Search results for: context aware computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7102

Search results for: context aware computing

6772 A Queer Approach to the National Irish Identity during 'The Troubles' in Belfast in Paul Mcveigh's 'The Good Son'

Authors: Eduardo Garcia Agustin

Abstract:

This paper focuses on how Mickey – the 10-year-old main character and narrator in Paul McVeigh’s novel The Good Son (2015) – becomes aware of his own queerness and its implications in a conflicting place and time such as Belfast during ‘The Troubles’ in the 1980s. Queer theory allows a comparative reading of identity issues such as national and gender discourses. As opposed to some other excluding social constructs that classify identities in an Us-Others binomial, queer has become a sort of umbrella term where there is room for more identities other than LGTBQ. Therefore, it offers some relevant tools to read this highly awarded novel by focusing on the intersectional construction of Mickey’s identity in progress within the social and familiar realms. The aim of this paper is to offer a queer reading of the The Good Son, which was awarded with the Polari First Book Prize in 2016, by showing the key role of Mickey’s conflictive realization of his own queerness in the polarized society of Northern Ireland in the 1980s, where there is no shade of grey. Within such a polarized context, Mickey’s perception of his own internal and external identity conflicts he is exposed to will show how necessary a certain touch of pink is as a potential escape to those conflicts.

Keywords: conflict, national identity, Northern Ireland, queer identity

Procedia PDF Downloads 506
6771 The History of the Birth of Tunisian Higher Accounting Education

Authors: Rim Khemiri, Mariam Dammak

Abstract:

The aim of this study is to trace the historical evolution of Tunisian higher accounting education and to understand and highlight the circumstances of its birth and its development. A documentary study (archival documents, official documents, public speeches, etc.), as well as semi-directive interviews with key actors, were carried out as part of this research work. These interviews aim to fill a lack of information on this subject and to confirm events addressed by other sources, but for which it lacks the elements necessary for a good understanding. After having put forward the specificities of the Tunisian context, we will, first of all, proceed to a review of the literature related to our theme in various contexts of the world. Then, we will present the evolution of the accounting curriculum by highlighting the circumstances of its birth and those of the successive reforms led by the Tunisian government. The study of higher accounting education in Tunisia and its evolution has several interests. The first lies in understanding the circumstances of its birth and its evolution in relation to the historical, socio-economic, and political context of the country. The second is to propose a reading grid that allows an understanding of the reforms that led to the university accountancy accounting course as we know it today. And, the third, aims to complete the literature on the processes of evolution of higher education accounting, by treating a different context, in order to provide additional knowledge necessary to compare experiences in this area around the world.

Keywords: accounting history, higher accounting education, socio-economic and political context, Tunisian context

Procedia PDF Downloads 107
6770 Hierarchical Checkpoint Protocol in Data Grids

Authors: Rahma Souli-Jbali, Minyar Sassi Hidri, Rahma Ben Ayed

Abstract:

Grid of computing nodes has emerged as a representative means of connecting distributed computers or resources scattered all over the world for the purpose of computing and distributed storage. Since fault tolerance becomes complex due to the availability of resources in decentralized grid environment, it can be used in connection with replication in data grids. The objective of our work is to present fault tolerance in data grids with data replication-driven model based on clustering. The performance of the protocol is evaluated with Omnet++ simulator. The computational results show the efficiency of our protocol in terms of recovery time and the number of process in rollbacks.

Keywords: data grids, fault tolerance, clustering, chandy-lamport

Procedia PDF Downloads 311
6769 AI/ML Atmospheric Parameters Retrieval Using the “Atmospheric Retrievals conditional Generative Adversarial Network (ARcGAN)”

Authors: Thomas Monahan, Nicolas Gorius, Thanh Nguyen

Abstract:

Exoplanet atmospheric parameters retrieval is a complex, computationally intensive, inverse modeling problem in which an exoplanet’s atmospheric composition is extracted from an observed spectrum. Traditional Bayesian sampling methods require extensive time and computation, involving algorithms that compare large numbers of known atmospheric models to the input spectral data. Runtimes are directly proportional to the number of parameters under consideration. These increased power and runtime requirements are difficult to accommodate in space missions where model size, speed, and power consumption are of particular importance. The use of traditional Bayesian sampling methods, therefore, compromise model complexity or sampling accuracy. The Atmospheric Retrievals conditional Generative Adversarial Network (ARcGAN) is a deep convolutional generative adversarial network that improves on the previous model’s speed and accuracy. We demonstrate the efficacy of artificial intelligence to quickly and reliably predict atmospheric parameters and present it as a viable alternative to slow and computationally heavy Bayesian methods. In addition to its broad applicability across instruments and planetary types, ARcGAN has been designed to function on low power application-specific integrated circuits. The application of edge computing to atmospheric retrievals allows for real or near-real-time quantification of atmospheric constituents at the instrument level. Additionally, edge computing provides both high-performance and power-efficient computing for AI applications, both of which are critical for space missions. With the edge computing chip implementation, ArcGAN serves as a strong basis for the development of a similar machine-learning algorithm to reduce the downlinked data volume from the Compact Ultraviolet to Visible Imaging Spectrometer (CUVIS) onboard the DAVINCI mission to Venus.

Keywords: deep learning, generative adversarial network, edge computing, atmospheric parameters retrieval

Procedia PDF Downloads 152
6768 A Review on Applications of Experts Systems in Medical Sciences

Authors: D. K. Sreekantha, T. M. Girish, R. H. Fattepur

Abstract:

In this article, we have given an overview of medical expert systems, which can be used for the developed of physicians in making decisions such as appropriate, prognostic, and therapeutic decisions which help to organize, store, and gives appropriate medical knowledge needed by physicians and practitioners during medical operations or further treatment. If they support the studies by using these systems, advanced tools in medicine will be developed in the future. New trends in the methodology of development of medical expert systems have also been discussed in this paper. So Authors would like to develop an innovative IT based solution to help doctors in rural areas to gain expertise in Medical Science for treating patients. This paper aims to survey the Soft Computing techniques in treating patient’s problems used throughout the world.

Keywords: expert system, fuzzy logic, knowledge base, soft computing, epilepsy

Procedia PDF Downloads 239
6767 Recent Developments in the Application of Deep Learning to Stock Market Prediction

Authors: Shraddha Jain Sharma, Ratnalata Gupta

Abstract:

Predicting stock movements in the financial market is both difficult and rewarding. Analysts and academics are increasingly using advanced approaches such as machine learning techniques to anticipate stock price patterns, thanks to the expanding capacity of computing and the recent advent of graphics processing units and tensor processing units. Stock market prediction is a type of time series prediction that is incredibly difficult to do since stock prices are influenced by a variety of financial, socioeconomic, and political factors. Furthermore, even minor mistakes in stock market price forecasts can result in significant losses for companies that employ the findings of stock market price prediction for financial analysis and investment. Soft computing techniques are increasingly being employed for stock market prediction due to their better accuracy than traditional statistical methodologies. The proposed research looks at the need for soft computing techniques in stock market prediction, the numerous soft computing approaches that are important to the field, past work in the area with their prominent features, and the significant problems or issue domain that the area involves. For constructing a predictive model, the major focus is on neural networks and fuzzy logic. The stock market is extremely unpredictable, and it is unquestionably tough to correctly predict based on certain characteristics. This study provides a complete overview of the numerous strategies investigated for high accuracy prediction, with a focus on the most important characteristics.

Keywords: stock market prediction, artificial intelligence, artificial neural networks, fuzzy logic, accuracy, deep learning, machine learning, stock price, trading volume

Procedia PDF Downloads 64
6766 Artificial Neurons Based on Memristors for Spiking Neural Networks

Authors: Yan Yu, Wang Yu, Chen Xintong, Liu Yi, Zhang Yanzhong, Wang Yanji, Chen Xingyu, Zhang Miaocheng, Tong Yi

Abstract:

Neuromorphic computing based on spiking neural networks (SNNs) has emerged as a promising avenue for building the next generation of intelligent computing systems. Owing to its high-density integration, low power, and outstanding nonlinearity, memristors have attracted emerging attention on achieving SNNs. However, fabricating a low-power and robust memristor-based spiking neuron without extra electrical components is still a challenge for brain-inspired systems. In this work, we demonstrate a TiO₂-based threshold switching (TS) memristor to emulate a leaky integrate-and-fire (LIF) neuron without auxiliary circuits, used to realize single layer fully connected (FC) SNNs. Moreover, our TiO₂-based resistive switching (RS) memristors realize spiking-time-dependent-plasticity (STDP), originating from the Ag diffusion-based filamentary mechanism. This work demonstrates that TiO2-based memristors may provide an efficient method to construct hardware neuromorphic computing systems.

Keywords: leaky integrate-and-fire, memristor, spiking neural networks, spiking-time-dependent-plasticity

Procedia PDF Downloads 109
6765 Architecture of a Preliminary Course on Computational Thinking

Authors: Mintu Philip, Renumol V. G.

Abstract:

An introductory programming course is a major challenge faced in Computing Education. Many of the introductory programming courses fail because student concentrate mainly on writing programs using a programming language rather than involving in problem solving. Computational thinking is a general approach to solve problems. This paper proposes a new preliminary course that aims to develop computational thinking skills in students, which may help them to become good programmers. The proposed course is designed based on the four basic components of computational thinking - abstract thinking, logical thinking, modeling thinking and constructive thinking. In this course, students are engaged in hands-on problem solving activities using a new problem solving model proposed in this paper.

Keywords: computational thinking, computing education, abstraction, constructive thinking, modelling thinking

Procedia PDF Downloads 430
6764 Teacher Professional Development in Saudi Arabia: Challenges and Possibilities

Authors: Ohood Alshammary

Abstract:

This study explores the current situation of teacher professional development, focusing on challenges experienced by English language teachers at a Saudi Arabian university. The study examines the current context of English language department (ELD) teachers in relation to PD activities available and the nature of the challenges they face in their attempts to engage in PD. The study adopted an interpretive approach to understanding the current situation of teachers working at the English language department (ELD) at one Saudi Arabian university. The study's findings reveal that participating teachers were aware of the significance of PD but were disappointed that the voices of teachers were not heard. The research reveals many challenges; lack of autonomy, insufficient time, heavy workloads, unsupportive working environments, and PD activities that were not considered necessary by the participants. Teachers viewed PD as subject to a top-down system, causing them to feel professionally undermined, lacking autonomy, and forced to comply with university rules. The study makes several recommendations for improving the PD experience and helping raise institutional awareness of the need to encourage teacher engagement and recommend enhancements to ELD teachers' professional development based on teachers' perspectives.

Keywords: adult learning., professional development, PD challenge, teacher perspective

Procedia PDF Downloads 50
6763 Demystifying Board Games for Teachers

Authors: Shilpa Sharma, Lakshmi Ganesh, Mantra Gurumurthy, Shweta Sharma

Abstract:

Board games provide affordances of 21st-century skills like collaboration, critical thinking, and strategy. Board games such as chess, Catan, Battleship, Scrabble, and Taboo can enhance learning in these areas. While board games are popular in informal child settings, their use in formal K-12 education is limited. To encourage teachers to incorporate board games, it's essential to grasp their perceptions and tailor professional development programs accordingly. This paper aims to explore teacher attitudes toward board games and propose interventions to motivate teachers to integrate and create board games in the classroom. A user study was conceived, designed, and administered with teachers (n=38) to understand their experience in playing board games and using board games in the classroom. Purposive sampling was employed as the questionnaire was floated to teacher groups that the authors were aware of. The teachers taught in K-12 affordable private schools. The majority of them had experience ranging from 2-5 years. The questionnaire consisted of questions on teacher perceptions and beliefs of board game usage in the classroom. From the responses, it was observed that ~90% of teachers, though they had experience of playing board games, rarely did it translate to using board games in the classroom. Additionally, it was observed that translating learning objectives to board game objectives is the key factor that teachers consider while using board games in the classroom. Based on the results from the questionnaire, a professional development workshop was co-designed with the objective of motivating teachers to design, create and use board games in the classroom. The workshop is based on the principles of gamification. This is to ensure that the teachers experience a board game in a learning context. Additionally, the workshop is based on the principles of andragogy, such as agency, pertinence, and relevance. The workshop will begin by modifying and reusing known board games in the learning context so that the teachers do not find it difficult and daunting. The intention is to verify the face validity and content validity of the workshop design, orchestration and content with experienced teacher development professionals and education researchers. The results from this study will be published in the full paper.

Keywords: board games, professional development, teacher motivation, teacher perception

Procedia PDF Downloads 86
6762 Loan Repayment Prediction Using Machine Learning: Model Development, Django Web Integration and Cloud Deployment

Authors: Seun Mayowa Sunday

Abstract:

Loan prediction is one of the most significant and recognised fields of research in the banking, insurance, and the financial security industries. Some prediction systems on the market include the construction of static software. However, due to the fact that static software only operates with strictly regulated rules, they cannot aid customers beyond these limitations. Application of many machine learning (ML) techniques are required for loan prediction. Four separate machine learning models, random forest (RF), decision tree (DT), k-nearest neighbour (KNN), and logistic regression, are used to create the loan prediction model. Using the anaconda navigator and the required machine learning (ML) libraries, models are created and evaluated using the appropriate measuring metrics. From the finding, the random forest performs with the highest accuracy of 80.17% which was later implemented into the Django framework. For real-time testing, the web application is deployed on the Alibabacloud which is among the top 4 biggest cloud computing provider. Hence, to the best of our knowledge, this research will serve as the first academic paper which combines the model development and the Django framework, with the deployment into the Alibaba cloud computing application.

Keywords: k-nearest neighbor, random forest, logistic regression, decision tree, django, cloud computing, alibaba cloud

Procedia PDF Downloads 108
6761 Environmental Factors Affecting Knowledge Transfer between the Context of the Training Institution and the Context of the Work Environment: The Case of Agricultural Vocational Training

Authors: Oussedik Lydia, Zaouani-Denoux Souâd

Abstract:

Given the evolution of professions, training is becoming a solution to meet the current requirements of the labor market. Notably, the amount of money invested in training activities is considerable and continuously increasing globally. The justification of this investment becomes an obligation for those responsible for training. Therefore, the impact of training can be measured by the degree to which the knowledge, skills, and attitudes acquired through training are transferred to the workplace. Further, knowledge transfer is fundamental because the objective of any training is to be close to a professional environment in order to improve the productivity of participants. Hence, the need to better understand the knowledge transfer process in order to determine the factors that may influence it. The objective of this research is to understand the process of knowledge transfer that can occur between two contexts: professional training and the workplace, which will provide further insight to identify the environmental factors that can hinder or promote it. By examining participants' perceptions of the training and work contexts, this qualitative approach seeks to understand the knowledge transfer process that occurs between the two contexts. It also aims to identify the factors that influence it. The results will help managers identify environmental factors in the training and work context that may impact knowledge transfer. These results can be used to promote the knowledge transfer process and the performance of the trainees.

Keywords: knowledge transfer, professional training, professional training in agriculture, training context, professional context

Procedia PDF Downloads 135
6760 Gentrification and Its Impact on Urbanization in India

Authors: Swapnil Vidhate, Anupama Sharma

Abstract:

At present the world is experiencing an extraordinary rate of urbanization. India is also in a major phase of urbanization. Gentrification is being practiced in India much later compared to western countries as a strategy for urban renewal. The urban fabric in Indian context is composed of multiple layers in it. Thus, the process of gentrification has different typologies, views and impacts in Indian context. It is a curative concept to restructure the declined areas of the city. But it has more negative views compared to positive due to the concerns in the process in India. The paper brings out the impacts of gentrification and concerns related with the process in Indian context with a case example of core city.

Keywords: urbanization, urban renewal, gentrification, restructure, core city

Procedia PDF Downloads 710
6759 Exploring the Experiences of Transnational TESOL Professionals about Their Writing Assessment Practices: A Critical Ethnography in the Saudi EFL Context

Authors: Abdullah Alshakhi

Abstract:

This study aims to explore the assessment practices of transnational western teachers in Saudi EFL writing classrooms. The study adopts a critical ethnographic approach to understand the views and the experiences of four transnational TESOL professionals about how they navigate and negotiate their writing assessment practices in the Saudi EFL context. The qualitative data were collected through classroom observations and video recordings of the classroom teaching, which were followed by semi-structured interviews with the four TESOL teachers from Australia, England, USA, and Ireland. The data were analyzed from three perspectives of these transnational TESOL teachers in the Saudi EFL context: as a transnational teacher in monolingual context, as a transitional teacher abides by the prescribed curriculum and assessment instructions, and as a transnational teacher’s vision for monolingual students. The results of the study revealed that owing to the transnational teachers’ lack of understanding of the Saudi monolingual culture, bureaucratic structures, and top-down assessment policies in the institute where they work, their teaching and assessment of writing and other language skills are negatively affected and consequently had to be modified. Also, the Saudi learners’ lack of interest and their lower level of English proficiency pose serious challenges to those transnational teachers’ writing assessment practices. More often, the teachers find the prescribed writing curriculum and assessment tools ineffective in the Saudi EFL context. Because of these experiences, the transnational teachers in this study have exhibited their awareness of their monolingual/monoculture background, Saudi’s cultural and religious values, and institutional structures, which have helped them customize or supplement the writing assessment practices accordingly.

Keywords: critical ethnography, Saudi EFL context, TESOL professionals, transnationalism, writing assessment

Procedia PDF Downloads 97
6758 A New Protocol Ensuring Users' Privacy in Pervasive Environment

Authors: Mohammed Nadir Djedid, Abdallah Chouarfia

Abstract:

Transparency of the system and its integration into the natural environment of the user are some of the important features of pervasive computing. But these characteristics that are considered as the strongest points of pervasive systems are also their weak points in terms of the user’s privacy. The privacy in pervasive systems involves more than the confidentiality of communications and concealing the identity of virtual users. The physical presence and behavior of the user in the pervasive space cannot be completely hidden and can reveal the secret of his/her identity and affect his/her privacy. This paper shows that the application of major techniques for protecting the user’s privacy still insufficient. A new solution named Shadow Protocol is proposed, which allows the users to authenticate and interact with the surrounding devices within an ubiquitous computing environment while preserving their privacy.

Keywords: pervasive systems, identification, authentication, privacy

Procedia PDF Downloads 455
6757 Investigating the Relationship between Bank and Cloud Provider

Authors: Hatim Elhag

Abstract:

Banking and Financial Service Institutions are possibly the most advanced in terms of technology adoption and use it as a key differentiator. With high levels of business process automation, maturity in the functional portfolio, straight through processing and proven technology outsourcing benefits, Banking sector stand to benefit significantly from Cloud computing capabilities. Additionally, with complex Compliance and Regulatory policies, combined with expansive products and geography coverage, the business impact is even greater. While the benefits are exponential, there are also significant challenges in adopting this model– including Legal, Security, Performance, Reliability, Transformation complexity, Operating control and Governance and most importantly proof for the promised cost benefits. However, new architecture designed should be implemented to align this approach.

Keywords: security, cloud, banking sector, cloud computing

Procedia PDF Downloads 479
6756 Nazca: A Context-Based Matching Method for Searching Heterogeneous Structures

Authors: Karine B. de Oliveira, Carina F. Dorneles

Abstract:

The structure level matching is the problem of combining elements of a structure, which can be represented as entities, classes, XML elements, web forms, and so on. This is a challenge due to large number of distinct representations of semantically similar structures. This paper describes a structure-based matching method applied to search for different representations in data sources, considering the similarity between elements of two structures and the data source context. Using real data sources, we have conducted an experimental study comparing our approach with our baseline implementation and with another important schema matching approach. We demonstrate that our proposal reaches higher precision than the baseline.

Keywords: context, data source, index, matching, search, similarity, structure

Procedia PDF Downloads 340
6755 Smart Structures for Cost Effective Cultural Heritage Preservation

Authors: Tamara Trček Pečak, Andrej Mohar, Denis Trček

Abstract:

This article investigates the latest technological means, which deploy smart structures that are based on (advanced) wireless sensors technologies and ubiquitous computing in general in order to support the above mentioned decision making. Based on two years of in-field research experiences it gives their analysis for these kinds of purposes and provides appropriate architectures and architectural solutions. Moreover, the directions for future research are stated, because these technologies are currently the most promising ones to enable cost-effective preservation of cultural heritage not only in uncontrolled places, but also in general.

Keywords: smart structures, wireless sensors, sensors networks, green computing, cultural heritage preservation, monitoring, cost effectiveness

Procedia PDF Downloads 422
6754 The Theory and Practice of Translanguaging: Scope, Potential and Limitations in a Multilingual Urban Context

Authors: Luzia Dominguez

Abstract:

This paper explores the concept of ‘translanguaging’ and the relevance of its pedagogical application in the context of foreign language education in a multilingual urban environment. We review relevant literature discussing this theoretical concept, its scope, potential, and limitations when applied to the teaching of foreign languages. We then discuss its possible practical application in Welsh secondary schools, particularly in the most diverse areas of the Welsh capital, Cardiff (United Kingdom). The concept of translanguaging has evolved in scope, from its initial application in the teaching of Welsh and English in the Welsh bilingual context to finding a relevant space not only in the international arena of Sociolinguistics and language pedagogy but also being present in current Welsh educational policies and, presumably, practices. However, it is important to consider the actual pedagogical relevance of incorporating this concept into these policies, particularly in the teaching of Modern Foreign Languages. Additionally, it is important to examine any social factors that may influence the effectiveness of its application in the social context, in our case, a multilingual, ethnically diverse urban context. By analyzing these issues, we aim to explore possible teaching practices that could be pedagogically effective in applying the concept in Cardiff secondary schools.

Keywords: pedagogy, modern foreign languages, applied linguistics, sociolinguistics

Procedia PDF Downloads 36
6753 Optimizing Data Transfer and Processing in Multi-Cloud Environments for Big Data Workloads

Authors: Gaurav Kumar Sinha

Abstract:

In an era defined by the proliferation of data and the utilization of cloud computing environments, the efficient transfer and processing of big data workloads across multi-cloud platforms have emerged as critical challenges. This research paper embarks on a comprehensive exploration of the complexities associated with managing and optimizing big data in a multi-cloud ecosystem.The foundation of this study is rooted in the recognition that modern enterprises increasingly rely on multiple cloud providers to meet diverse business needs, enhance redundancy, and reduce vendor lock-in. As a consequence, managing data across these heterogeneous cloud environments has become intricate, necessitating innovative approaches to ensure data integrity, security, and performance.The primary objective of this research is to investigate strategies and techniques for enhancing the efficiency of data transfer and processing in multi-cloud scenarios. It recognizes that big data workloads are characterized by their sheer volume, variety, velocity, and complexity, making traditional data management solutions insufficient for harnessing the full potential of multi-cloud architectures.The study commences by elucidating the challenges posed by multi-cloud environments in the context of big data. These challenges encompass data fragmentation, latency, security concerns, and cost optimization. To address these challenges, the research explores a range of methodologies and solutions. One of the key areas of focus is data transfer optimization. The paper delves into techniques for minimizing data movement latency, optimizing bandwidth utilization, and ensuring secure data transmission between different cloud providers. It evaluates the applicability of dedicated data transfer protocols, intelligent data routing algorithms, and edge computing approaches in reducing transfer times.Furthermore, the study examines strategies for efficient data processing across multi-cloud environments. It acknowledges that big data processing requires distributed and parallel computing capabilities that span across cloud boundaries. The research investigates containerization and orchestration technologies, serverless computing models, and interoperability standards that facilitate seamless data processing workflows.Security and data governance are paramount concerns in multi-cloud environments. The paper explores methods for ensuring data security, access control, and compliance with regulatory frameworks. It considers encryption techniques, identity and access management, and auditing mechanisms as essential components of a robust multi-cloud data security strategy.The research also evaluates cost optimization strategies, recognizing that the dynamic nature of multi-cloud pricing models can impact the overall cost of data transfer and processing. It examines approaches for workload placement, resource allocation, and predictive cost modeling to minimize operational expenses while maximizing performance.Moreover, this study provides insights into real-world case studies and best practices adopted by organizations that have successfully navigated the challenges of multi-cloud big data management. It presents a comparative analysis of various multi-cloud management platforms and tools available in the market.

Keywords: multi-cloud environments, big data workloads, data transfer optimization, data processing strategies

Procedia PDF Downloads 45
6752 A Comparative Study on ANN, ANFIS and SVM Methods for Computing Resonant Frequency of A-Shaped Compact Microstrip Antennas

Authors: Ahmet Kayabasi, Ali Akdagli

Abstract:

In this study, three robust predicting methods, namely artificial neural network (ANN), adaptive neuro fuzzy inference system (ANFIS) and support vector machine (SVM) were used for computing the resonant frequency of A-shaped compact microstrip antennas (ACMAs) operating at UHF band. Firstly, the resonant frequencies of 144 ACMAs with various dimensions and electrical parameters were simulated with the help of IE3D™ based on method of moment (MoM). The ANN, ANFIS and SVM models for computing the resonant frequency were then built by considering the simulation data. 124 simulated ACMAs were utilized for training and the remaining 20 ACMAs were used for testing the ANN, ANFIS and SVM models. The performance of the ANN, ANFIS and SVM models are compared in the training and test process. The average percentage errors (APE) regarding the computed resonant frequencies for training of the ANN, ANFIS and SVM were obtained as 0.457%, 0.399% and 0.600%, respectively. The constructed models were then tested and APE values as 0.601% for ANN, 0.744% for ANFIS and 0.623% for SVM were achieved. The results obtained here show that ANN, ANFIS and SVM methods can be successfully applied to compute the resonant frequency of ACMAs, since they are useful and versatile methods that yield accurate results.

Keywords: a-shaped compact microstrip antenna, artificial neural network (ANN), adaptive neuro-fuzzy inference system (ANFIS), support vector machine (SVM)

Procedia PDF Downloads 423
6751 An Application Framework for Integrating Wireless Sensor and Actuator Networks for Precision Farmingas Web of Things to Cloud Interface Using PaaS

Authors: Sumaya Ismail, Aijaz Ahmad Reshi

Abstract:

The advances in sensor and embedded technologies have led to rapid developments in Wireless Sensor Networks (WSNs). Presently researchers focus on the integration of WSNs to the Internet for their pervasive availability to access these network resources as the interoperable subsystems. The recent computing technologies like cloud computing has made resource sharing as a converged infrastructure with required service interfaces for the shared resources over the Internet. This paper presents application architecture for wireless Sensor and Actuator Networks (WSANS) following web of things, which allows easy integration of each node to the Internet in order to provide them with web accessibility. The architecture enables the sensors and actuator nodes accessed and controlled using cloud interface on WWW. The application architecture was implemented using existing web and its emerging technologies. In particular, the Representational State Transfer protocol (REST) was extended for the specific requirements of the application. The Cloud computing environment has been used as a development platform for the application to assess the possibility of integrating the WSAN nodes to Cloud services. The mushroom farm environment monitoring and control using WSANs has been taken as a research use case.

Keywords: WSAN, REST, web of things, ZigBee, cloud interface, PaaS, sensor gateway

Procedia PDF Downloads 82
6750 Ideology-Induced Contexts in the Conceptualization of 'the Islamic State' in Political Cartoons

Authors: Rim Baroudi

Abstract:

The notion of the context-induced metaphors refers to the role of different contextual aspects (socio-cultural, linguistic, bodily-physical, and ideological) in affecting metaphor production. This has not been investigated in visual discourse. This paper intends to extend the focus of this research interest to study context-induced metaphors in newspapers’ cartoons. It seeks to account for different contextual variables influencing the production of metaphors in cartoons placing special focus on the ideological variable. The aim is to demonstrate how different contextual aspects are conditioned by the ideological variable. The study applied critical metaphor approach to analyse contextual variables shaping the conceptualization of ‘the Islamic State’ in the cartoons of 3 newspapers (Al-Ryadh newspaper, Tehran Times, and The New York Times). Findings have revealed the decisive role of the ideological context in conditioning and priming the rest of contextual variables in the conceptualisation of ‘the Islamic State’ in political cartoons of the three newspapers. These findings bear special importance to the study of bodily-physical and socio-cultural variables inducing and shaping political cognition in political cartoons in a way consistent with the ideological framework within which newspapers operate.

Keywords: context-induced metaphors, ideological context, the Islamic State, political cartoons

Procedia PDF Downloads 277
6749 Multimodal Characterization of Emotion within Multimedia Space

Authors: Dayo Samuel Banjo, Connice Trimmingham, Niloofar Yousefi, Nitin Agarwal

Abstract:

Technological advancement and its omnipresent connection have pushed humans past the boundaries and limitations of a computer screen, physical state, or geographical location. It has provided a depth of avenues that facilitate human-computer interaction that was once inconceivable such as audio and body language detection. Given the complex modularities of emotions, it becomes vital to study human-computer interaction, as it is the commencement of a thorough understanding of the emotional state of users and, in the context of social networks, the producers of multimodal information. This study first acknowledges the accuracy of classification found within multimodal emotion detection systems compared to unimodal solutions. Second, it explores the characterization of multimedia content produced based on their emotions and the coherence of emotion in different modalities by utilizing deep learning models to classify emotion across different modalities.

Keywords: affective computing, deep learning, emotion recognition, multimodal

Procedia PDF Downloads 128
6748 Studies on Pesticide Usage Pattern and Farmers Knowledge on Pesticide Usage and Technologies in Open Field and Poly House Conditions

Authors: B. Raghu, Shashi Vemuri, Ch. Sreenivasa Rao

Abstract:

The survey on pesticide use pattern was carried out by interviewing farmers growing chill in open fields and poly houses based on the questionnaire prepared to assess their knowledge and practices on crop cultivation, general awareness on pesticide recommendations and use. Education levels of poly house farmers are high compared to open field farmers, where 57.14% poly house farmers are high school educated, whereas 35% open field farmers are illiterates. Majority farmers use nursery of 35 days and grow in <0.5 acre poly house in summer and rabi and < 1 acre in open field during kharif. Awareness on pesticide related issues is varying among poly house and open field farmers with some commonality, where 28.57% poly house farmers know about recommended pesticides while only 10% open field farmers are aware of this issue. However, in general, all farmers contact pesticide dealer for recommendations, poly house farmers prefer to contact scientists (35.71%) and open field farmers prefer to contact agricultural officers (33.33). Most farmers are unaware about pesticide classification and toxicity symbols on packing. Farmers are aware about endosulfan ban, but only 21.42% poly house and 11.66% open field farmers know about ban of monocrotofos on vegetables. Very few farmers know about pesticide residues and related issues, but know washing helps to reduce contamination.

Keywords: open field, pesticide usage, polyhouses, residues survey

Procedia PDF Downloads 446
6747 Deep Reinforcement Learning Model Using Parameterised Quantum Circuits

Authors: Lokes Parvatha Kumaran S., Sakthi Jay Mahenthar C., Sathyaprakash P., Jayakumar V., Shobanadevi A.

Abstract:

With the evolution of technology, the need to solve complex computational problems like machine learning and deep learning has shot up. But even the most powerful classical supercomputers find it difficult to execute these tasks. With the recent development of quantum computing, researchers and tech-giants strive for new quantum circuits for machine learning tasks, as present works on Quantum Machine Learning (QML) ensure less memory consumption and reduced model parameters. But it is strenuous to simulate classical deep learning models on existing quantum computing platforms due to the inflexibility of deep quantum circuits. As a consequence, it is essential to design viable quantum algorithms for QML for noisy intermediate-scale quantum (NISQ) devices. The proposed work aims to explore Variational Quantum Circuits (VQC) for Deep Reinforcement Learning by remodeling the experience replay and target network into a representation of VQC. In addition, to reduce the number of model parameters, quantum information encoding schemes are used to achieve better results than the classical neural networks. VQCs are employed to approximate the deep Q-value function for decision-making and policy-selection reinforcement learning with experience replay and the target network.

Keywords: quantum computing, quantum machine learning, variational quantum circuit, deep reinforcement learning, quantum information encoding scheme

Procedia PDF Downloads 102
6746 Moroccan Human Ecological Behavior: Grounded Theory Approach

Authors: Dalal Tarfaoui, Salah Zkim

Abstract:

Today, environmental sustainability is everyone’s concern as it contributes in many aspects to a country's development. Morocco is also aware of the increasing threats to its natural resources. Accordingly, many projects and research have been discussed pointing mainly to water security, pollution, desertification, and land degradation, but few studies bothered to dig into the human demeanor to disclose its ecological behavior. Human behavior is accountable for environment deterioration in the first place, but we keep fighting the symptoms instead of limiting the root causes. In the conceptual framework highlighted in the present article, semi-structured interviews have been conducted using a grounded theory approach. Initially this study will serve as a pilot study and a cornerstone to approve a bigger project now in progress. Beyond the existing general ecological measures (GEM), this study has chosen the grounded theory approach to bring out firsthand insights, and probe to which extent an ecological dimension exists in Morocco as a developing country. The discourse of the ecological behavior within the Moroccan context is seen in more realist, social, and community philosophy. The study has revealed an appreciative ecological behavior that is unfortunately repressed by variables beyond people’s control, which would prevent the people’s environmental good intentions to be translated into real ecological actions.

Keywords: ecological behavior, ecological dimension, variables beyond people’s control, Morocco

Procedia PDF Downloads 466
6745 Parallel Computation of the Covariance-Matrix

Authors: Claude Tadonki

Abstract:

We address the issues related to the computation of the covariance matrix. This matrix is likely to be ill conditioned following its canonical expression, thus consequently raises serious numerical issues. The underlying linear system, which therefore should be solved by means of iterative approaches, becomes computationally challenging. A huge number of iterations is expected in order to reach an acceptable level of convergence, necessary to meet the required accuracy of the computation. In addition, this linear system needs to be solved at each iteration following the general form of the covariance matrix. Putting all together, its comes that we need to compute as fast as possible the associated matrix-vector product. This is our purpose in the work, where we consider and discuss skillful formulations of the problem, then propose a parallel implementation of the matrix-vector product involved. Numerical and performance oriented discussions are provided based on experimental evaluations.

Keywords: covariance-matrix, multicore, numerical computing, parallel computing

Procedia PDF Downloads 292
6744 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 346
6743 Adaptive Certificate-Based Mutual Authentication Protocol for Mobile Grid Infrastructure

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Mobile Grid Computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using different types of electronic portable devices. In a grid environment the security issues are like authentication, authorization, message protection and delegation handled by GSI (Grid Security Infrastructure). Proving better security between mobile devices and grid infrastructure is a major issue, because of the open nature of wireless networks, heterogeneous and distributed environments. In a mobile grid environment, the individual computing devices may be resource-limited in isolation, as an aggregated sum, they have the potential to play a vital role within the mobile grid environment. Some adaptive methodology or solution is needed to solve the issues like authentication of a base station, security of information flowing between a mobile user and a base station, prevention of attacks within a base station, hand-over of authentication information, communication cost of establishing a session key between mobile user and base station, computing complexity of achieving authenticity and security. The sharing of resources of the devices can be achieved only through the trusted relationships between the mobile hosts (MHs). Before accessing the grid service, the mobile devices should be proven authentic. This paper proposes the dynamic certificate based mutual authentication protocol between two mobile hosts in a mobile grid environment. The certificate generation process is done by CA (Certificate Authority) for all the authenticated MHs. Security (because of validity period of the certificate) and dynamicity (transmission time) can be achieved through the secure service certificates. Authentication protocol is built on communication services to provide cryptographically secured mechanisms for verifying the identity of users and resources.

Keywords: mobile grid computing, certificate authority (CA), SSL/TLS protocol, secured service certificates

Procedia PDF Downloads 286