Search results for: ubiquitous computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1144

Search results for: ubiquitous computing

664 Land Cover Mapping Using Sentinel-2, Landsat-8 Satellite Images, and Google Earth Engine: A Study Case of the Beterou Catchment

Authors: Ella Sèdé Maforikan

Abstract:

Accurate land cover mapping is essential for effective environmental monitoring and natural resources management. This study focuses on assessing the classification performance of two satellite datasets and evaluating the impact of different input feature combinations on classification accuracy in the Beterou catchment, situated in the northern part of Benin. Landsat-8 and Sentinel-2 images from June 1, 2020, to March 31, 2021, were utilized. Employing the Random Forest (RF) algorithm on Google Earth Engine (GEE), a supervised classification categorized the land into five classes: forest, savannas, cropland, settlement, and water bodies. GEE was chosen due to its high-performance computing capabilities, mitigating computational burdens associated with traditional land cover classification methods. By eliminating the need for individual satellite image downloads and providing access to an extensive archive of remote sensing data, GEE facilitated efficient model training on remote sensing data. The study achieved commendable overall accuracy (OA), ranging from 84% to 85%, even without incorporating spectral indices and terrain metrics into the model. Notably, the inclusion of additional input sources, specifically terrain features like slope and elevation, enhanced classification accuracy. The highest accuracy was achieved with Sentinel-2 (OA = 91%, Kappa = 0.88), slightly surpassing Landsat-8 (OA = 90%, Kappa = 0.87). This underscores the significance of combining diverse input sources for optimal accuracy in land cover mapping. The methodology presented herein not only enables the creation of precise, expeditious land cover maps but also demonstrates the prowess of cloud computing through GEE for large-scale land cover mapping with remarkable accuracy. The study emphasizes the synergy of different input sources to achieve superior accuracy. As a future recommendation, the application of Light Detection and Ranging (LiDAR) technology is proposed to enhance vegetation type differentiation in the Beterou catchment. Additionally, a cross-comparison between Sentinel-2 and Landsat-8 for assessing long-term land cover changes is suggested.

Keywords: land cover mapping, Google Earth Engine, random forest, Beterou catchment

Procedia PDF Downloads 48
663 Description of a Structural Health Monitoring and Control System Using Open Building Information Modeling

Authors: Wahhaj Ahmed Farooqi, Bilal Ahmad, Sandra Maritza Zambrano Bernal

Abstract:

In view of structural engineering, monitoring of structural responses over time is of great importance with respect to recent developments of construction technologies. Recently, developments of advanced computing tools have enabled researcher’s better execution of structural health monitoring (SHM) and control systems. In the last decade, building information modeling (BIM) has substantially enhanced the workflow of planning and operating engineering structures. Typically, building information can be stored and exchanged via model files that are based on the Industry Foundation Classes (IFC) standard. In this study a modeling approach for semantic modeling of SHM and control systems is integrated into the BIM methodology using the IFC standard. For validation of the modeling approach, a laboratory test structure, a four-story shear frame structure, is modeled using a conventional BIM software tool. An IFC schema extension is applied to describe information related to monitoring and control of a prototype SHM and control system installed on the laboratory test structure. The SHM and control system is described by a semantic model applying Unified Modeling Language (UML). Subsequently, the semantic model is mapped into the IFC schema. The test structure is composed of four aluminum slabs and plate-to-column connections are fully fixed. In the center of the top story, semi-active tuned liquid column damper (TLCD) is installed. The TLCD is used to reduce effects of structural responses in context of dynamic vibration and displacement. The wireless prototype SHM and control system is composed of wireless sensor nodes. For testing the SHM and control system, acceleration response is automatically recorded by the sensor nodes equipped with accelerometers and analyzed using embedded computing. As a result, SHM and control systems can be described within open BIM, dynamic responses and information of damages can be stored, documented, and exchanged on the formal basis of the IFC standard.

Keywords: structural health monitoring, open building information modeling, industry foundation classes, unified modeling language, semi-active tuned liquid column damper, nondestructive testing

Procedia PDF Downloads 135
662 Ray Tracing Modified 3D Image Method Simulation of Picocellular Propagation Channel Environment

Authors: Fathi Alwafie

Abstract:

In this paper we present the simulation of the propagation characteristics of the picocellular propagation channel environment. The first aim has been to find a correct description of the environment for received wave. The result of the first investigations is that the environment of the indoor wave significantly changes as we change the electric parameters of material constructions. A modified 3D ray tracing image method tool has been utilized for the coverage prediction. A detailed analysis of the dependence of the indoor wave on the wide-band characteristics of the channel: Root Mean Square (RMS) delay spread characteristics and mean excess delay, is also investigated.

Keywords: propagation, ray tracing, network, mobile computing

Procedia PDF Downloads 390
661 A Novel Combination Method for Computing the Importance Map of Image

Authors: Ahmad Absetan, Mahdi Nooshyar

Abstract:

The importance map is an image-based measure and is a core part of the resizing algorithm. Importance measures include image gradients, saliency and entropy, as well as high level cues such as face detectors, motion detectors and more. In this work we proposed a new method to calculate the importance map, the importance map is generated automatically using a novel combination of image edge density and Harel saliency measurement. Experiments of different type images demonstrate that our method effectively detects prominent areas can be used in image resizing applications to aware important areas while preserving image quality.

Keywords: content-aware image resizing, visual saliency, edge density, image warping

Procedia PDF Downloads 570
660 Chebyshev Wavelets and Applications

Authors: Emanuel Guariglia

Abstract:

In this paper we deal with Chebyshev wavelets. We analyze their properties computing their Fourier transform. Moreover, we discuss the differential properties of Chebyshev wavelets due the connection coefficients. The differential properties of Chebyshev wavelets, expressed by the connection coefficients (also called refinable integrals), are given by finite series in terms of the Kronecker delta. Moreover, we treat the p-order derivative of Chebyshev wavelets and compute its Fourier transform. Finally, we expand the mother wavelet in Taylor series with an application both in fractional calculus and fractal geometry.

Keywords: Chebyshev wavelets, Fourier transform, connection coefficients, Taylor series, local fractional derivative, Cantor set

Procedia PDF Downloads 110
659 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 57
658 Development of the Web-Based Multimedia N-Screen Service System for Cross Platform

Authors: S. Bae, J. Shin, S. Lee

Abstract:

As the development of smart devices such as Smart TV, Smartphone, Tablet PC, Laptop, the interest in N-Screen Services that can be cross-linked with heterogeneous devices is increasing. N-Screen means User-centric services that can share and constantly watch multimedia contents anytime and anywhere. However, the existing N-Screen system has the limitation that N-Screen system has to implement the application for each platform and device to provide multimedia service. To overcome this limitation, Multimedia N-Screen Service System is proposed through the web, and it is independent of different environments. The combination of Web and cloud computing technologies from this study results in increasing efficiency and reduction in costs.

Keywords: N-screen, web, cloud, multimedia

Procedia PDF Downloads 288
657 The Taxonomic and Functional Diversity in Edaphic Microbial Communities from Antarctic Dry Valleys

Authors: Sean T. S. Wei, Joy D. Van Nostrand, Annapoorna Maitrayee Ganeshram, Stephen B. Pointing

Abstract:

McMurdo Dry Valleys are a largely ice-free polar desert protected by international treaty as an Antarctic special managed area. The terrestrial landscape is dominated by oligotrophic mineral soil with extensive rocky outcrops. Several environmental stresses: low temperature, lack of liquid water, UV exposure and oligotrophic substrates, restrict the major biotic component to microorganisms. The bacterial diversity and the putative physiological capacity of microbial communities of quartz rocks (hypoliths) and soil of a maritime-influenced Dry Valleys were interrogated by two metagenomic approaches: 454 pyro-sequencing and Geochp DNA microarray. The most abundant phylum in hypoliths was Cyanobacteria (46%), whereas in solils Actinobacteria (31%) were most abundant. The Proteobacteria and Bacteriodetes were the only other phyla to comprise >10% of both communities. Carbon fixation was indicated by photoautotrophic and chemoautotrophic pathways for both hypolith and soil communities. The fungi accounted for polymer carbon transformations, particularly for aromatic compounds. The complete nitrogen cycling was observed in both communities. The fungi in particular displayed pathways related to ammonification. Environmental stress response pathways were common among bacteria, whereas the nutrient stress response pathways were more widely present in bacteria, archaea and fungi. The diversity of bacterialphage was also surveyed by Geochip. Data suggested that different substrates supported different viral families: Leviviridae, Myoviridae, Podoviridae and Siphoviridiae were ubiquitous. However, Corticoviridae and Microviridae only occurred in wetter soils.

Keywords: Antarctica, hypolith, soil, dry valleys, geochip, functional diversity, stress response

Procedia PDF Downloads 438
656 Thermodynamics of Water Condensation on an Aqueous Organic-Coated Aerosol Aging via Chemical Mechanism

Authors: Yuri S. Djikaev

Abstract:

A large subset of aqueous aerosols can be initially (immediately upon formation) coated with various organic amphiphilic compounds whereof the hydrophilic moieties are attached to the aqueous aerosol core while the hydrophobic moieties are exposed to the air thus forming a hydrophobic coating thereupon. We study the thermodynamics of water condensation on such an aerosol whereof the hydrophobic organic coating is being concomitantly processed by chemical reactions with atmospheric reactive species. Such processing (chemical aging) enables the initially inert aerosol to serve as a nucleating center for water condensation. The most probable pathway of such aging involves atmospheric hydroxyl radicals that abstract hydrogen atoms from hydrophobic moieties of surface organics (first step), the resulting radicals being quickly oxidized by ubiquitous atmospheric oxygen molecules to produce surface-bound peroxyl radicals (second step). Taking these two reactions into account, we derive an expression for the free energy of formation of an aqueous droplet on an organic-coated aerosol. The model is illustrated by numerical calculations. The results suggest that the formation of aqueous cloud droplets on such aerosols is most likely to occur via Kohler activation rather than via nucleation. The model allows one to determine the threshold parameters necessary for their Kohler activation. Numerical results also corroborate previous suggestions that one can neglect some details of aerosol chemical composition in investigating aerosol effects on climate.

Keywords: aqueous aerosols, organic coating, chemical aging, cloud condensation nuclei, Kohler activation, cloud droplets

Procedia PDF Downloads 381
655 Theoretical Investigations and Simulation of Electromagnetic Ion Cyclotron Waves in the Earth’s Magnetosphere Through Magnetospheric Multiscale Mission

Authors: A. A. Abid

Abstract:

Wave-particle interactions are considered to be the paramount in the transmission of energy in collisionless space plasmas, where electromagnetic fields confined the charged particles movement. One of the distinct features of energy transfer in collisionless plasma is wave-particle interaction which is ubiquitous in space plasmas. The three essential populations of the inner magnetosphere are cold plasmaspheric plasmas, ring-currents, and radiation belts high energy particles. The transition region amid such populations initiates wave-particle interactions among distinct plasmas and the wave mode perceived in the magnetosphere is the electromagnetic ion cyclotron (EMIC) wave. These waves can interact with numerous particle species resonantly, accompanied by plasma particle heating is still in debate. In this work we paid particular attention to how EMIC waves impact plasma species, specifically how they affect the heating of electrons and ions during storm and substorm in the Magnetosphere. Using Magnetospheric Multiscale (MMS) mission and electromagnetic hybrid simulation, this project will investigate the energy transfer mechanism (e.g., Landau interactions, bounce resonance interaction, cyclotron resonance interaction, etc.) between EMIC waves and cold-warm plasma populations. Other features such as the production of EMIC waves and the importance of cold plasma particles in EMIC wave-particle interactions will also be worth exploring. Wave particle interactions, electromagnetic hybrid simulation, electromagnetic ion cyclotron (EMIC) waves, Magnetospheric Multiscale (MMS) mission, space plasmas, inner magnetosphere

Keywords: MMS, magnetosphere, wave particle interraction, non-maxwellian distribution

Procedia PDF Downloads 42
654 Instructional Design Strategy Based on Stories with Interactive Resources for Learning English in Preschool

Authors: Vicario Marina, Ruiz Elena, Peredo Ruben, Bustos Eduardo

Abstract:

the development group of Educational Computing of the National Polytechnic (IPN) in Mexico has been developing interactive resources at preschool level in an effort to improve learning in the Child Development Centers (CENDI). This work describes both a didactic architecture and a strategy for teaching English with digital stories using interactive resources available through a Web repository designed to be used in mobile platforms. It will be accessible initially to 500 children and worldwide by the end of 2015.

Keywords: instructional design, interactive resources, digital educational resources, story based English teaching, preschool education

Procedia PDF Downloads 462
653 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act

Authors: Maria Jędrzejczak, Patryk Pieniążek

Abstract:

The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.

Keywords: data protection law, personal data, AI law, personal data breach

Procedia PDF Downloads 47
652 Optimization for Autonomous Robotic Construction by Visual Guidance through Machine Learning

Authors: Yangzhi Li

Abstract:

Network transfer of information and performance customization is now a viable method of digital industrial production in the era of Industry 4.0. Robot platforms and network platforms have grown more important in digital design and construction. The pressing need for novel building techniques is driven by the growing labor scarcity problem and increased awareness of construction safety. Robotic approaches in construction research are regarded as an extension of operational and production tools. Several technological theories related to robot autonomous recognition, which include high-performance computing, physical system modeling, extensive sensor coordination, and dataset deep learning, have not been explored using intelligent construction. Relevant transdisciplinary theory and practice research still has specific gaps. Optimizing high-performance computing and autonomous recognition visual guidance technologies improves the robot's grasp of the scene and capacity for autonomous operation. Intelligent vision guidance technology for industrial robots has a serious issue with camera calibration, and the use of intelligent visual guiding and identification technologies for industrial robots in industrial production has strict accuracy requirements. It can be considered that visual recognition systems have challenges with precision issues. In such a situation, it will directly impact the effectiveness and standard of industrial production, necessitating a strengthening of the visual guiding study on positioning precision in recognition technology. To best facilitate the handling of complicated components, an approach for the visual recognition of parts utilizing machine learning algorithms is proposed. This study will identify the position of target components by detecting the information at the boundary and corner of a dense point cloud and determining the aspect ratio in accordance with the guidelines for the modularization of building components. To collect and use components, operational processing systems assign them to the same coordinate system based on their locations and postures. The RGB image's inclination detection and the depth image's verification will be used to determine the component's present posture. Finally, a virtual environment model for the robot's obstacle-avoidance route will be constructed using the point cloud information.

Keywords: robotic construction, robotic assembly, visual guidance, machine learning

Procedia PDF Downloads 75
651 Indoleamines (Serotonin & Melatonin) in Edible Plants: Its Influence on Human Health

Authors: G. A. Ravishankar, A. Ramakrishna

Abstract:

Melatonin (MEL) and Serotonin (SER), also known as [5-Hydroxytryptamine (5-HT)] are reported to be in a range of plant types which are edible. Their occurrence in plants species appears to be ubiquitous. Their presence in high quantities in plants assumes significance owing to their physiological effects upon consumption by human beings. MEL is a well known animal hormone mainly released by the pineal gland known to influence circadian rhythm, sleep, apart from immune enhancement. Similarly, SER is a neurotransmitter that regulates mood, sleep and anxiety in mammals. It is implicated in memory, behavioral changes, scavenging reactive oxygen species, antipsychotic, etc. Similarly Role of SER and MEL in plant morphogenesis, and various physiological processes through intense research is beginning to unfold. These molecules are in common foods viz banana, pineapple, plum, nuts, milk, grape wine. N- Feruloyl serotonin and p-coumaroyl serotonin found in certain seeds are found to possess antioxidant, anti-inflammatory, antitumor, antibacterial, and anti-stress potential apart from reducing depression and anxiety. MEL is found in Mediterranean diets, nuts, cherries, tomato berries, and olive products. Consumption of foods rich in MEL is known to increase blood MEL levels which have been implicated in protective effect against cardiovascular damage, cancer initiation and growth. MEL is also found in wines, green tea, beer, olive oil etc. Moreover, presence of SER and MEL in Coffee beans (green and roasted beans) and decoction has been reported us. In this communication we report the occurrence of indole amines in edible plants and their implications in human health.

Keywords: serotonin, melatonin, edible plants, neurotransmitters, physiological effects

Procedia PDF Downloads 268
650 Case-Based Reasoning Approach for Process Planning of Internal Thread Cold Extrusion

Authors: D. Zhang, H. Y. Du, G. W. Li, J. Zeng, D. W. Zuo, Y. P. You

Abstract:

For the difficult issues of process selection, case-based reasoning technology is applied to computer aided process planning system for cold form tapping of internal threads on the basis of similarity in the process. A model is established based on the analysis of process planning. Case representation and similarity computing method are given. Confidence degree is used to evaluate the case. Rule-based reuse strategy is presented. The scheme is illustrated and verified by practical application. The case shows the design results with the proposed method are effective.

Keywords: case-based reasoning, internal thread, cold extrusion, process planning

Procedia PDF Downloads 495
649 Archetypes in the Rorschach Inkblots: Imparting Universal Meaning in the Face of Ambiguity

Authors: Donna L. Roberts

Abstract:

The theory of archetypes contends that themes based on universal foundational images reside in and are transmitted generationally through the collective unconscious, which is referenced throughout an individual’s experience in order to make sense of that experience. There is then, a profoundly visceral and instinctive agreement on the gestalt of these universal themes and how they apply to the human condition throughout space and time. The inherent nature of projective tests, such as the Rorschach Inkblot, necessitates that the stimulus is ambiguous and thus elicits responses that reflect the unconscious inner psyche of the respondent. As the development of the Rorschach inkblots was relatively random and serendipitous - i.e., the inkblots were not engineered to elicit a specifically defined response - it would stand to reason that without a collective unconscious, every individual would interpret the inkblots in an individualized and unique way. Yet this is not the case. Instead, common themes appear in the images of the inkblots and their interpretation that reflect this deeper iconic understanding. This study analyzed the ten Rorschach inkblots in terms of Jungian archetypes, both with respect to the form of images on each plate and the commonly observed themes in responses. Examples of the archetypes were compared to each of the inkblots, with subsequent descriptions matched to the standard responses. The findings yielded clear and distinct instances of the universal symbolism intrinsic in the inkblot images as well as ubiquitous throughout the responses. This project illustrates the influence of the theories of psychologist Carl Gustav Jung on the interpretation of the ambiguous stimuli. It further serves to demonstrate the merit of Jungian psychology as a valuable tool with which to understand the nature of projective tests in general, Rorschach’s work specifically, and ultimately the broader implications for our collective unconscious and common humanity.

Keywords: archetypes, inkblots, projective tests, Rorschach

Procedia PDF Downloads 92
648 A Machine Learning Approach for the Leakage Classification in the Hydraulic Final Test

Authors: Christian Neunzig, Simon Fahle, Jürgen Schulz, Matthias Möller, Bernd Kuhlenkötter

Abstract:

The widespread use of machine learning applications in production is significantly accelerated by improved computing power and increasing data availability. Predictive quality enables the assurance of product quality by using machine learning models as a basis for decisions on test results. The use of real Bosch production data based on geometric gauge blocks from machining, mating data from assembly and hydraulic measurement data from final testing of directional valves is a promising approach to classifying the quality characteristics of workpieces.

Keywords: machine learning, classification, predictive quality, hydraulics, supervised learning

Procedia PDF Downloads 196
647 The Impact of Work Stress on Professionals' Life and Health: The Usage of Instant Messaging Applications

Authors: Pui-Lai To, Chechen Liao, Ming-Chi Sung

Abstract:

Work and family life are the most important areas for men and women today. Every professional is required to meet and fulfill the responsibilities of work and family roles. Although the development and popularity of communication technology bring a lot of benefits, including effective and efficient communication, may also generate conflicts between work and family life. Since mobile devices and the applications of mobile devices, such as instant messages, are ubiquitous, the boundaries of work and family roles are increasingly blurred. Professionals may be in the risk of work over-loading and work-family conflict. This study examines the impact of work stress on professionals’ life and health in the context of instant messaging application of smart phone. This study uses a web-based questionnaire to collect samples. The questionnaires are sent via virtual community sites, instant messaging applications, and e-mail. The study develops and empirically validates a work-family conflict model by integrating the pressure theory and technostress factors. The causal relationship between variables in the research model is tested. In terms of data analysis, Partial Least Square (PLS) in Structural Equation Modeling (SEM) is used for sample analysis and research model testing. The results of this study are as follows. First, both the variables of work-related stress and technological violations positively affect the work-family conflict. Second, both the variables of work-loading and technology-overloading have no effect on work-family conflict. Third, work-family conflict has negative effect on job satisfaction, family satisfaction, physical health, and mental health.

Keywords: mental health, physical health, technostress, work-family conflict, work-related stress

Procedia PDF Downloads 281
646 Lexical Collocations in Medical Articles of Non-Native vs Native English-Speaking Researchers

Authors: Waleed Mandour

Abstract:

This study presents multidimensional scrutiny of Benson et al.’s seven-category taxonomy of lexical collocations used by Egyptian medical authors and their peers of native-English speakers. It investigates 212 medical papers, all published during a span of 6 years (from 2013 to 2018). The comparison is held to the medical research articles submitted by native speakers of English (25,238 articles in total with over 103 million words) as derived from the Directory of Open Access Journals (a 2.7 billion-word corpus). The non-native speakers compiled corpus was properly annotated and marked-up manually by the researcher according to the standards of Weisser. In terms of statistical comparisons, though, deployed were the conventional frequency-based analysis besides the relevant criteria, such as association measures (AMs) in which LogDice is deployed as per the recommendation of Kilgariff et al. when comparing large corpora. Despite the terminological convergence in the subject corpora, comparison results confirm the previous literature of which the non-native speakers’ compositions reveal limited ranges of lexical collocations in terms of their distribution. However, there is a ubiquitous tendency of overusing the NS-high-frequency multi-words in all lexical categories investigated. Furthermore, Egyptian authors, conversely to their English-speaking peers, tend to embrace more collocations denoting quantitative rather than qualitative analyses in their produced papers. This empirical work, per se, contributes to the English for Academic Purposes (EAP) and English as a Lingua Franca in Academic settings (ELFA). In addition, there are pedagogical implications that would promote a better quality of medical research papers published in Egyptian universities.

Keywords: corpus linguistics, EAP, ELFA, lexical collocations, medical discourse

Procedia PDF Downloads 122
645 Private Coded Computation of Matrix Multiplication

Authors: Malihe Aliasgari, Yousef Nejatbakhsh

Abstract:

The era of Big Data and the immensity of real-life datasets compels computation tasks to be performed in a distributed fashion, where the data is dispersed among many servers that operate in parallel. However, massive parallelization leads to computational bottlenecks due to faulty servers and stragglers. Stragglers refer to a few slow or delay-prone processors that can bottleneck the entire computation because one has to wait for all the parallel nodes to finish. The problem of straggling processors, has been well studied in the context of distributed computing. Recently, it has been pointed out that, for the important case of linear functions, it is possible to improve over repetition strategies in terms of the tradeoff between performance and latency by carrying out linear precoding of the data prior to processing. The key idea is that, by employing suitable linear codes operating over fractions of the original data, a function may be completed as soon as enough number of processors, depending on the minimum distance of the code, have completed their operations. The problem of matrix-matrix multiplication in the presence of practically big sized of data sets faced with computational and memory related difficulties, which makes such operations are carried out using distributed computing platforms. In this work, we study the problem of distributed matrix-matrix multiplication W = XY under storage constraints, i.e., when each server is allowed to store a fixed fraction of each of the matrices X and Y, which is a fundamental building of many science and engineering fields such as machine learning, image and signal processing, wireless communication, optimization. Non-secure and secure matrix multiplication are studied. We want to study the setup, in which the identity of the matrix of interest should be kept private from the workers and then obtain the recovery threshold of the colluding model, that is, the number of workers that need to complete their task before the master server can recover the product W. The problem of secure and private distributed matrix multiplication W = XY which the matrix X is confidential, while matrix Y is selected in a private manner from a library of public matrices. We present the best currently known trade-off between communication load and recovery threshold. On the other words, we design an achievable PSGPD scheme for any arbitrary privacy level by trivially concatenating a robust PIR scheme for arbitrary colluding workers and private databases and the proposed SGPD code that provides a smaller computational complexity at the workers.

Keywords: coded distributed computation, private information retrieval, secret sharing, stragglers

Procedia PDF Downloads 108
644 Passive Attenuation of Nitrogen Species at Northern Mine Sites

Authors: Patrick Mueller, Alan Martin, Justin Stockwell, Robert Goldblatt

Abstract:

Elevated concentrations of inorganic nitrogen (N) compounds (nitrate, nitrite, and ammonia) are a ubiquitous feature to mine-influenced drainages due to the leaching of blasting residues and use of cyanide in the milling of gold ores. For many mines, the management of N is a focus for environmental protection, therefore understanding the factors controlling the speciation and behavior of N is central to effective decision making. In this paper, the passive attenuation of ammonia and nitrite is described for three northern water bodies (two lakes and a tailings pond) influenced by mining activities. In two of the water bodies, inorganic N compounds originate from explosives residues in mine water and waste rock. The third water body is a decommissioned tailings impoundment, with N compounds largely originating from the breakdown of cyanide compounds used in the processing of gold ores. Empirical observations from water quality monitoring indicate nitrification (the oxidation of ammonia to nitrate) occurs in all three waterbodies, where enrichment of nitrate occurs commensurately with ammonia depletion. The N species conversions in these systems occurred more rapidly than chemical oxidation kinetics permit, indicating that microbial mediated conversion was occurring, despite the cool water temperatures. While nitrification of ammonia and nitrite to nitrate was the primary process, in all three waterbodies nitrite was consistently present at approximately 0.5 to 2.0 % of total N, even following ammonia depletion. The persistence of trace amounts of nitrite under these conditions suggests the co-occurrence denitrification processes in the water column and/or underlying substrates. The implications for N management in mine waters are discussed.

Keywords: explosives, mining, nitrification, water

Procedia PDF Downloads 307
643 Design of Cloud Service Brokerage System Intermediating Integrated Services in Multiple Cloud Environment

Authors: Dongjae Kang, Sokho Son, Jinmee Kim

Abstract:

Cloud service brokering is a new service paradigm that provides interoperability and portability of application across multiple Cloud providers. In this paper, we designed cloud service brokerage system, any broker, supporting integrated service provisioning and SLA based service life cycle management. For the system design, we introduce the system concept and whole architecture, details of main components and use cases of primary operations in the system. These features ease the Cloud service provider and customer’s concern and support new Cloud service open market to increase cloud service profit and prompt Cloud service echo system in cloud computing related area.

Keywords: cloud service brokerage, multiple Clouds, Integrated service provisioning, SLA, network service

Procedia PDF Downloads 474
642 Comparative Study of Scheduling Algorithms for LTE Networks

Authors: Samia Dardouri, Ridha Bouallegue

Abstract:

Scheduling is the process of dynamically allocating physical resources to User Equipment (UE) based on scheduling algorithms implemented at the LTE base station. Various algorithms have been proposed by network researchers as the implementation of scheduling algorithm which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of PF, MLWDF and EXP/PF scheduling algorithms. The evaluation is considered for a single cell with interference scenario for different flows such as Best effort, Video and VoIP in a pedestrian and vehicular environment using the LTE-Sim network simulator. The comparative study is conducted in terms of system throughput, fairness index, delay, packet loss ratio (PLR) and total cell spectral efficiency.

Keywords: LTE, multimedia flows, scheduling algorithms, mobile computing

Procedia PDF Downloads 370
641 A Low-Area Fully-Reconfigurable Hardware Design of Fast Fourier Transform System for 3GPP-LTE Standard

Authors: Xin-Yu Shih, Yue-Qu Liu, Hong-Ru Chou

Abstract:

This paper presents a low-area and fully-reconfigurable Fast Fourier Transform (FFT) hardware design for 3GPP-LTE communication standard. It can fully support 32 different FFT sizes, up to 2048 FFT points. Besides, a special processing element is developed for making reconfigurable computing characteristics possible, while first-in first-out (FIFO) scheduling scheme design technique is proposed for hardware-friendly FIFO resource arranging. In a synthesis chip realization via TSMC 40 nm CMOS technology, the hardware circuit only occupies core area of 0.2325 mm2 and dissipates 233.5 mW at maximal operating frequency of 250 MHz.

Keywords: reconfigurable, fast Fourier transform (FFT), single-path delay feedback (SDF), 3GPP-LTE

Procedia PDF Downloads 266
640 The Effect of Torsional Angle on Reversible Electron Transfer in Donor: Acceptor Frameworks Using Bis(Imino)Pyridines as Proxy

Authors: Ryan Brisbin, Hassan Harb, Justin Debow, Hrant Hratchian, Ryan Baxter

Abstract:

Donor-Acceptor (DA) frameworks are crucial parts of any technology requiring charge transport. This type of behavior is ubiquitous across technologies from semi conductors to solar panels. Currently, most DA systems involve metallic components, but progressive research is being pursued to design fully organic DA systems to be used as both organic semi-conductors and light emitting diodes. These systems are currently comprised of conductive polymers and salts. However, little is known about the effect of various physical aspects (size, torsional angle, electron density) have on the act of reversible charge transfer. Herein, the effect of torsional angle on reductive stability in bis(imino)pyridines is analyzed using a combination of single crystal analysis and electro-chemical peak current ratios from cyclic voltammetry. The computed free energies of reduction and electron attachment points were also investigated through density functional theory and natural ionization orbital theory to gain greater understanding of the global effect torsional angles have on electron transfer in bis(imino)pyridines. Findings indicated that torsional angles are a multi-variable parameter affected by both local steric constraints and resonant electronic contributions. Local steric impacted torsional angles demonstrated a negligible effect on electrochemical reversibility, while resonant affected torsional angles were observed to significantly alter the electrochemical reversibility.

Keywords: cyclic voltammetry, bis(imino)pyridines, structure-activity relationship, torsional angles

Procedia PDF Downloads 224
639 Split Monotone Inclusion and Fixed Point Problems in Real Hilbert Spaces

Authors: Francis O. Nwawuru

Abstract:

The convergence analysis of split monotone inclusion problems and fixed point problems of certain nonlinear mappings are investigated in the setting of real Hilbert spaces. Inertial extrapolation term in the spirit of Polyak is incorporated to speed up the rate of convergence. Under standard assumptions, a strong convergence of the proposed algorithm is established without computing the resolvent operator or involving Yosida approximation method. The stepsize involved in the algorithm does not depend on the spectral radius of the linear operator. Furthermore, applications of the proposed algorithm in solving some related optimization problems are also considered. Our result complements and extends numerous results in the literature.

Keywords: fixedpoint, hilbertspace, monotonemapping, resolventoperators

Procedia PDF Downloads 38
638 Challenges and Pedagogical Strategies in Teaching Chemical Bonding: Perspectives from Moroccan Educators

Authors: Sara atibi, Azzeddine Atibi, Salim Ahmed, Khadija El Kababi

Abstract:

The concept of chemical bonding is fundamental in chemistry education, ubiquitous in school curricula, and essential to numerous topics in the field. Mastery of this concept enables students to predict and explain the physical and chemical properties of substances. However, chemical bonding is often regarded as one of the most complex concepts for secondary and higher education students to comprehend, due to the underlying complex theory and the use of abstract models. Teachers also encounter significant challenges in conveying this concept effectively. This study aims to identify the difficulties and alternative conceptions faced by Moroccan secondary school students in learning about chemical bonding, as well as the pedagogical strategies employed by teachers to overcome these obstacles. A survey was conducted involving 150 Moroccan secondary school physical science teachers, using a structured questionnaire comprising closed, open-ended, and multiple-choice questions. The results reveal frequent student misconceptions, such as the octet rule, molecular geometry, and molecular polarity. Contributing factors to these misconceptions include the abstract nature of the concepts, the use of models, and teachers' difficulties in explaining certain aspects of chemical bonding. The study proposes improvements for teaching chemical bonding, such as integrating information and communication technologies (ICT), diversifying pedagogical tools, and considering students' pre-existing conceptions. These recommendations aim to assist teachers, curriculum developers, and textbook authors in making chemistry more accessible and in addressing students' misconceptions.

Keywords: chemical bonding, alternative conceptions, chemistry education, pedagogical strategies

Procedia PDF Downloads 9
637 Analyzing the Impact of DCF and PCF on WLAN Network Standards 802.11a, 802.11b, and 802.11g

Authors: Amandeep Singh Dhaliwal

Abstract:

Networking solutions, particularly wireless local area networks have revolutionized the technological advancement. Wireless Local Area Networks (WLANs) have gained a lot of popularity as they provide location-independent network access between computing devices. There are a number of access methods used in Wireless Networks among which DCF and PCF are the fundamental access methods. This paper emphasizes on the impact of DCF and PCF access mechanisms on the performance of the IEEE 802.11a, 802.11b and 802.11g standards. On the basis of various parameters viz. throughput, delay, load etc performance is evaluated between these three standards using above mentioned access mechanisms. Analysis revealed a superior throughput performance with low delays for 802.11g standard as compared to 802.11 a/b standard using both DCF and PCF access methods.

Keywords: DCF, IEEE, PCF, WLAN

Procedia PDF Downloads 411
636 A Common Automated Programming Platform for Knowledge Based Software Engineering

Authors: Ivan Stanev, Maria Koleva

Abstract:

A common platform for automated programming (CPAP) is defined in details. Two versions of CPAP are described: Cloud-based (including the set of components for classic programming, and the set of components for combined programming) and KBASE based (including the set of components for automated programming, and the set of components for ontology programming). Four KBASE products (module for automated programming of robots, intelligent product manual, intelligent document display, and intelligent form generator) are analyzed and CPAP contributions to automated programming are presented.

Keywords: automated programming, cloud computing, knowledge based software engineering, service oriented architecture

Procedia PDF Downloads 330
635 The Concept of Female Beauty in Contemporary (2000-2020) Fine Arts and Design

Authors: Maria Ukolova

Abstract:

Social and cultural processes over the past decades have largely affected the understanding of conventional female beauty all over the world. Fine arts and design tendencies could not remain unchanged and show a dynamic interplay with female rights, gender equality, and other social processes. As of now, the area lacks comprehensive academic research on the tendencies of understanding female beauty in contemporary art. This article makes an attempt to outline and analyse the main tendencies of contemporary works of art that turn to the image of a woman, including photography, digital art, and various forms of design. The research bases itself on paintings, performing arts, photography, digital art, and various forms of design, mainly on the principle of the most broadly resonated in society, as an empirical basis, and on existing researches in the sphere. The results of the research show a general trend that the concept of female beauty in art is either challenged as such or its understanding has shifted to individuality, diversity, and the state of mental health. However, some categories of art, such as digital art in the gaming industry, remain resistant to change and retain the appearance-based understanding of beauty. Specific tendencies are, firstly, aestheticization of all types of appearances; secondly, a ubiquitous interest in mental health issues and understanding the state of mental health as a part of beauty; thirdly, a certain infantilization of the image of the woman is observed as compared to previous decades. The significance of the findings of the research is to contribute to a scientific understanding of the concept of beauty in contemporary art and to give ground for prospective further related research in sociology, phycology, etc. The findings might be perceived not only by academics but also by artists and practitioners in the spheres of art and society.

Keywords: fine arts, history of art, contemporary art, concept of beauty

Procedia PDF Downloads 78