Search results for: A Man Called Ove
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2807

Search results for: A Man Called Ove

2327 Isolation and Identification of the Dominant Flora of the Intestinal Microbiota of Rattus norvegicus an Algerian Firm West

Authors: Karima Ould Yerou, B. Meddah, A. Tir Touil

Abstract:

The intestinal flora also called the intestinal microbiota, consists of different bacteria and other microorganisms which occur naturally in the gastrointestinal tract organs components. These intestinal bacteria are present in their millions and help the functioning of the body in particular allowing aid to degradation of certain molecules into absorbable substrates. They also protect against invasion of the gut by other pathogenic bacteria, that is to say which may be responsible for disease. Factors like stress, antibiotics and diet can affect the balance of intestinal flora and in case of imbalance, digestive disorders type bloating, diarrhea or vomiting may occur. Rattus norvegicus of bad weight of 100 kg, an Algerian firm West are scarified and isolation of their ileum and colon respectively two Bactrian strains Escherichia coli and Lactobacillus are then purified and identified.

Keywords: intestinal flora, Rattus norvegicus, Escherichia coli, lactobacillus, West Algerian farm

Procedia PDF Downloads 323
2326 High Efficiency Double-Band Printed Rectenna Model for Energy Harvesting

Authors: Rakelane A. Mendes, Sandro T. M. Goncalves, Raphaella L. R. Silva

Abstract:

The concepts of energy harvesting and wireless energy transfer have been widely discussed in recent times. There are some ways to create autonomous systems for collecting ambient energy, such as solar, vibratory, thermal, electromagnetic, radiofrequency (RF), among others. In the case of the RF it is possible to collect up to 100 μW / cm². To collect and/or transfer energy in RF systems, a device called rectenna is used, which is defined by the junction of an antenna and a rectifier circuit. The rectenna presented in this work is resonant at the frequencies of 1.8 GHz and 2.45 GHz. Frequencies at 1.8 GHz band are e part of the GSM / LTE band. The GSM (Global System for Mobile Communication) is a frequency band of mobile telephony, it is also called second generation mobile networks (2G), it came to standardize mobile telephony in the world and was originally developed for voice traffic. LTE (Long Term Evolution) or fourth generation (4G) has emerged to meet the demand for wireless access to services such as Internet access, online games, VoIP and video conferencing. The 2.45 GHz frequency is part of the ISM (Instrumentation, Scientific and Medical) frequency band, this band is internationally reserved for industrial, scientific and medical development with no need for licensing, and its only restrictions are related to maximum power transfer and bandwidth, which must be kept within certain limits (in Brazil the bandwidth is 2.4 - 2.4835 GHz). The rectenna presented in this work was designed to present efficiency above 50% for an input power of -15 dBm. It is known that for wireless energy capture systems the signal power is very low and varies greatly, for this reason this ultra-low input power was chosen. The Rectenna was built using the low cost FR4 (Flame Resistant) substrate, the antenna selected is a microfita antenna, consisting of a Meandered dipole, and this one was optimized using the software CST Studio. This antenna has high efficiency, high gain and high directivity. Gain is the quality of an antenna in capturing more or less efficiently the signals transmitted by another antenna and/or station. Directivity is the quality that an antenna has to better capture energy in a certain direction. The rectifier circuit used has series topology and was optimized using Keysight's ADS software. The rectifier circuit is the most complex part of the rectenna, since it includes the diode, which is a non-linear component. The chosen diode is the Schottky diode SMS 7630, this presents low barrier voltage (between 135-240 mV) and a wider band compared to other types of diodes, and these attributes make it perfect for this type of application. In the rectifier circuit are also used inductor and capacitor, these are part of the input and output filters of the rectifier circuit. The inductor has the function of decreasing the dispersion effect on the efficiency of the rectifier circuit. The capacitor has the function of eliminating the AC component of the rectifier circuit and making the signal undulating.

Keywords: dipole antenna, double-band, high efficiency, rectenna

Procedia PDF Downloads 106
2325 Basics of Gamma Ray Burst and Its Afterglow

Authors: Swapnil Kumar Singh

Abstract:

Gamma-ray bursts (GRB's), short and intense pulses of low-energy γ rays, have fascinated astronomers and astrophysicists since their unexpected discovery in the late sixties. GRB'sare accompanied by long-lasting afterglows, and they are associated with core-collapse supernovae. The detection of delayed emission in X-ray, optical, and radio wavelength, or "afterglow," following a γ-ray burst can be described as the emission of a relativistic shell decelerating upon collision with the interstellar medium. While it is fair to say that there is strong diversity amongst the afterglow population, probably reflecting diversity in the energy, luminosity, shock efficiency, baryon loading, progenitor properties, circumstellar medium, and more, the afterglows of GRBs do appear more similar than the bursts themselves, and it is possible to identify common features within afterglows that lead to some canonical expectations. After an initial flash of gamma rays, a longer-lived "afterglow" is usually emitted at longer wavelengths (X-ray, ultraviolet, optical, infrared, microwave, and radio). It is a slowly fading emission at longer wavelengths created by collisions between the burst ejecta and interstellar gas. In X-ray wavelengths, the GRB afterglow fades quickly at first, then transitions to a less-steep drop-off (it does other stuff after that, but we'll ignore that for now). During these early phases, the X-ray afterglow has a spectrum that looks like a power law: flux F∝ E^β, where E is energy and beta is some number called the spectral index. This kind of spectrum is characteristic of synchrotron emission, which is produced when charged particles spiral around magnetic field lines at close to the speed of light. In addition to the outgoing forward shock that ploughs into the interstellar medium, there is also a so-called reverse shock, which propagates backward through the ejecta. In many ways," reverse" shock can be misleading; this shock is still moving outward from the restframe of the star at relativistic velocity but is ploughing backward through the ejecta in their frame and is slowing the expansion. This reverse shock can be dynamically important, as it can carry comparable energy to the forward shock. The early phases of the GRB afterglow still provide a good description even if the GRB is highly collimated since the individual emitting regions of the outflow are not in causal contact at large angles and so behave as though they are expanding isotropically. The majority of afterglows, at times typically observed, fall in the slow cooling regime, and the cooling break lies between the optical and the X-ray. Numerous observations support this broad picture for afterglows in the spectral energy distribution of the afterglow of the very bright GRB. The bluer light (optical and X-ray) appears to follow a typical synchrotron forward shock expectation (note that the apparent features in the X-ray and optical spectrum are due to the presence of dust within the host galaxy). We need more research in GRB and Particle Physics in order to unfold the mysteries of afterglow.

Keywords: GRB, synchrotron, X-ray, isotropic energy

Procedia PDF Downloads 78
2324 Audit Is a Production Performance Tool

Authors: Lattari Samir

Abstract:

The performance of a production process is the result of proper operation where the management tools appear as the key to success through process management which consists of managing and implementing a quality policy, organizing and planning the manufacturing, and thus defining an efficient logic as the main areas covered by production management. To carry out this delicate mission, which requires reconciling often contradictory objectives, the auditor is called upon, who must be able to express an opinion on the effectiveness of the operation of the "production" function. To do this, the auditor must structure his mission in three phases, namely, the preparation phase to assimilate the particularities of this function, the implementation phase and the conclusion phase. The audit is a systematic and independent examination of all the stages of a manufacturing process intended to determine whether the pre-established arrangements for the combination of production factors are respected, whether their implementation is effective and whether they are relevant in relation to the goals.

Keywords: audit, performance of process, independent examination, management tools, audit of accounts

Procedia PDF Downloads 58
2323 End To End Process to Automate Batch Application

Authors: Nagmani Lnu

Abstract:

Often, Quality Engineering refers to testing the applications that either have a User Interface (UI) or an Application Programming Interface (API). We often find mature test practices, standards, and automation regarding UI or API testing. However, another kind is present in almost all types of industries that deal with data in bulk and often get handled through something called a Batch Application. This is primarily an offline application companies develop to process large data sets that often deal with multiple business rules. The challenge gets more prominent when we try to automate batch testing. This paper describes the approaches taken to test a Batch application from a Financial Industry to test the payment settlement process (a critical use case in all kinds of FinTech companies), resulting in 100% test automation in Test Creation and Test execution. One can follow this approach for any other batch use cases to achieve a higher efficiency in their testing process.

Keywords: batch testing, batch test automation, batch test strategy, payments testing, payments settlement testing

Procedia PDF Downloads 37
2322 Empirical Evaluation of Gradient-Based Training Algorithms for Ordinary Differential Equation Networks

Authors: Martin K. Steiger, Lukas Heisler, Hans-Georg Brachtendorf

Abstract:

Deep neural networks and their variants form the backbone of many AI applications. Based on the so-called residual networks, a continuous formulation of such models as ordinary differential equations (ODEs) has proven advantageous since different techniques may be applied that significantly increase the learning speed and enable controlled trade-offs with the resulting error at the same time. For the evaluation of such models, high-performance numerical differential equation solvers are used, which also provide the gradients required for training. However, whether classical gradient-based methods are even applicable or which one yields the best results has not been discussed yet. This paper aims to redeem this situation by providing empirical results for different applications.

Keywords: deep neural networks, gradient-based learning, image processing, ordinary differential equation networks

Procedia PDF Downloads 144
2321 A Green Approach towards the Production of CaCO₃ Scaffolds for Bone Tissue Engineering

Authors: Sudhir Kumar Sharma, Abiy D. Woldetsadik, Mazin Magzoub, Ramesh Jagannathan

Abstract:

It is well known that bioactive ceramics exhibit specific biological affinities, especially in the area of tissue re-generation. In this context, we report the development of an eminently scalable, novel, supercritical CO₂ based process for the fabrication of hierarchically porous 'soft' CaCO₃ scaffolds. Porosity at the macro, micro, and nanoscales was obtained through process optimization of the so-called 'coffee-ring effect'. Exposure of these CaCO₃ scaffolds to monocytic THP-1 cells yielded negligible levels of tumor necrosis factor-alpha (TNF-α) thereby confirming the lack of immunogenicity of the scaffolds. ECM protein treatment of the scaffolds showed enhanced adsorption comparable to standard control such as glass. In vitro studies using osteoblast precursor cell line, MC3T3, also demonstrated the cytocompatibility of hierarchical porous CaCO₃ scaffolds.

Keywords: supercritical CO2, CaCO3 scaffolds, coffee-ring effect, ECM proteins

Procedia PDF Downloads 286
2320 Assessment of Factors Influencing Business Process Harmonization: A Case Study in an Industrial Company

Authors: J. J. M. Trienekens, H. L. Romero, L. Cuenca

Abstract:

While process harmonization is increasingly mentioned and unanimously associated with several benefits, there is a need for more understanding of how it contributes to business process redesign and improvement. This paper presents the application, in an industrial case study, of a conceptual harmonization model on the relationship between drivers and effects of process harmonization. The drivers are called contextual factors which influence harmonization. Assessment of these contextual factors in a particular business domain, clarifies the extent of harmonization that can be achieved, or that should be strived at. The case study shows how the conceptual harmonization model can be made operational and can act as a valuable assessment tool. From both qualitative, as well as some quantitative, assessment results, insights are being discussed on the extent of harmonization that can be achieved, and action plans are being defined for business (process) harmonization.

Keywords: case study, contextual factors, process harmonization, industrial company

Procedia PDF Downloads 378
2319 Neuropedagogy as a Scientific Discipline: Interdisciplinary Description of the Theoretical Basis for the Development of a Research Field

Authors: M. Chojak

Abstract:

Recently, more and more scientific disciplines refer to research in the field of neurobiology. Interdisciplinary research procedures are created using modern methods of brain imaging. Neither did the pedagogues start looking for neuronal conditions for various processes. The publications began to show concepts such as ‘neuropedagogy’, ‘neuroeducation’, ‘neurodidactics’, ‘brain-friendly education’. They were and are still used interchangeably. In the offer of training for teachers, the topics of multiple intelligences or educational kinesiology began to be more and more popular. These and other ideas have been actively introduced into the curricula. To our best knowledge, the literature on the subject lacks articles organizing the new nomenclature and indicating the methodological framework for research that would confirm the effectiveness of the above-mentioned innovations. The author of this article tries to find the place for neuropedagogy in the system of sciences, define its subject of research, methodological framework and basic concepts. This is necessary to plan studies that will verify the so-called neuromyths.

Keywords: brain, education, neuropedagogy, research

Procedia PDF Downloads 160
2318 Ageing Population and Generational Turn-Over in the Italian Labour Market: Towards a Sustainable Solidarity

Authors: Marianna Russo

Abstract:

Ageing population and youth unemployment are the major challenges that Western Countries – and Italy in particular – are facing in recent years. These phenomena have a significant impact not only on the labour market and the welfare system, but also on the organisational models of work. Therefore, in Italy, in the past few years, there have been some attempts to regulate the management of generational turn-over: intergenerational pacts, early retirement incentives, solidarity contracts, etc. In particular, this paper aims to focus on the expansive solidarity contracts, that were introduced in the Italian legal system for the first time in 1984. Indeed, they have been little used during the thirty years of their lives, so the Legislative Decree no. 148/2015, implementing the so-called Jobs Act, has given them another opportunity. The paper tries to analyse the rules and the empirical data, looking for a sustainable model of generational turn-over management.

Keywords: ageing population, generational turn-over, Italian jobs' act, solidarity contracts

Procedia PDF Downloads 241
2317 Atomic Force Microscopy Studies of DNA Binding Properties of the Archaeal Mini Chromosome Maintenance Complex

Authors: Amna Abdalla Mohammed Khalid, Pietro Parisse, Silvia Onesti, Loredana Casalis

Abstract:

Basic cellular processes as DNA replication are crucial to cell life. Understanding at the molecular level the mechanisms that govern DNA replication in proliferating cells is fundamental to understand disease connected to genomic instabilities, as a genetic disease and cancer. A key step for DNA replication to take place, is unwinding the DNA double helix and this carried out by proteins called helicases. The archaeal MCM (minichromosome maintenance) complex from Methanothermobacter thermautotrophicus have being studied using Atomic Force Microscopy (AFM), imaging in air and liquid (Physiological environment). The accurate analysis of AFM topographic images allowed to understand the static conformations as well the interaction dynamic of MCM and DNA double helix in the present of ATP.

Keywords: DNA, protein-DNA interaction, MCM (mini chromosome manteinance) complex, atomic force microscopy (AFM)

Procedia PDF Downloads 296
2316 Intercultural Strategies of Chinese Composers in the Organizational Structure of Their Works

Authors: Bingqing Chen

Abstract:

The Opium War unlocked the gate of China. Since then, modern western culture has been imported strongly and spread throughout this Asian country. The monologue of traditional Chinese culture in the past has been replaced by the hustle and bustle of multiculturalism. In the field of music, starting from school music, China, a country without the concept of composition, was deeply influenced by western culture and professional music composition, and entered the era of professional music composition. Recognizing the importance of national culture, a group of insightful artists began to try to add ‘China’ to musical composition. However, due to the special historical origin of Chinese professional musical composition and the three times of cultural nihilism in China, professional musical composition at this time failed to interpret the deep language structure of local culture within Chinese traditional culture, but only regarded Chinese traditional music as a ‘melody material library.’ At this time, the cross-cultural composition still takes Western music as its ‘norm,’ while our own music culture only exists as the sound of the contrast of Western music. However, after reading scores extensively, watching video performances, and interviewing several active composers, we found that at least in the past 30 years, China has created some works that can be called intercultural music. In these kinds of music, composers put Chinese and Western, traditional and modern in an almost equal position to have a dialogue based on their deep understanding and respect for the two cultures. This kind of music connects two music worlds, and links the two cultural and ideological worlds behind it, and communicates and grows together. This paper chose the works of three composers with different educational backgrounds, and pay attention to how composers can make a dialogue at the organizational structure level of their works. Based on the strategies adopted by composers in structuring their works, this paper expounds on how the composer's music procedure shows intercultural in terms of whole sound effects and cultural symbols. By actively participating in this intercultural practice, composers resorting to various musical and extra-musical procedures to arrive at the so-called ‘innovation within tradition.’ Through the dialogue, we can activate the space of creative thinking and explore the potential contained in culture. This interdisciplinary research promotes the rethinking of the possibility of innovation in contemporary Chinese intercultural music composition, spanning the fields of sound studies, dialogue theory, cultural research, music theory, and so on. Recently, China is calling for actively promoting 'the construction of Chinese music canonization,’ expecting to form a particular music style to show national-cultural identity. In the era of globalization, it is possible to form a brand-new Chinese music style through intercultural composition, but it is a question about talents, and the key lies in how composers do it. There is no recipe for the formation of the Chinese music style, only the composers constantly trying and tries to solve problems in their works.

Keywords: dialogism, intercultural music, national-cultural identity, organization/structure, sound

Procedia PDF Downloads 99
2315 Classification Based on Deep Neural Cellular Automata Model

Authors: Yasser F. Hassan

Abstract:

Deep learning structure is a branch of machine learning science and greet achievement in research and applications. Cellular neural networks are regarded as array of nonlinear analog processors called cells connected in a way allowing parallel computations. The paper discusses how to use deep learning structure for representing neural cellular automata model. The proposed learning technique in cellular automata model will be examined from structure of deep learning. A deep automata neural cellular system modifies each neuron based on the behavior of the individual and its decision as a result of multi-level deep structure learning. The paper will present the architecture of the model and the results of simulation of approach are given. Results from the implementation enrich deep neural cellular automata system and shed a light on concept formulation of the model and the learning in it.

Keywords: cellular automata, neural cellular automata, deep learning, classification

Procedia PDF Downloads 173
2314 Shared Vision System Support for Maintenance Tasks of Wind Turbines

Authors: Buket Celik Ünal, Onur Ünal

Abstract:

Communication is the most challenging part of maintenance operations. Communication between expert and fieldworker is crucial for effective maintenance and this also affects the safety of the fieldworkers. To support a machine user in a remote collaborative physical task, both, a mobile and a stationary device are needed. Such a system is called a shared vision system and the system supports two people to solve a problem from different places. This system reduces the errors and provides a reliable support for qualified and less qualified users. Through this research, it was aimed to validate the effectiveness of using a shared vision system to facilitate communication between on-site workers and those issuing instructions regarding maintenance or inspection works over long distances. The system is designed with head-worn display which is called a shared vision system. As a part of this study, a substitute system is used and implemented by using a shared vision system for maintenance operation. The benefits of the use of a shared vision system are analyzed and results are adapted to the wind turbines to improve the occupational safety and health for maintenance technicians. The motivation for the research effort in this study can be summarized in the following research questions: -How can expert support technician over long distances during maintenance operation? -What are the advantages of using a shared vision system? Experience from the experiment shows that using a shared vision system is an advantage for both electrical and mechanical system failures. Results support that the shared vision system can be used for wind turbine maintenance and repair tasks. Because wind turbine generator/gearbox and the substitute system have similar failures. Electrical failures, such as voltage irregularities, wiring failures and mechanical failures, such as alignment, vibration, over-speed conditions are the common and similar failures for both. Furthermore, it was analyzed the effectiveness of the shared vision system by using a smart glasses in connection with the maintenance task performed by a substitute system under four different circumstances, namely by using a shared vision system, an audio communication, a smartphone and by yourself condition. A suitable method for determining dependencies between factors measured in Chi Square Test, and Chi Square Test for Independence measured for determining a relationship between two qualitative variables and finally Mann Whitney U Test is used to compare any two data sets. While based on this experiment, no relation was found between the results and the gender. Participants` responses confirmed that the shared vision system is efficient and helpful for maintenance operations. From the results of the research, there was a statistically significant difference in the average time taken by subjects on works using a shared vision system under the other conditions. Additionally, this study confirmed that a shared vision system provides reduction in time to diagnose and resolve maintenance issues, reduction in diagnosis errors, reduced travel costs for experts, and increased reliability in service.

Keywords: communication support, maintenance and inspection tasks, occupational health and safety, shared vision system

Procedia PDF Downloads 251
2313 Transnational Rurality: Bridging Two Towns with Renewable Energy

Authors: Yaprak Aydin

Abstract:

The rural is no longer a space of only agricultural activities that gave into the global market demands; or an idyll to return after retirement; or only a reservoir of cultural values, but rather a vision to redefine the future in terms of production and consumption relations. Gulpınar in Turkey and Ashtarak in Armenia are two towns where a new ground of dialogue between two communities has been initiated: ‘energy democracy’, which is a significant driving force in a sense of gathering people of two historically conflicted communities around common future concerns; and in a sense of transforming the accepted knowledge on the rurality and all the social structures it represents. This paper seeks to provoke a discussion of to what extent such a rurality is attainable by contextualizing – through visits and meetings in person – two towns and two communities within a renewable energy project called 'Under the Same Sun' carried out by two local civil society organizations together at two public spaces.

Keywords: civil society, energy democracy, prosumer communities, renewable energy, transnational rurality

Procedia PDF Downloads 130
2312 Numerical Study of Fiber Bragg Grating Sensor: Longitudinal and Transverse Detection of Temperature and Strain

Authors: K. Khelil, H. Ammar, K. Saouchi

Abstract:

Fiber Bragg Grating (FBG) structure is an periodically modulated optical fiber. It acts as a selective filter of wavelength whose reflected peak is called Bragg wavelength and it depends on the period of the fiber and the refractive index. The simulation of FBG is based on solving the Coupled Mode Theory equation by using the Transfer Matrix Method which is carried out using MATLAB. It is found that spectral reflectivity is shifted when the change of temperature and strain is uniform. Under non-uniform temperature or strain perturbation, the spectrum is both shifted and destroyed. In case of transverse loading, reflectivity spectrum is split into two peaks, the first is specific to X axis, and the second belongs to Y axis. FBGs are used in civil engineering to detect perturbations applied to buildings.

Keywords: Bragg wavelength, coupled mode theory, optical fiber, temperature measurement

Procedia PDF Downloads 481
2311 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 151
2310 Stability or Instabilty? Triplet Deficit Analysis In Turkey

Authors: Zeynep Karaçor, Volkan Alptekin, Gökhan Akar, Tuba Akar

Abstract:

This paper aims to review the phenomenon of triplet deficit which is called interaction of budget balance that make up the overall balance of the economy, investment savings balance and current accounts balance in terms of Turkey. In this paper, triplet deficit state in Turkish economy has been analyzed with vector autoregressive model and Granger causality test using data covering the period of 1980-2010. According to VAR results, increase in current accounts is perceived on public sector borrowing requirement. These two variables influence each other bilaterally. Therefore, current accounts increase public deficit, whereas public deficit increases current accounts. It is not possible to mention the existence of a short-term Granger causality between variables at issue.

Keywords: internal and external deficit, stability, triplet deficit, Turkey economy

Procedia PDF Downloads 327
2309 Blood Clot Emulsification via Ultrasonic Thrombolysis Device

Authors: Sun Tao, Lou Liang, Tan Xing Haw Marvin, Gu Yuandong Alex

Abstract:

Patients with blood clots in their brains can experience problems with their vision or speech, seizures and general weakness. To treat blood clots, clinicians presently have two options. The first involves drug therapy to thin the blood and thus reduce the clot. The second choice is to invasively remove the clot using a plastic tube called a catheter. Both approaches carry a high risk of bleeding, and invasive procedures, such as catheter intervention, can also damage the blood vessel wall and cause infection. Ultrasonic treatment as a potential alternative therapy to break down clots is attracting growing interests due to the reduced adverse effects. To demonstrate the concept, in this investigation a microfabricated ultrasonic device was electrically packaged with printed circuit board to treat healthy human blood. The red blood cells could be broken down after 3-hour ultrasonic treatment.

Keywords: microfabrication, blood clot, ultrasonic thrombolysis device, ultrasonic device

Procedia PDF Downloads 435
2308 Cultural and Historical Roots of Plagiarism in Georgia

Authors: Lali Khurtsia, Vano Tsertsvadze

Abstract:

The purpose of the study was to find out incentives and expectations, methods and ways, which are influential to students during working with their thesis. Research findings shows that the use of plagiarism has cultural links deep in the history - on the one hand, the tradition of sharing knowledge in the oral manner, with its different interpretations, and on the other hand the lack of fair and honest methods in the academic process. Research results allow us to determine general ideas about preventive policy to reduce the use of plagiarism. We conducted surveys in three different groups – we interviewed so-called diploma writers, students on bachelors and masters level and the focus group of lecturers. We found that the problem with plagiarism in Georgia has cultural-mental character. We think that nearest years’ main task should be breaking of barriers existed between lecturers and students and acknowledgement of honest principals of study process among students and pupils.

Keywords: education, Georgia, plagiarism, study process, school, university

Procedia PDF Downloads 217
2307 Training a Neural Network Using Input Dropout with Aggressive Reweighting (IDAR) on Datasets with Many Useless Features

Authors: Stylianos Kampakis

Abstract:

This paper presents a new algorithm for neural networks called “Input Dropout with Aggressive Re-weighting” (IDAR) aimed specifically at datasets with many useless features. IDAR combines two techniques (dropout of input neurons and aggressive re weighting) in order to eliminate the influence of noisy features. The technique can be seen as a generalization of dropout. The algorithm is tested on two different benchmark data sets: a noisy version of the iris dataset and the MADELON data set. Its performance is compared against three other popular techniques for dealing with useless features: L2 regularization, LASSO and random forests. The results demonstrate that IDAR can be an effective technique for handling data sets with many useless features.

Keywords: neural networks, feature selection, regularization, aggressive reweighting

Procedia PDF Downloads 437
2306 Angular Correlation and Independent Particle Model in Two-Electron Atomic Systems

Authors: Tokuei Sako

Abstract:

The ground and low-lying singly-excited states of He and He-like atomic ions have been studied by the Full Configuration Interaction (FCI) method focusing on the angular correlation between two electrons in the studied systems. The two-electron angle density distribution obtained by integrating the square-modulus of the FCI wave function over the coordinates other than the interelectronic angle shows a distinct trend between the singlet-triplet pair of states for different values of the nuclear charge Zn. Further, both of these singlet and triplet distributions tend to show an increasingly stronger dependence on the interelectronic angle as Zn increases, in contrast to the well-known fact that the correlation energy approaches towards zero for increasing Zn. This controversial observation has been rationalized on the basis of the recently introduced concept of so-called conjugate Fermi holes.

Keywords: He-like systems, angular correlation, configuration interaction wave function, conjugate Fermi hole

Procedia PDF Downloads 402
2305 Existential Affordances and Psychopathology: A Gibsonian Analysis of Dissociative Identity Disorder

Authors: S. Alina Wang

Abstract:

A Gibsonian approach is used to understand the existential dimensions of the human ecological niche. Then, this existential-Gibsonian framework is applied to rethinking Hacking’s historical analysis of multiple personality disorder. This research culminates in a generalized account of psychiatric illness from an enactivist lens. In conclusion, reflections on the implications of this account on approaches to psychiatric treatment are mentioned. J.J. Gibson’s theory of affordances centered on affordances of sensorimotor varieties, which guide basic behaviors relative to organisms’ vital needs and physiological capacities (1979). Later theorists, notably Neisser (1988) and Rietveld (2014), expanded on the theory of affordances to account for uniquely human activities relative to the emotional, intersubjective, cultural, and narrative aspects of the human ecological niche. This research shows that these affordances are structured by what Haugeland (1998) calls existential commitments, which draws on Heidegger’s notion of dasein (1927) and Merleau-Ponty’s account of existential freedom (1945). These commitments organize the existential affordances that fill an individual’s environment and guide their thoughts, emotions, and behaviors. This system of a priori existential commitments and a posteriori affordances is called existential enactivism. For humans, affordances do not only elicit motor responses and appear as objects with instrumental significance. Affordances also, and possibly primarily, determine so-called affective and cognitive activities and structure the wide range of kinds (e.g., instrumental, aesthetic, ethical) of significances of objects found in the world. Then existential enactivism is applied to understanding the psychiatric phenomenon of multiple personality disorder (precursor of the current diagnosis of dissociative identity disorder). A reinterpretation of Hacking’s (1998) insights into the history of this particular disorder and his generalizations on the constructed nature of most psychiatric illness is taken on. Enactivist approaches sensitive to existential phenomenology can provide a deeper understanding of these matters. Conceptualizing psychiatric illness as strictly a disorder in the head (whether parsed as a disorder of brain chemicals or meaning-making capacities encoded in psychological modules) is incomplete. Rather, psychiatric illness must also be understood as a disorder in the world, or in the interconnected networks of existential affordances that regulate one’s emotional, intersubjective, and narrative capacities. All of this suggests that an adequate account of psychiatric illness must involve (1) the affordances that are the sources of existential hindrance, (2) the existential commitments structuring these affordances, and (3) the conditions of these existential commitments. Approaches to treatment of psychiatric illness would be more effective by centering on the interruption of normalized behaviors corresponding to affordances targeted as sources of hindrance, the development of new existential commitments, and the practice of new behaviors that erect affordances relative to these reformed commitments.

Keywords: affordance, enaction, phenomenology, psychiatry, psychopathology

Procedia PDF Downloads 119
2304 Hardware for Genetic Algorithm

Authors: Fariborz Ahmadi, Reza Tati

Abstract:

Genetic algorithm is a soft computing method that works on set of solutions. These solutions are called chromosome and the best one is the absolute solution of the problem. The main problem of this algorithm is that after passing through some generations, it may be produced some chromosomes that had been produced in some generations ago that causes reducing the convergence speed. From another respective, most of the genetic algorithms are implemented in software and less works have been done on hardware implementation. Our work implements genetic algorithm in hardware that doesn’t produce chromosome that have been produced in previous generations. In this work, most of genetic operators are implemented without producing iterative chromosomes and genetic diversity is preserved. Genetic diversity causes that not only do not this algorithm converge to local optimum but also reaching to global optimum. Without any doubts, proposed approach is so faster than software implementations. Evaluation results also show the proposed approach is faster than hardware ones.

Keywords: hardware, genetic algorithm, computer science, engineering

Procedia PDF Downloads 484
2303 Urban Poor: The Situations and Characteristics of the Problem and Social Welfare Service of Bangkok Metropolis

Authors: Sanchai Ratthanakwan

Abstract:

This research aims to study situations and characteristics of the problems facing the urban poor. The data and information are collected by focus group and in-depth interview leader and members of Four Regions Slum Network, community representatives and the social welfare officer. The research can be concluded that the problems of the urban poor faced with three major problems: Firstly, the shortage of housing and stability issues in housing; secondly, the problem of substandard quality of life; and thirdly, the debt problem. The study found that a solution will be found in two ways: First way is the creation of housing for the urban poor in slums or community intrusion by the state. Second way is the stability in the housing and subsistence provided by the community center called “housing stability”.

Keywords: urban poor, social welfare, Bangkok metropolis, housing stability

Procedia PDF Downloads 404
2302 Sync Consensus Algorithm: Trying to Reach an Agreement at Full Speed

Authors: Yuri Zinchenko

Abstract:

Recently, distributed storage systems have been used more and more in various aspects of everyday life. They provide such necessary properties as Scalability, Fault Tolerance, Durability, and others. At the same time, not only reliable but also fast data storage remains one of the most pressing issues in this area. That brings us to the consensus algorithm as one of the most important components that has a great impact on the functionality of a distributed system. This paper is the result of an analysis of several well-known consensus algorithms, such as Paxos and Raft. The algorithm it offers, called Sync, promotes, but does not insist on simultaneous writing to the nodes (which positively affects the overall writing speed) and tries to minimize the system's inactive time. This allows nodes to reach agreement on the system state in a shorter period, which is a critical factor for distributed systems. Also when developing Sync, a lot of attention was paid to such criteria as simplicity and intuitiveness, the importance of which is difficult to overestimate.

Keywords: sync, consensus algorithm, distributed system, leader-based, synchronization.

Procedia PDF Downloads 47
2301 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 417
2300 A Research on Glass Ceiling Syndrome: Career Barriers of Women Academics

Authors: Serdar Öge, Alpay Karasoy, Özlem Kara

Abstract:

Although women have merit in their jobs, they still are located very few in the top management in many sectors. There are many causes of such situation. Such a situation creates obstacles; especially invisible ones are called “glass ceiling syndrome”. Also, studies which handle this subject in academic community are very few. The aim of this research is to reach the results about glass ceiling obstacles in terms of female teaching staff (academics) working in higher education institutions. To this end, our study was performed on female academics working at Selcuk University, Konya / Turkey. Our study's main aim can be expressed as to determine whether there are glass ceiling obstacles for female academics working at the higher education institution in question, to measure their glass ceiling perceptions and, thus, to identify what the glass ceiling barrier components for them to promotion to senior management positions are.

Keywords: career, career barriers, glass ceiling syndrome, academics

Procedia PDF Downloads 308
2299 Non-Native Expatriate English: An Emerging Variety (Category of Users) in Cameroon?

Authors: Valentine Ubanako

Abstract:

This paper investigates a situation that has given rise to a particular kind of variety or category of users of English in Cameroon which I have called here Non-native expatriate English (Users). This paper asserts that Non-expatriates in Cameroon (those who work for native speakers of English) use English in a peculiar manner which is worth investigating. This paper thus looks into the kind of English they use and their attitudes towards other users of different varieties of English and how these non-native expatriates form new identities and try to negotiate social ascendency within a local context. Data for this paper is collected through observation, interviews and questionnaires. Some Cameroonians, especially the educated, believe that they must move to Europe or America, study to a very high level and struggle to be like the white man whereas, the lowly educated (working with native English expatriates), are living their European and American dream in Cameroon among their brothers. Thus, educational attainment is not a necessary criterion for social ascendency.

Keywords: non-native expatriate English, native expatriates, varieties of English, English language, linguistics

Procedia PDF Downloads 303
2298 Evaluation of Quasi-Newton Strategy for Algorithmic Acceleration

Authors: T. Martini, J. M. Martínez

Abstract:

An algorithmic acceleration strategy based on quasi-Newton (or secant) methods is displayed for address the practical problem of accelerating the convergence of the Newton-Lagrange method in the case of convergence to critical multipliers. Since the Newton-Lagrange iteration converges locally at a linear rate, it is natural to conjecture that quasi-Newton methods based on the so called secant equation and some minimal variation principle, could converge superlinearly, thus restoring the convergence properties of Newton's method. This strategy can also be applied to accelerate the convergence of algorithms applied to fixed-points problems. Computational experience is reported illustrating the efficiency of this strategy to solve fixed-point problems with linear convergence rate.

Keywords: algorithmic acceleration, fixed-point problems, nonlinear programming, quasi-newton method

Procedia PDF Downloads 474