Search results for: deep convolutional neural networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5315

Search results for: deep convolutional neural networks

1475 Energy Consumption in China’s Urban Water Supply System

Authors: Kate Smith, Shuming Liu, Yi Liu, Dragan Savic, Gustaf Olsson, Tian Chang, Xue Wu

Abstract:

In a water supply system, a great deal of care goes into sourcing, treating and delivering water to consumers, but less thought is given to the energy consumed during these processes. This study uses 2011 data to quantify energy use for urban water supply in China and investigates population density as a possible influencing factor. The objective is to provide information that can be used to develop energy-conscious water infrastructure policy, calculate the energy co-benefits of water conservation and compare energy use between China and other countries. The average electrical energy intensity and per capita electrical energy consumption for urban water supply in China in 2011 were 0.29 kWh/m3 and 33.2 kWh/cap•yr, respectively. Comparison between provinces revealed a direct correlation between energy intensity of urban water supply and population served per unit length of pipe. This could imply energy intensity is lower when more densely populated areas are supplied by relatively dense networks of pipes. This study also found that whereas the percentage of energy used for urban water supply tends to increase with the percentage of population served this increase is slower where water supply is more energy efficient and where a larger percentage of population is already supplied.

Keywords: china, electrical energy use, water-energy nexus, water supply

Procedia PDF Downloads 498
1474 Shallow Water Lidar System in Measuring Erosion Rate of Coarse-Grained Materials

Authors: Ghada S. Ellithy, John. W. Murphy, Maureen K. Corcoran

Abstract:

Erosion rate of soils during a levee or dam overtopping event is a major component in risk assessment evaluation of breach time and downstream consequences. The mechanism and evolution of dam or levee breach caused by overtopping erosion is a complicated process and difficult to measure during overflow due to accessibility and quickly changing conditions. In this paper, the results of a flume erosion tests are presented and discussed. The tests are conducted on a coarse-grained material with a median grain size D50 of 5 mm in a 1-m (3-ft) wide flume under varying flow rates. Each test is performed by compacting the soil mix r to its near optimum moisture and dry density as determined from standard Proctor test in a box embedded in the flume floor. The box measures 0.45 m wide x 1.2 m long x 0.25 m deep. The material is tested several times at varying hydraulic loading to determine the erosion rate after equal time intervals. The water depth, velocity are measured at each hydraulic loading, and the acting bed shear is calculated. A shallow water lidar (SWL) system was utilized to record the progress of soil erodibility and water depth along the scanned profiles of the tested box. SWL is a non-contact system that transmits laser pulses from above the water and records the time-delay between top and bottom reflections. Results from the SWL scans are compared with before and after manual measurements to determine the erosion rate of the soil mix and other erosion parameters.

Keywords: coarse-grained materials, erosion rate, LIDAR system, soil erosion

Procedia PDF Downloads 114
1473 Aggregate Fluctuations and the Global Network of Input-Output Linkages

Authors: Alexander Hempfing

Abstract:

The desire to understand business cycle fluctuations, trade interdependencies and co-movement has a long tradition in economic thinking. From input-output economics to business cycle theory, researchers aimed to find appropriate answers from an empirical as well as a theoretical perspective. This paper empirically analyses how the production structure of the global economy and several states developed over time, what their distributional properties are and if there are network specific metrics that allow identifying structurally important nodes, on a global, national and sectoral scale. For this, the World Input-Output Database was used, and different statistical methods were applied. Empirical evidence is provided that the importance of the Eastern hemisphere in the global production network has increased significantly between 2000 and 2014. Moreover, it was possible to show that the sectoral eigenvector centrality indices on a global level are power-law distributed, providing evidence that specific national sectors exist which are more critical to the world economy than others while serving as a hub within the global production network. However, further findings suggest, that global production cannot be characterized as a scale-free network.

Keywords: economic integration, industrial organization, input-output economics, network economics, production networks

Procedia PDF Downloads 279
1472 Spiritual Warriors: Christian Testimony and Psychotherapy in Ritual Abuse Memoir

Authors: Jocelyn Cohen

Abstract:

This paper identifies a powerful synchronicity of two traditions of life-story writing in the autobiographies of ritual abuse (RA) survivors, the Christian conversion narrative and the memoir of healing from childhood sexual trauma. Using methodologies from literary studies, history, and psychology, a close reading of three RA memoirs sheds light on a taboo and deeply suspect form of violence. Treatment of RA survivors and the unique role of psychotherapists, in particular, deserve far greater attention from multi-disciplinary scholars. Each story reflects salient characteristics of the Christian conversion narrative, a genre which originated in the US in the early 19th century with the serendipitous confluence of the simultaneous emergence of print culture and the basic structures of evangelicalism during the Second Great Awakening. The impulse of writing is thus to give testimony against the sin they witnessed and endured as young children during ritual violence perpetrated within the church. Importantly, RA is seen as an inherent if obscure aspect of Christian discourse itself, not in opposition to it, and not as an aberration. In RA's memoir, healing comes in part from the Christian narrative praxis of personal redemption, framed as prevailing in a war between good and evil. In other words, storytelling itself affects the healing, much as it does by means of each writer’s 'talking cure,' in the relationship with a psychotherapist who guides her through a repair of the life-story through the excavation of traumatic memories and their integration into the writer’s psyche. Integrating literary techniques into the psychotherapeutic relationship, therapists leverage the deep linguistic structures that clients possess as a resource to aid in their healing.

Keywords: memoir, psychotherapy, religion, trauma

Procedia PDF Downloads 127
1471 Effective Student Engaging Strategies to Enhance Academic Learning in Middle Eastern Classrooms: An Action Research Approach

Authors: Anjum Afrooze

Abstract:

The curriculum at General Sciences department in Prince Sultan University includes ‘Physical science’ for Computer Science, Information Technology and Business courses. Students are apathetic towards Physical Science and question, as to, ‘How this course is related to their majors?’ English is not a native language for the students and also for many instructors. More than sixty percent of the students come from institutions where English is not the medium of instruction, which makes student learning and academic achievement challenging. After observing the less enthusiastic student cohort for two consecutive semesters, the instructor was keen to find effective strategies to enhance learning and further encourage deep learning by engaging students in different tasks to empower them with necessary skills and motivate them. This study is participatory action research, in which instructor designs effective tasks to engage students in their learning. The study is conducted through two semesters with a total of 200 students. The effectiveness of this approach is studied using questionnaire at the end of each semester and teacher observation. Major outcomes of this study were overall improvement in students attitude towards science learning, enhancement of multiple skills like note taking, problem solving, language proficiency and also fortifying confidence. This process transformed instructor into engaging and reflecting practitioner. Also, these strategies were implemented by other instructors teaching the course and proved effective in opening a path to changes in related areas of the course curriculum. However, refinement in the strategies could be done based on student evaluation and instructors observation.

Keywords: group activity, language proficiency, reasoning skills, science learning

Procedia PDF Downloads 146
1470 Impact of Series Reactive Compensation on Increasing a Distribution Network Distributed Generation Hosting Capacity

Authors: Moataz Ammar, Ahdab Elmorshedy

Abstract:

The distributed generation hosting capacity of a distribution network is typically limited at a given connection point by the upper voltage limit that can be violated due to the injection of active power into the distribution network. The upper voltage limit violation concern becomes more important as the network equivalent resistance increases with respect to its equivalent reactance. This paper investigates the impact of modifying the distribution network equivalent reactance at the point of connection such that the upper voltage limit is violated at a higher distributed generation penetration, than it would without the addition of series reactive compensation. The results show that series reactive compensation proves efficient in certain situations (based on the ratio of equivalent network reactance to equivalent network resistance at the point of connection). As opposed to the conventional case of capacitive compensation of a distribution network to reduce voltage drop, inductive compensation is seen to be more appropriate for alleviation of distributed-generation-induced voltage rise.

Keywords: distributed generation, distribution networks, series compensation, voltage rise

Procedia PDF Downloads 398
1469 Photovoltaic System: An Alternative to Energy Efficiency in a Residence

Authors: Arsenio Jose Mindu

Abstract:

The concern to carry out a study related to Energy Efficiency arose based on the various debates in international television networks and not only, but also in several forums of national debates. The concept of Energy Efficiency is not yet widely disseminated and /or taken into account in terms of energy consumption, not only at the domestic level but also at the industrial level in Mozambique. In the context of the energy audit, the time during which each of the appliances is connected to the voltage source, the time during which they are in standby mode was recorded on a spreadsheet basis. Based on these data, daily and monthly consumption was calculated. In order to have more accurate information on the daily levels of daily consumption, the electricity consumption was read every hour of the day (from 5:00 am to 11:00 pm), since after 23:00 the energy consumption remains constant. For ten days. Based on the daily energy consumption and the maximum consumption power, the design of the photovoltaic system for the residence was made. With the implementation of the photovoltaic system in order to guarantee energy efficiency, there was a significant reduction in the use of electricity from the public grid, increasing from approximately 17 kwh per day to around 11 kwh, thus achieving an energy efficiency of 67.4 %. That is to say, there was a reduction not only in terms of the amount of energy consumed but also of the monthly expenses with electricity, having increased from around 2,500,00Mt (2,500 meticais) to around 800Mt per month.

Keywords: energy efficiency, photovoltaic system, residential sector, Mozambique

Procedia PDF Downloads 207
1468 Common Causes of Eye Removal Surgery in Turkish Patients: A Review of 226 Cases

Authors: Titap Yazicioglu

Abstract:

Purpose: To determine the etiological factors responsible for the eye removal surgery and to evaluate our surgical results. Material and Methods: Medical records of 226 patients, who underwent eye removal surgery, were analyzed retrospectively. Demographic information, clinical history, surgical procedure, and histopathological data were all collected. Evisceration surgery was performed under general anesthesia in all patients except tumor cases and one patient with rhino-orbital mucormycosis. The patients were followed for an average of 16.46±10.78 months and checked for the possible complications, cosmesis, and functional results.Results: 144 men, and 82 women,with a mean age of 41.78±22.6 years, were underwent enucleation (n=15) or evisceration (n=211) due to traumatic (n=169) and non-traumatic (n=57) causes. In the traumatic group, 79.8% of 169 patients were injured by penetrating and 14.2% by blunt trauma.3.6% of the patients were injured in a traffic accident, and 2.4% of them were injured by explosives. In the non-traumatic group, 40% of 25 patients had post-traumatic endophthalmitis, 32% had endophthalmitis due to corneal ulceration and melting, and 24% had endophthalmitis after cataract surgery. One patient had panophthalmitis due to rhino-orbital mucormycosis. Another cause in the non-traumatic group was glaucoma, of which 92.3% had neovascular glaucoma, and 8.7% had congenital glaucoma. Of the 14 patients who were enucleated for tumor, 35.7% had retinoblastoma, 14.3% had medulloepithelioma, 42.9% had uveal melanoma, and 7.1% had metastatic tumor from paranasal sinuses.The most common complaint in the follow-up period was discharging, seen in all prosthesis-wearing patients. 13.3% of the patients had itching due to ocular prosthesis. 4.4% of the patients were complaining about deep superior sulcus. 4.4% had pyogenic granuloma, and 17.8% had implant exposure. Conclusion: Etiological factors should be carefully evaluated, and precautions should be taken in order to reduce the devastating effect of the physical loss of the eye.

Keywords: enucleation, evisceration, ocular injury, etiology, frequency

Procedia PDF Downloads 112
1467 Integrated Geotechnical and Geophysical Investigation of a Proposed Construction Site at Mowe, Southwestern Nigeria

Authors: Kayode Festus Oyedele, Sunday Oladele, Adaora Chibundu Nduka

Abstract:

The subsurface of a proposed site for building development in Mowe, Nigeria, using Standard Penetration Test (SPT) and Cone Penetrometer Test (CPT) supplemented with Horizontal Electrical Profiling (HEP) was investigated with the aim of evaluating the suitability of the strata for foundation materials. Four SPT and CPT were implemented using 10 tonnes hammer. HEP utilizing Wenner array were performed with inter-electrode spacing of 10 – 60 m along four traverses coincident with each of the SPT and CPT. The HEP data were processed using DIPRO software and textural filtering of the resulting resistivity sections was implemented to enable delineation of hidden layers. Sandy lateritic clay, silty lateritic clay, clay, clayey sand and sand horizons were delineated. The SPT “N” value defined very soft to soft sandy lateritic (<4), stiff silty lateritic clay (7 – 12), very stiff silty clay (12 - 15), clayey sand (15- 20) and sand (27 – 37). Sandy lateritic clay (5-40 kg/cm2) and silty lateritic clay (25 - 65 kg/cm2) were defined from the CPT response. Sandy lateritic clay (220-750 Ωm), clay (< 50 Ωm) and sand (415-5359 Ωm) were delineated from the resistivity sections with two thin layers of silty lateritic clay and clayey sand defined in the texturally filtered resistivity sections. This study concluded that the presence of incompetent thick clayey materials (18 m) beneath the study area makes it unsuitable for shallow foundation. Deep foundation involving piling through the clayey layers to the competent sand at 20 m depth was recommended.

Keywords: cone penetrometer, foundation, lithologic texture, resistivity section, standard penetration test

Procedia PDF Downloads 265
1466 Text Emotion Recognition by Multi-Head Attention based Bidirectional LSTM Utilizing Multi-Level Classification

Authors: Vishwanath Pethri Kamath, Jayantha Gowda Sarapanahalli, Vishal Mishra, Siddhesh Balwant Bandgar

Abstract:

Recognition of emotional information is essential in any form of communication. Growing HCI (Human-Computer Interaction) in recent times indicates the importance of understanding of emotions expressed and becomes crucial for improving the system or the interaction itself. In this research work, textual data for emotion recognition is used. The text being the least expressive amongst the multimodal resources poses various challenges such as contextual information and also sequential nature of the language construction. In this research work, the proposal is made for a neural architecture to resolve not less than 8 emotions from textual data sources derived from multiple datasets using google pre-trained word2vec word embeddings and a Multi-head attention-based bidirectional LSTM model with a one-vs-all Multi-Level Classification. The emotions targeted in this research are Anger, Disgust, Fear, Guilt, Joy, Sadness, Shame, and Surprise. Textual data from multiple datasets were used for this research work such as ISEAR, Go Emotions, Affect datasets for creating the emotions’ dataset. Data samples overlap or conflicts were considered with careful preprocessing. Our results show a significant improvement with the modeling architecture and as good as 10 points improvement in recognizing some emotions.

Keywords: text emotion recognition, bidirectional LSTM, multi-head attention, multi-level classification, google word2vec word embeddings

Procedia PDF Downloads 174
1465 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 308
1464 On the Use of Reliability Factors to Reduce Conflict between Information Sources in Dempster-Shafer Theory

Authors: A. Alem, Y. Dahmani, A. Hadjali, A. Boualem

Abstract:

Managing the problem of the conflict, either by using the Dempster-Shafer theory, or by the application of the fusion process to push researchers in recent years to find ways to get to make best decisions especially; for information systems, vision, robotic and wireless sensor networks. In this paper we are interested to take account of the conflict in the combination step that took the conflict into account and tries to manage such a way that it does not influence the decision step, the conflict what from reliable sources. According to [1], the conflict lead to erroneous decisions in cases where was with strong degrees between sources of information, if the conflict is more than the maximum of the functions of belief mass K > max1...n (mi (A)), then the decision becomes impossible. We will demonstrate in this paper that the multiplication of mass functions by coefficients of reliability is a decreasing function; it leads to the reduction of conflict and a good decision. The definition of reliability coefficients accurately and multiply them by the mass functions of each information source to resolve the conflict and allow deciding whether the degree of conflict. The evaluation of this technique is done by a use case; a comparison of the combination of springs with a maximum conflict without, and with reliability coefficients.

Keywords: Dempster-Shafer theory, fusion process, conflict managing, reliability factors, decision

Procedia PDF Downloads 427
1463 Subjective Quality Assessment for Impaired Videos with Varying Spatial and Temporal Information

Authors: Muhammad Rehan Usman, Muhammad Arslan Usman, Soo Young Shin

Abstract:

The new era of digital communication has brought up many challenges that network operators need to overcome. The high demand of mobile data rates require improved networks, which is a challenge for the operators in terms of maintaining the quality of experience (QoE) for their consumers. In live video transmission, there is a sheer need for live surveillance of the videos in order to maintain the quality of the network. For this purpose objective algorithms are employed to monitor the quality of the videos that are transmitted over a network. In order to test these objective algorithms, subjective quality assessment of the streamed videos is required, as the human eye is the best source of perceptual assessment. In this paper we have conducted subjective evaluation of videos with varying spatial and temporal impairments. These videos were impaired with frame freezing distortions so that the impact of frame freezing on the quality of experience could be studied. We present subjective Mean Opinion Score (MOS) for these videos that can be used for fine tuning the objective algorithms for video quality assessment.

Keywords: frame freezing, mean opinion score, objective assessment, subjective evaluation

Procedia PDF Downloads 495
1462 Study of Pipes Scaling of Purified Wastewater Intended for the Irrigation of Agadir Golf Grass

Authors: A. Driouiche, S. Mohareb, A. Hadfi

Abstract:

In Morocco’s Agadir region, the reuse of treated wastewater for irrigation of green spaces has faced the problem of scaling of the pipes of these waters. This research paper aims at studying the phenomenon of scaling caused by the treated wastewater from the Mzar sewage treatment plant. These waters are used in the irrigation of golf turf for the Ocean Golf Resort. Ocean Golf, located about 10 km from the center of the city of Agadir, is one of the most important recreation centers in Morocco. The course is a Belt Collins design with 27 holes, and is quite open with deep challenging bunkers. The formation of solid deposits in the irrigation systems has led to a decrease in their lifetime and, consequently, a loss of load and performance. Thus, the sprinklers used in golf turf irrigation are plugged in the first weeks of operation. To study this phenomenon, the wastewater used for the irrigation of the golf turf was taken and analyzed at various points, and also samples of scale formed in the circuits of the passage of these waters were characterized. This characterization of the scale was performed by X-ray fluorescence spectrometry, X-ray diffraction (XRD), thermogravimetric analysis (TGA), differential thermal analysis (DTA), and scanning electron microscopy (SEM). The results of the physicochemical analysis of the waters show that they are full of bicarbonates (653 mg/L), chloride (478 mg/L), nitrate (412 mg/L), sodium (425 mg/L) and calcium (199mg/L). Their pH is slightly alkaline. The analysis of the scale reveals that it is rich in calcium and phosphorus. It is formed of calcium carbonate (CaCO₃), silica (SiO₂), calcium silicate (Ca₂SiO₄), hydroxylapatite (Ca₁₀P₆O₂₆), calcium carbonate and phosphate (Ca₁₀(PO₄) 6CO₃) and silicate calcium and magnesium (Ca₅MgSi₃O₁₂).

Keywords: Agadir, irrigation, scaling water, wastewater

Procedia PDF Downloads 122
1461 Time and Wavelength Division Multiplexing Passive Optical Network Comparative Analysis: Modulation Formats and Channel Spacings

Authors: A. Fayad, Q. Alqhazaly, T. Cinkler

Abstract:

In light of the substantial increase in end-user requirements and the incessant need of network operators to upgrade the capabilities of access networks, in this paper, the performance of the different modulation formats on eight-channels Time and Wavelength Division Multiplexing Passive Optical Network (TWDM-PON) transmission system has been examined and compared. Limitations and features of modulation formats have been determined to outline the most suitable design to enhance the data rate and transmission reach to obtain the best performance of the network. The considered modulation formats are On-Off Keying Non-Return-to-Zero (NRZ-OOK), Carrier Suppressed Return to Zero (CSRZ), Duo Binary (DB), Modified Duo Binary (MODB), Quadrature Phase Shift Keying (QPSK), and Differential Quadrature Phase Shift Keying (DQPSK). The performance has been analyzed by varying transmission distances and bit rates under different channel spacing. Furthermore, the system is evaluated in terms of minimum Bit Error Rate (BER) and Quality factor (Qf) without applying any dispersion compensation technique, or any optical amplifier. Optisystem software was used for simulation purposes.

Keywords: BER, DuoBinary, NRZ-OOK, TWDM-PON

Procedia PDF Downloads 151
1460 Routing Protocol in Ship Dynamic Positioning Based on WSN Clustering Data Fusion System

Authors: Zhou Mo, Dennis Chow

Abstract:

In the dynamic positioning system (DPS) for vessels, the reliable information transmission between each note basically relies on the wireless protocols. From the perspective of cluster-based routing protocols for wireless sensor networks, the data fusion technology based on the sleep scheduling mechanism and remaining energy in network layer is proposed, which applies the sleep scheduling mechanism to the routing protocols, considering the remaining energy of node and location information when selecting cluster-head. The problem of uneven distribution of nodes in each cluster is solved by the Equilibrium. At the same time, Classified Forwarding Mechanism as well as Redelivery Policy strategy is adopted to avoid congestion in the transmission of huge amount of data, reduce the delay in data delivery and enhance the real-time response. In this paper, a simulation test is conducted to improve the routing protocols, which turn out to reduce the energy consumption of nodes and increase the efficiency of data delivery.

Keywords: DPS for vessel, wireless sensor network, data fusion, routing protocols

Procedia PDF Downloads 526
1459 Interaction of Metals with Non-Conventional Solvents

Authors: Evgeny E. Tereshatov, C. M. Folden

Abstract:

Ionic liquids and deep eutectic mixtures represent so-called non-conventional solvents. The former, composed of discrete ions, is a salt with a melting temperature below 100°С. The latter, consisting of hydrogen bond donors and acceptors, is a mixture of at least two compounds, resulting in a melting temperature depression in comparison with that of the individual moiety. These systems also can be water-immiscible, which makes them applicable for metal extraction. This work will cover interactions of In, Tl, Ir, and Rh in hydrochloric acid media with eutectic mixtures and Er, Ir, and At in a gas phase with chemically modified α-detectors. The purpose is to study chemical systems based on non-conventional solvents in terms of their interaction with metals. Once promising systems are found, the next step is to modify the surface of α-detectors used in the online element production at cyclotrons to get the detector chemical selectivity. Initially, the metal interactions are studied by means of the liquid-liquid extraction technique. Then appropriate molecules are chemisorbed on the surrogate surface first to understand the coating quality. Finally, a detector is covered with the same molecule, and the metal sorption on such detectors is studied in the online regime. It was found that chemical treatment of the surface can result in 99% coverage with a monolayer formation. This surface is chemically active and can adsorb metals from hydrochloric acid solutions. Similarly, a detector surface was modified and tested during cyclotron-based experiments. Thus, a procedure of detectors functionalization has been developed, and this opens an interesting opportunity of studying chemisorption of elements which do not have stable isotopes.

Keywords: mechanism, radioisotopes, solvent extraction, gas phase sorption

Procedia PDF Downloads 103
1458 Cardiopulmonary Resuscitation Performance Efficacy While Wearing a Powered Air-Purifying Respirator

Authors: Jun Young Chong, Seung Whan Kim

Abstract:

Introduction: The use of personal protective equipment for respiratory infection control in cardiopulmonary resuscitation (CPR) is a physical burden to healthcare providers. It matters how long CPR quality according to recommended guidelines can be maintained under these circumstances. It was investigated whether chest compression time was appropriate for a 2-minute shift and how long it was maintained in accordance with the guidelines under such conditions. Methods: This prospective crossover simulation study was performed at a single center from September 2020 to October 2020. Five indicators of CPR quality were measured during the first and second sessions of the study period. All participants wore a Level D powered air-purifying respirator (PAPR), and the experiment was conducted using a Resusci Anne manikin, which can measure the quality of chest compressions. Each participant conducted two sessions. In session one, 2-minutes of chest compressions followed by a 2-minute rest was repeated twice; in session two, 1-minute of chest compressions followed by a 1-minute rest was repeated four times. Results: All 34 participants completed the study. The deep and sufficient compression rate was 65.9 ± 13.1 mm in the 1-minute shift group and 61.5 ± 30.5 mm in the 2-minute shift group. The mean depth was 52.8 ±4.3 mm in the 1-minute shift group and 51.0 ± 6.1 mm in the 2-minute shift group. In these two values, there was a statistically significant difference between the two sessions. There was no statistically significant difference in the other CPR quality values. Conclusions: It was suggested that the different standard of current 2-minute to 1-minute cycles due to a significant reduction in the quality of chest compression in cases of CPR with PAPR.

Keywords: cardiopulmonary resuscitation, chest compression, personal protective equipment, powered air-purifying respirator

Procedia PDF Downloads 115
1457 Impact of SES and Culture on Well-Being of Adolescent

Authors: Shraddha B. Rai, Mahipatsinh D. Chavda, Bharat S. Trivedi

Abstract:

The aim of the present research is to study the effect of education and social belonging on well-being of youth. Well-being is one of the most important aspects of human being and the state of well-being can be attained in terms of healthy body with healthy mind. Well-being has been defined as encompassing people’s cognitive and affective evaluations of their lives. Well-being has been interchangeably used with health and quality of life. According to the WHO, the main determinants of health include the social, economic, and the physical environment and the persons individual characteristics and behaviors. WHO lists other factors that can influence the well-being of a person such as the gender, education, social support networks and health services. The main objective of the present investigation is to know the effect of education and social belonging on well-being of youth. The sample of 180 students belonging to Gujarati and English (convent) culture were selected randomly from Guajarati and English (convent) schools of Ahmedabad City of Gujarat (India). General well-being Scale by Dr. Ashok Kalia and Ms. Anita Deswal was administered to measure the Physical, Emotional, and Social and school well-being. The result shows that there is significant different found between Gujarati and English (convent) culture on Well-being in school students. SES is also affect significantly to wellbeing of students.

Keywords: culture, SES, well-being, health, quality of life

Procedia PDF Downloads 528
1456 The Strategic Importance of Technology in the International Production: Beyond the Global Value Chains Approach

Authors: Marcelo Pereira Introini

Abstract:

The global value chains (GVC) approach contributes to a better understanding of the international production organization amid globalization’s second unbundling from the 1970s on. Mainly due to the tools that help to understand the importance of critical competences, technological capabilities, and functions performed by each player, GVC research flourished in recent years, rooted in discussing the possibilities of integration and repositioning along regional and global value chains. Regarding this context, part of the literature endorsed a more optimistic view that engaging in fragmented production networks could represent learning opportunities for developing countries’ firms, since the relationship with transnational corporations could allow them build skills and competences. Increasing recognition that GVCs are based on asymmetric power relations provided another sight about benefits, costs, and development possibilities though. Once leading companies tend to restrict the replication of their technologies and capabilities by their suppliers, alternative strategies beyond the functional specialization, seen as a way to integrate value chains, began to be broadly highlighted. This paper organizes a coherent narrative about the shortcomings of the GVC analytical framework, while recognizing its multidimensional contributions and recent developments. We adopt two different and complementary perspectives to explore the idea of integration in the international production. On one hand, we emphasize obstacles beyond production components, analyzing the role played by intangible assets and intellectual property regimes. On the other hand, we consider the importance of domestic production and innovation systems for technological development. In order to provide a deeper understanding of the restrictions on technological learning of developing countries’ firms, we firstly build from the notion of intellectual monopoly to analyze how flagship companies can prevent subordinated firms from improving their positions in fragmented production networks. Based on intellectual property protection regimes we discuss the increasing asymmetries between these players and the decreasing access of part of them to strategic intangible assets. Second, we debate the role of productive-technological ecosystems and of interactive and systemic technological development processes, as concepts of the Innovation Systems approach. Supporting the idea that not only endogenous advantages are important for international competition of developing countries’ firms, but also that the building of these advantages itself can be a source of technological learning, we focus on local efforts as a crucial element, which is not replaceable for technology imported from abroad. Finally, the paper contributes to the discussion about technological development as a two-dimensional dynamic. If GVC analysis tends to underline a company-based perspective, stressing the learning opportunities associated to GVC integration, historical involvement of national States brings up the debate about technology as a central aspect of interstate disputes. In this sense, technology is seen as part of military modernization before being also used in civil contexts, what presupposes its role for national security and productive autonomy strategies. From this outlook, it is important to consider it as an asset that, incorporated in sophisticated machinery, can be the target of state policies besides the protection provided by intellectual property regimes, such as in export controls and inward-investment restrictions.

Keywords: global value chains, innovation systems, intellectual monopoly, technological development

Procedia PDF Downloads 82
1455 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 352
1454 Using Facebook as an Alternative Learning Tools in Malaysian Higher Learning Institutions: A Structural Equation Modelling Approach

Authors: Ahasanul Haque, Abdullah Sarwar, Khaliq Ahmed

Abstract:

Networking is important among students to achieve better understanding. Social networking plays an important role in the education. Realizing its huge potential, various organizations, including institutions of higher learning have moved to the area of social networks to interact with their students especially through Facebook. Therefore, measuring the effectiveness of Facebook as a learning tool has become an area of interest to academicians and researchers. Therefore, this study tried to integrate and propose new theoretical and empirical evidences by linking the western idea of adopting Facebook as an alternative learning platform from a Malaysian perspective. This study, thus, aimed to fill a gap by being among the pioneering research that tries to study the effectiveness of adopting Facebook as a learning platform across other cultural settings, namely Malaysia. Structural equation modelling was employed for data analysis and hypothesis testing. This study findings have provided some insights that would likely affect students’ awareness towards using Facebook as an alternative learning platform in the Malaysian higher learning institutions. At the end, future direction is proposed.

Keywords: Learning Management Tool, social networking, education, Malaysia

Procedia PDF Downloads 427
1453 Climate Risk Perception and Trust – Presence of a Social Trap for Willingness to Act in Favour of Climate Mitigation and Support for Renewables: A Cross-sectional Study of Four European Countries

Authors: Lana Singleton

Abstract:

Achieving a sufficient global solution to climate change seems elusive through disappointing climate agreements and lack of cooperation. However, is this reluctance of coordination deep rooted on a more individual, societal level within countries due to a fundamental lack of social and institutional trust? The risks of climate change are illustrious and widely accepted, yet responses on an individual level are also largely inadequate. This research looks to further investigate types of trust, risk perception of climate change, and their interaction to build a greater understanding of whether a social trap (Rothstein, 2005) – where an absence of trust can overwhelm an individuals’ risk perception and result in minimal action despite knowing the dangers of no action – exists and where it is more prevalent. Presence of the social trap will be analysed for willingness to act in favour of climate change mitigation as well as attitude (acceptance) of different types of renewable energy forms. Using probit models with cross-sectional survey data on four developed European countries (UK, France, Germany, and Norway), we find evidence of the social trap in the aggregated data model, which highlights the importance of social trust regarding willingness to act in favour of climate mitigation as there is a high probability of action regardless of risk perception of climate change when social trust is high. In contrast, the same is not true for renewables, as interactions were mainly insignificant, although there were interesting findings involving institutional trust, gender, and country specific results for particular renewables.

Keywords: climate risk, renewables, risk perception, social trap, trust, willingness to act

Procedia PDF Downloads 96
1452 Study of Large-Scale Atmospheric Convection over the Tropical Indian Ocean and Its Association with Oceanic Variables

Authors: Supriya Manikrao Ovhal

Abstract:

In India, the summer monsoon rainfall occurs owing to large scale convection with reference to continental ITCZ. It was found that convection over tropical ocean increases with SST from 26 to 28 degree C, and when SST is above 29 degree C, it sharply decreases for warm pool areas of Indian and for monsoon areas of West Pacific Ocean. The reduction in convection can be influenced by large scale subsidence forced by nearby or remotely generated deep convection, thus it was observed that under the influence of strong large scale rising motion, convection does not decreases but increases monotonically with SST even if SST value is higher than 29.5 degree C. Since convection is related to SST gradient, that helps to generate low level moisture convergence and upward vertical motion in the atmosphere. Strong wind fields like cross equatorial low level jet stream on equator ward side of the warm pool are produced due to convection initiated by SST gradient. Areas having maximum SST have low SST gradient, and that result in feeble convection. Hence it is imperative to mention that the oceanic role (other than SST) could be prominent in influencing large Scale Atmospheric convection. Since warm oceanic surface somewhere or the other contributes to penetrate the heat radiation to the subsurface of the ocean, and as there is no studies seen related to oceanic subsurface role in large Scale Atmospheric convection, in the present study, we are concentrating on the oceanic subsurface contribution in large Scale Atmospheric convection by considering the SST gradient, mixed layer depth (MLD), thermocline, barrier layer. The present study examines the probable role of subsurface ocean parameters in influencing convection.

Keywords: sst, d20, olr, wind

Procedia PDF Downloads 93
1451 Toxic Ingredients Contained in Our Cosmetics

Authors: El Alia Boularas, H. Bekkar, H. Larachi, H. Rezk-kallah

Abstract:

Introduction: Notwithstanding cosmetics are used in life every day, these products are not all innocuous and harmless, as they may contain ingredients responsible for allergic reactions and, possibly, for other health problems. Additionally, environmental pollution should be taken into account. Thus, it is time to investigate what is ‘hidden behind beauty’. Aims: 1.To investigate prevalence of 13 chemical ingredients in cosmetics being object of concern, which the Algerians use regularly. 2.To know the profile of questioned consumers and describe their opinion on cosmetics. Methods: The survey was carried out in year 2013 over a period of 3 months, among Algerian Internet users having an e-mail address or a Facebook account.The study investigated 13 chemical agents showing health and environmental problems, selected after analysis of the recent studies published on the subject, the lists of national and international regulatory references on chemical hazards, and querying the database Skin Deep presented by the Environmental Working Group. Results: 300 people distributed all over the Algerian territory participated in the survey, providing information about 731 cosmetics; 86% aged from 20 to 39 years, with a sex ratio=0,27. A percentage of 43% of the analyzed cosmetics contained at least one of the 13 toxic ingredients. The targeted ingredient that has been most frequently reported was ‘perfume’ followed by parabens and PEG.85% of the participants declared that cosmetics ‘can contain toxic substances’, 27% asserted that they verify regularly the list of ingredients when they buy cosmetics, 61% said that they try to avoid the toxic ingredients, among whom 24 % were more vigilant on the presence of parabens, 95% were in favour of the strengthening of the Algerian laws on cosmetics. Conclusion: The results of the survey provide the indication of a widespread presence of toxic chemical ingredients in personal care products that Algerians use daily.

Keywords: Algerians consumers, cosmetics, survey, toxic ingredients

Procedia PDF Downloads 277
1450 Design and Implementation of Low-code Model-building Methods

Authors: Zhilin Wang, Zhihao Zheng, Linxin Liu

Abstract:

This study proposes a low-code model-building approach that aims to simplify the development and deployment of artificial intelligence (AI) models. With an intuitive way to drag and drop and connect components, users can easily build complex models and integrate multiple algorithms for training. After the training is completed, the system automatically generates a callable model service API. This method not only lowers the technical threshold of AI development and improves development efficiency but also enhances the flexibility of algorithm integration and simplifies the deployment process of models. The core strength of this method lies in its ease of use and efficiency. Users do not need to have a deep programming background and can complete the design and implementation of complex models with a simple drag-and-drop operation. This feature greatly expands the scope of AI technology, allowing more non-technical people to participate in the development of AI models. At the same time, the method performs well in algorithm integration, supporting many different types of algorithms to work together, which further improves the performance and applicability of the model. In the experimental part, we performed several performance tests on the method. The results show that compared with traditional model construction methods, this method can make more efficient use, save computing resources, and greatly shorten the model training time. In addition, the system-generated model service interface has been optimized for high availability and scalability, which can adapt to the needs of different application scenarios.

Keywords: low-code, model building, artificial intelligence, algorithm integration, model deployment

Procedia PDF Downloads 31
1449 Investigating the Effect of Brand Equity on Competitive Advantage in the Banking Industry

Authors: Rohollah Asadian Kohestani, Nazanin Sedghi

Abstract:

As the number of banks and financial institutions working in Iran has been significantly increased, the attracting and retaining customers and encouraging them to continually use the modern banking services have been important and vital issues. Therefore, there would be a serious competition without a deep perception of consumers and fitness of banking services with their needs in the current economic conditions of Iran. It should be noted that concepts such as 'brand equity' is defined based on the view of consumers; however, it is also focused by shareholders, competitors and other beneficiaries of a firm in addition to bank and its consumers. This study examines the impact of brand equity on the competitive advantage in the banking industry as intensive competition between brands of different banks leads to pay more attention to the brands. This research is based on the Aaker’s model examining the impact of four dimensions of brand equity on the competitive advantage of private banks in Behshahr city. Moreover, conducting an applied research and data analysis has been carried out by a descriptive method. Data collection was done using literature review and questionnaire. A 'simple random' methodology was selected for sampling staff of banks while sampling methodology to select consumers of banks was the distribution of questionnaire between staff and consumers of five private banks including Tejarat, Mellat, Refah K., Ghavamin and, Tose’e Ta’avon banks. Results show that there is a significant relationship between brand equity and their competitive advantage. In this research, software of SPSS 16 and LISREL 8.5, as well as different methods of descriptive inferential statistics for analyzing data and test hypotheses, were employed.

Keywords: brand awareness, brand loyalty, brand equity, competitive advantage

Procedia PDF Downloads 141
1448 Helical Motions Dynamics and Hydraulics of River Channel Confluences

Authors: Ali Aghazadegan, Ali Shokria, Julia Mullarneya, Jon Tunnicliffe

Abstract:

River channel confluences are dynamic systems with branching structures that exhibit a high degree of complexity both in natural and man-made open channel networks. Recent and past fields and modeling have investigated the river dynamics modeling of confluent based on a series of over-simplified assumptions (i.e. straight tributary channel with a bend with a 90° junction angle). Accurate assessment of such systems is important to the design and management of hydraulic structures and river engineering processes. Despite their importance, there has been little study of the hydrodynamics characteristics of river confluences, and the link between flow hydrodynamics and confluence morphodynamics in the confluence is still incompletely understood. This paper studies flow structures in confluences, morphodynamics and deposition patterns in 30 and 90 degrees confluences with different flow conditions. The results show that the junction angle is primarily the key factor for the determination of the confluence bed morphology and sediment pattern, while the discharge ratio is a secondary factor. It also shows that super elevation created by mixing flows is a key function of the morphodynamics patterns.

Keywords: helical flow, river confluence, bed morphology , secondary flows, shear layer

Procedia PDF Downloads 146
1447 Determinants of the Welfare of Itinerant Palm Oil Marketers in Akwa Ibom State, Nigeria

Authors: Obasi Igwe Oscar, Udokure Ubong James, Echebiri Raphael Ndubuisi

Abstract:

The study examined the determinants of the welfare of itinerant palm oil marketers in Akwa Ibom State, Nigeria. Multistage sampling techniques were adopted to select 120 itinerant palm oil marketers for the study. Primary data were obtained using a structured questionnaire. Data were analyzed using the cost and returns formula and multiple regression model. Results showed that itinerant palm oil marketing was profitable and 57.39% efficient. The respondents' monthly expenditure of N111,787.90 on food and non-food items indicated that they live above the extreme poverty threshold of $2.15 per person per day, with a daily spending of over $2. Net income (P<0.05), age (P<0.01), educational level (P<0.01), household size (P<0.01), credit amount (P<0.01), market information (P<0.05), amount of tax paid (P<0.01) and the level of market participation (P<0.05) were the significant determinants of the welfare of itinerant traders in the study area. The study recommended that government and non-governmental organizations should make available marketing facilities and enhance transportation networks to reduce inefficiencies and lower transaction costs for itinerant palm oil traders in Akwa Ibom state.

Keywords: determinants, welfare, itinerant, palm oil, marketers

Procedia PDF Downloads 33
1446 Introduction to Multi-Agent Deep Deterministic Policy Gradient

Authors: Xu Jie

Abstract:

As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decisionmaking problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security). By modeling the multi-job collaborative cryptographic service scheduling problem as a multiobjective optimized job flow scheduling problem, and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing, and effectively solves the problem of complex resource scheduling in cryptographic services.

Keywords: multi-agent reinforcement learning, non-stationary dynamics, multi-agent systems, cooperative and competitive agents

Procedia PDF Downloads 26