Search results for: existing foundation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6532

Search results for: existing foundation

3142 The Effect of Context in Eliminating Interpretation Problems of Screen Subtitles for the Promotion of Intelligible Film Language

Authors: Ezzeldin M. T. Ali

Abstract:

Arguably viewers hardly benefit from screen subtitles due to the inconsistency between scenarios and their subtitles. Research in this area will provide an understanding of the association between these scenarios and subtitles via context. It attempts to eliminate the inconsistency existing between contexts and screen subtitles providing insights into the problem. Specifically, the study aims at examining the extent to which the understanding of screen subtitles largely depends on the force of linguistic and situational contexts. This is because the context is assumed to have a powerful effect on the interpretation of the source text. Both descriptive and experimental methods were adopted for data collection. These included a test and paper-pencil-questionnaires where participants provided their impressions about the role of context in eliminating interpretation problems of screen subtitles. Participants developed a good background about screen subtitles watching films. Results showed that context forms a powerful element in understanding screen subtitles. Results also revealed that communicative translation fits well screen translation boosting the contextual meaning. The association of context and communicative translation makes subtitles globally more economical and intelligible. Context forms a central element for film language to be intelligible.

Keywords: communicative translation, context, scenario, powerful, intellgible

Procedia PDF Downloads 163
3141 Optimization in Locating Firefighting Stations Using GIS Data and AHP Model; A Case Study on Arak City

Authors: Hasan Heydari

Abstract:

In recent decades, locating urban services is one of the significant discussions in urban planning. Among these considerations, cities require more accurate planning in order to supply citizen needs, especially part of urban safety. In order to gain this goal, one of the main tasks of urban planners and managers is specifying suitable sites to locate firefighting stations. This study has been done to reach this purpose. Therefore effective criteria consist of coverage radius, population density, proximity to pathway network, land use (compatible and incompatible neighborhood) have been specified. After that, descriptive and local information of the criteria was provided and their layers were created in ArcGIS 9.3. Using Analytic Hierarchy Process (AHP) these criteria and their sub-criteria got the weights. These layers were classified regarding their weights and finally were overlaid by Index Overlay Model and provided the final site selection map for firefighting stations of Arak city. The results gained by analyzing in GIS environment indicate the existing fire station don’t cover the whole city sufficiently and some of the stations have established on the unsuitable sites. The output map indicates the best sites to locate firefighting stations of Arak.

Keywords: site-selection, firefighting stations, analytic hierarchy process (AHP), GIS, index overlay model

Procedia PDF Downloads 348
3140 An Inquiry into the Usage of Complex Systems Models to Examine the Effects of the Agent Interaction in a Political Economic Environment

Authors: Ujjwall Sai Sunder Uppuluri

Abstract:

Group theory is a powerful tool that researchers can use to provide a structural foundation for their Agent Based Models. These Agent Based models are argued by this paper to be the future of the Social Science Disciplines. More specifically, researchers can use them to apply evolutionary theory to the study of complex social systems. This paper illustrates one such example of how theoretically an Agent Based Model can be formulated from the application of Group Theory, Systems Dynamics, and Evolutionary Biology to analyze the strategies pursued by states to mitigate risk and maximize usage of resources to achieve the objective of economic growth. This example can be applied to other social phenomena and this makes group theory so useful to the analysis of complex systems, because the theory provides the mathematical formulaic proof for validating the complex system models that researchers build and this will be discussed by the paper. The aim of this research, is to also provide researchers with a framework that can be used to model political entities such as states on a 3-dimensional plane. The x-axis representing resources (tangible and intangible) available to them, y the risks, and z the objective. There also exist other states with different constraints pursuing different strategies to climb the mountain. This mountain’s environment is made up of risks the state faces and resource endowments. This mountain is also layered in the sense that it has multiple peaks that must be overcome to reach the tallest peak. A state that sticks to a single strategy or pursues a strategy that is not conducive to the climbing of that specific peak it has reached is not able to continue advancement. To overcome the obstacle in the state’s path, it must innovate. Based on the definition of a group, we can categorize each state as being its own group. Each state is a closed system, one which is made up of micro level agents who have their own vectors and pursue strategies (actions) to achieve some sub objectives. The state also has an identity, the inverse being anarchy and/or inaction. Finally, the agents making up a state interact with each other through competition and collaboration to mitigate risks and achieve sub objectives that fall within the primary objective. Thus, researchers can categorize the state as an organism that reflects the sum of the output of the interactions pursued by agents at the micro level. When states compete, they employ a strategy and that state which has the better strategy (reflected by the strategies pursued by her parts) is able to out-compete her counterpart to acquire some resource, mitigate some risk or fulfil some objective. This paper will attempt to illustrate how group theory combined with evolutionary theory and systems dynamics can allow researchers to model the long run development, evolution, and growth of political entities through the use of a bottom up approach.

Keywords: complex systems, evolutionary theory, group theory, international political economy

Procedia PDF Downloads 139
3139 Possibilities of Building Regional Migration Governance due to the Venezuelan Diaspora in Ibero-America (2015-2018)

Authors: Jonathan Palatz Cedeño

Abstract:

The paper will seek to examine the scope and limitations of the process of construction of ordinary and extraordinary migration regulatory tools of the countries of Latin America, due to the Venezuelan diaspora in Ibero-America (2015-2018). The analysis methodology will be based on a systematic presentation of the existing advances in the subject under a qualitative approach, in which the results are detailed. We hold that an important part of the Latin American countries that used to be the emitters of migrants have had to generate, with greater or lesser success both nationally and regionally, ordinary and extraordinary migration regulatory tools to respond to the rapid intensification of the current Venezuelan migratory flows. This fact beyond implementing policies for the reception and integration of this population marks a new moment that represents a huge challenge both for the receiving States and for the young Ibero-American institutional migration system. Therefore, we can say that measures to adopt reception and solidarity policies, despite being supported by organs of the multilateral system such as UNHCR and IOM, are not found as guidelines for national and regional action, at the expense of the reactions of the respective public opinions and the influence of what to do of the neighboring countries in the face of the problem.

Keywords: Venezuela, migration, migration policies and governance, Venezuelan diaspora

Procedia PDF Downloads 131
3138 Decision-Making using Fuzzy Linguistic Hypersoft Set Topology

Authors: Muhammad Saqlain, Poom Kumam

Abstract:

Language being an abstract system and creative act, is quite complicated as its meaning varies depending on the context. The context is determined by the empirical knowledge of a person, which is derived from observation and experience. About further subdivided attributes, the decision-making challenges may entail quantitative and qualitative factors. However, because there is no norm for putting a numerical value on language, existing approaches cannot carry out the operations of linguistic knowledge. The assigning of mathematical values (fuzzy, intuitionistic, and neutrosophic) to any decision-making problem; without considering any rule of linguistic knowledge is ambiguous and inaccurate. Thus, this paper aims to provide a generic model for these issues. This paper provides the linguistic set structure of the fuzzy hypersoft set (FLHSS) to solve decision-making issues. We have proposed the definition some basic operations like AND, NOT, OR, AND, compliment, negation, etc., along with Topology and examples, and properties. Secondly, the operational laws for the fuzzy linguistic hypersoft set have been proposed to deal with the decision-making issues. Implementing proposed aggregate operators and operational laws can be used to convert linguistic quantifiers into numerical values. This will increase the accuracy and precision of the fuzzy hypersoft set structure to deal with decision-making issues.

Keywords: linguistic quantifiers, aggregate operators, multi-criteria decision making (mcdm)., fuzzy topology

Procedia PDF Downloads 97
3137 Effect of High Dose of Black Tea Extract on Physiological Parameters of Mother and Pups in Experimental Albino Rats

Authors: Avijit Dey, Antony Gomes, Subir Chandra Dasgupta

Abstract:

Tea (Camellia sinensis) is the most popular beverages in the world and is ranked second after the water. Tea has been considered as a health promoting beverage since ancient times due to its health-promoting activity. Recently, immunomodulatory, anti-arthritic, antioxidant, anticancer and cardioprotective activity of tea has been established. Very few studies have demonstrated the effect of high dose of black tea on health. The aim of the present study was to evaluate the role of low & high dose of Black Tea Extract (BTE) on the different physiological parameters of mother and pups during prenatal and postnatal developmental period in the experimental rodent. BTE was orally administered in LD (50mg BTE/kg/day) and HD (100mg BTE/kg/day) except control groups of rats (n=6/group) throughout the prenatal (day 0-21) and postnatal (day 21-42) periods. During prenatal period (0, 7th, 14th, 20th days) body weight, urinary calcium, magnesium, urea and creatinine was measured. In postnatal period physical (0, 10th, 21th days) parameters of pups like body weight, cranial length, cranial diameter, neck width, tail length, craniosacral length of pups were analyzed. Liver and lungs from pups and kidney spleen, etc. from mothers were collected on day 42 for histopathological studies. The comparative urine strip and morphology of RBC was also analyzed by SEM from mothers of different groups on day 42. The level of cytokines like IL-1alpha, IL-1beta, IL-6, IL-10, TNF-alpha were analysed by enzyme-linked immunosorbent assay (ELISA) on day 0, day 20 and day 42. The body weight of LD and HD mothers were also significantly (P<0.05) less than control mothers at 20th day of pregnancy and there was also significant changes in urinary calcium, urea, creatinine. The bio morphometric analysis of pups showed significant alteration (P<0.05) in HD groups relative to control. Some histological alterations were also observed in pups and mothers. Comparative urine strip analysis and morphology of RBC showed significant changes in treated groups. LD and HD treated mothers showed an increase in proinflammatory cytokines like IL-1beta, TNF-alpha and decrease in anti-inflammatory cytokine-like IL-10 on day 20 compared to PC mothers. This study clearly indicated that high dose of BTE possesses detrimental effect on pregnant mother and the pup. Further studies are in progress to elucidate the molecular mechanism of actions. This project work has been sponsored by National Tea Research Foundation vide Project Sanction No.: 17 (305)/2013/4423 dated 11th March, 2014. All experimental protocols described in the study were approved by animal ethics committee.

Keywords: black tea extract, pregnancy, prenatal and postnatal development, inflammation

Procedia PDF Downloads 272
3136 Enhancement of Transaction's Authentication for the Europay, MasterCard, and Visa Contactless Card Payments

Authors: Ossama Al-Maliki

Abstract:

Europay, MasterCard, and Visa (EMV) is one of the most popular payment protocol in the world. The EMV protocol supports Chip and PIN Transactions, Chip and Signature transactions, and Contactless transactions. This protocol suffers from tens of £ millions of lost per year due to many fraudulent payments. This is due to several reported vulnerable points in the protocols used for such payments that allow skimming, replay, cloning, Mole Point of Sale (POS), relay, and other attacks to be conducted. In this paper, we are focusing on the EMV contactless specification and we have proposed two proposal solutions to the addition of a localization factor to enhance the payment authentication of such transactions designed to prevent relay, cloning, and Mole-POS attacks. Our proposed solution is a back-end localization scheme to help the Issuer-Bank compare the location of the genuine cardholder in relation to the used POS. Our scheme uses 'something you have' which is the Cardholder Smartphone (CSP) to provide the location of the cardholder at the time of the transaction and without impacting the contactless payment time/protocol. The Issuer-bank obtain the CSP Location using tried and tested localization techniques, and independently of the cardholder. Both of our proposal solutions do not require infrastructure changes, and it uses existing EMV/SP protocol messages to communicate our scheme information.

Keywords: NFC, RFID, contactless card, authentication, location, EMV

Procedia PDF Downloads 242
3135 Risk Mitigation of Data Causality Analysis Requirements AI Act

Authors: Raphaël Weuts, Mykyta Petik, Anton Vedder

Abstract:

Artificial Intelligence has the potential to create and already creates enormous value in healthcare. Prescriptive systems might be able to make the use of healthcare capacity more efficient. Such systems might entail interpretations that exclude the effect of confounders that brings risks with it. Those risks might be mitigated by regulation that prevents systems entailing such risks to come to market. One modality of regulation is that of legislation, and the European AI Act is an example of such a regulatory instrument that might mitigate these risks. To assess the risk mitigation potential of the AI Act for those risks, this research focusses on a case study of a hypothetical application of medical device software that entails the aforementioned risks. The AI Act refers to the harmonised norms for already existing legislation, here being the European medical device regulation. The issue at hand is a causal link between a confounder and the value the algorithm optimises for by proxy. The research identifies where the AI Act already looks at confounders (i.a. feedback loops in systems that continue to learn after being placed on the market). The research identifies where the current proposal by parliament leaves legal uncertainty on the necessity to check for confounders that do not influence the input of the system, when the system does not continue to learn after being placed on the market. The authors propose an amendment to article 15 of the AI Act that would require high-risk systems to be developed in such a way as to mitigate risks from those aforementioned confounders.

Keywords: AI Act, healthcare, confounders, risks

Procedia PDF Downloads 259
3134 Metaphors, Cognition, and Action: Conceptual Metaphor Analysis of President Akuffo-Addo’s Speeches in the COVID-19 Crisis

Authors: Isaac Kwabena Adubofour, Esther Serwaah Afreh

Abstract:

Political speeches are structured in ways that ensure that the ideology of the leader is communicated in ways that the opinions of the audience are influenced towards certain lines of action, and in crisis situations like the outbreak of a global pandemic, public opinion and action are influenced through speeches. The foregoing explains the presence of metaphors in presidential speeches. Crises require, among other things, that the thoughts, emotions, and actions of the population are controlled in dealing with the problems at hand. The primary question this study assesses is how the use of metaphors in crisis situations, like the COVID-19 pandemic, influences thought, determines the policies a government adopts, and influences the reactions of the people. The study focused on twenty-four (24) addresses of the President of Ghana, Nana Addo Danquah Akuffo-Addo, on the COVID-19 pandemic and his government’s efforts to manage the crisis. The nature and relevance of presidential speeches and the presence of metaphors in such speeches have been investigated. However, there is a paucity of research on the connection between the presence of metaphors in presidential speeches and their influence on thought and action. Especially within the crisis of the COVID-19 pandemic, it is pertinent to investigate how the presence of metaphors in presidential addresses influences social thought and action. Thus, the current study sought to investigate the potential for metaphor use to influence thought and action on a national scale during the COVID crisis. The speeches were collected from the website of the presidency. The analysis was done using Metaphor Identification Process by the Praglejazz Group (2007) with conceptual metaphor theory (Lakoff & Johnson, 1980) as the theoretical foundation. The findings of the study show that the President’s adoption of war metaphors may not have been ideal since it triggered thoughts, policies, and social actions in line with war. For instance, the reference to health workers as heroes, heroines, and frontline workers praised the efforts of these workers over the efforts of the rest of the population, and that may have contributed to the apathy that arose among the citizens in dealing with the pandemic. This prioritization of the frontline workers explains why their taxes were forgiven for a considerable period. The government further absorbed utility bills of citizens during the pandemic. All these financial commitments may not have been advisable for a developing country like Ghana, but the authors argue that the actions may have been influenced by the metaphor that was adopted. Another finding that is explored is the problem of stigmatization in the country during the pandemic and its connection with the war metaphor. This investigation expands the research on metaphors, social thought and action, and crisis communication. Its contribution to metaphor use, thought, and action suggest its potential implication for education and other fields.

Keywords: conceptual metaphor theory, COVID-19, crisis communication, presidential addresses, risk communication

Procedia PDF Downloads 104
3133 Experiences of Online Opportunities and Risks: Examining Internet Use and Digital Literacy of Young People in Nigeria

Authors: Isah Yahaya Aliyu

Abstract:

Research on Internet use has often approached beneficial uses (online opportunities) of the Internet as separate from the risky encounters (online risks) of young people online. However, empirical evidence from diverse contexts appears to increasingly support the fusion of the two sets of online activities. Hence, the current research investigates the correlation between Internet use (IU) and digital literacy (DL) with online opportunities (OP) and risks (OR), using data from a Nigerian context, where there appears a paucity of research and literature on integrating opportunities and risks in the same study. A web-based data collection method was used to administer a survey to 335 undergraduate students in Northeastern Nigeria. Underpinned to Livingstone and Helsper model, findings are largely consistent with existing literature; IU and DL influence OP (R2 = 0.791, SE = 0.265, F-Stats = 626.566, P-value <.001), equally IU and DL influence OR as well (R2 = 0.343, SE = 0.465, F-Stats = 86.671, P-value <.001). OP and OR were found to strongly correlate positively (r = .667, n = 335, p < 0.01). This study has provided buttressing evidence from a Nigerian context of the fusion of benefits and risks of the Internet among young people. It has also upheld the argument for improved literacy as strategy for minimizing risks/harm rather than restricting use. Other theoretical and policy implications of the findings have been discussed in line with local and global debates about the Internet and its attendant effects.

Keywords: digital, internet, literacy, opportunities, risks

Procedia PDF Downloads 87
3132 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 95
3131 Refinement of Existing Benzthiazole lead Targeting Lysine Aminotransferase in Dormant Stage of Mycobacterium tuberculosis

Authors: R. Reshma srilakshmi, S. Shalini, P. Yogeeswari, D. Sriram

Abstract:

Lysine aminotransferase is a crucial enzyme for dormancy in M. tuberculosis. It is involved in persistence and antibiotic resistance. In present work, we attempted to develop benzthiazole derivatives as lysine aminotransferase inhibitors. In our attempts, we also unexpectedly arrived at an interesting compound 21 (E)-4-(5-(2-(benzo[d]thiazol-2-yl)-2-cyanovinyl)thiophen-2-yl)benzoic acid which even though has moderate activity against persistent phase of mycobacterium, it has significant potency against active phase. In the entire series compound 22 (E)-4-(5-(2-(benzo[d]thiazol-2-yl)-2-cyanovinyl)thiophen-2-yl)isophthalic acid emerged as potent molecule with LAT IC50 of 2.62 µM. It has a significant log reduction of 2.9 and 2.3 fold against nutrient starved and biofilm forming mycobacteria. It was found to be inactive in MABA assay and M.marinum induced zebra fish model. It is also devoid of cytotoxicity. Compound 22 was also found to possess bactericidal effect which is independent of concentration and time. It was found to be effective in combination with Rifampicin in 3D granuloma model. The results are very encouraging as the hit molecule shows activity against active as well as persistent forms of tuberculosis. The identified hit needs further more pharmacokinetic and dynamic screening for development as new drug candidate.

Keywords: benzothiazole, latent tuberculosis, LAT, nutrient starvation

Procedia PDF Downloads 330
3130 Modification of a Human Powered Lawn Mower

Authors: Akinwale S. O., Koya O. A.

Abstract:

The need to provide ecologically-friendly and effective lawn mowing solution is crucial for the well-being of humans. This study involved the modification of a human-powered lawn mower designed to cut tall grasses in residential areas. This study designed and fabricated a reel-type mower blade system and a pedal-powered test rig for the blade system. It also evaluated the performance of the machine. The machine was tested on some overgrown grass plots at College of Education Staff School Ilesa. Parameters such as theoretical field capacity, field efficiency and effective field capacity were determined from the data gathered. The quality of cut achieved by the unit was also documented. Test results showed that the fabricated cutting system produced a theoretical field capacity of 0.11 ha/h and an effective field capacity of 0.08ha/h. Moreover, the unit’s cutting system showed a substantial improvement over existing reel mower designs in its ability to cut on both the forward and reverse phases of its motion. This study established that the blade system described herein has the capacity to cut tall grasses. Hence, this device can therefore eliminate the need for powered mowers entirely on small residential lawns.

Keywords: effective field capacity, field efficiency, theoretical field capacity, quality of cut

Procedia PDF Downloads 147
3129 Phylogenetic Analysis of Georgian Populations of Potato Cyst Nematodes Globodera Rostochiensis

Authors: Dali Gaganidze, Ekaterine Abashidze

Abstract:

Potato is one of the main agricultural crops in Georgia. Georgia produces early and late potato varieties in almost all regions. In traditional potato growing regions (Svaneti, Samckhet javaheti and Tsalka), the yield is higher than 30-35 t/ha. Among the plant pests that limit potato production and quality, the potato cyst nematodes (PCN) are harmful around the world. Yield losses caused by PCN are estimated up to 30%. Rout surveys conducted in two geographically distinct regions of Georgia producing potatoes - Samtskhe - Javakheti and Svaneti revealed potato cyst nematode Globodera rostochiensi. The aim of the study was the Phylogenetic analyses of Globodera rostochiensi revealed in Georgia by the amplification and sequencing of 28S gen in the D3 region and intergenic ITS1-15.8S-ITS2 region. Identification of all the samples from the two Globodera populations (Samtskhe - Javakheti and Svaneti), i.e., G. rostochiensis (20 isolates) were confirmed by conventional multiplex PCR with ITS 5 universal and PITSp4, PITSr3 specific primers of the cyst nematodes’ (G. pallida, G. rostochiensis). The size of PCR fragment 434 bp confirms that PCN samples from two populations, Samtskhe- Javakheti and Svaneti, belong to G. rostochiensi . The ITS1–5.8S-ITS2 regions were amplified using prime pairs: rDNA1 ( 5’ -TTGATTACGTCCCTGCCCTTT-3’ and rDNA2( 5’ TTTCACTCGCCGTTACTAAGG-3’), D3 expansion regions were amplified using primer pairs: D3A (5’ GACCCCTCTTGAAACACGGA-3’) and D3B (5’-TCGGAAGGAACCAGCTACTA-3’. PCR products of each region were cleaned up and sequenced using an ABI 3500xL Genetic Analyzer. Obtained sequencing results were analyzed by computer program BLASTN (https://blast.ncbi.nlm.nih.gov/Blast.cg). Phylogenetic analyses to resolve the relationships between the isolates were conducted in MEGA7 using both distance- and character-based methods. Based on analysis of G.rostochiensis isolate`s D3 expansion regions are grouped in three major clades (A, B and C) on the phylogenetic tree. Clade A is divided into three subclades; clade C is divided into two subclades. Isolates from the Samtckhet-javakheti population are in subclade 1 of clade A and isolates in subclade 1 of clade C. Isolates) from Svaneti populations are in subclade 2 of clade A and in clad B. In Clade C, subclade two is presented by three isolates from Svaneti and by one isolate (GL17) from Samckhet-Javakheti. . Based on analysis of G.rostochiensis isolate`s ITS1–5.8S-ITS2 regions are grouped in two main clades, the first contained 20 Georgian isolates of Globodera rostochiensis from Svaneti . The second clade contained 15 isolates of Globodera rostochiensis from Samckhet javakheti. Our investigation showed of high genetic variation of D3 and ITS1–5.8S-ITS2 region of rDNA of the isolates of G. rostochiensis from different geographic origins (Svameti, Samckhet-Javakheti) of Georgia. Acknowledgement: The research has been supported by the Shota Rustaveli National Scientific Foundation of Georgia : Project # FR17_235

Keywords: globodera rostochiensi, PCR, phylogenetic tree, sequencing

Procedia PDF Downloads 195
3128 Basic Research on Applying Temporary Work Engineering at the Design Phase

Authors: Jin Woong Lee, Kyuman Cho, Taehoon Kim

Abstract:

The application of constructability is increasingly required not only in the construction phase but also in the whole project stage. In particular, the proper application of construction experience and knowledge during the design phase enables the minimization of inefficiencies such as design changes and improvements in constructability during the construction phase. In order to apply knowledge effectively, engineering technology efforts should be implemented with design progress. Among many engineering technologies, engineering for temporary works, including facilities, equipment, and other related construction methods, is important to improve constructability. Therefore, as basic research, this study investigates the applicability of temporary work engineering during the design phase in the building construction industry. As a result, application of temporary work engineering has a greater impact on construction cost reduction and constructability improvement. In contrast to the existing design-bid-build method, the turn-key and CM (construct management) procurement methods currently being implemented in Korea are expected to have a significant impact on the direction of temporary work engineering. To introduce temporary work engineering, expert/professional organization training is first required, and a lack of client awareness should be preferentially improved. The results of this study are expected to be useful as reference material for the development of more effective temporary work engineering tasks and work processes in the future.

Keywords: Temporary Work Engineering, Design Phase, Constructability, Building Construction

Procedia PDF Downloads 386
3127 An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic

Authors: Diogen Babuc

Abstract:

The question that is a motivation of writing is how many devote themselves to discovering something in the world of science where much is discerned and revealed, but at the same time, much is unknown. Methods: The insightful elements of this algorithm are the ciphering and deciphering algorithms of Playfair, Caesar, and Vigenère. Only a few of their main properties are taken and modified, with the aim of forming a specific functionality of the algorithm called Latin Djokovic. Specifically, a string is entered as input data. A key k is given, with a random value between the values a and b = a+3. The obtained value is stored in a variable with the aim of being constant during the run of the algorithm. In correlation to the given key, the string is divided into several groups of substrings, and each substring has a length of k characters. The next step involves encoding each substring from the list of existing substrings. Encoding is performed using the basis of Caesar algorithm, i.e., shifting with k characters. However, that k is incremented by 1 when moving to the next substring in that list. When the value of k becomes greater than b+1, it’ll return to its initial value. The algorithm is executed, following the same procedure, until the last substring in the list is traversed. Results: Using this polyalphabetic method, ciphering and deciphering of strings are achieved. The algorithm also works for a 100-character string. The x character isn’t used when the number of characters in a substring is incompatible with the expected length. The algorithm is simple to implement, but it’s questionable if it works better than the other methods from the point of view of execution time and storage space.

Keywords: ciphering, deciphering, authentic, algorithm, polyalphabetic cipher, random key, methods comparison

Procedia PDF Downloads 103
3126 Multi-Criteria Inventory Classification Process Based on Logical Analysis of Data

Authors: Diana López-Soto, Soumaya Yacout, Francisco Ángel-Bello

Abstract:

Although inventories are considered as stocks of money sitting on shelve, they are needed in order to secure a constant and continuous production. Therefore, companies need to have control over the amount of inventory in order to find the balance between excessive and shortage of inventory. The classification of items according to certain criteria such as the price, the usage rate and the lead time before arrival allows any company to concentrate its investment in inventory according to certain ranking or priority of items. This makes the decision making process for inventory management easier and more justifiable. The purpose of this paper is to present a new approach for the classification of new items based on the already existing criteria. This approach is called the Logical Analysis of Data (LAD). It is used in this paper to assist the process of ABC items classification based on multiple criteria. LAD is a data mining technique based on Boolean theory that is used for pattern recognition. This technique has been tested in medicine, industry, credit risk analysis, and engineering with remarkable results. An application on ABC inventory classification is presented for the first time, and the results are compared with those obtained when using the well-known AHP technique and the ANN technique. The results show that LAD presented very good classification accuracy.

Keywords: ABC multi-criteria inventory classification, inventory management, multi-class LAD model, multi-criteria classification

Procedia PDF Downloads 881
3125 Curriculum Change and Innovation Viewed from Two Different Lenses

Authors: Muqaddas Butt, Allah Bakhsh Malik

Abstract:

The changing educational environment, the diverse educational needs of students, the high expectations from the public, and the policy reports demand a strong change & innovation in the curriculum. Effective change and innovation could not be possible without the involvement of two major tenants i.e. teachers and educational managers. Thus, the locus of this research was to explore the secondary school principals and teachers priorities regarding change and innovation in curriculum. The main research objectives were included to explore the secondary school teachers’ and principals’ views about existing Humanities group curriculum; to identify their priorities regarding change and innovation in curriculum and to make a comparison between the priorities of both (the teachers & principals). A total sample of 150 Secondary school teachers and 24 principals from Federal Government Secondary Schools was drawn. The data was obtained through a five point Likert scale questionnaire. The findings indicated a huge difference between principals and teachers priorities. Related to prevailed curriculum, teachers showed more satisfactory views than principals. It was also found that the principals in comparison with teachers showed more inclination towards change and innovation and emphasized on an interdisciplinary, practical and ICT Integrated curriculum. Inclusion of local environmental issues; creativity based and practical activities based curriculum; and orientation to citizenship education into curriculum were some of the aspects highly prioritized by both teachers and principals.

Keywords: curriculum change, curriculum innovation, humanities curriculum, curriculum priorities

Procedia PDF Downloads 448
3124 Political Economy of Foreign Direct Investment: Literature Review of Domestic Interest Groups’ Preferences

Authors: Chaiwat Wuthinitikornkit

Abstract:

Foreign Direct Investment (FDI) inevitably affects the landscape of the political economy of the host country. It is, therefore, significant to review and uncover how and in what way(s) FDI shapes the preferences of the interest groups within the host country, as such preferences may, in turn, influence the policies of the host country. By conducting a review of relevant literature, this paper attempts to outline the key forces behind such preferences and identify potential gaps for future studies. This paper argues that while existing theories have specified endowment and political and institutional factors as key explanations behind the preferences of domestic interest groups, other qualitative attributes of the foreign investors' side, such as their nationalities, have yet to be adequately investigated empirically and may potentially also possess explanatory power. This is particularly important in the current global economic landscape, where key global investors hail from origins from both developed and developing countries with diverse political systems and business practices. This paper aims to provide the groundwork for future studies on these potential gaps, which may provide not only contributions to the academic sphere but also practical insight into policymaking and business communities.

Keywords: foreign direct investment, interest groups, international political economy, political economy

Procedia PDF Downloads 90
3123 Exploration into Bio Inspired Computing Based on Spintronic Energy Efficiency Principles and Neuromorphic Speed Pathways

Authors: Anirudh Lahiri

Abstract:

Neuromorphic computing, inspired by the intricate operations of biological neural networks, offers a revolutionary approach to overcoming the limitations of traditional computing architectures. This research proposes the integration of spintronics with neuromorphic systems, aiming to enhance computational performance, scalability, and energy efficiency. Traditional computing systems, based on the Von Neumann architecture, struggle with scalability and efficiency due to the segregation of memory and processing functions. In contrast, the human brain exemplifies high efficiency and adaptability, processing vast amounts of information with minimal energy consumption. This project explores the use of spintronics, which utilizes the electron's spin rather than its charge, to create more energy-efficient computing systems. Spintronic devices, such as magnetic tunnel junctions (MTJs) manipulated through spin-transfer torque (STT) and spin-orbit torque (SOT), offer a promising pathway to reducing power consumption and enhancing the speed of data processing. The integration of these devices within a neuromorphic framework aims to replicate the efficiency and adaptability of biological systems. The research is structured into three phases: an exhaustive literature review to build a theoretical foundation, laboratory experiments to test and optimize the theoretical models, and iterative refinements based on experimental results to finalize the system. The initial phase focuses on understanding the current state of neuromorphic and spintronic technologies. The second phase involves practical experimentation with spintronic devices and the development of neuromorphic systems that mimic synaptic plasticity and other biological processes. The final phase focuses on refining the systems based on feedback from the testing phase and preparing the findings for publication. The expected contributions of this research are twofold. Firstly, it aims to significantly reduce the energy consumption of computational systems while maintaining or increasing processing speed, addressing a critical need in the field of computing. Secondly, it seeks to enhance the learning capabilities of neuromorphic systems, allowing them to adapt more dynamically to changing environmental inputs, thus better mimicking the human brain's functionality. The integration of spintronics with neuromorphic computing could revolutionize how computational systems are designed, making them more efficient, faster, and more adaptable. This research aligns with the ongoing pursuit of energy-efficient and scalable computing solutions, marking a significant step forward in the field of computational technology.

Keywords: material science, biological engineering, mechanical engineering, neuromorphic computing, spintronics, energy efficiency, computational scalability, synaptic plasticity.

Procedia PDF Downloads 43
3122 An Image Enhancement Method Based on Curvelet Transform for CBCT-Images

Authors: Shahriar Farzam, Maryam Rastgarpour

Abstract:

Image denoising plays extremely important role in digital image processing. Enhancement of clinical image research based on Curvelet has been developed rapidly in recent years. In this paper, we present a method for image contrast enhancement for cone beam CT (CBCT) images based on fast discrete curvelet transforms (FDCT) that work through Unequally Spaced Fast Fourier Transform (USFFT). These transforms return a table of Curvelet transform coefficients indexed by a scale parameter, an orientation and a spatial location. Accordingly, the coefficients obtained from FDCT-USFFT can be modified in order to enhance contrast in an image. Our proposed method first uses a two-dimensional mathematical transform, namely the FDCT through unequal-space fast Fourier transform on input image and then applies thresholding on coefficients of Curvelet to enhance the CBCT images. Consequently, applying unequal-space fast Fourier Transform leads to an accurate reconstruction of the image with high resolution. The experimental results indicate the performance of the proposed method is superior to the existing ones in terms of Peak Signal to Noise Ratio (PSNR) and Effective Measure of Enhancement (EME).

Keywords: curvelet transform, CBCT, image enhancement, image denoising

Procedia PDF Downloads 300
3121 Uncovering Underwater Communication for Multi-Robot Applications via CORSICA

Authors: Niels Grataloup, Micael S. Couceiro, Manousos Valyrakis, Javier Escudero, Patricia A. Vargas

Abstract:

This paper benchmarks the possible underwater communication technologies that can be integrated into a swarm of underwater robots by proposing an underwater robot simulator named CORSICA (Cross platfORm wireleSs communICation simulator). Underwater exploration relies increasingly on the use of mobile robots, called Autonomous Underwater Vehicles (AUVs). These robots are able to reach goals in harsh underwater environments without resorting to human divers. The introduction of swarm robotics in these scenarios would facilitate the accomplishment of complex tasks with lower costs. However, swarm robotics requires implementation of communication systems to be operational and have a non-deterministic behaviour. Inter-robot communication is one of the key challenges in swarm robotics, especially in underwater scenarios, as communication must cope with severe restrictions and perturbations. This paper starts by presenting a list of the underwater propagation models of acoustic and electromagnetic waves, it also reviews existing transmitters embedded in current robots and simulators. It then proposes CORSICA, which allows validating the choices in terms of protocol and communication strategies, whether they are robot-robot or human-robot interactions. This paper finishes with a presentation of possible integration according to the literature review, and the potential to get CORSICA at an industrial level.

Keywords: underwater simulator, robot-robot underwater communication, swarm robotics, transceiver and communication models

Procedia PDF Downloads 300
3120 The Solid-Phase Sensor Systems for Fluorescent and SERS-Recognition of Neurotransmitters for Their Visualization and Determination in Biomaterials

Authors: Irina Veselova, Maria Makedonskaya, Olga Eremina, Alexandr Sidorov, Eugene Goodilin, Tatyana Shekhovtsova

Abstract:

Such catecholamines as dopamine, norepinephrine, and epinephrine are the principal neurotransmitters in the sympathetic nervous system. Catecholamines and their metabolites are considered to be important markers of socially significant diseases such as atherosclerosis, diabetes, coronary heart disease, carcinogenesis, Alzheimer's and Parkinson's diseases. Currently, neurotransmitters can be studied via electrochemical and chromatographic techniques that allow their characterizing and quantification, although these techniques can only provide crude spatial information. Besides, the difficulty of catecholamine determination in biological materials is associated with their low normal concentrations (~ 1 nM) in biomaterials, which may become even one more order lower because of some disorders. In addition, in blood they are rapidly oxidized by monoaminooxidases from thrombocytes and, for this reason, the determination of neurotransmitter metabolism indicators in an organism should be very rapid (15—30 min), especially in critical states. Unfortunately, modern instrumental analysis does not offer a complex solution of this problem: despite its high sensitivity and selectivity, HPLC-MS cannot provide sufficiently rapid analysis, while enzymatic biosensors and immunoassays for the determination of the considered analytes lack sufficient sensitivity and reproducibility. Fluorescent and SERS-sensors remain a compelling technology for approaching the general problem of selective neurotransmitter detection. In recent years, a number of catecholamine sensors have been reported including RNA aptamers, fluorescent ribonucleopeptide (RNP) complexes, and boronic acid based synthetic receptors and the sensor operated in a turn-off mode. In this work we present the fluorescent and SERS turn-on sensor systems based on the bio- or chemorecognizing nanostructured films {chitosan/collagen-Tb/Eu/Cu-nanoparticles-indicator reagents} that provide the selective recognition, visualization, and sensing of the above mentioned catecholamines on the level of nanomolar concentrations in biomaterials (cell cultures, tissue etc.). We have (1) developed optically transparent porous films and gels of chitosan/collagen; (2) ensured functionalization of the surface by molecules-'recognizers' (by impregnation and immobilization of components of the indicator systems: biorecognizing and auxiliary reagents); (3) performed computer simulation for theoretical prediction and interpretation of some properties of the developed materials and obtained analytical signals in biomaterials. We are grateful for the financial support of this research from Russian Foundation for Basic Research (grants no. 15-03-05064 a, and 15-29-01330 ofi_m).

Keywords: biomaterials, fluorescent and SERS-recognition, neurotransmitters, solid-phase turn-on sensor system

Procedia PDF Downloads 406
3119 Giftedness Cloud Model: A Psychological and Ecological Vision of Giftedness Concept

Authors: Rimeyah H. S. Almutairi, Alaa Eldin A. Ayoub

Abstract:

The aim of this study was to identify empirical and theoretical studies that explored giftedness theories and identification. In order to assess and synthesize the mechanisms, outcomes, and impacts of gifted identification models. Thus, we sought to provide an evidence-informed answer to how does current giftedness theories work and effectiveness. In order to develop a model that incorporates the advantages of existing models and avoids their disadvantages as much as possible. We conducted a systematic literature review (SLR). The disciplined analysis resulted in a final sample consisting of 30 appropriate searches. The results indicated that: (a) there is no uniform and consistent definition of Giftedness; (b) researchers are using several non-consistent criteria to detect gifted, and (d) The detection of talent is largely limited to early ages, and there is obvious neglect of adults. This study contributes to the development of Giftedness Cloud Model (GCM) which defined as a model that attempts to interpretation giftedness within an interactive psychological and ecological framework. GCM aims to help a talented to reach giftedness core and manifestation talent in creative productivity or invention. Besides that, GCM suggests classifying giftedness into four levels of mastery, excellence, creative productivity, and manifestation. In addition, GCM presents an idea to distinguish between talent and giftedness.

Keywords: giftedness cloud model, talent, systematic literature review, giftedness concept

Procedia PDF Downloads 167
3118 Schematic Study of Groundwater Potential Zones in Granitic Terrain Using Remotesensing and GIS Techniques, in Miyapur and Bollaram Areas of Hyderabad, India

Authors: Ishrath, Tapas Kumar Chatterjee

Abstract:

The present study aims developing interpretation and evaluation to integrate various data types for management of existing water resources for sustainable use. Proper study should be followed based on the geomorphology of the area. Thematic maps such as lithology, base map, land use/land cover, geomorphology, drainage and lineaments maps are prepared to study the area by using area toposheet, IRS P6 and LISIII Satellite imagery. These thematic layers are finally integrated by using Arc GIS, Arc View, and software to prepare a ground water potential zones map of the study area. In this study, an integrated approach involving remote sensing and GIS techniques has successfully been used in identifying groundwater potential zones in the study area to classify them as good, moderate and poor. It has been observed that Pediplain shallow (PPS) has good recharge, Pediplain moderate (PPM) has moderately good recharge, Pediment Inselberg complex (PIC) has poor recharge and Inselberg (I) has no recharge. The study has concluded that remote sensing and GIS techniques are very efficient and useful for identifying ground water potential zones.

Keywords: satellite remote sensing, GIS, ground water potential zones, Miyapur

Procedia PDF Downloads 445
3117 Sea-Land Segmentation Method Based on the Transformer with Enhanced Edge Supervision

Authors: Lianzhong Zhang, Chao Huang

Abstract:

Sea-land segmentation is a basic step in many tasks such as sea surface monitoring and ship detection. The existing sea-land segmentation algorithms have poor segmentation accuracy, and the parameter adjustments are cumbersome and difficult to meet actual needs. Also, the current sea-land segmentation adopts traditional deep learning models that use Convolutional Neural Networks (CNN). At present, the transformer architecture has achieved great success in the field of natural images, but its application in the field of radar images is less studied. Therefore, this paper proposes a sea-land segmentation method based on the transformer architecture to strengthen edge supervision. It uses a self-attention mechanism with a gating strategy to better learn relative position bias. Meanwhile, an additional edge supervision branch is introduced. The decoder stage allows the feature information of the two branches to interact, thereby improving the edge precision of the sea-land segmentation. Based on the Gaofen-3 satellite image dataset, the experimental results show that the method proposed in this paper can effectively improve the accuracy of sea-land segmentation, especially the accuracy of sea-land edges. The mean IoU (Intersection over Union), edge precision, overall precision, and F1 scores respectively reach 96.36%, 84.54%, 99.74%, and 98.05%, which are superior to those of the mainstream segmentation models and have high practical application values.

Keywords: SAR, sea-land segmentation, deep learning, transformer

Procedia PDF Downloads 181
3116 Human Action Recognition Using Variational Bayesian HMM with Dirichlet Process Mixture of Gaussian Wishart Emission Model

Authors: Wanhyun Cho, Soonja Kang, Sangkyoon Kim, Soonyoung Park

Abstract:

In this paper, we present the human action recognition method using the variational Bayesian HMM with the Dirichlet process mixture (DPM) of the Gaussian-Wishart emission model (GWEM). First, we define the Bayesian HMM based on the Dirichlet process, which allows an infinite number of Gaussian-Wishart components to support continuous emission observations. Second, we have considered an efficient variational Bayesian inference method that can be applied to drive the posterior distribution of hidden variables and model parameters for the proposed model based on training data. And then we have derived the predictive distribution that may be used to classify new action. Third, the paper proposes a process of extracting appropriate spatial-temporal feature vectors that can be used to recognize a wide range of human behaviors from input video image. Finally, we have conducted experiments that can evaluate the performance of the proposed method. The experimental results show that the method presented is more efficient with human action recognition than existing methods.

Keywords: human action recognition, Bayesian HMM, Dirichlet process mixture model, Gaussian-Wishart emission model, Variational Bayesian inference, prior distribution and approximate posterior distribution, KTH dataset

Procedia PDF Downloads 353
3115 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms

Authors: Sekkal Nawel, Mahammed Nadir

Abstract:

The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.

Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network

Procedia PDF Downloads 67
3114 A Portable Miniature Syringe Needle Remover And Receptacle For Drug Injection Users

Authors: Fanjun Zhou

Abstract:

In today's drug-ridden society, drug injection is gradually becoming more popular and has hidden danger to IDUs (injection drug users) such as infectious diseases. According to reports, 67% of IDUs reported improper disposal at some point over the prior 30 days, leading to a proliferation of injection needles on the streets. In recent years, the number of cases of children or ordinary people unintentionally picking up needles have increased. Various needle remover inventions have begun to surface, but the existing ones are either expensive, unportable, or risky for IDUs. In order to effectively alleviate the proliferation of drug injection needles and improve the invention of needle removers, a miniature portable needle remover and receptacle is invented. The device for capturing and storing syringe needles contains an upper lid portion mounted tightly onto the lower box portion through an interlock system on the opposing sides of the device with a breaking-twisting mechanism to remove the needle. The invention is intended to be affordable to the general public, safe enough for IDUs to use, reliable enough not to harm others, and effective in breaking needles from the syringe. This report is conducted in the hope of spreading awareness of the dangers of drug injection and to provide a way to mitigate this drug rampant situation.

Keywords: needle remover, drug injection, injection drug users, portable, receptacle

Procedia PDF Downloads 91
3113 Influence of Laser Treatment on the Growth of Sprouts of Different Wheat Varieties

Authors: N. Bakradze, T. Dumbadze, N. Gagelidze, L. Amiranashvili, A. D. L. Batako

Abstract:

Cereals are considered as a strategic product in human life and it demand is increasing with the growth of world population. There is always shortage of cereals in various areas of the globe. For example, Georgia own production meets only 15-20% of the demand for grain, despite the fact that the country is considered one of the main centers of wheat origin. In Georgia, there are 14 types of wheat and more than 150 subspecies, and 40 subspecies of common wheat. Increasing wheat production is important for the country. One of the ways to solve the problem is to develop and implement new, environmentally and economically acceptable technologies. Such technologies include pre-sowing treatment of seed with a laser and associative nitrogen-fixing of the Azospirillum brasilensse bacteria. In the region there are Dika and Lomtagora which are among the most common in Georgia. Dika is a frost-resistant wheat, with a high ability to adapt to the environment, resistant to falling and it is sown in highlands. Dicka excellent properties are due to its strong immunity to fungal diseases; Dicka grains are rich in protein and lysine. Lomtagora 126 differs with its winter and drought resistance, and, it has a great ability to germinate. Lomtagora is characterized by a strong root system and a high budding capacity. It is an early variety, fall-resistant, easy to thresh and suitable for mechanized harvesting with large and red grains. The plant is moderately resistant to fungal diseases. This paper presents some preliminary experimental results where, a continuous CO2 laser at a power of 25-40 W/cm2 was used to radiate grains at a flow rate of 10-15 cm/sec. The treatment was carried out on grains of the Triticum aestivum L. var. of Lutescens (local variety name - Lomtagora 126), and Triticum carthlicum Nevski (local variety name - Dika). Here the grains were treated with Azospirillum brasilensse isolate (108-109 CFU / ml), which was isolated from the rhizosphere of wheat. It was observed that the germination of the wheat was not significantly influenced by either laser or bacteria treatment. In the case of the variety Lomtagora 126, when irradiated at an angle of 90°, it slightly improved the growth within 38 days of sawing, and in the case of irradiation at an angle of 90°+1, by 23%. The treatment of seeds with Azospirillum brazilense in both irradiated and non-irradiated variants led to an improvement in the growth of ssprouts. However, in the case of treatment with azospiril alone - by 22%, and with joint treatment of seeds with azospiril and irradiation - by 29%. In the case of the Dika wheat, the irradiation only led to an increase in growth by 8-9%, and the combine treatment of seeds with azospiril and irradiation - by 10-15%, in comparison with the control. Thus, the combine treatment of wheat of different varieties provided the best effect on the growth. Acknowledgment: This work was supported by Shota Rustaveli National Science Foundation of Georgia (SRNSFG) (Grant number CARYS 19-573)

Keywords: laser treatment, Azospirillum brasilensse, seeds, wheat varieties, Lomtagora, Dika

Procedia PDF Downloads 144