Search results for: classical theorists
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1039

Search results for: classical theorists

619 Airfield Pavements Made of Reinforced Concrete: Dimensioning According to the Theory of Limit States and Eurocode

Authors: M. Linek, P. Nita

Abstract:

In the previous airfield construction industry, pavements made of reinforced concrete have been used very rarely; however, the necessity to use this type of pavements in an emergency situations justifies the need reference to this issue. The paper concerns the problem of airfield pavement dimensioning made of reinforced concrete and the evaluation of selected dimensioning methods of reinforced concrete slabs intended for airfield pavements. Analysis of slabs dimensioning, according to classical method of limit states has been performed and it has been compared to results obtained in case of methods complying with Eurocode 2 guidelines. Basis of an analysis was a concrete slab of class C35/45 with reinforcement, located in tension zone. Steel bars of 16.0 mm have been used as slab reinforcement. According to comparative analysis of obtained results, conclusions were reached regarding application legitimacy of the discussed methods and their design advantages.

Keywords: rainforced concrete, cement concrete, airport pavements, dimensioning

Procedia PDF Downloads 235
618 The Veil of Virtuality: Anonymity and Trust in the Metaverse's New Frontier

Authors: Cheng Xu, Rui Zhong

Abstract:

Utilizing a preregistered randomized experiment, this study explores the effects of anonymity and curated identity on trust within the Metaverse. Participants were randomly assigned to different conditions of anonymity and identity curation and engaged in a series of tasks designed to mirror the complexities of trust in real-world social interactions. Trust was measured using the classical trust game, allowing for a nuanced understanding of how these factors interact and influence trust. The findings reveal that higher levels of anonymity negatively impact trust, while identity curation can moderate this effect. Mechanism analysis uncovers how anonymity influences perceived reciprocity and group cohesion, and how curation can moderate these relationships. The results demonstrate a nuanced interaction between anonymity and trust, with variations across different curation levels. These insights provide a multifaceted understanding of trust within virtual environments, contributing valuable knowledge to the design, policy-making, and ethical considerations of the Metaverse

Keywords: metaverse, anonymity, curated identity, social behavior, trust

Procedia PDF Downloads 106
617 Measuring Banking Risk

Authors: Mike Tsionas

Abstract:

The paper develops new indices of financial stability based on an explicit model of expected utility maximization by financial institutions subject to the classical technology restrictions of neoclassical production theory. The model can be estimated using standard econometric techniques, like GMM for dynamic panel data and latent factor analysis for the estimation of co-variance matrices. An explicit functional form for the utility function is not needed and we show how measures of risk aversion and prudence (downside risk aversion) can be derived and estimated from the model. The model is estimated using data for Eurozone countries and we focus particularly on (i) the use of the modeling approach as an “early warning mechanism”, (ii) the bank- and country-specific estimates of risk aversion and prudence (downside risk aversion), and (iii) the derivation of a generalized measure of risk that relies on loan-price uncertainty.

Keywords: financial stability, banking, expected utility maximization, sub-prime crisis, financial crisis, eurozone, PIIGS

Procedia PDF Downloads 324
616 Numerical Computation of Sturm-Liouville Problem with Robin Boundary Condition

Authors: Theddeus T. Akano, Omotayo A. Fakinlede

Abstract:

The modelling of physical phenomena, such as the earth’s free oscillations, the vibration of strings, the interaction of atomic particles, or the steady state flow in a bar give rise to Sturm-Liouville (SL) eigenvalue problems. The boundary applications of some systems like the convection-diffusion equation, electromagnetic and heat transfer problems requires the combination of Dirichlet and Neumann boundary conditions. Hence, the incorporation of Robin boundary condition in the analyses of Sturm-Liouville problem. This paper deals with the computation of the eigenvalues and eigenfunction of generalized Sturm-Liouville problems with Robin boundary condition using the finite element method. Numerical solutions of classical Sturm–Liouville problems are presented. The results show an agreement with the exact solution. High results precision is achieved with higher number of elements.

Keywords: Sturm-Liouville problem, Robin boundary condition, finite element method, eigenvalue problems

Procedia PDF Downloads 340
615 Freedom of Speech, Dissent and the Right to be Governed By Consensus are Inherent Rights Under Classical Islamic Law

Authors: Ziyad Motala

Abstract:

It is often proclaimed by leasers in Muslim majority countries that Islamic Law does not permit dissent against a ruler. This paper will evaluate and discuss freedom of speech and dissent as found in concrete prophetic examples during the time of the Prophet Muhammad. It will further look at the examples and practices during the time of the four Noble Caliphs, the immediate successors to the Prophet Muhammad. It will argue that the positivist position of absolute obedience to a ruler is inconsistent with the prophetic tradition. The examples of the Prophet and his immediate four successors (whose lessons Sunni Islam considers to be a source of Islamic Law) demonstrates among the earliest example of freedom of speech and dissent in human history. That tradition frowned upon an inert and uninvolved citizenry. It will conclude with lessons for modern day Muslim majority countries arguing with empirical evidence that freedom of speech, dissent and the right to be governed by consensus versus coercion are fundamental requisites of Islamic law.

Keywords: islamic law, demoracy, freedom of speech, right to dissent

Procedia PDF Downloads 55
614 Scheduling Algorithm Based on Load-Aware Queue Partitioning in Heterogeneous Multi-Core Systems

Authors: Hong Kai, Zhong Jun Jie, Chen Lin Qi, Wang Chen Guang

Abstract:

There are inefficient global scheduling parallelism and local scheduling parallelism prone to processor starvation in current scheduling algorithms. Regarding this issue, this paper proposed a load-aware queue partitioning scheduling strategy by first allocating the queues according to the number of processor cores, calculating the load factor to specify the load queue capacity, and it assigned the awaiting nodes to the appropriate perceptual queues through the precursor nodes and the communication computation overhead. At the same time, real-time computation of the load factor could effectively prevent the processor from being starved for a long time. Experimental comparison with two classical algorithms shows that there is a certain improvement in both performance metrics of scheduling length and task speedup ratio.

Keywords: load-aware, scheduling algorithm, perceptual queue, heterogeneous multi-core

Procedia PDF Downloads 118
613 Design and Implementation of Testable Reversible Sequential Circuits Optimized Power

Authors: B. Manikandan, A. Vijayaprabhu

Abstract:

The conservative reversible gates are used to designed reversible sequential circuits. The sequential circuits are flip-flops and latches. The conservative logic gates are Feynman, Toffoli, and Fredkin. The design of two vectors testable sequential circuits based on conservative logic gates. All sequential circuit based on conservative logic gates can be tested for classical unidirectional stuck-at faults using only two test vectors. The two test vectors are all 1s, and all 0s. The designs of two vectors testable latches, master-slave flip-flops and double edge triggered (DET) flip-flops are presented. We also showed the application of the proposed approach toward 100% fault coverage for single missing/additional cell defect in the quantum- dot cellular automata (QCA) layout of the Fredkin gate. The conservative logic gates are in terms of complexity, speed, and area.

Keywords: DET, QCA, reversible logic gates, POS, SOP, latches, flip flops

Procedia PDF Downloads 281
612 Naïve Bayes: A Classical Approach for the Epileptic Seizures Recognition

Authors: Bhaveek Maini, Sanjay Dhanka, Surita Maini

Abstract:

Electroencephalography (EEG) is used to classify several epileptic seizures worldwide. It is a very crucial task for the neurologist to identify the epileptic seizure with manual EEG analysis, as it takes lots of effort and time. Human error is always at high risk in EEG, as acquiring signals needs manual intervention. Disease diagnosis using machine learning (ML) has continuously been explored since its inception. Moreover, where a large number of datasets have to be analyzed, ML is acting as a boon for doctors. In this research paper, authors proposed two different ML models, i.e., logistic regression (LR) and Naïve Bayes (NB), to predict epileptic seizures based on general parameters. These two techniques are applied to the epileptic seizures recognition dataset, available on the UCI ML repository. The algorithms are implemented on an 80:20 train test ratio (80% for training and 20% for testing), and the performance of the model was validated by 10-fold cross-validation. The proposed study has claimed accuracy of 81.87% and 95.49% for LR and NB, respectively.

Keywords: epileptic seizure recognition, logistic regression, Naïve Bayes, machine learning

Procedia PDF Downloads 39
611 Bandwidth Control Using Reconfigurable Antenna Elements

Authors: Sudhina H. K, Ravi M. Yadahalli, N. M. Shetti

Abstract:

Reconfigurable antennas represent a recent innovation in antenna design that changes from classical fixed-form, Fixed function antennas to modifiable structures that can be adapted to fit the requirements of a time varying system. The ability to control the operating band of an antenna system can have many useful applications. Systems that operate in an acquire-and-track configuration would see a benefit from active bandwidth control. In such systems a wide band search mode is first employed to find a desired signal, Then a narrow band track mode is used to follow only that signal. Utilizing active antenna bandwidth control, A single antenna would function for both the wide band and narrow band configurations providing the rejection of unwanted signals with the antenna hardware. This ability to move a portion of the RF filtering out of the receiver and onto the antenna itself will also aid in reducing the complexity of the often expensive RF processing subsystems.

Keywords: designing methods, mems, stack, reconfigurable elements

Procedia PDF Downloads 251
610 Mechanistic Analysis of an L-2-Haloacid Dehalogenase (DehL) from Rhizobium Sp. RC1: Computational Approach

Authors: Aliyu Adamu, Fahrul Huyop, Roswanira Abdul Wahab, Mohd Shahir Shamsir

Abstract:

Halogenated organic compounds occur in huge amount in biosphere. This is attributable to the diverse use of halogen-based compounds in the synthesis of various industrially important products. Halogenated compound is toxic and may persist in the environment, thereby causing serious health and environmental pollution problems. L-2-haloacid dehalogenases (EC 3.8.1.2) catalyse the specific cleavage of carbon-halogen bond in L-isomers of halogenated compounds, which consequently reverse the effects of environmental halogen-associated pollution. To enhance the efficiency and utility of these enzymes, this study investigates the catalytic amino acid residues and the molecular functional mechanism of DehL, by classical molecular dynamic simulations, MM-PBSA and ab initio fragments molecular orbital (FMO) calculations. The results of the study will serve as the basis for the molecular engineering of the enzyme.

Keywords: DehL, Functional mechanism, Catalytic residues, L-2-haloacid dehalogenase

Procedia PDF Downloads 334
609 On Virtual Coordination Protocol towards 5G Interference Mitigation: Modelling and Performance Analysis

Authors: Bohli Afef

Abstract:

The fifth-generation (5G) wireless systems is featured by extreme densities of cell stations to overcome the higher future demand. Hence, interference management is a crucial challenge in 5G ultra-dense cellular networks. In contrast to the classical inter-cell interference coordination approach, which is no longer fit for the high density of cell-tiers, this paper proposes a novel virtual coordination based on the dynamic common cognitive monitor channel protocol to deal with the inter-cell interference issue. A tractable and flexible model for the coverage probability of a typical user is developed through the use of the stochastic geometry model. The analyses of the performance of the suggested protocol are illustrated both analytically and numerically in terms of coverage probability.

Keywords: ultra dense heterogeneous networks, dynamic common channel protocol, cognitive radio, stochastic geometry, coverage probability

Procedia PDF Downloads 304
608 Mean Shift-Based Preprocessing Methodology for Improved 3D Buildings Reconstruction

Authors: Nikolaos Vassilas, Theocharis Tsenoglou, Djamchid Ghazanfarpour

Abstract:

In this work we explore the capability of the mean shift algorithm as a powerful preprocessing tool for improving the quality of spatial data, acquired from airborne scanners, from densely built urban areas. On one hand, high resolution image data corrupted by noise caused by lossy compression techniques are appropriately smoothed while at the same time preserving the optical edges and, on the other, low resolution LiDAR data in the form of normalized Digital Surface Map (nDSM) is upsampled through the joint mean shift algorithm. Experiments on both the edge-preserving smoothing and upsampling capabilities using synthetic RGB-z data show that the mean shift algorithm is superior to bilateral filtering as well as to other classical smoothing and upsampling algorithms. Application of the proposed methodology for 3D reconstruction of buildings of a pilot region of Athens, Greece results in a significant visual improvement of the 3D building block model.

Keywords: 3D buildings reconstruction, data fusion, data upsampling, mean shift

Procedia PDF Downloads 297
607 "If It Bleeds It Leads” the Visual Witnessing Trauma Phenomenon among Journalists: An Analysis of Various Media Images from East Africa

Authors: Lydia Ouma Radoli

Abstract:

The paradox of documenting history through visuals that objectify gruesome images to depict the prominence of stories intrigues media researchers. In East Africa, the topic has been captured in a variety of media frames, but scantly in scholarly work. This paper adopts Visual Rhetoric and Framing Theories to tease out the drivers behind the criteria for the selection of violent visuals. The paper projects that quantitative and qualitative literature regarding journalists’ personal and work-related exposure to PSTD will give insights into the concept of trauma journalism - reporting of horrific events, e.g., violent crime and terror. The data will be collected through methods such as document analysis (photographs and videos) and in-depth interviews to summarize the informational contents with respect to the research objectives and questions. The study is hinged on the background that the criterion for news production is constructed from the idea that ‘if there’s violence, conflict, and death involved, the story gets top priority.’ The anticipated outcome is to establish trauma experiences of visual rhetors, suggest mitigations, and address gaps in academic research. The findings of the study will sustain the critical role of visual rhetors. Further, media practitioners may find the study useful in assessing the effects and values of visual witnessing. Historically, the criterion for visual news production has been that if there’s violence, conflict, and death involved, the story gets top priority. To capture the goriness of the images, media theorists and sociologists have used the expression: “If it bleeds, it leads.” The statement assumes that audiences are attracted to pictures that show violent images. Further, research on visual aspects of Television news has shown its ability to hold viewers’ attention and cause aggression. This paper samples images and narratives from Journalists who have covered trauma-related events. The samples are indicative of the problem under study, which depicts journalists exposed to traumatic events as not receiving any Psycho-social support within newsrooms. It is hoped that the study could inform policy and practice within developing countries through the interpretations of theoretical and empirical explanations of existing trauma phenomena among journalists.

Keywords: visual-witnessing, media culture, visual rhetoric, imaging violence in East Africa

Procedia PDF Downloads 98
606 New Approach for Load Modeling

Authors: Slim Chokri

Abstract:

Load forecasting is one of the central functions in power systems operations. Electricity cannot be stored, which means that for electric utility, the estimate of the future demand is necessary in managing the production and purchasing in an economically reasonable way. A majority of the recently reported approaches are based on neural network. The attraction of the methods lies in the assumption that neural networks are able to learn properties of the load. However, the development of the methods is not finished, and the lack of comparative results on different model variations is a problem. This paper presents a new approach in order to predict the Tunisia daily peak load. The proposed method employs a computational intelligence scheme based on the Fuzzy neural network (FNN) and support vector regression (SVR). Experimental results obtained indicate that our proposed FNN-SVR technique gives significantly good prediction accuracy compared to some classical techniques.

Keywords: neural network, load forecasting, fuzzy inference, machine learning, fuzzy modeling and rule extraction, support vector regression

Procedia PDF Downloads 417
605 Iran’s Dual Geopolitical Approach towards African States

Authors: Dragos Ardeleanu, Silviu-Valentin Petre

Abstract:

Written to satisfy the needs of Western powers, classical geopolitics bore the stint of Eurocentrism. Both Mackinder’s heartland and Nicholas Spykman’s rimland were intellectual creations set for the purpose of the Anglophone nations dealing with Eurasia. However, while today’s world is moving towards multipolarity, other emerging regional actors are following their own interests using a different geospatial map. Such is the case of Iran which has developed an engagement pattern in Africa, directed mostly towards costal states, in order to break the rimland grip of Arab states and also the international pressure established against Tehran’s nascent nuclear program. Capitalizing on literature review and analysing statements from key public figures, our paper argues that Iranian African geopolitics displays a dual message: on the one hand, it uses tiers-mondiste rhetoric to garner the support of different coastal African states and, on the other hand, it employs Shiism to gain a foothold in strategic parts of the black continent.

Keywords: African geopolitics, Iran, Shiism, tiers-mondisme

Procedia PDF Downloads 185
604 Maintaining the Tension between the Classic Seduction Theory and the Role of Unconscious Fantasies

Authors: Galit Harel

Abstract:

This article describes the long-term psychoanalytic psychotherapy of a young woman who had experienced trauma during her childhood. The details of the trauma were unknown, as all memory of the trauma had been repressed. Past trauma is analyzable through a prism of transference, dreaming and dreams, mental states, and thinking processes that offer an opportunity to explore and analyze the influence of both reality and fantasy on the patient. The presented case describes a therapeutic process that strives to discover hidden meanings through the unconscious system and illustrates the movement from unconscious to conscious during exploration of the patient’s personal trauma in treatment. The author discusses the importance of classical and contemporary psychoanalytic models of childhood sexual trauma through the discovery of manifest and latent content, unconscious fantasies, and actual events of trauma. It is suggested that the complexity of trauma is clarified by the tension between these models and by the inclusion of aspects of both of them for a complete understanding.

Keywords: dreams, psychoanalytic psychotherapy, thinking processes, transference, trauma

Procedia PDF Downloads 59
603 The Engineering Properties of Jordanian Marble

Authors: Mousa Bani Baker, Raed Abendeh, Zaidoon Abu Salem, Hesham Ahmad

Abstract:

This research paper was commissioned to discuss the Jordanian marble, which is a non-foliated metamorphic rock composed of recrystallized carbonate minerals, most commonly calcite or dolomite. Geologists use the term "marble" to refer to metamorphosed limestone; however, stonemasons use the term more broadly to encompass unmetamorphised limestone. Marble is commonly used for sculpture and as a building material. The marble has many uses; one of them is using the white marble that has been prized for its use in sculptures since classical times. This preference has to do with its softness, relative isotropy and homogeneity, and a relative resistance to shattering. Another use of it is the construction marble which is “a stone which is composed of calcite, dolomite or serpentine which is capable of taking a polish” Marble Institute of America. This report focuses most about the marble in Jordan and its properties: rock definition, physical properties, the marble occurrences in Jordan, types of Jordanian marble and their prices and test done on this marble.

Keywords: marble, metamorphic, non-foliated, compressive strength, recrystallized, Moh’s hardness, abrasion, absorption, modulus of rupture, porosity

Procedia PDF Downloads 351
602 Quality of the Ruin Probabilities Approximation Using the Regenerative Processes Approach regarding to Large Claims

Authors: Safia Hocine, Djamil Aïssani

Abstract:

Risk models, recently studied in the literature, are becoming increasingly complex. It is rare to find explicit analytical relations to calculate the ruin probability. Indeed, the stability issue occurs naturally in ruin theory, when parameters in risk cannot be estimated than with uncertainty. However, in most cases, there are no explicit formulas for the ruin probability. Hence, the interest to obtain explicit stability bounds for these probabilities in different risk models. In this paper, we interest to the stability bounds of the univariate classical risk model established using the regenerative processes approach. By adopting an algorithmic approach, we implement this approximation and determine numerically the bounds of ruin probability in the case of large claims (heavy-tailed distribution).

Keywords: heavy-tailed distribution, large claims, regenerative process, risk model, ruin probability, stability

Procedia PDF Downloads 337
601 The Europeanization of Indigenous Tradition: Inventing Classical Wise Men in Prehispanic Mexico

Authors: Jongsoo Lee

Abstract:

From the beginning of the conquest, the Spanish missionaries promoted indigenous intellectuality to prove that indigenous people were capable of receiving Christian doctrine. To prove indigenous intellectuality, Spanish missionaries focused on the highly advanced and complex level of indigenous political, religious, moral, artistic, and cultural practices. In this context, they frequently compared the Aztecs with European gentiles such as Greeks and Romans. In the chronicles of the Spanish missionaries such as Bernardino de Sahagún, indigenous wise men (tlamatinime) appear as clear evidence of indigenous civility and capability. As the pagan Greek and Roman philosophers, orators, rhetoricians, theologians, and physicians known as wise men in European history were responsible for the advanced level of social systems, some Spanish missionaries tried to identify those types of people, tlamatinime, in Aztec society. This paper examines how the Spanish colonizers invented European-style wise men in Prehispanic Mexico.

Keywords: Aztec, indigenous tradition, prehispanic Mexico, wise men

Procedia PDF Downloads 301
600 Protonic Conductivity Highlighted by Impedance Measurement of Y-Doped BaZrO3 Synthesized by Supercritical Hydrothermal Process

Authors: Melanie Francois, Gilles Caboche, Frederic Demoisson, Francois Maeght, Maria Paola Carpanese, Lionel Combemale, Pascal Briois

Abstract:

Finding new clean, and efficient way for energy production is one of the actual global challenges. Advances in fuel cell technology have shown that, for few years, Protonic Ceramic Fuel Cell (PCFC) has attracted much attention in the field of new hydrogen energy thanks to their lower working temperature, possible higher efficiency, and better durability than classical SOFC. On the contrary of SOFC, where O²⁻ oxygen ion is the charge carrier, PCFC works with H⁺ proton as a charge carrier. Consequently, the lower activation energy of proton diffusion compared to the one of oxygen ion explains those benefits and allows PCFC to work in the 400-600°C temperature range. Doped-BaCeO₃ is currently the most chosen material for this application because of its high protonic conductivity; for example, BaCe₀.₉Y₀.₁O₃ δ exhibits a total conductivity of 1.5×10⁻² S.cm⁻¹ at 600°C in wet H₂. However, BaCeO₃ based perovskite has low stability in H₂O and/or CO₂ containing atmosphere, which limits their practical application. On the contrary, BaZrO₃ based perovskite exhibits good chemical stability but lower total conductivity than BaCeO₃ due to its larger grain boundary resistance. By substituting zirconium with 20% of yttrium, it is possible to achieve a total conductivity of 2.5×10⁻² S.cm⁻¹ at 600°C in wet H₂. However, the high refractory property of BaZr₀.₈Y₀.₂O₃-δ (noted BZY20) causes problems to obtain a dense membrane with large grains. Thereby, using a synthesis process that gives fine particles could allow better sinterability and thus decrease the number of grain boundaries leading to a higher total conductivity. In this work, BaZr₀.₈Y₀.₂O₃-δ have been synthesized by classical batch hydrothermal device and by a continuous hydrothermal device developed at ICB laboratory. The two variants of this process are able to work in supercritical conditions, leading to the formation of nanoparticles, which could be sintered at a lower temperature. The as-synthesized powder exhibits the right composition for the perovskite phase, impurities such as BaCO₃ and YO-OH were detected at very low concentration. Microstructural investigation and densification rate measurement showed that the addition of 1 wt% of ZnO as sintering aid and a sintering at 1550°C for 5 hours give high densified electrolyte material. Furthermore, it is necessary to heat the synthesized powder prior to the sintering to prevent the formation of secondary phases. It is assumed that this thermal treatment homogenizes the crystal structure of the powder and reduces the number of defects into the bulk grains. Electrochemical impedance spectroscopy investigations in various atmospheres and a large range of temperature (200-700°C) were then performed on sintered samples, and the protonic conductivity of BZY20 has been highlighted. Further experiments on half-cell, NiO-BZY20 as anode and BZY20 as electrolyte, are in progress.

Keywords: hydrothermal synthesis, impedance measurement, Y-doped BaZrO₃, proton conductor

Procedia PDF Downloads 116
599 Performance Analysis of the Time-Based and Periodogram-Based Energy Detector for Spectrum Sensing

Authors: Sadaf Nawaz, Adnan Ahmed Khan, Asad Mahmood, Chaudhary Farrukh Javed

Abstract:

Classically, an energy detector is implemented in time domain (TD). However, frequency domain (FD) based energy detector has demonstrated an improved performance. This paper presents a comparison between the two approaches as to analyze their pros and cons. A detailed performance analysis of the classical TD energy-detector and the periodogram based detector is performed. Exact and approximate mathematical expressions for probability of false alarm (Pf) and probability of detection (Pd) are derived for both approaches. The derived expressions naturally lead to an analytical as well as intuitive reasoning for the improved performance of (Pf) and (Pd) in different scenarios. Our analysis suggests the dependence improvement on buffer sizes. Pf is improved in FD, whereas Pd is enhanced in TD based energy detectors. Finally, Monte Carlo simulations results demonstrate the analysis reached by the derived expressions.

Keywords: cognitive radio, energy detector, periodogram, spectrum sensing

Procedia PDF Downloads 354
598 Gene Names Identity Recognition Using Siamese Network for Biomedical Publications

Authors: Micheal Olaolu Arowolo, Muhammad Azam, Fei He, Mihail Popescu, Dong Xu

Abstract:

As the quantity of biological articles rises, so does the number of biological route figures. Each route figure shows gene names and relationships. Annotating pathway diagrams manually is time-consuming. Advanced image understanding models could speed up curation, but they must be more precise. There is rich information in biological pathway figures. The first step to performing image understanding of these figures is to recognize gene names automatically. Classical optical character recognition methods have been employed for gene name recognition, but they are not optimized for literature mining data. This study devised a method to recognize an image bounding box of gene name as a photo using deep Siamese neural network models to outperform the existing methods using ResNet, DenseNet and Inception architectures, the results obtained about 84% accuracy.

Keywords: biological pathway, gene identification, object detection, Siamese network

Procedia PDF Downloads 256
597 A Parallel Algorithm for Solving the PFSP on the Grid

Authors: Samia Kouki

Abstract:

Solving NP-hard combinatorial optimization problems by exact search methods, such as Branch-and-Bound, may degenerate to complete enumeration. For that reason, exact approaches limit us to solve only small or moderate size problem instances, due to the exponential increase in CPU time when problem size increases. One of the most promising ways to reduce significantly the computational burden of sequential versions of Branch-and-Bound is to design parallel versions of these algorithms which employ several processors. This paper describes a parallel Branch-and-Bound algorithm called GALB for solving the classical permutation flowshop scheduling problem as well as its implementation on a Grid computing infrastructure. The experimental study of our distributed parallel algorithm gives promising results and shows clearly the benefit of the parallel paradigm to solve large-scale instances in moderate CPU time.

Keywords: grid computing, permutation flow shop problem, branch and bound, load balancing

Procedia PDF Downloads 260
596 Microbiological and Physicochemical Evaluation of Traditional Greek Kopanisti Cheese Produced by Different Starter Cultures

Authors: M. Kazou, A. Gavriil, O. Kalagkatsi, T. Paschos, E. Tsakalidou

Abstract:

Kopanisti cheese is a Greek soft Protected Designation of Origin (PDO) cheese made of raw cow, sheep or goat milk, or mixtures of them, with similar organoleptic characteristics to that of Roquefort cheese. Traditional manufacturing of Kopanisti cheese is limited in small-scale dairies, without the addition of starter cultures. Instead, an amount of over-mature Kopanisti cheese, called Mana Kopanisti, is used to initiate ripening. Therefore, the selection of proper starter cultures and the understanding of the contribution of various microbial groups to its overall quality is crucial for the production of a high-quality final product with standardized organoleptic and physicochemical characteristics. Taking the above into account, the aim of the present study was the investigation of Kopanisti cheese microbiota and its role in cheese quality. For this purpose, four different types of Kopanisti were produced in triplicates, all with pasteurized cow milk, with the addition of (A) the typical mesophilic species Lactococcus lactis and Lactobacillus paracasei used as starters in the production of soft spread cheeses, (B) strains of Lactobacillus acidipiscis and Lactobacillus rennini previously isolated from Kopanisti and Mana Kopanisti, (C) all the species from (A) and (B) as inoculum, and finally (D) the species from (A) and Mana Kopanisti. Physicochemical and microbiological analysis was performed for milk and cheese samples during ripening. Enumeration was performed for major groups of lactic acid bacteria (LAB), total mesophilic bacteria, yeasts as well as hygiene indicator microorganisms. Bacterial isolates from all the different LAB groups, apart from enterococci, alongside yeasts isolates, were initially grouped using repetitive sequence-based polymerase chain reaction (rep-PCR) and then identified at the species level using 16S rRNA gene and internal transcribed spacer (ITS) DNA region sequencing, respectively. Sensory evaluation was also performed for final cheese samples at the end of the ripening period (35 days). Based on the results of the classical microbiological analysis, the average counts of the total mesophilic bacteria and LAB, apart from enterococci, ranged between 7 and 10 log colony forming unit (CFU) g⁻¹, phychrotrophic bacteria, and yeast extract glucose chloramphenicol (YGC) isolates between 4 and 8 log CFU g⁻¹, while coliforms and enterococci up to 2 log CFU g⁻¹ throughout ripening in cheese samples A, C and D. In contrast, in cheese sample B, the average counts of the total mesophilic bacteria and LAB, apart from enterococci, phychrotrophic bacteria, and YGC isolates ranged between 0 and 10 log CFU g⁻¹ and coliforms and enterococci up to 2 log CFU g⁻¹. Although the microbial counts were not that different among samples, identification of the bacterial and yeasts isolates revealed the complex microbial community structure present in each cheese sample. Differences in the physicochemical characteristics among the cheese samples were also observed, with pH ranging from 4.3 to 5.3 and moisture from 49.6 to 58.0 % in the final cheese products. Interestingly, the sensory evaluation also revealed differences among samples, with cheese sample B ranking first based on the total score. Overall, the combination of these analyses highlighted the impact of different starter cultures on the Kopanisti microbiota as well as on the physicochemical and sensory characteristics of the final product.

Keywords: Kopanisti cheese, microbiota, classical microbiological analysis, physicochemical analysis

Procedia PDF Downloads 120
595 Creativity in the Dark: A Qualitative Study of Cult’s Members Battle between True and False Self in Heterotopia

Authors: Shirly Bar-Lev, Michal Morag

Abstract:

Cults are usually thought of as suppressive organizations, where creativity is systematically stifled. Except for few scholars, creativity in cults remains an uncharted terrain (Boeri and Pressley, 2010). This paperfocuses on how cult members sought real and imaginary spaces to express themselves and even used their bodies as canvases on which to assert their individuality, resistance, devotion, pain, and anguish. We contend that cult members’ creativity paves their way out of the cult. This paper is part of a larger study into the experiences of former members of cults and cult-like NewReligiousMmovements (NRM). The research is based on in-depth interviews conducted with thirtyIsraeli men and women, aged 24 to 50, who either joined an NRM or were born into one. Their stories reveal that creativity is both emplaced and embedded in power relations. That is why Foucault’s idea of Heterotopia and Winnicott’s idea of the battle between True and False self canbenefit our understanding of how cult members creatively assert their autonomy over their bodies and thoughts while in the cult. Cults’ operate on a complex tension between submission and autonomy. On the one hand, they act as heterotopias byallowing for a ‘simultaneousmythic and real contestation of the space in which we live. Ascounter-hegemonic sites, they serve as‘the greatest reserve of theimagination’, to use Foucault’s words. Cults definitely possesselements of mystery, danger, and transgression where an alternative social ordering can emerge. On the other hand, cults are set up to format alternative identities. Often, the individuals who inhibit these spaces look for spiritual growth, self-reflection, and self-actualization. They might willingly relinquish autonomy over vast aspects of their lives in pursuit of self-improvement. In any case, cultsclaim the totality of their members’ identities and absolute commitment and compliance with the cult’s regimes. It, therefore, begs the question how the paradox between autonomy and submissioncan spur instances of creativity. How can cult members escape processes of performative regulation to assert their creative self? Both Foucault and Winnicott recognize the possibility of an authentic self – one that is spontaneous and creative. Both recognize that only the true self can feel real andmust never comply. Both note the disciplinary regimes that push the true self into hiding, as well as the social and psychological mechanisms that individuals develop to protect their true self. But while Foucault spoke of the power of critic as a way of salvaging the true self, Winnicott spoke of recognition and empathy - feeling known by others. Invitinga dialogue between the two theorists can yield a productive discussion on how cult members assert their ‘true self’ to cultivate a creative self within the confines of the cult.

Keywords: cults, creativity, heterotopia, true and false self

Procedia PDF Downloads 68
594 Estimation of Structural Parameters in Time Domain Using One Dimensional Piezo Zirconium Titanium Patch Model

Authors: N. Jinesh, K. Shankar

Abstract:

This article presents a method of using the one dimensional piezo-electric patch on beam model for structural identification. A hybrid element constituted of one dimensional beam element and a PZT sensor is used with reduced material properties. This model is convenient and simple for identification of beams. Accuracy of this element is first verified against a corresponding 3D finite element model (FEM). The structural identification is carried out as an inverse problem whereby parameters are identified by minimizing the deviation between the predicted and measured voltage response of the patch, when subjected to excitation. A non-classical optimization algorithm Particle Swarm Optimization is used to minimize this objective function. The signals are polluted with 5% Gaussian noise to simulate experimental noise. The proposed method is applied on beam structure and identified parameters are stiffness and damping. The model is also validated experimentally.

Keywords: inverse problem, particle swarm optimization, PZT patches, structural identification

Procedia PDF Downloads 286
593 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 100
592 Conceptualizing a Biomimetic Fablab Based on the Makerspace Concept and Biomimetics Design Research

Authors: Petra Gruber, Ariana Rupp, Peter Niewiarowski

Abstract:

This paper presents a concept for a biomimetic fablab as a physical space for education, research and development of innovation inspired by nature. Biomimetics as a discipline finds increasing recognition in academia and has started to be institutionalized at universities in programs and centers. The Biomimicry Research and Innovation Center was founded in 2012 at the University of Akron as an interdisciplinary venture for the advancement of innovation inspired by nature and is part of a larger community fostering the approach of bioimimicry in the Great Lakes region of the US. With 30 faculty members the center has representatives from Colleges of Arts and Sciences (e.g., biology, chemistry, geoscience, and philosophy) Engineering (e.g., mechanical, civil, and biomedical), Polymer Science, and Myers School of Arts. A platform for training PhDs in Biomimicry (17 students currently enrolled) is co-funded by educational institutions and industry partners. Research at the center touches on many areas but is also currently biased towards materials and structures, with highlights being materials based on principles found in spider silk and gecko attachment mechanisms. As biomimetics is also a novel scientific discipline, there is little standardisation in programming and the equipment of research facilities. As a field targeting innovation, design and prototyping processes are fundamental parts of the developments. For experimental design and prototyping, MIT's maker space concept seems to fit well to the requirements, but facilities need to be more specialised in terms of accessing biological systems and knowledge, specific research, production or conservation requirements. For the education and research facility BRIC we conceptualize the concept of a biomimicry fablab, that ties into the existing maker space concept and creates the setting for interdisciplinary research and development carried out in the program. The concept takes on the process of biomimetics as a guideline to define core activities that shall be enhanced by the allocation of specific spaces and tools. The limitations of such a facility and the intersections to further specialised labs housed in the classical departments are of special interest. As a preliminary proof of concept two biomimetic design courses carried out in 2016 are investigated in terms of needed tools and infrastructure. The spring course was a problem based biomimetic design challenge in collaboration with an innovation company interested in product design for assisted living and medical devices. The fall course was a solution based biomimetic design course focusing on order and hierarchy in nature with the goal of finding meaningful translations into art and technology. The paper describes the background of the BRIC center, identifies and discusses the process of biomimetics, evaluates the classical maker space concept and explores how these elements can shape the proposed research facility of a biomimetic fablab by examining two examples of design courses held in 2016.

Keywords: biomimetics, biomimicry, design, biomimetic fablab

Procedia PDF Downloads 256
591 The Gaze; Objectification of the Surrogate Mother in Cross-Border Surrogacy: An Empirical Study Applied to Surrogacy Facilitators

Authors: Yingyi Luo

Abstract:

Cross-border surrogacy is seen by many as a market in which women are bought and sold commodities at risk of trafficking. A surrogate can be framed as either a fully acknowledged subject, with whom intended parents engage in cross-border surrogacy—or as a tool utilized by intended parents and surrogacy facilitators in the furtherance of their own objectives. In order to identify which frame prevails, this paper applies subjectivity theory to an empirical study of cross-border surrogacy facilitated by facilitators in Australia analysing interviews with surrogate agents, counsellors and lawyers, and observations at trade show. The aim of the paper is to advance understanding of the dynamics of the relationship between intended parents, surrogates, and surrogacy facilitators by collecting new data and applying unique framework. As dominant players, surrogacy facilitators have a significant impact on determining the nature of cross-border surrogacy. However, little is known concerning the manner in which facilitators influence the inter-subjectivity between surrogate mothers and intended parents. Thus, this paper intends to identify how facilitators depict surrogate mothers, the degree to which their perspectives bear upon both the subjectivity of the surrogate mother and the relationship of intended parents with surrogate mothers. For the purpose of introducing and developing this framework in the context of cross-border surrogacy, this paper borrows from the work of theorists not often mentioned in bioethics, including Jacques Lacan, Marco Cavallaro, Michel Foucault, and others. It also applies the concept of 'the gaze' along with the dynamic of 'self' and 'other' to the cross-border surrogacy arrangement. Applying the concept of the gaze can provide a new way to interpret the power dynamic that plays out among surrogacy facilitators, intended parents, and surrogates within the commercial surrogacy arrangement and how the subjectivity is produced through the power. Viewing the relationships between the players in cross-border surrogacy through the lens of gaze theory, this paper finds that, in cross-border surrogacy, due to the structural power imbalance, affluent intended parents and surrogacy facilitators are possessors of the gaze, while surrogate mothers are under the thrall of the gaze. Specifically, facilitators frame surrogate mothers' reproductive abilities as commodities that intended parents can purchase to fulfil their urgent need to have children and experience full subjectivity, and they take a cut of the money that paid by intended parents. Therefore, commodification of the body results in degrading a surrogate mother (the object), reifying her as no more than a walking womb (the other), a process which is highly detrimental to the self of surrogate mothers. This relationship, formalized through contractual means, allows intended parents and facilitators to take advantage of surrogate mothers in the furtherance of their own objectives. This argument is enriched by new data from interviews and observations that provide nuance to this understanding of inter-subjectivity.

Keywords: cross-border surrogacy, facilitators, self, surrogate mothers

Procedia PDF Downloads 116
590 FE Analysis of Blade-Disc Dovetail Joints Using Mortar Base Frictional Contact Formulation

Authors: Abbas Moradi, Mohsen Safajoy, Reza Yazdanparast

Abstract:

Analysis of blade-disc dovetail joints is one of the biggest challenges facing designers of aero-engines. To avoid comparatively expensive experimental full-scale tests, numerical methods can be used to simulate loaded disc-blades assembly. Mortar method provides a powerful and flexible tool for solving frictional contact problems. In this study, 2D frictional contact in dovetail has been analysed based on the mortar algorithm. In order to model the friction, the classical law of coulomb and moving friction cone algorithm is applied. The solution is then obtained by solving the resulting set of non-linear equations using an efficient numerical algorithm based on Newton–Raphson Method. The numerical results show that this approach has better convergence rate and accuracy than other proposed numerical methods.

Keywords: computational contact mechanics, dovetail joints, nonlinear FEM, mortar approach

Procedia PDF Downloads 327