Search results for: managing code blue
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3179

Search results for: managing code blue

3149 Adsorptive Removal of Methylene Blue Dye from Aqueous Solutions by Leaf and Stem Biochar Derived from Lantana camara: Adsorption Kinetics, Equilibrium, Thermodynamics and Possible Mechanism

Authors: Deepa Kundu, Prabhakar Sharma, Sayan Bhattacharya, Jianying Shang

Abstract:

The discharge of dye-containing effluents in the water bodies has raised concern due to the potential hazards related to their toxicity in the environment. There are various treatment technologies available for the removal of dyes from wastewaters. The use of biosorbent to remove dyes from wastewater is one of the effective and inexpensive techniques. In the study, the adsorption of phenothiazine dye methylene blue onto biosorbent prepared from Lantana camara L. has been studied in aqueous solutions. The batch adsorption experiments were conducted and the effects of various parameters such as pH (3-12), contact time, adsorbent dose (100-400 mg/L), initial dye concentration (5-20 mg/L), and temperature (303, 313 and 323 K) were investigated. The prepared leaf (BCL600) and shoot (BCS600) biochar of Lantana were characterized using FTIR, SEM, elemental analysis, and zeta potential (pH~7). A comparison between the adsorption potential of both the biosorbent was also evaluated. The results indicated that the amount of methylene blue dye (mg/g) adsorbed onto the surface of biochar was highly dependent on the pH of the dye solutions as it increased with an increase in pH from 3 to 12. It was observed that the dye treated with BCS600 and BCL600 attained an equilibrium within 60 and 100 minutes, respectively. The rate of the adsorption process was determined by performing the Lagergren pseudo-first-order and pseudo-second-order kinetics. It was found that dye treated with both BCS600 and BCL600 followed pseudo-second-order kinetics implying the multi-step nature of the adsorption process involving external adsorption and diffusion of dye molecules into the interior of the adsorbents. The data obtained from batch experiments were fitted well with Langmuir and Freundlich isotherms (R² > 0.98) to indicate the multilayer adsorption of dye over the biochar surfaces. The thermodynamic studies revealed that the adsorption process is favourable, spontaneous, and endothermic in nature. Based on the results, the inexpensive and easily available Lantana camara biomass can be used to remove methylene blue dye from wastewater. It can also help in managing the growth of the notorious weed in the environment.

Keywords: adsorption kinetics, biochar, Lantana camara, methylene blue dye, possible mechanism, thermodynamics

Procedia PDF Downloads 136
3148 The Impact of Foliar Application of the Calcium-Containing Compounds in Increasing Resistance to Blue Mold on Apples

Authors: Masoud Baghalian, Musa Arshad

Abstract:

In order to investigate the effect of foliar application of calcium chloride on the resistance of fruits such as Red and Golden Lebanese apple varieties to blue mold, a split plot experiment in time and space, based on accidental blocks, with three replications under foliar application were done (Control, one in a thousand, two in thousands) and the results of the variance analysis showed that there is a significant difference between the levels of foliar and variety at 5% level and between time, there is significant difference in interaction of variety × time and three way interaction of foliar×variety×time, at 1% level. The highest resistance to the blue mold disease in foliar application was observed at two in thousands calcium (calcium chloride) level.

Keywords: apple, blue mold, foliar calcium, resistance

Procedia PDF Downloads 265
3147 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 494
3146 Analyzing the Impact of Code Commenting on Software Quality

Authors: Thulya Premathilake, Tharushi Perera, Hansi Thathsarani, Tharushi Nethmini, Dilshan De Silva, Piyumika Samarasekara

Abstract:

One of the most efficient ways to assist developers in grasping the source code is to make use of comments, which can be found throughout the code. When working in fields such as software development, having comments in your code that are of good quality is a fundamental requirement. Tackling software problems while making use of programs that have already been built. It is essential for the intention of the source code to be made crystal apparent in the comments that are added to the code. This assists programmers in better comprehending the programs they are working on and enables them to complete software maintenance jobs in a more timely manner. In spite of the fact that comments and documentation are meant to improve readability and maintainability, the vast majority of programmers place the majority of their focus on the actual code that is being written. This study provides a complete and comprehensive overview of the previous research that has been conducted on the topic of code comments. The study focuses on four main topics, including automated comment production, comment consistency, comment classification, and comment quality rating. One is able to get the knowledge that is more complete for use in following inquiries if they conduct an analysis of the proper approaches that were used in this study issue.

Keywords: code commenting, source code, software quality, quality assurance

Procedia PDF Downloads 85
3145 Lowering Error Floors by Concatenation of Low-Density Parity-Check and Array Code

Authors: Cinna Soltanpur, Mohammad Ghamari, Behzad Momahed Heravi, Fatemeh Zare

Abstract:

Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.

Keywords: concatenated coding, low–density parity–check codes, array code, error floors

Procedia PDF Downloads 356
3144 Citizens’ Satisfaction with Green and Blue Spaces and Urban Furniture in Sari Iran

Authors: Neda Rezvanisanijouybari

Abstract:

Cities are living and dynamic organisms that can play an essential role in meeting people's psychological and mental needs. The green and blue spaces, including parks, play an important role in meeting those needs, and therefore they should be prioritised in urban planning and designing. Sari city had several city designs and planning projects to expand the green spaces. These included adding more parks and open spaces with new urban furniture in the city and were an important step forward in creating a pleasant urban landscape in the north of Iran. This research used quantitative and qualitative methods to examine whether the citizens of Sari were satisfied with green and blue spaces and new urban furniture in the city or not. From a questionnaire of 120 Sari citizens, it was found that the citizens were generally satisfied with the green and blue spaces and new urban furniture in Sari. It was also found that the favourite park was Mellal park, and the least favourite was Azadegan park. Accessibility, safety, design, facilities, and water source were the most important reason to visit the parks.

Keywords: satisfaction, green, blue, urban furniture

Procedia PDF Downloads 165
3143 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 270
3142 Code Refactoring Using Slice-Based Cohesion Metrics and AOP

Authors: Jagannath Singh, Durga Prasad Mohapatra

Abstract:

Software refactoring is very essential for maintaining the software quality. It is an usual practice that we first design the software and then go for coding. But after coding is completed, if the requirement changes slightly or our expected output is not achieved, then we change the codes. For each small code change, we cannot change the design. In course of time, due to these small changes made to the code, the software design decays. Software refactoring is used to restructure the code in order to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods which requires refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we have used the concepts of Aspects to adjust the code structure so that the external behaviour of the original module does not change.

Keywords: software refactoring, program slicing, AOP, cohesion metrics, code restructure, AspectJ

Procedia PDF Downloads 513
3141 Maximum Distance Separable b-Symbol Repeated-Root γ-Constacylic Codes over a Finite Chain Ring of Length 2

Authors: Jamal Laaouine, Mohammed Elhassani Charkani

Abstract:

Let p be a prime and let b be an integer. MDS b-symbol codes are a direct generalization of MDS codes. The γ-constacyclic codes of length pˢ over the finite commutative chain ring Fₚm [u]/ < u² > had been classified into four distinct types, where is a nonzero element of the field Fₚm. Let C₃ be a code of Type 3. In this paper, we obtain the b-symbol distance db(C₃) of the code C₃. Using this result, necessary and sufficient conditions under which C₃ is an MDS b-symbol code are given.

Keywords: constacyclic code, repeated-root code, maximum distance separable, MDS codes, b-symbol distance, finite chain rings

Procedia PDF Downloads 137
3140 Synthesis and Characterization of TiO₂, N Doped TiO₂ and AG Doped TiO₂ for Photocatalytic Degradation of Methylene Blue in Adwa Almeda Textile Industry, Tigray, Ethiopia

Authors: Mulugeta Gurum Gerechal

Abstract:

Nowadays, the photocatalytic mechanism of water purification using nanoparticles has gained wider acceptance. For this purpose, the crystal form of N- TiO₂ and Ag-TiO₂ was prepared from TiCl₄, urea, NH₄OH, and AgNO₃ by sol-gel method and simple solid phase reaction followed by calcination at a temperature of 400°C for 4h at each. The synthesized photocatalysts were characterized using XRD, SEM, and UV-visible diffuse reflectance spectra. In the experiment, it was found that the absorption edge of N-TiO₂ was an efficient shift to visible light as compared to Ag-TiO₂. The XRD diffraction makes the particle size of N-TiO₂ smaller than Ag-TiO₂. The effect of catalyst loading and the effect of temperature on the photocatalytic efficiency of the prepared samples was tested using methylene blue as a target pollutant. The photocatalytic degradation efficiency of the catalysts for methylene blue was increased from 57.05 to 96.02% under solar radiation as the amount of the catalyst increased from 0.15 to 0.45 gram for N-TiO₂. Similarly, photocatalytic degradation of methylene blue was increased from 40.32 to 81.21% as the amount of Ag-TiO₂ increased from 0.05g to 0.1g. In addition, the photocatalytic degradation efficiency of the catalysts for the removal of methylene blue was increased from 58.00 to 98.00 and 47.00 to 81.21% under solar radiation as the calcination temperature of the catalyst increased from 300 to 500 for N-TiO₂ for Ag-TiO₂ 300 to 400⁰C. However, a further increase in catalyst loading and calcination temperature was found to decrease the degradation efficiency.

Keywords: photocatalysis, degradation, nanoparticles, catalyst loading, calcination, methylene blue

Procedia PDF Downloads 11
3139 Assessment of Metal and Nano-Metal Doped TiO₂ Nanoparticles for Photocatalytic Degradation of Methylene Blue in Almeda Textile Industry, Tigray, Ethiopia

Authors: Mulugeta Gurum Gerechal

Abstract:

Nowadays, the photocatalytic mechanism of water purification using nanoparticles has gained wider acceptance. For this purpose, the Crystal form of N- TiO₂ and Ag-TiO₂ was prepared from TiCl₄, Urea, NH₄OH and AgNO₃ by sol-gel method and simple solid phase reaction followed by calcination at a temperature of 400 °C for 4h at each. The synthesized photocatalysts were characterized using XRD, SEM and UV-visible diffuse reflectance spectra. In the experiment, it was found that the absorption edge of N-TiO₂ was a well efficient shift to visible light as compared to Ag-TiO₂. The XRD diffraction makes the particle size of N-TiO₂ smaller than Ag-TiO₂. The effect of catalyst loading and the effect of temperature on the photocatalytic efficiency of the prepared samples was tested using methylene blue as a target pollutant. The photocatalytic degradation efficiency of the catalysts for methylene blue was increased from 57.05 to 96.02% under solar radiation as the amount of the catalyst increased from 0.15 to 0.45 gram for N-TiO₂. Similarly, photocatalytic degradation of methylene blue was increased from 40.32 to 81.21% as the amount of Ag-TiO₂ increased from 0.05g to 0.1g. In addition, the photocatalytic degradation efficiency of the catalysts for the removal of methylene blue was increased from 58.00 to 98.00 and 47.00 to 81.21 % under solar radiation as the calcination temperature of the catalyst increased from 300 to 500 for N-TiO₂ for Ag-TiO₂ 300 to 4000C. However, a further increase in catalyst loading and calcination temperature was found to decrease the degradation efficiency.

Keywords: photocatalysis, degradation, nanoparticles, catalyst loading, calcination and methylene blue

Procedia PDF Downloads 63
3138 Performance of the SrSnO₃/SnO₂ Nanocomposite Catalyst on the Photocatalytic Degradation of Dyes

Authors: H. Boucheloukh, N. Aoun, M. Denni, A. Mahrouk, T. Sehili

Abstract:

Perovskite materials with strontium alkaline earth metal have attracted researchers in photocatalysis. Thus, nanocomposite-based strontium has been synthesized by the sol-gel method, calciened at 700 °C, and characterized by different methods such as X-ray difraction (DRX), Fourier transformed infrared (FTIR), and diffuse relectance spectroscopy (DRS). After that, the photocatlytic performance of SrNO3/SnO2 has been tested under sunlight in an aqueous solution for two dyes methylene blue and congo-red. The results reveal that 70% of methylene blue has already been degraded after 45 minutes of exposure to sun light, while 80% of Congo red has been eliminated by adsorption on SrSnO₃/SnO₂ in 120 minutes of contact.

Keywords: congo-red, methylene blue, photocatalysis, perovskite

Procedia PDF Downloads 55
3137 Photocatalytic Removal of Methylene Blue Dye: Fabrication and Optimization of Adsorbant Material and a Photocatlyst in Unilayer and Bilayer System

Authors: M. Z. Mahmood, S. Ismail

Abstract:

A reusable immobilized unilayer thin coating of adsorbent material bentonite and photocatalyst (TiO₂) was fabricated on the glass beaker to remove aqueous methylene blue solution. The dye removal efficiency of photocatalyst was much lower with pure titanium dioxide. In the preliminary experiments, different compositions of TiO₂ – bentonite were tested on unilayer and bilayer system, and it was observed that 0.50:0.50 ratios are best for maximum photocatalytic degradation of methylene blue in aqueous medium when applied on unilayer coating system.

Keywords: adsorption, photocatalyst, bentonite, TiO₂

Procedia PDF Downloads 105
3136 A Thematic Analysis of Aging in Blue Zone Regions: Lessons from Okinawa and the Nicoya Peninsula

Authors: Theresa MacNeil-Kelly

Abstract:

Blue Zones are particular regions of the world with a high prevalence of centenarians who share common characteristics, lifestyles and environments. There are currently only five recognized Blue Zones, two of which include Okinawa, Japan and the Nicoya Peninsula in Costa Rica. Individuals living in these areas tend to have positive outlooks on life, utilize daily movement, rely on strong social support groups, and eat little to no processed foods. The current research sought to further understand how centenarians living in Okinawa and in the Nicoya Peninsula utilize Blue Zone lifestyle elements in their daily living habits. To accomplish this, the author traveled to both Okinawa and the Nicoya Peninsula, Costa Rica, and interviewed several centenarians, paying particular attention to lifestyle choices and their effects on the aging process. Thematic analysis was used to analyze interview responses, and several themes emerged, such as the importance of family, friends, faith/spirituality, mindfulness, nutrition and daily movement as key foundations to aging in healthy and productive ways. Suggestions for ways to implement these habits globally was also discussed.

Keywords: aging, blue zones, centenarians, nicoya peninsula, okinawa

Procedia PDF Downloads 257
3135 Determining Antecedents of Employee Turnover: A Study on Blue Collar vs White Collar Workers on Marco Level

Authors: Evy Rombaut, Marie-Anne Guerry

Abstract:

Predicting voluntary turnover of employees is an important topic of study, both in academia and industry. Researchers try to uncover determinants for a broader understanding and possible prevention of turnover. In the current study, we use a data set based approach to reveal determinants for turnover, differing for blue and white collar workers. Our data set based approach made it possible to study actual turnover for more than 500000 employees in 15692 Belgian corporations. We use logistic regression to calculate individual turnover probabilities and test the goodness of our model with the AUC (area under the ROC-curve) method. The results of the study confirm the relationship of known determinants to employee turnover such as age, seniority, pay and work distance. In addition, the study unravels unknown and verifies known differences between blue and white collar workers. It shows opposite relationships to turnover for gender, marital status, the number of children, nationality, and pay.

Keywords: employee turnover, blue collar, white collar, dataset analysis

Procedia PDF Downloads 291
3134 Large-Scale Simulations of Turbulence Using Discontinuous Spectral Element Method

Authors: A. Peyvan, D. Li, J. Komperda, F. Mashayek

Abstract:

Turbulence can be observed in a variety fluid motions in nature and industrial applications. Recent investment in high-speed aircraft and propulsion systems has revitalized fundamental research on turbulent flows. In these systems, capturing chaotic fluid structures with different length and time scales is accomplished through the Direct Numerical Simulation (DNS) approach since it accurately simulates flows down to smallest dissipative scales, i.e., Kolmogorov’s scales. The discontinuous spectral element method (DSEM) is a high-order technique that uses spectral functions for approximating the solution. The DSEM code has been developed by our research group over the course of more than two decades. Recently, the code has been improved to run large cases in the order of billions of solution points. Running big simulations requires a considerable amount of RAM. Therefore, the DSEM code must be highly parallelized and able to start on multiple computational nodes on an HPC cluster with distributed memory. However, some pre-processing procedures, such as determining global element information, creating a global face list, and assigning global partitioning and element connection information of the domain for communication, must be done sequentially with a single processing core. A separate code has been written to perform the pre-processing procedures on a local machine. It stores the minimum amount of information that is required for the DSEM code to start in parallel, extracted from the mesh file, into text files (pre-files). It packs integer type information with a Stream Binary format in pre-files that are portable between machines. The files are generated to ensure fast read performance on different file-systems, such as Lustre and General Parallel File System (GPFS). A new subroutine has been added to the DSEM code to read the startup files using parallel MPI I/O, for Lustre, in a way that each MPI rank acquires its information from the file in parallel. In case of GPFS, in each computational node, a single MPI rank reads data from the file, which is specifically generated for the computational node, and send them to other ranks on the node using point to point non-blocking MPI communication. This way, communication takes place locally on each node and signals do not cross the switches of the cluster. The read subroutine has been tested on Argonne National Laboratory’s Mira (GPFS), National Center for Supercomputing Application’s Blue Waters (Lustre), San Diego Supercomputer Center’s Comet (Lustre), and UIC’s Extreme (Lustre). The tests showed that one file per node is suited for GPFS and parallel MPI I/O is the best choice for Lustre file system. The DSEM code relies on heavily optimized linear algebra operation such as matrix-matrix and matrix-vector products for calculation of the solution in every time-step. For this, the code can either make use of its matrix math library, BLAS, Intel MKL, or ATLAS. This fact and the discontinuous nature of the method makes the DSEM code run efficiently in parallel. The results of weak scaling tests performed on Blue Waters showed a scalable and efficient performance of the code in parallel computing.

Keywords: computational fluid dynamics, direct numerical simulation, spectral element, turbulent flow

Procedia PDF Downloads 133
3133 A Characterization of Skew Cyclic Code with Complementary Dual

Authors: Eusebio Jr. Lina, Ederlina Nocon

Abstract:

Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/〈x^n-1〉, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given.

Keywords: LCD cyclic codes, skew cyclic LCD codes, skew cyclic complementary dual codes, theta-cyclic codes with complementary duals

Procedia PDF Downloads 345
3132 Performance Analysis and Comparison of Various 1-D and 2-D Prime Codes for OCDMA Systems

Authors: Gurjit Kaur, Shashank Johri, Arpit Mehrotra

Abstract:

In this paper we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension i.e. time slots whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for OCDMA system on a single platform. Results shows that 1D Extended Prime Code (EPC) can support more number of active users compared to other codes but at the expense of larger code length which further increases the complexity of the code. Modified Prime Code (MPC) supports lesser number of active users at λc=2 but it has a lesser code length as compared to 1D prime code. Analysis shows that 2D prime code supports lesser number of active users than 1D codes but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 510
3131 The Effect of the 2015 Revision to the Corporate Governance Code on Japanese Listed Firms

Authors: Tomotaka Yanagida

Abstract:

The Corporate Governance Code, revised in 2015, requires firms listed within the first and second sections of Japan’s Tokyo stock exchange to select two or more independent outside directors (the Corporate Governance Code4-8). Therefore, Japanese listed firms must do this or explain the reason why they are not able to do so. This study investigates how the Corporate Governance Code affects Japanese listed firms. We find that the Corporate Governance Code increases the ratio of outside directors by nearly 8.8% for a sample of Japanese firms comprising nearly 4,200 firm-year observations from 2014 to 2015 using a difference-in-differences approach. This implies that they felt it would have been difficult to explain why it was not appropriate to have an outside director at the annual shareholders' meeting. Moreover, this suggests that they appoint outside directors as defined by the Corporate Governance Code, but maintain board size. This situation shows that compliance in Japan may simply be 'window dressing,' that is, more form than substance.

Keywords: board structure, comply or explain, corporate governance code, soft law

Procedia PDF Downloads 173
3130 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms

Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid

Abstract:

Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code switching literature reveals that mostly code switching has been studied in classroom in learning and teaching context while code switching outside classroom in settings such as café, hostel and so on have been the least explored areas. Current research investigated the reasons for code switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different class room situations. In Pakistani classrooms where Multilingual are in abundance i.e. they can speak two or more than two languages at the same time, the code switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the class rooms. This phenomenon has not been explored in the Sialkot’s teaching context. In Sialkot private educational institutes does not encourage code-switching whereas the public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code switching by taking its users in consideration. Survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.

Keywords: code switching, bilingual context, L1, L2

Procedia PDF Downloads 65
3129 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 158
3128 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms

Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid

Abstract:

Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code-switching literature reveals that mostly code-switching has been studied in the classrooms in learning and teaching contexts, while code-switching outside the classroom in settings such as café, hostels and so on has been the least explored areas. The current research investigated the reasons for code-switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different classroom situations. In Pakistani classrooms where Multilingual is in abundance, i.e. they can speak two or more two languages at the same time, code-switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the classrooms. This phenomenon has not been explored in Sialkot’s teaching context. In Sialkot, private educational institutes do not encourage code-switching, whereas public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code-switching by taking its users into consideration. The survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.

Keywords: code switching, foreign language classrooms, bilingual context, use of L1, importance of L2.

Procedia PDF Downloads 66
3127 Code – Switching in a Flipped Classroom for Foreign Students

Authors: E. Tutova, Y. Ebzeeva, L. Gishkaeva, Y.Smirnova, N. Dubinina

Abstract:

We have been working with students from different countries and found it crucial to switch the languages to explain something. Whether it is Russian, or Chinese, explaining in a different language plays an important role for students’ cognitive abilities. In this work we are going to explore how code switching may impact the student’s perception of information. Code-switching is a tool defined by linguists as a switch from one language to another for convenience, explanation of terms unavailable in an initial language or sometimes prestige. In our case, we are going to consider code-switching from the function of convenience. As a rule, students who come to study Russian in a language environment, lack many skills in speaking the language. Thus, it is made harder to explain the rules for them of another language, which is English. That is why switching between English, Russian and Mandarin is crucial for their better understanding. In this work we are going to explore the code-switching as a tool which can help a teacher in a flipped classroom.

Keywords: bilingualism, psychological linguistics, code-switching, social linguistics

Procedia PDF Downloads 81
3126 Optimization of Steel Moment Frame Structures Using Genetic Algorithm

Authors: Mohammad Befkin, Alireza Momtaz

Abstract:

Structural design is the challenging aspect of every project due to limitations in dimensions, functionality of the structure, and more importantly, the allocated budget for construction. This research study aims to investigate the optimized design for three steel moment frame buildings with different number of stories using genetic algorithm code. The number and length of spans, and height of each floor were constant in all three buildings. The design of structures are carried out according to AISC code within the provisions of plastic design with allowable stress values. Genetic code for optimization is produced using MATLAB program, while buildings modeled in Opensees program and connected to the MATLAB code to perform iterations in optimization steps. In the end designs resulted from genetic algorithm code were compared with the analysis of buildings in ETABS program. The results demonstrated that suggested structural elements by the code utilize their full capacity, indicating the desirable efficiency of produced code.

Keywords: genetic algorithm, structural analysis, steel moment frame, structural design

Procedia PDF Downloads 118
3125 Intrathecal: Not Intravenous Administration of Evans Blue Reduces Pain Behavior in Neuropathic Rats

Authors: Kun Hua O., Dong Woon Kim, Won Hyung Lee

Abstract:

Introduction: Neuropathic pain induced by spinal or peripheral nerve injury is highly resistant to common painkillers, nerve blocks, and other pain management approaches. Recently, several new therapeutic drug candidates have been developed to control neuropathic pain. In this study, we used the spinal nerve L5 ligation (SNL) model to investigate the ability of intrathecal or intravenous Evans blue to decrease pain behavior and to study the relationship between Evans blue and the neural structure of pain transmission. Method: Neuropathic pain (allodynia) of the left hind paw was induced by unilateral SNL in Sprague-Dawley rats(n=10) in each group. Evans blue (5, 15, 50μg/10μl) or phosphate buffer saline(PBS,10μl) was injected intrathecally at 3days post-ligation or intravenously(1mg/200 μl) 3days and 5days post-ligation . Mechanical sensitivity was assessed using Von Frey filaments at 3 days post-ligation and at 2 hours, days 1, 2, 3, 5,7 after intrathecal Evans blue injection, and on days 2, 4, 7, and 11 at 14 days after intravenous injection. In the intrathecal group, microglia and glutaminergic neurons in the dorsal horn and VNUT(vesicular nucleotide transporter) in the dorsal root ganglia were tested to evaluate co-staining with Evans blue. The experimental procedures were performed in accordance with the animal care guideline of the Korean Academy of Medical Science(Animal ethic committee of Chungnam National University Hospital: CNUH-014-A0005-1). Results: Tight ligation of the L5 spinal nerve induced allodynia in the left hind paw 3 days post-ligation. Intrathecal Evans blue most significantly(P<0.001) alleviated allodynia at 2 days after intrathecal, but not an intravenous injection. Glutaminergic neurons in the dorsal horn and VNUT in the dorsal root ganglia were co-stained with Evans blue. On the other hand, microglia in the dorsal horn were partially co-stained with Evans blue. Conclusion: We confirmed that Evans blue might have an analgesic effect through the central nervous system, not another system in neuropathic pain of the SNL animal model. These results suggest Evans blue may be a potential new drug for the treatment of chronic pain. This research was supported by the National Research Foundation of Korea (NRF-2020R1A2C100757512), funded by the Ministry of Education.

Keywords: neuropathic pain, Evas blue, intrathecal, intravenous

Procedia PDF Downloads 94
3124 Colour Quick Response Code with High Damage Resistance Capability

Authors: Minh Nguyen

Abstract:

Today, QR or Quick Response Codes are prevalent, and mobile/smart devices can efficiently read and understand them. Therefore, we can see their appearance in many areas, such as storing web pages/websites, business phone numbers, redirecting to an app download, business location, social media. The popularity of the QR Code is mainly because of its many advantages, such as it can hold a good amount of information, is small, easy to scan and read by a general RGB camera, and it can still work with some damages on its surface. However, there are still some issues. For instance, some areas needed to be kept untouched for its successful decode (e.g., the “Finder Patterns,” the “Quiet Zone,” etc.), the capability of built-in auto-correction is not robust enough, and it is not flexible enough for many application such as Augment Reality (AR). We proposed a new Colour Quick Response Code that has several advantages over the original ones: (1) there is no untouchable area, (2) it allows up to 40% of the entire code area to be damaged, (3) it is more beneficial for Augmented Reality applications, and (4) it is back-compatible and readable by available QR Code scanners such as Pyzbar. From our experience, our Colour Quick Response Code is significantly more flexible on damage compared to the original QR Code. Our code is believed to be suitable in situations where standard 2D Barcodes fail to work, such as curved and shiny surfaces, for instance, medical blood test sample tubes and syringes.

Keywords: QR code, computer vision, image processing, 2D barcode

Procedia PDF Downloads 118
3123 Counterfeit Product Detection Using Block Chain

Authors: Sharanya C. H., Pragathi M., Vathsala R. S., Theja K. V., Yashaswini S.

Abstract:

Identifying counterfeit products have become increasingly important in the product manufacturing industries in recent decades. This current ongoing product issue of counterfeiting has an impact on company sales and profits. To address the aforementioned issue, a functional blockchain technology was implemented, which effectively prevents the product from being counterfeited. By utilizing the blockchain technology, consumers are no longer required to rely on third parties to determine the authenticity of the product being purchased. Blockchain is a distributed database that stores data records known as blocks and several databases known as chains across various networks. Counterfeit products are identified using a QR code reader, and the product's QR code is linked to the blockchain management system. It compares the unique code obtained from the customer to the stored unique code to determine whether or not the product is original.

Keywords: blockchain, ethereum, QR code

Procedia PDF Downloads 177
3122 Removal of Samarium in Environmental Water Samples by Modified Yeast Cells

Authors: Homayon Ahmad Panahi, Seyed Mehdi Seyed Nejad, Elham Moniri

Abstract:

A novel bio-adsorbent is fabricated by attaching a cibacron blue to yeast cells. The modified bio-sorbent has been characterized by some techniques like Fourier transform infrared spectroscopy (FT-IR) and elemental analysis (CHN) and applied for the preconcentration and determination of samarium from aqueous water samples. The best pH value for adsorption of the brilliant crecyle blue by yeast cells- cibacron blue was 7. The sorption capacity of modified biosorbent was 18.5 mg. g⁻¹. A recovery of 95.3% was obtained for Sm(III) when eluted with 0.5 M nitric acid. The method was applied for Sm(III) preconcentration and determination in river water sample.

Keywords: samarium, solid phase extraction, yeast cells, water sample, removal

Procedia PDF Downloads 255
3121 Fingerprint on Ballistic after Shooting

Authors: Narong Kulnides

Abstract:

This research involved fingerprints on ballistics after shooting. Two objectives of research were as follows; (1) to study the duration of the existence of latent fingerprints on .38, .45, 9 mm and .223 cartridge case after shooting, and (2) to compare the effectiveness of the detection of latent fingerprints by Black Powder, Super Glue, Perma Blue and Gun Bluing. The latent fingerprint appearance were studied on .38, .45, 9 mm. and .223 cartridge cases before and after shooting with Black Powder, Super Glue, Perma Blue and Gun Bluing. The detection times were 3 minute, 6, 12, 18, 24, 30, 36, 42, 48, 54, 60, 66, 72, 78 and 84 hours respectively. As a result of the study, it can be conclude that: (1) Before shooting, the detection of latent fingerprints on 38, .45, and 9 mm. and .223 cartridge cases with Black Powder, Super Glue, Perma Blue and Gun Bluing can detect the fingerprints at all detection times. (2) After shooting, the detection of latent fingerprints on .38, .45, 9 mm. and .223 cartridge cases with Black Powder, Super Glue did not appear. The detection of latent fingerprints on .38, .45, 9 mm. cartridge cases with Perma Blue and Gun Bluing were found 100% of the time and the detection of latent fingerprints on .223 cartridge cases with Perma Blue and Gun Bluing were found 40% and 46.67% of the time, respectively.

Keywords: ballistic, fingerprint, shooting, detection times

Procedia PDF Downloads 418
3120 On the Construction of Some Optimal Binary Linear Codes

Authors: Skezeer John B. Paz, Ederlina G. Nocon

Abstract:

Finding an optimal binary linear code is a central problem in coding theory. A binary linear code C = [n, k, d] is called optimal if there is no linear code with higher minimum distance d given the length n and the dimension k. There are bounds giving limits for the minimum distance d of a linear code of fixed length n and dimension k. The lower bound which can be taken by construction process tells that there is a known linear code having this minimum distance. The upper bound is given by theoretic results such as Griesmer bound. One way to find an optimal binary linear code is to make the lower bound of d equal to its higher bound. That is, to construct a binary linear code which achieves the highest possible value of its minimum distance d, given n and k. Some optimal binary linear codes were presented by Andries Brouwer in his published table on bounds of the minimum distance d of binary linear codes for 1 ≤ n ≤ 256 and k ≤ n. This was further improved by Markus Grassl by giving a detailed construction process for each code exhibiting the lower bound. In this paper, we construct new optimal binary linear codes by using some construction processes on existing binary linear codes. Particularly, we developed an algorithm applied to the codes already constructed to extend the list of optimal binary linear codes up to 257 ≤ n ≤ 300 for k ≤ 7.

Keywords: bounds of linear codes, Griesmer bound, construction of linear codes, optimal binary linear codes

Procedia PDF Downloads 755