Search results for: concurrent computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1157

Search results for: concurrent computing

737 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code

Authors: Deborah Garcia-Magna

Abstract:

The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.

Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting

Procedia PDF Downloads 183
736 Managing Data from One Hundred Thousand Internet of Things Devices Globally for Mining Insights

Authors: Julian Wise

Abstract:

Newcrest Mining is one of the world’s top five gold and rare earth mining organizations by production, reserves and market capitalization in the world. This paper elaborates on the data acquisition processes employed by Newcrest in collaboration with Fortune 500 listed organization, Insight Enterprises, to standardize machine learning solutions which process data from over a hundred thousand distributed Internet of Things (IoT) devices located at mine sites globally. Through the utilization of software architecture cloud technologies and edge computing, the technological developments enable for standardized processes of machine learning applications to influence the strategic optimization of mineral processing. Target objectives of the machine learning optimizations include time savings on mineral processing, production efficiencies, risk identification, and increased production throughput. The data acquired and utilized for predictive modelling is processed through edge computing by resources collectively stored within a data lake. Being involved in the digital transformation has necessitated the standardization software architecture to manage the machine learning models submitted by vendors, to ensure effective automation and continuous improvements to the mineral process models. Operating at scale, the system processes hundreds of gigabytes of data per day from distributed mine sites across the globe, for the purposes of increased improved worker safety, and production efficiency through big data applications.

Keywords: mineral technology, big data, machine learning operations, data lake

Procedia PDF Downloads 94
735 Characterising the Processes Underlying Emotion Recognition Deficits in Adolescents with Conduct Disorder

Authors: Nayra Martin-Key, Erich Graf, Wendy Adams, Graeme Fairchild

Abstract:

Children and adolescents with Conduct Disorder (CD) have been shown to demonstrate impairments in emotion recognition, but it is currently unclear whether this deficit is related to specific emotions or whether it represents a global deficit in emotion recognition. An emotion recognition task with concurrent eye-tracking was employed to further explore this relationship in a sample of male and female adolescents with CD. Participants made emotion categorization judgements for presented dynamic and morphed static facial expressions. The results demonstrated that males with CD, and to a lesser extent, females with CD, displayed impaired facial expression recognition in general, whereas callous-unemotional (CU) traits were linked to specific problems in sadness recognition in females with CD. A region-of-interest analysis of the eye-tracking data indicated that males with CD exhibited reduced fixation times for the eye-region of the face compared to typically-developing (TD) females, but not TD males. Females with CD did not show reduced fixation to the eye-region of the face relative to TD females. In addition, CU traits did not influence CD subjects’ attention to the eye-region of the face. These findings suggest that the emotion recognition deficits found in CD males, the worst performing group in the behavioural tasks, are partly driven by reduced attention to the eyes.

Keywords: attention, callous-unemotional traits, conduct disorder, emotion recognition, eye-region, eye-tracking, sex differences

Procedia PDF Downloads 290
734 An Evolutionary Approach for QAOA for Max-Cut

Authors: Francesca Schiavello

Abstract:

This work aims to create a hybrid algorithm, combining Quantum Approximate Optimization Algorithm (QAOA) with an Evolutionary Algorithm (EA) in the place of traditional gradient based optimization processes. QAOA’s were first introduced in 2014, where, at the time, their algorithm performed better than the traditional best known classical algorithm for Max-cut graphs. Whilst classical algorithms have improved since then and have returned to being faster and more efficient, this was a huge milestone for quantum computing, and their work is often used as a benchmarking tool and a foundational tool to explore variants of QAOA’s. This, alongside with other famous algorithms like Grover’s or Shor’s, highlights to the world the potential that quantum computing holds. It also presents the reality of a real quantum advantage where, if the hardware continues to improve, this could constitute a revolutionary era. Given that the hardware is not there yet, many scientists are working on the software side of things in the hopes of future progress. Some of the major limitations holding back quantum computing are the quality of qubits and the noisy interference they generate in creating solutions, the barren plateaus that effectively hinder the optimization search in the latent space, and the availability of number of qubits limiting the scale of the problem that can be solved. These three issues are intertwined and are part of the motivation for using EAs in this work. Firstly, EAs are not based on gradient or linear optimization methods for the search in the latent space, and because of their freedom from gradients, they should suffer less from barren plateaus. Secondly, given that this algorithm performs a search in the solution space through a population of solutions, it can also be parallelized to speed up the search and optimization problem. The evaluation of the cost function, like in many other algorithms, is notoriously slow, and the ability to parallelize it can drastically improve the competitiveness of QAOA’s with respect to purely classical algorithms. Thirdly, because of the nature and structure of EA’s, solutions can be carried forward in time, making them more robust to noise and uncertainty. Preliminary results show that the EA algorithm attached to QAOA can perform on par with the traditional QAOA with a Cobyla optimizer, which is a linear based method, and in some instances, it can even create a better Max-Cut. Whilst the final objective of the work is to create an algorithm that can consistently beat the original QAOA, or its variants, due to either speedups or quality of the solution, this initial result is promising and show the potential of EAs in this field. Further tests need to be performed on an array of different graphs with the parallelization aspect of the work commencing in October 2023 and tests on real hardware scheduled for early 2024.

Keywords: evolutionary algorithm, max cut, parallel simulation, quantum optimization

Procedia PDF Downloads 42
733 Lack of Functional Interaction between Nitric Oxide and ET-A Receptors in Cisplatin-Induced Acute Renal Failure

Authors: Mai M. Helmy

Abstract:

Although the role of either nitric oxide (NO) or endothelin receptors modulation in the severity of cisplatin-induced nephrotoxicity has been recognized in previous studies including our own, the possible interaction between the two pathways remains obscure. In this study, we tested the possible interaction between the nitrergic and endothelin pathways in cisplatin-induced nephrotoxicity in male rats. Sprague Dawley male rats (200 to 250 g) were divided into four groups: Control (given a single dose of normal saline, i.p.), cisplatin (6 mg/kg, i.p.), cisplatin+Sildenafil (2 mg/kg, i.p.), cisplatin+Sildenafil+BQ-123 (1 mg/kg, i.p.). Each of the co-administered drugs was given in two doses; one hour before and one day after the cisplatin dose. Acute cisplatin administration resulted in significant increases in BUN and serum creatinine levels at 96 h following cisplatin injection. Increased levels of MDA, TNF-α and caspase-3, decreased nitrite/nitrate level and SOD activity in kidney homogenates were also observed following cisplatin injection. According to the obtained results, the co-adminstration of sildenafil alone with cisplatin offered a reno-protective effect comparable to that obtained following the concurrent administration of both sildenafil and the selective ETAR antagonist BQ-123. Thus, the current study is the first to reveal that the presence of an intact NO/cGMP system may offer a moderate reno-protective effect against cisplatin-induced nephrotoxicity even in the presence of ETAR-mediated vasoconstriction, suggesting the absence of obvious functional interaction between the nitrergic and endothelin pathways in cisplatin-induced nephrotoxicity in male rats.

Keywords: BQ-123, cisplatin, endothelin-1, nephrotoxicity, sildenafil

Procedia PDF Downloads 434
732 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 82
731 Wine Tourism in Rural Russia: Perceptions of Vineyard Managers

Authors: Jeremy Schultz

Abstract:

The purpose of this study was to understand the perceptions of vineyard managers in the Krasnodar Region of Southern Russia located between the city of Kransnodar and the Black Sea. In recent years, wine tourism throughout the region has seen tremendous growth due in part to the concurrent growth in the number of tourists vacationing at the Black Sea. This trend has contributed to the development of large-scale wine operations developing in numerous rural locations along the tourists’ travel path. Niche areas of tourism, such as wine tourism, have proven to provide economic viability for rural communities all around the world. Understanding their shared group characteristics while honoring their unique qualities as individuals aids in responsible wine tourism development that provides a sense of well-being for the communities and stakeholders involved. Semi-structured interviews and lived experience methodologies were used in locations that were associated with wine food tourism operations. By understanding management perspectives, it lends insight into sustainable destination management and wine tourism product development, furthering our progress toward ethical, responsible, and financially feasible operations. This research also represents a collaborative effort between Russia and the United States that supports an agenda of sustainable destination development and management. As a global community, we need to continue to investigate stakeholder perceptions and strategic management techniques that best support the pillars upon which responsible tourism was founded.

Keywords: wine tourism, tourism development, Russia, rural tourism

Procedia PDF Downloads 116
730 Exploring Data Stewardship in Fog Networking Using Blockchain Algorithm

Authors: Ruvaitha Banu, Amaladhithyan Krishnamoorthy

Abstract:

IoT networks today solve various consumer problems, from home automation systems to aiding in driving autonomous vehicles with the exploration of multiple devices. For example, in an autonomous vehicle environment, multiple sensors are available on roads to monitor weather and road conditions and interact with each other to aid the vehicle in reaching its destination safely and timely. IoT systems are predominantly dependent on the cloud environment for data storage, and computing needs that result in latency problems. With the advent of Fog networks, some of this storage and computing is pushed to the edge/fog nodes, saving the network bandwidth and reducing the latency proportionally. Managing the data stored in these fog nodes becomes crucial as it might also store sensitive information required for a certain application. Data management in fog nodes is strenuous because Fog networks are dynamic in terms of their availability and hardware capability. It becomes more challenging when the nodes in the network also live a short span, detaching and joining frequently. When an end-user or Fog Node wants to access, read, or write data stored in another Fog Node, then a new protocol becomes necessary to access/manage the data stored in the fog devices as a conventional static way of managing the data doesn’t work in Fog Networks. The proposed solution discusses a protocol that acts by defining sensitivity levels for the data being written and read. Additionally, a distinct data distribution and replication model among the Fog nodes is established to decentralize the access mechanism. In this paper, the proposed model implements stewardship towards the data stored in the Fog node using the application of Reinforcement Learning so that access to the data is determined dynamically based on the requests.

Keywords: IoT, fog networks, data stewardship, dynamic access policy

Procedia PDF Downloads 37
729 Thyroid Malignancy Concurrent with Hyperthyroidism: Variations with Thyroid Status and Age

Authors: N. J. Nawarathna, N. R. Kmarasinghe, D. Chandrasekara, B. M. R. S. Balasooriya, R. A. A. Shaminda, R. J. K. Senevirathne

Abstract:

Introduction: Thyroid malignancy associated with hyperthyroidism is considered rare. Retrospective studies have shown the incidence of thyroid malignancy in hyperthyroid patients to be low (0.7-8.5%). To assess the clinical relevance of this association, thyroid status in a cohort of patients with thyroid malignancy were analyzed. Method: Thyroid malignancies diagnosed histologically in 56 patients, over a 18 month period beginning from April 2013, in a single surgical unit at Teaching Hospital Kandy were included. Preoperative patient details and progression of thyroid status were asessed with Thyroid Stimulating Hormone, free Thyroxin and free Triiodothyronine levels. Results: Amongst 56 patients Papillary carcinoma was diagnosed in 44(78.6%), follicular carcinomas in 7(12.5%) and 5(8.9%) with medullary and anaplastic carcinomas. 12(21.4%) were males and 44(78.6%) were females. 20(35.7%) were less than 40years, 29(51.8%) were between 40 to 59years and 7(12.5%) were above 59years. Cross tabulation of Type of carcinoma with Gender revealed likelihood ratio of 6.908, Significance p = 0.032. Biochemically 12(21.4%) were hyperthyroid. Out of them 5(41.7%) had primary hyperthyroidism and 7(58.3%) had secondary hyperthyroidism. Mean age of euthyroid patients was 43.77years (SD 10.574) and hyperthyroid patients was 53.25years(SD 16.057). Independent Samples Test t is -2.446, two tailed significance p =0.018. When cross tabulate thyroid status with Age group Likelihood Ratio was 9.640, Significance p = 0.008. Conclusion: Papillary carcinoma is seen more among females. Among the patients with thyroid carcinomas, those with biochemically proven hyperthyroidism were more among the older age group than those who were euthyroid. Hence careful evaluation of elderly hyperthyroid patients to select the most suitable therapeutic approach is justified.

Keywords: age, hyperthyroidism, thyroid malignancy, thyroid status

Procedia PDF Downloads 383
728 High Performance Computing Enhancement of Agent-Based Economic Models

Authors: Amit Gill, Lalith Wijerathne, Sebastian Poledna

Abstract:

This research presents the details of the implementation of high performance computing (HPC) extension of agent-based economic models (ABEMs) to simulate hundreds of millions of heterogeneous agents. ABEMs offer an alternative approach to study the economy as a dynamic system of interacting heterogeneous agents, and are gaining popularity as an alternative to standard economic models. Over the last decade, ABEMs have been increasingly applied to study various problems related to monetary policy, bank regulations, etc. When it comes to predicting the effects of local economic disruptions, like major disasters, changes in policies, exogenous shocks, etc., on the economy of the country or the region, it is pertinent to study how the disruptions cascade through every single economic entity affecting its decisions and interactions, and eventually affect the economic macro parameters. However, such simulations with hundreds of millions of agents are hindered by the lack of HPC enhanced ABEMs. In order to address this, a scalable Distributed Memory Parallel (DMP) implementation of ABEMs has been developed using message passing interface (MPI). A balanced distribution of computational load among MPI-processes (i.e. CPU cores) of computer clusters while taking all the interactions among agents into account is a major challenge for scalable DMP implementations. Economic agents interact on several random graphs, some of which are centralized (e.g. credit networks, etc.) whereas others are dense with random links (e.g. consumption markets, etc.). The agents are partitioned into mutually-exclusive subsets based on a representative employer-employee interaction graph, while the remaining graphs are made available at a minimum communication cost. To minimize the number of communications among MPI processes, real-life solutions like the introduction of recruitment agencies, sales outlets, local banks, and local branches of government in each MPI-process, are adopted. Efficient communication among MPI-processes is achieved by combining MPI derived data types with the new features of the latest MPI functions. Most of the communications are overlapped with computations, thereby significantly reducing the communication overhead. The current implementation is capable of simulating a small open economy. As an example, a single time step of a 1:1 scale model of Austria (i.e. about 9 million inhabitants and 600,000 businesses) can be simulated in 15 seconds. The implementation is further being enhanced to simulate 1:1 model of Euro-zone (i.e. 322 million agents).

Keywords: agent-based economic model, high performance computing, MPI-communication, MPI-process

Procedia PDF Downloads 111
727 Local Homology Modules

Authors: Fatemeh Mohammadi Aghjeh Mashhad

Abstract:

In this paper, we give several ways for computing generalized local homology modules by using Gorenstein flat resolutions. Also, we find some bounds for vanishing of generalized local homology modules.

Keywords: a-adic completion functor, generalized local homology modules, Gorenstein flat modules

Procedia PDF Downloads 397
726 Heat Transfer and Diffusion Modelling

Authors: R. Whalley

Abstract:

The heat transfer modelling for a diffusion process will be considered. Difficulties in computing the time-distance dynamics of the representation will be addressed. Incomplete and irrational Laplace function will be identified as the computational issue. Alternative approaches to the response evaluation process will be provided. An illustration application problem will be presented. Graphical results confirming the theoretical procedures employed will be provided.

Keywords: heat, transfer, diffusion, modelling, computation

Procedia PDF Downloads 538
725 Optimizing Data Integration and Management Strategies for Upstream Oil and Gas Operations

Authors: Deepak Singh, Rail Kuliev

Abstract:

The abstract highlights the critical importance of optimizing data integration and management strategies in the upstream oil and gas industry. With its complex and dynamic nature generating vast volumes of data, efficient data integration and management are essential for informed decision-making, cost reduction, and maximizing operational performance. Challenges such as data silos, heterogeneity, real-time data management, and data quality issues are addressed, prompting the proposal of several strategies. These strategies include implementing a centralized data repository, adopting industry-wide data standards, employing master data management (MDM), utilizing real-time data integration technologies, and ensuring data quality assurance. Training and developing the workforce, “reskilling and upskilling” the employees and establishing robust Data Management training programs play an essential role and integral part in this strategy. The article also emphasizes the significance of data governance and best practices, as well as the role of technological advancements such as big data analytics, cloud computing, Internet of Things (IoT), and artificial intelligence (AI) and machine learning (ML). To illustrate the practicality of these strategies, real-world case studies are presented, showcasing successful implementations that improve operational efficiency and decision-making. In present study, by embracing the proposed optimization strategies, leveraging technological advancements, and adhering to best practices, upstream oil and gas companies can harness the full potential of data-driven decision-making, ultimately achieving increased profitability and a competitive edge in the ever-evolving industry.

Keywords: master data management, IoT, AI&ML, cloud Computing, data optimization

Procedia PDF Downloads 53
724 Budd-Chiari Syndrome: Common Presentation, Rare Disease

Authors: Aadil Khan, Yasser Chomayil, P. P. Venugopalan

Abstract:

Background: Budd-Chiari syndrome is caused by thrombosis of the hepatic veins and/or the thrombosis of the intrahepatic or suprahepatic IVC. The etiology remains idiopathic in 16% -35% of cases. Malignancy, rheumatological disorder, myeloproliferative disease, inheritable coagulopathy, infection or hyperestrogen state can be identified in many cases. Methodology: Review of case records of the patient presented to Aster Medcity, Emergency Department, Cochin. Introduction:17 years old female was presented to ED with fever, jaundice and abdominal distention since 1 week. O/E: Pallor+, icterus+. Abdomen- gross distension+, shifting dullness+, generalized anasarca+. USG abdomen showed hepatomegaly with mild coarse echotexture and moderate to gross ascites. CT abdomen and chest showed hepatomegaly with thrombosis of all three hepatic vein and moderate ascites suggestive of Budd-Chiari syndrome. Patient was taken for catheter vein thrombolysis. Venogram done the next day revealed almost > 50% opening of the right hepatic vein. Concurrent doppler showed colour and doppler signals in middle hepatic veins. She gradually improved and was discharged home on anticoagulant and adviced regular follow up. Conclusion: Being a rare disease in this young population, high suspicion is required when evaluating young patients with abdominal pain and jaundice.

Keywords: Budd-Chiari syndrome, rare disease, abdominal pain, India

Procedia PDF Downloads 255
723 Collision Tumor of Plasmacytoma with Hematological and Non-Hematological Malignancies

Authors: Arati Inamdar, Siddharth Bhattacharyya, Kester Haye

Abstract:

Collision tumors are rare entities characterized by neoplasms of two different cell populations with distinct separating boundaries. Such tumors could be benign, malignant, or a combination of both. The exact mechanism of origin for collision tumors is predicted to be tumor heterogeneity or concurrent occurrence of neoplasm in the same organ. We present two cases of plasmacytoma presenting as a collision tumor, one with a tumor of hematological origin and another with a non-hematological origin, namely Chronic Lymphocytic Leukemia and Adenocarcinoma of the colon, respectively. The immunohistochemical stains and flowcytometry analysis performed on the specimens aided incorrect diagnosis. Interestingly, neoplastic cells of plasmacytoma in the first case demonstrated strong cytokeratin along with weak Epithelial Specific Antigen/ Epithelial cell adhesion molecule Monoclonal Antibody (MOC31) positivity, indicating that the tumor may influence the microenvironment of the tumor in the vicinity. Furthermore, the next-generation sequencing studies performed on the specimen with plasmacytoma and chronic lymphocytic lymphoma demonstrated BReast CAncer gene (BRCA2) and Tumor Necrosis Factor Alpha Induced Protein 3 (TNFAIP3) as a disease associated variants suggestive of risk for multiple tumors including collision tumors. Our reports highlight the unique collision tumors involving plasmacytoma, which have never been reported previously, as well as provide necessary insights about the underline genetic aberrations and tumor heterogeneity through sequencing studies and allow clonality assessment for subsequent tumors.

Keywords: BRCA2, collision tumor, chronic lymphocytic leukemia, plasmacytoma

Procedia PDF Downloads 167
722 Disaggregation of Coarser Resolution Radiometer Derived Soil Moisture to Finer Scales

Authors: Gurjeet Singh, Rabindra K. Panda

Abstract:

Soil moisture is a key hydrologic state variable and is intrinsically linked to the Earth's water, climate and carbon cycles. On ecological point of view, the soil moisture is a fundamental natural resource providing the transpirable water for plants. Soil moisture varies both temporally and spatially due to spatiotemporal variation in rainfall, vegetation cover, soil properties and topography. Satellite derived soil moisture provides spatio-temporal extensive data. However, the spatial resolution of a typical satellite (L-band radiometry) is of the order of tens of kilometers, which is not good enough for developing efficient agricultural water management schemes at the field scale. In the present study, the soil moisture from radiometer data has been disaggregated using blending approach to achieve higher resolution soil moisture data. The radiometer estimates of soil moisture at a 40 km resolution have been disaggregated to 10 km, 5 km and 1 km resolutions. The disaggregated soil moisture was compared with the observed data, consisting of continuous sensor based soil moisture profile measurements, at three monitoring sites and extensive spatial near-surface soil moisture measurements, concurrent with satellite monitoring in the 500 km2 study watershed in the Eastern India. The estimated soil moisture status at different spatial scales can help in developing efficient agricultural water management schemes to increase the crop production and water use efficiency.

Keywords: disaggregation, eastern India, radiometers, soil moisture, water use efficiency

Procedia PDF Downloads 255
721 Detailed Quantum Circuit Design and Evaluation of Grover's Algorithm for the Bounded Degree Traveling Salesman Problem Using the Q# Language

Authors: Wenjun Hou, Marek Perkowski

Abstract:

The Traveling Salesman problem is famous in computing and graph theory. In short, it asks for the Hamiltonian cycle of the least total weight in a given graph with N nodes. All variations on this problem, such as those with K-bounded-degree nodes, are classified as NP-complete in classical computing. Although several papers propose theoretical high-level designs of quantum algorithms for the Traveling Salesman Problem, no quantum circuit implementation of these algorithms has been created up to our best knowledge. In contrast to previous papers, the goal of this paper is not to optimize some abstract complexity measures based on the number of oracle iterations, but to be able to evaluate the real circuit and time costs of the quantum computer. Using the emerging quantum programming language Q# developed by Microsoft, which runs quantum circuits in a quantum computer simulation, an implementation of the bounded-degree problem and its respective quantum circuit were created. To apply Grover’s algorithm to this problem, a quantum oracle was designed, evaluating the cost of a particular set of edges in the graph as well as its validity as a Hamiltonian cycle. Repeating the Grover algorithm with an oracle that finds successively lower cost each time allows to transform the decision problem to an optimization problem, finding the minimum cost of Hamiltonian cycles. N log₂ K qubits are put into an equiprobablistic superposition by applying the Hadamard gate on each qubit. Within these N log₂ K qubits, the method uses an encoding in which every node is mapped to a set of its encoded edges. The oracle consists of several blocks of circuits: a custom-written edge weight adder, node index calculator, uniqueness checker, and comparator, which were all created using only quantum Toffoli gates, including its special forms, which are Feynman and Pauli X. The oracle begins by using the edge encodings specified by the qubits to calculate each node that this path visits and adding up the edge weights along the way. Next, the oracle uses the calculated nodes from the previous step and check that all the nodes are unique. Finally, the oracle checks that the calculated cost is less than the previously-calculated cost. By performing the oracle an optimal number of times, a correct answer can be generated with very high probability. The oracle of the Grover Algorithm is modified using the recalculated minimum cost value, and this procedure is repeated until the cost cannot be further reduced. This algorithm and circuit design have been verified, using several datasets, to generate correct outputs.

Keywords: quantum computing, quantum circuit optimization, quantum algorithms, hybrid quantum algorithms, quantum programming, Grover’s algorithm, traveling salesman problem, bounded-degree TSP, minimal cost, Q# language

Procedia PDF Downloads 169
720 The Effect of Particulate Matter on Cardiomyocyte Apoptosis Through Mitochondrial Fission

Authors: Tsai-chun Lai, Szu-ju Fu, Tzu-lin Lee, Yuh-Lien Chen

Abstract:

There is much evidence that exposure to fine particulate matter (PM) from air pollution increases the risk of cardiovascular morbidity and mortality. According to previous reports, PM in the air enters the respiratory tract, contacts the alveoli, and enters the blood circulation, leading to the progression of cardiovascular disease. PM pollution may also lead to cardiometabolic disturbances, increasing the risk of cardiovascular disease. The effects of PM on cardiac function and mitochondrial damage are currently unknown. We used mice and rat cardiomyocytes (H9c2) as animal and in vitro cell models, respectively, to simulate an air pollution environment using PM. These results indicate that the apoptosis-related factor PUMA, a regulator of apoptosis upregulated by p53, is increased in mice treated with PM. Apoptosis was aggravated in cardiomyocytes treated with PM, as measured by TUNEL assay and Annexin V/PI. Western blot results showed that CASPASE3 was significantly increased and BCL2 (B-cell lymphoid 2) was significantly decreased under PM treatment. Concurrent exposure to PM increases mitochondrial reactive oxygen species (ROS) production by MitoSOX Red staining. Furthermore, using Mitotracker staining, PM treatment significantly shortened mitochondrial length, indicating mitochondrial fission. The expression of mitochondrial fission-related proteins p-DRP1 (phosphodynamics-related protein 1) and FIS1 (mitochondrial fission 1 protein) was significantly increased. Based on these results, the exposure to PM worsens mitochondrial function and leads to cardiomyocyte apoptosis.

Keywords: particulate matter, cardiomyocyte, apoptosis, mitochondria

Procedia PDF Downloads 86
719 Multidimensional Poverty: A Comparative Study for Vulnerability of Women in Lebanon

Authors: Elif N. Coban

Abstract:

With the political instability that has prevailed in Lebanon since October 2019, followed by a global pandemic and a deepening concurrent economic crisis after the Beirut Port explosion on August 4, 2020, Syrian refugees in Lebanon have struggled to survive what the World Bank has described as one of the worst economic crises in decades. This study aims to assess the vulnerability of Syrian refugee women. It will present a comparative analysis of refugee and Lebanese households using data from Lebanon’s Labour Force and Household Conditions Survey (LFHLCS) and from VASyr surveys, which are comprehensive annual surveys conducted jointly by the United Nations High Commissioner for Refugees (UNHCR), the United Nations Children’s Fund (UNICEF), and the United Nations World Food Programme (WFP). The study adopts an intersectionality-based method, which deals with gender and marginalized communities from many different perspectives, to put forward a gender-oriented approach. Examining the distribution of socioeconomic status among Syrian and Lebanese households might help to understand the disproportionate burdens borne by women. In this context, multidimensional poverty (MP) helps depict fragile communities’ socioeconomic status and allows a fuller grasp the multiple aspects of deprivation. Finally, this understanding may pave the way to more inclusive policy for decision-makers and practitioners working on refugee issues.

Keywords: multidimensional poverty, gender studies, intersectionality, Syrian refugees, Lebanon

Procedia PDF Downloads 96
718 Methods for Solving Identification Problems

Authors: Fadi Awawdeh

Abstract:

In this work, we highlight the key concepts in using semigroup theory as a methodology used to construct efficient formulas for solving inverse problems. The proposed method depends on some results concerning integral equations. The experimental results show the potential and limitations of the method and imply directions for future work.

Keywords: identification problems, semigroup theory, methods for inverse problems, scientific computing

Procedia PDF Downloads 463
717 Heightening Pre-Service Teachers’ Attitude towards Learning and Metacognitive Learning through Information and Communication Technology: Pre-Service Science Teachers’ Perspective

Authors: Abiodun Ezekiel Adesina, Ijeoma Ginikanwa Akubugwo

Abstract:

Information and Communication Technology, ICT can heighten pre-service teachers’ attitudes toward learning and metacognitive learning; however, there is a dearth of literature on the perception of the pre-service teachers on heightening their attitude toward learning and metacognitive learning. Thus, this study investigates the perception of pre-service science teachers on heightening their attitude towards learning and metacognitive learning through ICT. Two research questions and four hypotheses guided the research. A mixed methods research was adopted for the study in concurrent triangulation type of integrating qualitative and quantitative approaches to the study. The cluster random sampling technique was adopted to select 250 pre-service science teachers in Oyo township. Two self-constructed instruments: Heightening Pre-service Science Teachers’ Attitude towards Learning and Metacognitive Learning through Information and Communication Technology Scale (HPALMIS, r=.73), and an unstructured interview were used for data collection. Thematic analysis, frequency counts and percentages, t-tests, and analysis of variance were used for data analysis. The perception level of the pre-service science teachers on heightening their attitude towards learning and metacognitive learning through ICT is above average, with the majority perceiving that ICT can enhance their thinking about their learning. The perception was significant (mean=92.68, SD=10.86, df=249, t=134.91, p<.05). The perception was significantly differentiated by gender (t=2.10, df= 248, p<.05) in favour of the female pre-service teachers and based on the first time of ICTs use (F(5,244)= 9.586, p<.05). Lecturers of science and science related courses should therefore imbibe the use of ICTs in heightening pre-service teachers’ attitude towards learning and metacognitive learning. Government should organize workshops, seminars, lectures, and symposia along with professional bodies for the science education lecturers to keep abreast of the trending ICT.

Keywords: pre-service teachers’ attitude towards learning, metacognitive learning, ICT, pre-service teachers’ perspectives

Procedia PDF Downloads 76
716 Internet of Things, Edge and Cloud Computing in Rock Mechanical Investigation for Underground Surveys

Authors: Esmael Makarian, Ayub Elyasi, Fatemeh Saberi, Olusegun Stanley Tomomewo

Abstract:

Rock mechanical investigation is one of the most crucial activities in underground operations, especially in surveys related to hydrocarbon exploration and production, geothermal reservoirs, energy storage, mining, and geotechnics. There is a wide range of traditional methods for driving, collecting, and analyzing rock mechanics data. However, these approaches may not be suitable or work perfectly in some situations, such as fractured zones. Cutting-edge technologies have been provided to solve and optimize the mentioned issues. Internet of Things (IoT), Edge, and Cloud Computing technologies (ECt & CCt, respectively) are among the most widely used and new artificial intelligence methods employed for geomechanical studies. IoT devices act as sensors and cameras for real-time monitoring and mechanical-geological data collection of rocks, such as temperature, movement, pressure, or stress levels. Structural integrity, especially for cap rocks within hydrocarbon systems, and rock mass behavior assessment, to further activities such as enhanced oil recovery (EOR) and underground gas storage (UGS), or to improve safety risk management (SRM) and potential hazards identification (P.H.I), are other benefits from IoT technologies. EC techniques can process, aggregate, and analyze data immediately collected by IoT on a real-time scale, providing detailed insights into the behavior of rocks in various situations (e.g., stress, temperature, and pressure), establishing patterns quickly, and detecting trends. Therefore, this state-of-the-art and useful technology can adopt autonomous systems in rock mechanical surveys, such as drilling and production (in hydrocarbon wells) or excavation (in mining and geotechnics industries). Besides, ECt allows all rock-related operations to be controlled remotely and enables operators to apply changes or make adjustments. It must be mentioned that this feature is very important in environmental goals. More often than not, rock mechanical studies consist of different data, such as laboratory tests, field operations, and indirect information like seismic or well-logging data. CCt provides a useful platform for storing and managing a great deal of volume and different information, which can be very useful in fractured zones. Additionally, CCt supplies powerful tools for predicting, modeling, and simulating rock mechanical information, especially in fractured zones within vast areas. Also, it is a suitable source for sharing extensive information on rock mechanics, such as the direction and size of fractures in a large oil field or mine. The comprehensive review findings demonstrate that digital transformation through integrated IoT, Edge, and Cloud solutions is revolutionizing traditional rock mechanical investigation. These advanced technologies have empowered real-time monitoring, predictive analysis, and data-driven decision-making, culminating in noteworthy enhancements in safety, efficiency, and sustainability. Therefore, by employing IoT, CCt, and ECt, underground operations have experienced a significant boost, allowing for timely and informed actions using real-time data insights. The successful implementation of IoT, CCt, and ECt has led to optimized and safer operations, optimized processes, and environmentally conscious approaches in underground geological endeavors.

Keywords: rock mechanical studies, internet of things, edge computing, cloud computing, underground surveys, geological operations

Procedia PDF Downloads 38
715 Through Seligman’s Lenses: Creating a Culture of Well-Being in Higher-Education

Authors: Neeru Deep, Kimberly McAlister

Abstract:

Mental health issues have been increasing worldwide for many decades, but the COVID-19 pandemic has brought mental health issues into the spotlight. Within higher education, promoting the well-being of students has dramatically increased in focus. The Northwestern State University of Louisiana opened the Center for Positivity, Well-being, and Hope using the action research process of reflecting, planning, acting, and observing. The study’s purpose is two-fold: First, it highlights how to create a collaborative team to reflect, plan, and act to develop a well-being culture in higher education institutions. Second, it investigates the efficacy of the center through Seligman’s lenses. The researchers shared their experience in the first three phases of the action research process and then applied an identical concurrent mixed methods design. A purposive sample evaluated the efficacy of the center through Seligman’s lenses. The researcher administered PERMA-Profiler Measure, the PERMA-Profiler Measure overview, the CoPWH Evaluation I, and the CoPWH Evaluation II questionnaires to collect qualitative and quantitative data. The thematic analysis for qualitative and descriptive statistics for quantitative data concluded that the center creates a well-being culture and promotes well-being in college students. In conclusion, this action research shares the successful implementation of the cyclic process of research in promoting a well-being culture in higher education with the implications for promoting a well-being culture in various educational settings, workplaces, and communities.

Keywords: action research, mixed methods research design, Seligman, well-being.

Procedia PDF Downloads 113
714 ABET Accreditation Process for Engineering and Technology Programs: Detailed Process Flow from Criteria 1 to Criteria 8

Authors: Amit Kumar, Rajdeep Chakrabarty, Ganesh Gupta

Abstract:

This paper illustrates the detailed accreditation process of Accreditation Board of Engineering and Technology (ABET) for accrediting engineering and Technology programs. ABET is a non-governmental agency that accredits engineering and technology, applied and natural sciences, and computing sciences programs. ABET was founded on 10th May 1932 and was founded by Institute of Electrical and Electronics Engineering. International industries accept ABET accredited institutes having the highest standards in their academic programs. In this accreditation, there are eight criteria in general; criterion 1 describes the student outcome evaluations, criteria 2 measures the program's educational objectives, criteria 3 is the student outcome calculated from the marks obtained by students, criteria 4 establishes continuous improvement, criteria 5 focus on curriculum of the institute, criteria 6 is about faculties of this institute, criteria 7 measures the facilities provided by the institute and finally, criteria 8 focus on institutional support towards staff of the institute. In this paper, we focused on the calculative part of each criterion with equations and suitable examples, the files and documentation required for each criterion, and the total workflow of the process. The references and the values used to illustrate the calculations are all taken from the samples provided at ABET's official website. In the final section, we also discuss the criterion-wise score weightage followed by evaluation with timeframe and deadlines.

Keywords: Engineering Accreditation Committee, Computing Accreditation Committee, performance indicator, Program Educational Objective, ABET Criterion 1 to 7, IEEE, National Board of Accreditation, MOOCS, Board of Studies, stakeholders, course objective, program outcome, articulation, attainment, CO-PO mapping, CO-PO-SO mapping, PDCA cycle, degree certificates, course files, course catalogue

Procedia PDF Downloads 45
713 Applying Business Model Patterns: A Case Study in Latin American Building Industry

Authors: James Alberto Ortega Morales, Nelson Andrés Martínez Marín

Abstract:

The bulding industry is one of the most important sectors all around the world in terms of contribution to index like GDP and labor. On the other hand, it is a major contributor to Greenhouse Gases (GHG) and waste generation contributing to global warming. In this sense, it is necessary to establish sustainable practices both from the strategic point of view to the operations point of view as well in all business and industries. Business models don’t scape to this reality attending it´s mediator role between strategy and operations. Business models can turn from the traditional practices searching economic benefits to sustainable bussines models that generate both economic value and value for society and the environment. Recent advances in the analysis of sustainable business models find different classifications that allow finding potential triple bottom line (economic, social and environmental) solutions applicable in every business sector. Into the metioned Advances have been identified, 11 groups and 45 patterns of sustainable business models have been identified; such patterns can be found either in the business models as a whole or found concurrently in their components. This article presents the analysis of a case study, seeking to identify the components and elements that are part of it, using the ECO CANVAS conceptual model. The case study allows showing the concurrent existence of different patterns of business models for sustainability empirically, serving as an example and inspiration for other Latin American companies interested in integrating sustainability into their new and existing business models.

Keywords: sustainable business models, business sustainability, business model patterns, case study, construction industry

Procedia PDF Downloads 101
712 Eliciting and Confirming Data, Information, Knowledge and Wisdom in a Specialist Health Care Setting - The Wicked Method

Authors: Sinead Impey, Damon Berry, Selma Furtado, Miriam Galvin, Loretto Grogan, Orla Hardiman, Lucy Hederman, Mark Heverin, Vincent Wade, Linda Douris, Declan O'Sullivan, Gaye Stephens

Abstract:

Healthcare is a knowledge-rich environment. This knowledge, while valuable, is not always accessible outside the borders of individual clinics. This research aims to address part of this problem (at a study site) by constructing a maximal data set (knowledge artefact) for motor neurone disease (MND). This data set is proposed as an initial knowledge base for a concurrent project to develop an MND patient data platform. It represents the domain knowledge at the study site for the duration of the research (12 months). A knowledge elicitation method was also developed from the lessons learned during this process - the WICKED method. WICKED is an anagram of the words: eliciting and confirming data, information, knowledge, wisdom. But it is also a reference to the concept of wicked problems, which are complex and challenging, as is eliciting expert knowledge. The method was evaluated at a second site, and benefits and limitations were noted. Benefits include that the method provided a systematic way to manage data, information, knowledge and wisdom (DIKW) from various sources, including healthcare specialists and existing data sets. Limitations surrounded the time required and how the data set produced only represents DIKW known during the research period. Future work is underway to address these limitations.

Keywords: healthcare, knowledge acquisition, maximal data sets, action design science

Procedia PDF Downloads 307
711 Influence of the Molar Concentration and Substrate Temperature on Fluorine-Doped Zinc Oxide Thin Films Chemically Sprayed

Authors: J. Ramirez, A. Maldonado, M. de la L. Olvera

Abstract:

The effect of both the molar concentration of the starting solution and the substrate temperature on the electrical, morphological, structural and optical properties of chemically sprayed fluorine-doped zinc oxide (ZnO:F) thin films deposited on glass substrates, is analyzed in this work. All the starting solutions employed were aged for ten days before the deposition. The results show that as the molar concentration increases, a decrease in the electrical resistivity values is obtained, reaching the minimum in films deposited from a 0.4 M solution at 500°C. A further increase in the molar concentration leads to a very slight increase in the resistivity. On the other hand, as the substrate temperature is increased, the resistivity decreases and a tendency towards to minimum value is evidenced; taking the molar concentration as parameter, minimum values are reached at 500°C. The attain of ZnO:F thin films, with a resistivity as low as 7.8×10-3 Ώcm (sheet resistance of 130 Ώ/☐ and film thickness of 600 nm) measured in as-deposited films is reported here for the first time. The concurrent effect of the high molar concentration of the starting solution, the substrate temperature values used, and the ageing of the starting solution, which might cause polymerization of the zinc ions with the fluorine species, enhance the electrical properties. The structure of the films is polycrystalline, with a (002) preferential growth. Molar concentration rules the surface morphology as at low concentration an hexagonal and porous structure is developed changing to a uniform compact and small grain size surface in the films deposited with the high molar concentrations.

Keywords: zinc oxide, chemical spray, thin films, TCO

Procedia PDF Downloads 484
710 Ideology and Lexicogrammar: Discourse Against the Power in Lyrical Texts (XIII, XVII and XX Centuries)

Authors: Ulisses Tadeu Vaz de Oliveira

Abstract:

The development of multifunctional studies in the theoretical-methodological perspective of the Systemic-Functional Grammar (SFG) and the increasing number of critical literary studies have introduced new opportunities for the study of ideologies and societies, but also brought up new challenges across and within many areas. In this regard, the Critical Linguistics researches allow a form of pairing a textual linguistic analysis method (micro level) with a social language theory in political and ideological processes (macro level), presented in the literature. This presentation will report on strategies to criticize power holders in literary productions from three distinct eras, namely: (a) Satirical Galego-Portuguese chants of Gil Pérez Conde (thirteenth century), (b) Poems of Gregorio de Matos Guerra (seventeenth century), and (c) Songs of Chico Buarque de Holanda (twentieth century). The analysis of these productions is based on the SFG proposals, which considers the clause as a social event. Therefore, the structure serves to realize three concurrent meanings (metafunctions): Ideational, Interpersonal and Textual. The presenter aims to shed light on the core issues relevant to the successes of the authors to criticize authorities in repressive times while caring about face-threatening and politeness. The effective and meaningful critical discourse was a way of moving the society`s chains towards new ideologies reflected in the lexicogrammatical choices made and the rhetorical functions of the persuasive structures used by the authors.

Keywords: ideology, literature, persuasion, systemic-functional grammar

Procedia PDF Downloads 398
709 Risk Factors and Biomarkers for the Recurrence of Ovarian Endometrioma: About the Immunoreactivity of Progesterone Receptor Isoform B and Nuclear Factor Kappa B.

Authors: Ae Ra Han, Taek Hoo Lee, Sun Zoo Kim, Hwa Young Lee

Abstract:

Introduction: Ovarian endometrioma is one of the important causes of poor ovarian reserve and up to half of them have recurred. However, the treatment for recurrence prevention has limited efficiency and repeated surgical management makes worsen the ovarian reserve. To find better management for recurrence prevention, we investigated risk factors and biomarkers for the recurrence of ovarian endometrioma. Methods: The medical records of women with the history of surgical dissection for ovarian endometrioma were collected. After exclusion of the cases with concurrent hysterectomy, been menopaused during follow-up, incomplete medical record, and loss of follow-up, a total of 134 women were enrolled. Immunohistochemical staining for progesterone receptor isoform B (PR-B) and nuclear factor kappa B (NFκB) was done with the fixed tissue blocks of their endometriomas which were collected at the time of surgery. Results: Severity of dysmenorrhea and co-existence of adenomyosis had significant correlation with recurrence of endometrioma. Increased PR-B (P = .041) and decreased NFκB (P = .036) immunoreactivity were found in recurrent group. Serum CA-125 level at the time of recurrence was higher than the highest level of CA-125 during follow-up in unrecurred group (55.6 vs. 21.3 U/mL, P = .014). Conclusion: We found that the severity of dysmenorrhea and coexistence of adenomyosis are risk factors for recurrence of ovarian endometrioma, and serial follow-up of CA-125 is effective to detect and prevent the recurrence. However, to determine the possibility of immunoreactivity of PR-B and NFκB as biomarkers for ovarian endometrioma, further studies of various races and large numbers with prospective design are needed.

Keywords: endometriosis, recurrence, biomarker, risk factor

Procedia PDF Downloads 539
708 Project Time and Quality Management during Construction

Authors: Nahed Al-Hajeri

Abstract:

Time and cost is an integral part of every construction plan and can affect each party’s contractual obligations. The performance of both time and cost are usually important to the client and contractor during the project. Almost all construction projects are experiencing time overrun. These time overruns always contributed as expensive to both client and contractor. Construction of any project inside the gathering centers involves complex management skills related to work force, materials, plant, machineries, new technologies etc. It also involves many agencies interdependent on each other like the vendors, structural and functional designers including various types of specialized engineers and it includes support of contractors and specialized contractors. This paper mainly highlights the types of construction delays due to which project suffer time and cost overrun. This paper also speaks about the delay causes and factors that contribute to the construction sequence delay for the oil and gas projects. Construction delay is supposed to be one of the repeated problems in the construction projects and it has an opposing effect on project success in terms of time, cost and quality. Some effective methods are identified to minimize delays in construction projects such as: 1. Site management and supervision, 2. Effective strategic planning, 3. Clear information and communication channel. Our research paper studies the types of delay with some real examples with statistic results and suggests solutions to overcome this problem.

Keywords: non-compensable delay, delays caused by force majeure, compensable delay, delays caused by the owner or the owner’s representative, non-excusable delay, delay caused by the contractor or the contractor’s representative, concurrent delay, delays resulting from two separate causes at the same time

Procedia PDF Downloads 230