Search results for: missionary works
1421 A New Verification Based Congestion Control Scheme in Mobile Networks
Authors: P. K. Guha Thakurta, Shouvik Roy, Bhawana Raj
Abstract:
A congestion control scheme in mobile networks is proposed in this paper through a verification based model. The model proposed in this work is represented through performance metric like buffer Occupancy, latency and packet loss rate. Based on pre-defined values, each of the metric is introduced in terms of three different states. A Markov chain based model for the proposed work is introduced to monitor the occurrence of the corresponding state transitions. Thus, the estimation of the network status is obtained in terms of performance metric. In addition, the improved performance of our proposed model over existing works is shown with experimental results.Keywords: congestion, mobile networks, buffer, delay, call drop, markov chain
Procedia PDF Downloads 4431420 Balancing Independence and Guidance: Cultivating Student Agency in Blended Learning
Authors: Yeo Leng Leng
Abstract:
Blended learning, with its combination of online and face-to-face instruction, presents a unique set of challenges and opportunities in terms of cultivating student agency. While it offers flexibility and personalized learning pathways, it also demands a higher degree of self-regulation and motivation from students. This paper presents the design of blended learning in a Chinese lesson and discusses the framework involved. It also talks about the Edtech tools adopted to engage the students. Some of the students’ works will be showcased. A qualitative case study research method was employed in this paper to find out more about students’ learning experiences and to give them a voice. The purpose is to seek improvement in the blended learning design of the Chinese lessons and to encourage students’ self-directed learning.Keywords: blended learning, student agency, ed-tech tools, self-directed learning
Procedia PDF Downloads 801419 The Influence of Alginate Microspheres Modified with DAT on the Proliferation and Adipogenic Differentiation of ASCs
Authors: Shin-Yi Mao, Jiashing Yu
Abstract:
Decellularized adipose tissue (DAT) has received lots of attention as biological scaffolds recently. DAT that extracted from the extracellular matrix (ECM) of adipose tissues holds great promise as a xenogeneic biomaterial for tissue engineering and regenerative medicine. In our study, 2-D DATsol film was fabricated to enhance cell adhesion, proliferation, and differentiation of ASCs in vitro. DAT was also used to modify alginate for improvement of cell adhesion. Alginate microspheres modified with DAT were prepared by Nisco. These microspheres could provide a highly supportive 3-D environment for ASCs. In our works, ASCs were immobilized in alginate microspheres modified with DAT to promoted cell adhesion and adipogenic differentiation. Accordingly, we hypothesize that tissue regeneration in vivo could be promoted with the aid of modified microspheres in future.Keywords: adipose stem cells, decellularize adipose tissue, Alginate, microcarries
Procedia PDF Downloads 4441418 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability
Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola
Abstract:
Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.Keywords: data, employee, malware, work place
Procedia PDF Downloads 3851417 Swelling Behavior of Cross-Linked Poly (2-hydroxyethyl methacrylate)
Authors: Salah Hamri, Tewfik Bouchaour, Ulrich Maschke
Abstract:
The aim of this works is the study of swelling ratio of cross-linked polymer networks poly (2-hydroxyethyl methacrylate) (PHEMA). The system composed of erythrosine and Triethanolamine, in aqueous medium, is used as photo-initiator and 1,6-Hexanediol diacrylate as cross-linker. The analysis of UV-visible and infrared spectra, which were taken at different times during polymerization/cross linking, makes it possible to obtain useful information on the reaction mechanism. The swelling behavior was study by changing the nature of solvent, dye sensitizer (erythrosine, rose Bengal and eosin), and pH of the medium. The exploitation of experimental results using Fick diffusion model is also expected and shows a good correlation between theoretical and experimental results.Keywords: cross-linker, photo-sensitizer, polymer network, swelling ratio
Procedia PDF Downloads 3201416 Generative AI in Higher Education: Pedagogical and Ethical Guidelines for Implementation
Authors: Judit Vilarmau
Abstract:
Generative AI is emerging rapidly and transforming higher education in many ways, occasioning new challenges and disrupting traditional models and methods. The studies and authors explored remark on the impact on the ethics, curriculum, and pedagogical methods. Students are increasingly using generative AI for study, as a virtual tutor, and as a resource for generating works and doing assignments. This point is crucial for educators to make sure that students are using generative AI with ethical considerations. Generative AI also has relevant benefits for educators and can help them personalize learning experiences and promote self-regulation. Educators must seek and explore tools like ChatGPT to innovate without forgetting an ethical and pedagogical perspective. Eighteen studies were systematically reviewed, and the findings provide implementation guidelines with pedagogical and ethical considerations.Keywords: ethics, generative artificial intelligence, guidelines, higher education, pedagogy
Procedia PDF Downloads 891415 Problems and Prospects of Protection of Historical Building as a Corner Stone of Cultural Policy for International Collaboration in New Era: A Study of Fars Province, Iran
Authors: Kiyanoush Ghalavand, Ali Ferydooni
Abstract:
Fars province Fārs or Pārs is a vast land located in the southwest of Iran. All over the province, you can see and feel the glory of Ancient Iranian culture and civilization. There are many monuments from pre-historical to the Islamic era within this province. The existence of ancient cultural and historical monuments in Fars province including the historical complex of Persepolis, the tombs of Persian poets Hafez and Saadi, and dozens of other valuable cultural and historical works of this province as a symbol of Iranian national identity and the manifestation of transcendent cultural values of this national identity. Fars province is quintessentially Persian. Its name is the modern version of ancient Parsa, the homeland, if not the place of origin, of the Persians, one of the great powers of antiquity. From here, the Persian Empire ruled much of Western and Central Asia, receiving ambassadors and messengers at Persepolis. It was here that the Persian kings were buried, both in the mountain behind Persepolis and in the rock face of nearby Naqsh-e Rustam. We have a complex paradox in Persian and Islamic ideology in the age of technology in Iran. The main purpose of the present article is to identify and describe the problems and prospects of origin and development of the modern approach to the conservation and restoration of ancient monuments and historic buildings, the influence that this development has had on international collaboration in the protection and conservation of cultural heritage, and the present consequences worldwide. The definition of objects and structures of the past as heritage, and the policies related to their protection, restoration, and conservation, have evolved together with modernity, and are currently recognized as an essential part of the responsibilities of modern society. Since the eighteenth century, the goal of this protection has been defined as the cultural heritage of humanity; gradually this has included not only ancient monuments and past works of art but even entire territories for a variety of new values generated in recent decades. In its medium-term program of 1989, UNESCO defined the full scope of such heritage. The cultural heritage may be defined as the entire corpus of material signs either artistic or symbolic handed on by the past to each culture and, therefore, to the whole of humankind. As a constituent part of the affirmation and enrichment of cultural identities, as a legacy belonging to all humankind, the cultural heritage gives each particular place its recognizable features and is the storehouse of human experience. The preservation and the presentation of the cultural heritage are therefore a corner-stone of any cultural policy. The process, from which these concepts and policies have emerged, has been identified as the ‘modern conservation movement’.Keywords: tradition, modern, heritage, historical building, protection, cultural policy, fars province
Procedia PDF Downloads 1661414 Narrating Irish Identity: Retrieving ‘Irishness’ in the Works of William Butler Yeats and Seamus Heaney
Authors: Rafik Massoudi
Abstract:
Irish identity continues to be discussed in various fields including social science, culture, literary humanities as well as political debates. In this context, Irishness had been usurped for a long time by the hegemonic power of the British Empire. That is why, Irish writers, in general, and Seamus Heaney along with William Butler Yeats, in particular, endeavored to retrieve this lost identity by shedding light on Irish history, folklore, communal traditions, landscape, indigenous people, language as well as culture. In this context, we may speak of a decolonizing attempt that allowed these writers to represent the autonomous Irish subjectivity by establishing an ethical relationship based on an extraordinary approach to the represented alterity. This article, indeed, places itself within the arena of postmodern, postcolonial discussions of the issue of identity and, particularly, of Irishness.Keywords: identity, Irishess, narration, postcolonialism
Procedia PDF Downloads 3281413 The Impact of Feuerstein Enhancement of Learning Potential to the Integration of Children from Socially Disadvantaged Backgrounds into Society
Authors: Michal Kozubík, Svetlana Síthová
Abstract:
Aim: Aim of this study is to introduce the method of instrumental enrichment to people who works in the helping professions, and show further possibilities of its realization with children from socially disadvantaged backgrounds into society. Methods: We focused on Feuerstein’s Instrumental Enrichment method, its theoretical grounds and practical implementation. We carried out questionnaires and directly observed children from the disadvantaged background in Partizánske district. Results: We outlined the issues of children from disadvantaged social environment and their opportunity of social integration using the method. The findings showed the utility of Feuerstein method. Conclusions: We conclude that Feuerstein methods are very suitable for children from socially disadvantaged background and importance of social workers and special educator co-operation.Keywords: Feuerstein, inclusion, education, socially disadvantaged background
Procedia PDF Downloads 3111412 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 1981411 Energy Consumption Models for Electric Vehicles: Survey and Proposal of a More Realistic Model
Authors: I. Sagaama, A. Kechiche, W. Trojet, F. Kamoun
Abstract:
Replacing combustion engine vehicles by electric vehicles (EVs) is a major step in recent years due to their potential benefits. Battery autonomy and charging processes are still a big issue for that kind of vehicles. Therefore, reducing the energy consumption of electric vehicles becomes a necessity. Many researches target introducing recent information and communication technologies in EVs in order to propose reducing energy consumption services. Evaluation of realistic scenarios is a big challenge nowadays. In this paper, we will elaborate a state of the art of different proposed energy consumption models in the literature, then we will present a comparative study of these models, finally, we will extend previous works in order to propose an accurate and realistic energy model for calculating instantaneous power consumption of electric vehicles.Keywords: electric vehicle, vehicular networks, energy models, traffic simulation
Procedia PDF Downloads 3721410 Condition Monitoring System of Mine Air Compressors Based on Wireless Sensor Network
Authors: Sheng Fu, Yinbo Gao, Hao Lin
Abstract:
In the current mine air compressors monitoring system, there are some difficulties in the installation and maintenance because of the wired connection. To solve the problem, this paper introduces a new air compressors monitoring system based on ZigBee in which the monitoring parameters are transmitted wirelessly. The collecting devices are designed to form a cluster network to collect vibration, temperature, and pressure of air cylinders and other parameters. All these devices are battery-powered. Besides, the monitoring software in PC is developed using MFC. Experiments show that the designed wireless sensor network works well in the site environmental condition and the system is very convenient to be installed since the wireless connection. This monitoring system will have a wide application prospect in the upgrade of the old monitoring system of the air compressors.Keywords: condition monitoring, wireless sensor network, air compressor, zigbee, data collecting
Procedia PDF Downloads 5081409 The Dialectic of Law and Politics for George Friedrich Wilhelm Hegel
Authors: Djehich Mohamed Yousri
Abstract:
This paper aims to address the dialectic of law and politics in the philosophy of the state of the philosopher Hegel by addressing the concept of law, which refers to its general meaning to the set of rules and legislation that man sets to apply them within society, as it is considered one of the primary and necessary conditions for the functioning of And organizing social life, when it defines the rights and duties of every individual belonging to the state, by approaching it with central concepts in political philosophy, such as the state, freedom and the people. The most prominent result that we reached through our analysis of the details of the problematic research is the relationship between law and politics in the philosophical system of Hegel; on the one hand, We find that the state is rational only to the extent that it resorts to the law and works under it, and the latter does not realize its essence and effectiveness unless it is extracted from the customs, traditions, and culture of the people so that it does not conflict with the ideal goal of its existence, which is to achieve freedom and protect it from all possible. A state does not mean at all to reduce the freedom of the people, so there is no conflict between law and freedom.Keywords: hegel, the law, country, freedom, citizen
Procedia PDF Downloads 861408 The Primitive Code-Level Design Patterns for Distributed Programming
Authors: Bing Li
Abstract:
The primitive code-level design patterns (PDP) are the rudimentary programming elements to develop any distributed systems in the generic distributed programming environment, GreatFree. The PDP works with the primitive distributed application programming interfaces (PDA), the distributed modeling, and the distributed concurrency for scaling-up. They not only hide developers from underlying technical details but also support sufficient adaptability to a variety of distributed computing environments. Programming with them, the simplest distributed system, the lightweight messaging two-node client/server (TNCS) system, is constructed rapidly with straightforward and repeatable behaviors, copy-paste-replace (CPR). As any distributed systems are made up of the simplest ones, those PDAs, as well as the PDP, are generic for distributed programming.Keywords: primitive APIs, primitive code-level design patterns, generic distributed programming, distributed systems, highly patterned development environment, messaging
Procedia PDF Downloads 1941407 Magnetic Field Analysis of External Rotor Permanent-Magnet Synchronous Motors with Non Magnetic Rotor Core
Authors: Mabrak Samir
Abstract:
The motor performance created by permanent magnetic in a slotless air-gap of a surface mounted permanent-magnet synchronous motor with non magnetic rotor and either sinusoidal or mixed (quasi-Halbatch) magnetization is presented in this paper using polar coordinates. The analysis works for both internal and external rotor motor topologies, The effect of stator slots is introduced by modulating the magnetic field distribution in the slotless stator by the complex relative air-gap permeance, calculated from the conformal transformation of the slot geometry. We compare predicted results of flux density distribution and cogging torque with those obtained by finite-element analysis.Keywords: air-cored, cogging torque, finite element magnetic field, permanent-magnet
Procedia PDF Downloads 3711406 Behavior of SPEC CPU2006 Based on Optimization Levels
Authors: Faisel Elramalli, Ibrahim Althomali Amjad Sabbagh, Dhananjay Tambe
Abstract:
SPEC CPU benchmarks are used to evaluate the performance of CPUs on computer systems. In our project we are going to use SPEC CPU suite that contains several benchmarks running on two different compilers gcc and icc in different optimizations levels to evaluate the performance of a CPU. The motivation of this project is to find out which compiler and in which optimization level makes the CPU reaches the best performance. The results of that evaluation will help users of these compilers to choose the best compiler and optimization level that perform efficiently for their work. In other words, it will give users the best performance of the CPU while doing their works. This project is interesting since it will provide the method used to measure the performance of CPU and how different optimization levels of compilers can help achieve a higher performance. Moreover, it will give a good understanding of how benchmarks are used to evaluate a CPU performance. For the reader, in reality SPEC CPU benchmarks are used to measure the performance of new released CPUs to be compared to other CPUs.Keywords: SPEC, CPU, GCC, ICC, copilers
Procedia PDF Downloads 4851405 An Algorithm for Herding Cows by a Swarm of Quadcopters
Authors: Jeryes Danial, Yosi Ben Asher
Abstract:
Algorithms for controlling a swarm of robots is an active research field, out of which cattle herding is one of the most complex problems to solve. In this paper, we derive an independent herding algorithm that is specifically designed for a swarm of quadcopters. The algorithm works by devising flight trajectories that cause the cows to run-away in the desired direction and hence herd cows that are distributed in a given field towards a common gathering point. Unlike previously proposed swarm herding algorithms, this algorithm does not use a flocking model but rather stars each cow separately. The effectiveness of this algorithm is verified experimentally using a simulator. We use a special set of experiments attempting to demonstrate that the herding times of this algorithm correspond to field diameter small constant regardless of the number of cows in the field. This is an optimal result indicating that the algorithm groups the cows into intermediate groups and herd them as one forming ever closing bigger groups.Keywords: swarm, independent, distributed, algorithm
Procedia PDF Downloads 1781404 Behavior of Reinforced Concrete Structures Subjected to Multiple Floor Fire Loads
Authors: Suresh Narayana, Chaitanya Akkannavar
Abstract:
Assessment of behavior of reinforced concrete structures subjected to fire load, and its behavior for the multi-floor fire have been presented in this paper. This research is the part of the study to evaluate the performance of ten storied RC structure when it is subjected to fire loads at multiple floors and to evaluate the post-fire effects on structure such as deflection and stresses occurring due to combined effect of static and thermal loading. Thermal loading has been assigned to different floor levels to estimate the critical floors that initiate the collapse of the structure. The structure has been modeled and analyzed in Solid Works and commercially available Finite Element Software ABAQUS. Results are analyzed, and particular design solution has been suggested.Keywords: collapse mechanism, fire analysis, RC structure, stress vs temperature
Procedia PDF Downloads 4731403 Evaluating the Performance of Offensive Lineman in the National Football League
Authors: Nikhil Byanna, Abdolghani Ebrahimi, Diego Klabjan
Abstract:
How does one objectively measure the performance of an individual offensive lineman in the NFL? The existing literature proposes various measures that rely on subjective assessments of game film, but has yet to develop an objective methodology to evaluate performance. Using a variety of statistics related to an offensive lineman’s performance, we develop a framework to objectively analyze the overall performance of an individual offensive lineman and determine specific linemen who are overvalued or undervalued relative to their salary. We identify eight players across the 2013-2014 and 2014-2015 NFL seasons that are considered to be overvalued or undervalued and corroborate the results with existing metrics that are based on subjective evaluation. To the best of our knowledge, the techniques set forth in this work have not been utilized in previous works to evaluate the performance of NFL players at any position, including offensive linemen.Keywords: offensive lineman, player performance, NFL, machine learning
Procedia PDF Downloads 1441402 Identifying Chaotic Architecture: Origins of Nonlinear Design Theory
Authors: Mohammadsadegh Zanganehfar
Abstract:
Since the modernism, movement, and appearance of modern architecture, an aggressive desire for a general design theory in the theoretical works of architects in the form of books and essays emerges. Since Robert Venturi and Denise Scott Brown’s published complexity and contradiction in architecture in 1966, the discourse of complexity and volumetric composition has been an important and controversial issue in the discipline. Ever since various theories and essays were involved in this discourse, this paper attempt to identify chaos theory as a scientific model of complexity and its relation to architecture design theory by conducting a qualitative analysis and multidisciplinary critical approach through architecture and basic sciences resources. As a result, we identify chaotic architecture as the correlation of chaos theory and architecture as an independent nonlinear design theory with specific characteristics and properties.Keywords: architecture complexity, chaos theory, fractals, nonlinear dynamic systems, nonlinear ontology
Procedia PDF Downloads 3771401 A Case Study on Tension Drop of Cable-band Bolts in Suspension Bridge
Authors: Sihyun Park, Hyunwoo Kim, Wooyoung Jung, Dongwoo You
Abstract:
Regular maintenance works are very important on the axial forces of the cable-band bolts in suspension bridges. The band bolts show stress reduction for several reasons, including cable wire creep, the bolt relaxation, load fluctuation and cable rearrangements, etc., with time. In this study, with respect to the stress reduction that occurs over time, we carried out the theoretical review of the main cause based on the field measurements. As a result, the main cause of reduction in the cable-band bolt axial force was confirmed by the plastic deformation of the zinc plating layer used in the main cable wire, and thus, the theoretical process was established for the practical use in the field.Keywords: cable-band Bolts, field test, maintenance, stress reduction
Procedia PDF Downloads 3321400 Compressive Strength Evaluation of Underwater Concrete Structures Integrating the Combination of Rebound Hardness and Ultrasonic Pulse Velocity Methods with Artificial Neural Networks
Authors: Seunghee Park, Junkyeong Kim, Eun-Seok Shin, Sang-Hun Han
Abstract:
In this study, two kinds of nondestructive evaluation (NDE) techniques (rebound hardness and ultrasonic pulse velocity methods) are investigated for the effective maintenance of underwater concrete structures. A new methodology to estimate the underwater concrete strengths more effectively, named “artificial neural network (ANN) – based concrete strength estimation with the combination of rebound hardness and ultrasonic pulse velocity methods” is proposed and verified throughout a series of experimental works.Keywords: underwater concrete, rebound hardness, Schmidt hammer, ultrasonic pulse velocity, ultrasonic sensor, artificial neural networks, ANN
Procedia PDF Downloads 5331399 Terrain Classification for Ground Robots Based on Acoustic Features
Authors: Bernd Kiefer, Abraham Gebru Tesfay, Dietrich Klakow
Abstract:
The motivation of our work is to detect different terrain types traversed by a robot based on acoustic data from the robot-terrain interaction. Different acoustic features and classifiers were investigated, such as Mel-frequency cepstral coefficient and Gamma-tone frequency cepstral coefficient for the feature extraction, and Gaussian mixture model and Feed forward neural network for the classification. We analyze the system’s performance by comparing our proposed techniques with some other features surveyed from distinct related works. We achieve precision and recall values between 87% and 100% per class, and an average accuracy at 95.2%. We also study the effect of varying audio chunk size in the application phase of the models and find only a mild impact on performance.Keywords: acoustic features, autonomous robots, feature extraction, terrain classification
Procedia PDF Downloads 3701398 Privacy for the Internet of Things and its Different Dimensions
Authors: Maryam M Esfahani
Abstract:
The Internet of Things is a concept that has fundamentally changed the way information technology works and communication environments. This concept, which is referred to as the next revolution in the field of information and communication technology, takes advantage of existing technologies such as wireless sensor networks, RFID, cloud computing, M2M, etc., to the final slogan of providing the possibility of connecting any object anywhere and everywhere. This use of technologies, along with the possibility of providing new services, also inherits their threats, and although the Internet of Things is facing many challenges, it can be said that its most important challenge is security and privacy, and perhaps even a more tangible challenge is privacy. In this article, we will first introduce the definition and concepts related to privacy, and then we will examine some threats against the privacy of the Internet of Things in different layers of a typical architecture. Also, while examining the differences and the relationship between security and privacy, we study different dimensions of privacy, and finally, we review some of the methods and technologies for improving the level of privacy.Keywords: Iot, privacy, different dimension of privacy, W3model, privacy enhancing technologies
Procedia PDF Downloads 1011397 Establishing the Optimum Location of a Single Tower Crane Using a Smart Mathematical Model
Authors: Yasser Abo El-Magd, Wael Fawzy Mohamed
Abstract:
Due to the great development in construction and building field, there are many projects and huge works appeared which consume many construction materials. Accordingly, that causes difficulty in handling traditional transportation means (ordinary cranes) due to their limited capacity; there is an urgent need to use high capacity cranes such as tower cranes. However, with regard to their high expense, we have to take into consideration selecting what type of cranes to be utilized which has been discussed by many researchers. In this research, a proposed technique was created to select the suitable type of crane and the best place for crane erection, in addition to minimum radius for requested crane in order to minimize cost. To fulfill that target, a computer program is designed to numerate these problems, demonstrating an example explaining how to apply program and the result donated the best place.Keywords: tower crane, jib length, operating time, location, feasible area
Procedia PDF Downloads 2261396 Social Entrepreneurship and Women: A Bibliometric Analysis
Authors: S. Jailapdeen
Abstract:
Social entrepreneurship (SE)plays a pivotal role in the country which can contribute to women’s empowerment by providing them employment opportunities. SE plays a vital role in improving the economic condition of women, with self-motivated women entrepreneurs engaging several of their community members in their enterprises. Social enterprises unearth women’s inherent ability to be engaged in jobs other than agricultural and allied fields for their livelihoods. This paper highlights the role of social entrepreneurship in socio-economic empowerment of women. The researcher performed a bibliographic analysis of previously published works from peer-reviewed journals. The results are presented in the form of descriptive findings and discussions. The paper concludes by setting an agenda for future researchers in this field.Keywords: social entrepreneurship, women’s socio-economic empowerment, bibliometric analysis, agenda for future researchers
Procedia PDF Downloads 881395 Self Immolation and the Deactivation of State Necropower
Authors: Kate L. Yusi
Abstract:
This paper is an attempt to theoretically reframe the act of self-immolation beyond violence/non-violence discourse, to differentiate it from other paradigmatic examples of necropolitical activism like suicide bombing, in order to highlight its particular ontopolitical statement in relation to life and death and to re-energize its deactivating power. In this paper, the writer seeks to focus on self-immolation by Tibetan monks and other activists against Chinese imperialism, its continuing ethnic cleansing of the Tibetan people, forced assimilation, and territorial occupation. Here, the main driving force is this question: what does self-immolation mean to a people who are forced to live in deathspace? In other words, if one is reduced to nothingness that their deaths (as is their lives) become insignificant, in what ways does the reclamation of death/dying become a “way out” of this state-imposed enclave of death? To answer these questions, the writer engages with and put in conversation the works of Achille Mbembe, Elias Cannetti, and Giorgio Agamben.Keywords: necropolitics, self immolation, tibetan people, chinese imperialism
Procedia PDF Downloads 1161394 Design and Fabrication of a Scaffold with Appropriate Features for Cartilage Tissue Engineering
Authors: S. S. Salehi, A. Shamloo
Abstract:
Poor ability of cartilage tissue when experiencing a damage leads scientists to use tissue engineering as a reliable and effective method for regenerating or replacing damaged tissues. An artificial tissue should have some features such as biocompatibility, biodegradation and, enough mechanical properties like the original tissue. In this work, a composite hydrogel is prepared by using natural and synthetic materials that has high porosity. Mechanical properties of different combinations of polymers such as modulus of elasticity were tested, and a hydrogel with good mechanical properties was selected. Bone marrow derived mesenchymal stem cells were also seeded into the pores of the sponge, and the results showed the adhesion and proliferation of cells within the hydrogel after one month. In comparison with previous works, this study offers a new and efficient procedure for the fabrication of cartilage like tissue and further cartilage repair.Keywords: cartilage tissue engineering, hydrogel, mechanical strength, mesenchymal stem cell
Procedia PDF Downloads 3021393 Localization of Mobile Robots with Omnidirectional Cameras
Authors: Tatsuya Kato, Masanobu Nagata, Hidetoshi Nakashima, Kazunori Matsuo
Abstract:
Localization of mobile robots are important tasks for developing autonomous mobile robots. This paper proposes a method to estimate positions of a mobile robot using an omnidirectional camera on the robot. Landmarks for points of references are set up on a field where the robot works. The omnidirectional camera which can obtain 360 [deg] around images takes photographs of these landmarks. The positions of the robots are estimated from directions of these landmarks that are extracted from the images by image processing. This method can obtain the robot positions without accumulative position errors. Accuracy of the estimated robot positions by the proposed method are evaluated through some experiments. The results show that it can obtain the positions with small standard deviations. Therefore the method has possibilities of more accurate localization by tuning of appropriate offset parameters.Keywords: mobile robots, localization, omnidirectional camera, estimating positions
Procedia PDF Downloads 4421392 Towards a Resources Provisioning for Dynamic Workflows in the Cloud
Authors: Fairouz Fakhfakh, Hatem Hadj Kacem, Ahmed Hadj Kacem
Abstract:
Cloud computing offers a new model of service provisioning for workflow applications, thanks to its elasticity and its paying model. However, it presents various challenges that need to be addressed in order to be efficiently utilized. The resources provisioning problem for workflow applications has been widely studied. Nevertheless, the existing works did not consider the change in workflow instances while they are being executed. This functionality has become a major requirement to deal with unusual situations and evolution. This paper presents a first step towards the resources provisioning for a dynamic workflow. In fact, we propose a provisioning algorithm which minimizes the overall workflow execution cost, while meeting a deadline constraint. Then, we extend it to support the dynamic adding of tasks. Experimental results show that our proposed heuristic demonstrates a significant reduction in resources cost by using a consolidation process.Keywords: cloud computing, resources provisioning, dynamic workflow, workflow applications
Procedia PDF Downloads 295