STATISTICAL INSIGHTS INTO FIELD EXPERIMENTS: A GENERALIZED LINEAR MODEL APPLICATION WITH ANCOVA-POST
Authors: L. M. D’Souza & T. F. Wills
Abstract:
A simple repeated measures experiment or observational study in which a subject is assessed twice –once at the beginning of the study and again at the end-analysis of covariance is one of the obvious possibilities for its analysis. In the method, initial observations are being used to measure environmental influences, the object or subject at this stages are yet to be influenced by the treatments. The situation where such measurements are influenced by the treatments, the subjects are reassessed to study the effects of these treatments. Analysis of covariance (ANCOVA) is a technique which is useful for improving the precision of an experiment (Montgomery, 1976; Brookman2017). Analysis of covariance model evaluates whether the means of a dependent variable (DV) are equal across levels of a categorical independent variable (IV) often called a treatment, while statistically controlling for the effects of other continuous variables that are not of primary interest, known as covariates (CV) or nuisance variables. Mathematically, ANCOVA decomposes the variance in the DV into variance explained by the CV(s), variance explained by the categorical IV, and residual variance. Intuitively, ANCOVA can be thought of as ‘adjusting’ the DV by the group means of the CV(s).In this study, we use the analysis of variance techniques to model the effect of four treatment means on the growth of rubber trees in South-South Nigeria. The field experimental data on height gain of the young rubber trees before (pre) and after (post) the application of the treatments, were obtained from the Rubber Research Institute , Nigeria; the performance of these treatments was well supported with empirical results obtained through analysis of covariance statistical model.
Page: 1 – 6
Download PDF
Assessment of Corrosion Effects on the Strength and Behavior of RCC Beams
Authors: Liam Peterson, Noah Johnson, Ava Williams, Sophia Brown & Dr. James Anderson
Abstract:
One of the major problems encountered in design life of any structure is deterioration due to corrosion. Many studies have been done to determine effect of corrosion on reinforced concrete members. The studies basically focused on the performance of members with either all bars corroded or bar corroded. The study evaluates the experimental effect of corrosion on the performance of reinforced cement concrete beams. The steel bars used as main reinforcement in the beams were artificially corroded using accelerated corrosion technique. The corroded main reinforcement was laid in all possible combinations. Flexure test was done on 14 standard beam specimens casted with different combinations of corroded and non-corroded bars after 28 days of curing. From the results of tests, it was observed that not only the corroded reinforcement reduces the flexure strength of beams, but also the position of corroded main reinforcement bars affect the strength of beam considerably. Beams with corroded bars near edges of beam showed less strength than the beams with corroded bars near central portion. 3 cylinders were casted for testing bond strength between concrete and corroded, non-corroded and reinforcement bars coated with synthetic resin for corrosion prevention. Tests implied that corrosion of bars done for experiment was not enough to affect the bond strength while synthetic resin reduced the bond strength. The results obtained stand useful for retrofitting works and optimum way of strengthening damaged beams can be worked out.
Page: 7 – 18
Download PDF
Supplementary Cementing Materials in Concrete: A Path to Improved Material Properties
Authors: Ethan Williams & Oliver Brown
Abstract:
Concrete is one of the frequently used constructions material on the civil sites because it has high stability, durability and structural strength. A verity of waste material are disposed of to the environment directly thereby causing huge environment impacts an emphasis is laid on reuse of the water material waste material can be used in wide variety of ways such as an admixture. This may reduce the extensive use of natural resources. There are lots of researches going on for the constructive use of waste materials. In this paper the investigation is carried out for use of fly ash and marble powder in concrete. The grade of concrete used M-25 mix with cement replacements of 5%, 10%, 15%, 20% and 30% with fly ash and marble powder simultaneous use of fly ash in civil engineering applications is gaining momentum day by day. it can be used in concrete as well as manufacture of fly ash blocks. It ultimately leads to improvement in long term durability of concrete as well as environmental benefits. The grade of cement as classified by bureau of Indian standards is OPC-53. After the experimental investigation was done it was observed that the fly ash and marble powder improves concrete properties up to certain percentage of replacements.
Page: 19 – 24
Download PDF
Enhancing Energy Efficiency in MANETs: A Review of Malicious Node Detection and Routing Protocols
Authors: Aiden Smith & Dr. Thomas Anderson
Abstract:
Mobile ad-hoc networks are network infrastructure that is used for communication between two or more nodes without a common access point. It is a node’s assembly which shapes the emerging topology through a remote medium. In versatile specially designated systems, each node is portable in nature and constrained battery charge. Continuous change in the situation of the node in the system thus corrupts the battery charge of the node in this way, it is important to leave the battery energy of that node with this goal that the system life can be sustainable. For later, the node should choose the middle node to forward the bundles from the source to the target. The proposed methodology utilizes a technique to determine the circumstances under which malicious nodes ought to be checked. In addition to identifying malicious nodes, it has been observed that within this view, ad hoc routing has less protection and fewer communication breaks. MANET has many issues that attract researchers to work in these areas. This research is mainly related to many issues: How to increase the availability of packet power by reducing the energy consumption first? The other thing is how to manage malicious nodes in MANET and detect data protection by detecting malicious nodes?
Page: 25 – 29
Download PDF
Energy-Aware Routing and Malicious Node Detection to Extend the Life of Mobile Ad-Hoc Networks
Authors: Mohammad Ali & Dr. Adrian Thompson
Abstract:
The incidence of malicious nodes in an ad-hoc network worsens the performance of the network. A novel approach to detect increasing intrusion of malicious nodes is proposed to protect against attack on MANET vector route protocol. These malicious nodes can reduce overall data access in the network, with the increase in query delays. However some nodes can only decide to support partially or not at all with other nodes. Those mobile nodes that take their own packets but do not send neighbors to packets are known as the unfaithfully nodes. This type of malicious nodes can reduce overall data access in the network. Due to this kind of problem, the overall process of MANET was affected.
The proposed approach employs a technique for determining the conditions less than which the first stage is based on the secure malicious nodes detecting method (SMND) to the network and the second step is based on the smallest route to reducing energy consumption using AODV (REC-AODV). In accumulation to identifying malicious nodes, it have been experiential that in this approach, ad- hoc routing has less security and less communication breaks. MANET has many issues that attract researchers to work in these areas.
Experimental outcome show that the proposed methodology is to successfully detect malicious nodes, and with the help of routing protocol, the shortest route reduces the energy consumption of the packets in the network, which will be for long life in the network. By keeping these parameters in mind we calculate the packet delivery ratio, throughput, energy usage, congestion control and routing overhead.
Page: 30 – 37
Download PDF
Cross-Subsidy Allocation Models in Colombia’s Power Sector: An Income-Based Approach
Authors: Maria Petrova
Abstract:
Restructuring of the electric sector in Colombia in 1994, included provisions to guarantee supply of electricity to less affluent groups at a price below the cost of supply. According to this, electricity service is provided at a subsidized price to almost 90% of residential customers during the study period. The system under-collects requiring budget subsidies from the government. Also, there is near one million homes in the first income decile for which monthly electricity bill represents approximately 90% of the household income. The current allocation method for subsidies does not take the household income in consideration then it is not possible to identify families that need additional financial support. Thus, this research proposes an allocation method to assign subsidies based on household income. The proposed method provides full subsidy to families in the first income decile and requires no budget subsidies from the government. However, it is important to mention that this research presents a macro[1]level study, then before implementing the allocation method proposed herestakeholders need to conduct more detailed level studies including evaluation of the trade-offs between the social, political and economic costs of implementing a new system against the performance of the current system.
Page: 38 – 47
Download PDF
Strengthening Fingerprint Recognition: Dynamic Time Warping-Based Defense Against Attacks
Authors: Dr. Elena Rossi & Mr. Andreas Müller
Abstract:
Photo-response non-uniformity (PRNU) of imaging sensors can be employed as a distinctive fingerprint to deal with diverse forensic tasks connecting digital images and video. One of the most significant applications of this knowledge is matching an image or a video snip to the camera that acquired it, which is a task analogous in spirit to matching a shell to a gun cask. The problem examined here distress the condition when an adversary guesstimates the sensor fingerprint from a set of images and applies to it onto an image from a diverse camera to enclose an innocent victim. The previous paper provides a consistent method for detecting such fake fingerprints under quite mild and common assumptions regarding the adversary’s movement and the means accessible to the victim. The major drawback of the previous work is that every attack is guessed based on defenders’ assumptions. To overcome this, in this paper, we plan to present Dynamic Time Warping (DTW) algorithm to detect sensor finger print. DTW identify similarity among two sequences of finger print images alter in time or speed can be applied to video, audio, and graphics with linear representation. Evaluate an optimal match between two given sequences to detect fake sensor fingerprint at the specific time and event. Sequences are warped non-linearly at the time of fake infusion Utilized with hidden Markov models. Fake Sensor fingerprint detection time is identified exactly by quantifying the similarity variance. Source of Fake generated camera features can be approximately identified. An experimental evaluation is conducted with set of tests in real system to estimate the performance of the proposed DTW to detect sensor finger print contarst with an existing Defending Against Fingerprint-Copy Attack in Sensor-Based Camera Identification.
Page: 48 – 56
Download PDF
Waste to Wealth: Enhancing Community Awareness and Creative Plastic Waste Use near Buana Perjuangan Karawang
Authors: Ahmad Rizwan, M.Sc., MBA
Abstract:
The purposes of this activity are how is the knowledge of the community around UBP Karawang campus about the dangers of plastic waste for environmental pollution. What steps that have been taken by the local government in dealing with waste problems in the community. Providing training to produce products that made of plastic waste. The research method is qualitative method with FGD and debt interview. The finding of this research is Counseling activities on the impact and risks of inorganic waste to the community around campus have a positive effect on improving their understanding of how the community must manage waste properly, especially in the effort to sort and separate organic and inorganic waste, this activity of course must be continuously increased with intensity more by educational institutions, especially by local governments.
Page: 57 – 69
Download PDF
Socio-Economic Transformations along the Vanaz-Ramwadi Corridor: Insights from the Pune Metro Rail Project
Authors: Liam T. McAllister, Ethan P. Hawthorne, Noah J. Caldwell, Lucas B. Sterling, Prof. Oliver R. Bennett & Prof. Sophia K. Harrington
Abstract:
Despite large scale investments in road infrastructure, tactics for land use and transport development, all the urban cities are facing the problem of traffic congestion, accidents, air pollution etc. To cater this demand of growing population and exponential growth of personal use vehicles in cites, Mass Rapid Transport System proves to be very useful. Pune being the national or global headquarter for various companies is witnessing enormous growth, due to which the infrastructure of the city is being stressed as the roads do not have adequate width to cater with the mixed traffic conditions. The aim of this project is to study and evaluate the socio-economic impact of Pune Metro on Vanaz-Ramwadi corridor. The scope of this project includes carrying out survey along the corridor and analyzing the data in view of reduction in air pollution, saving in travel time, decrease in accidents. From the survey it is observed that nearly half of the vehicles will go off the road thus reducing air pollution, noise pollution and traffic congestion considerably, hence impacting the socio-economic status of the commuters along the Vanaz-Ramwadi corridor.
Page: 70 – 80
Download PDF