factors which would evaluate livability potential within a metropolis. In pursuit of identifying primary factors, which have a direct impact on urban livability, this study delineates the metropolitan area into various clusters, having their distinct livability potential. As a final outcome of the study, variations of livability potential of those selected clusters are highlighted to explain the complexity of the metropolitan development. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kolkata%20Metropolitan%20Area%20%28KMA%29" title="Kolkata Metropolitan Area (KMA)">Kolkata Metropolitan Area (KMA)</a>, <a href="https://publications.waset.org/abstracts/search?q=livability%20potential" title=" livability potential"> livability potential</a>, <a href="https://publications.waset.org/abstracts/search?q=metropolis" title=" metropolis"> metropolis</a>, <a href="https://publications.waset.org/abstracts/search?q=wellbeing" title=" wellbeing"> wellbeing</a> </p> <a href="https://publications.waset.org/abstracts/57192/identifying-factors-for-evaluating-livability-potential-within-a-metropolis-a-case-of-kolkata" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/57192.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11451</span> Synthesis and Antimicrobial Activity of Tolyloxy Derived Oxadiazoles</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shivkanya%20Fuloria">Shivkanya Fuloria</a>, <a href="https://publications.waset.org/abstracts/search?q=Neeraj%20Kumar%20Fuloria"> Neeraj Kumar Fuloria</a>, <a href="https://publications.waset.org/abstracts/search?q=Sokinder%20Kumar"> Sokinder Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> m-Cresol and oxadiazoles are the potent antimicrobial moieties. 2-(m-Tolyloxy)acetohydrazide (1) on cyclization with aromatic acids yielded 2-(aryl)-5-(m-tolyloxymethyl)-1,3,4-oxadiazole (1A-E). The structures of newer oxadiazoles were confirmed by elemental and spectral analysis. The newer compounds were evaluated for their antimicrobial potential. The compound 1E containing strong electron withdrawing group showed maximum antimicrobial potential. Other compounds also displayed antimicrobial potential to certain extent. The SAR of newer oxadiazoles indicated that substitution of strong electronegative group in the tolyloxy derived oxadiazoles enhanced their antimicrobial potential. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=antibacterial" title="antibacterial">antibacterial</a>, <a href="https://publications.waset.org/abstracts/search?q=cresol" title=" cresol"> cresol</a>, <a href="https://publications.waset.org/abstracts/search?q=hydrazide" title=" hydrazide"> hydrazide</a>, <a href="https://publications.waset.org/abstracts/search?q=oxadiazoles" title=" oxadiazoles"> oxadiazoles</a> </p> <a href="https://publications.waset.org/abstracts/67547/synthesis-and-antimicrobial-activity-of-tolyloxy-derived-oxadiazoles" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67547.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">458</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">11450</span> Determination of the Oxidative Potential of Organic Materials: Method Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jui%20Afrin">Jui Afrin</a>, <a href="https://publications.waset.org/abstracts/search?q=Akhtarul%20Islam"> Akhtarul Islam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, the solution of glucose, yeast and glucose yeast mixture are being used as sample solution for determining the chemical oxygen demand (COD). In general COD determination method used to determine the different rang of oxidative potential. But in this work has shown to determine the definite oxidative potential for different concentration for known COD value and wanted to see the difference between experimental value and the theoretical value for evaluating the method drawbacks. In this study, made the values of oxidative potential like 400 mg/L, 500 mg/L, 600 mg/L, 700 mg/L and 800mg/L for various sample solutions and determined the oxidative potential according to our developed method. Plotting the experimental COD values vs. sample solutions of various concentrations in mg/L to draw the curve. From these curves see that the curves for glucose solution is not linear; its deviate from linearity for the lower concentration and the reason for this deviation is unknown. If these drawback can be removed this method can be effectively used to determine Oxidative Potential of Industrial wastewater (such as: Leather industry wastewater, Municipal wastewater, Food industry wastewater, Textile wastewater, Pharmaceuticals waste water) that’s why more experiment and study required. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=bod%20%28biological%20oxygen%20demand%29" title="bod (biological oxygen demand)">bod (biological oxygen demand)</a>, <a href="https://publications.waset.org/abstracts/search?q=cod%20%28chemical%20oxygen%20demand%29" title=" cod (chemical oxygen demand)"> cod (chemical oxygen demand)</a>, <a href="https://publications.waset.org/abstracts/search?q=oxidative%20potential" title=" oxidative potential"> oxidative potential</a>, <a href="https://publications.waset.org/abstracts/search?q=titration" title=" titration"> titration</a>, <a href="https://publications.waset.org/abstracts/search?q=waste%20water" title=" waste water"> waste water</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a> </p> <a href="https://publications.waset.org/abstracts/40766/determination-of-the-oxidative-potential-of-organic-materials-method-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40766.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">229</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=382">382</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=383">383</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=firewall%20potential&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10