Search results for: adversarial examples
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1362

Search results for: adversarial examples

792 [Keynote Talk]: Animation of Objects on the Website by Application of CSS3 Language

Authors: Vladimir Simovic, Matija Varga, Robert Svetlacic

Abstract:

Scientific work analytically explores and demonstrates techniques that can animate objects and geometric characters using CSS3 language by applying proper formatting and positioning of elements. This paper presents examples of optimum application of the CSS3 descriptive language when generating general web animations (e.g., billiards and movement of geometric characters, etc.). The paper presents analytically, the optimal development and animation design with the frames within which the animated objects are. The originally developed content is based on the upgrading of existing CSS3 descriptive language animations with more complex syntax and project-oriented work. The purpose of the developed animations is to provide an overview of the interactive features of CSS3 descriptive language design for computer games and the animation of important analytical data based on the web view. It has been analytically demonstrated that CSS3 as a descriptive language allows inserting of various multimedia elements into websites for public and internal sites.

Keywords: web animation recording, KML GML HTML5 forms, Cascading Style Sheets 3, Google Earth Professional

Procedia PDF Downloads 316
791 The Use of Different Methodological Approaches to Teaching Mathematics at Secondary Level

Authors: M. Rodionov, N. Sharapova, Z. Dedovets

Abstract:

The article describes methods of preparation of future teachers that includes the entire diversity of traditional and computer-oriented methodological approaches. The authors reveal how, in the specific educational environment, a teacher can choose the most effective combination of educational technologies based on the nature of the learning task. The key conditions that determine such a choice are that the methodological approach corresponds to the specificity of the problem being solved and that it is also responsive to the individual characteristics of the students. The article refers to the training of students in the proper use of mathematical electronic tools for educational purposes. The preparation of future mathematics teachers should be a step-by-step process, building on specific examples. At the first stage, students optimally solve problems aided by electronic means of teaching. At the second stage, the main emphasis is on modeling lessons. At the third stage, students develop and implement strategies in the study of one of the topics within a school mathematics curriculum. The article also recommended the implementation of this strategy in preparation of future teachers and stated the possible benefits.

Keywords: education, methodological approaches, teacher, secondary school

Procedia PDF Downloads 157
790 Canned Sealless Pumps for Hazardous Applications

Authors: Shuja Alharbi

Abstract:

Oil and Gas industry has many applications considered as toxic or hazardous, where process fluid leakage is not permitted and leads to health, safety, and environmental impacts. Caustic/Acidic applications, High Benzene Concentrations, Hydrogen sulfide rich oil/gas as well as liquids operating above their auto-ignition temperatures are examples of such liquids that pose as a risk to the industry operation, and for those, special arrangements are in place to allow for the safe operation environment. Pumps in the industry requires special attention, specifically in the interface between the fluid and the environment, where the potential of leakages are foreseen. Mechanical Seals are used to contain the fluid within the equipment, but the prices are ever increasing for such seals, along with maintenance, design, and operating requirements. Several alternatives to seals are being employed nowadays, such as Sealless systems, which is hermitically sealed from the atmosphere and does not require sealing. This technology is considered relatively new and requires more studies to understand the limitations and factors associated from an owner and design perspective. Things like financial factors, maintenance factors, and design limitation should be studies further in order to have a mature and reliable technical solution available to end users.

Keywords: pump, sealless, selection, failure

Procedia PDF Downloads 82
789 Numerical Applications of Tikhonov Regularization for the Fourier Multiplier Operators

Authors: Fethi Soltani, Adel Almarashi, Idir Mechai

Abstract:

Tikhonov regularization and reproducing kernels are the most popular approaches to solve ill-posed problems in computational mathematics and applications. And the Fourier multiplier operators are an essential tool to extend some known linear transforms in Euclidean Fourier analysis, as: Weierstrass transform, Poisson integral, Hilbert transform, Riesz transforms, Bochner-Riesz mean operators, partial Fourier integral, Riesz potential, Bessel potential, etc. Using the theory of reproducing kernels, we construct a simple and efficient representations for some class of Fourier multiplier operators Tm on the Paley-Wiener space Hh. In addition, we give an error estimate formula for the approximation and obtain some convergence results as the parameters and the independent variables approaches zero. Furthermore, using numerical quadrature integration rules to compute single and multiple integrals, we give numerical examples and we write explicitly the extremal function and the corresponding Fourier multiplier operators.

Keywords: fourier multiplier operators, Gauss-Kronrod method of integration, Paley-Wiener space, Tikhonov regularization

Procedia PDF Downloads 298
788 A Comprehensive Model of Professional Ethics Based on the Teachings of the Holy Quran

Authors: Zahra Mohagheghian, Fatema Agharebparast

Abstract:

Professional ethic is a subject that has been an issue today, so most of the businesses, including the teaching profession, understand the need and importance of it. So they need to develop a code of professional ethics for their own. In this regard, this study seeks to answer the question, with respect to the integrity of the Qur'an (Nahl / 89), is it possible to contemplate the divine teachers conduct to extract the divine pattern for teaching and training? In the code of conduct for divine teachers what are the most important moral obligations and duties of the teaching professionals? The results of this study show that the teaching of Khidr, according to the Quran’s verses, Abundant and subtle hints emphasized that it can be as comprehensive and divine pattern used in teaching and in the drafting of the charter of professional ethics of teachers used it. Also, the results show that in there have been many ethical principles in prophet Khidr’s teaching pattern.The most important ethical principles include: Student assessment, using objective and not subjective examples, assessment during teaching, flexibility, and others. According to each of these principles can help teachers achieve their educational goals and lead human being in their path toward spiritual evaluation.

Keywords: professional ethics, teaching-learning process, teacher, student, Quran

Procedia PDF Downloads 277
787 A Family of Second Derivative Methods for Numerical Integration of Stiff Initial Value Problems in Ordinary Differential Equations

Authors: Luke Ukpebor, C. E. Abhulimen

Abstract:

Stiff initial value problems in ordinary differential equations are problems for which a typical solution is rapidly decaying exponentially, and their numerical investigations are very tedious. Conventional numerical integration solvers cannot cope effectively with stiff problems as they lack adequate stability characteristics. In this article, we developed a new family of four-step second derivative exponentially fitted method of order six for the numerical integration of stiff initial value problem of general first order differential equations. In deriving our method, we employed the idea of breaking down the general multi-derivative multistep method into predator and corrector schemes which possess free parameters that allow for automatic fitting into exponential functions. The stability analysis of the method was discussed and the method was implemented with numerical examples. The result shows that the method is A-stable and competes favorably with existing methods in terms of efficiency and accuracy.

Keywords: A-stable, exponentially fitted, four step, predator-corrector, second derivative, stiff initial value problems

Procedia PDF Downloads 240
786 What Defines Acceptable European Values for Georgia

Authors: Maia Kipiani, Tamari Beridze, Natalia Tchanturia, Bella Goderdzishvili, Sophio Beridze, Natia Kuparadze

Abstract:

Europe has concrete examples how small nations can survive and maintain their identity in its area. Values are eternal guides of our life and source of its perfection. European values are universal and relevant for every epoch, society or state. Values, such as personal freedom, human dignity, sovereignty of law, national or cultural identity are universal and eternal. Even superficial review of history of Georgian culture clearly shows that western values, including fundamental human rights. This paper discusses the approach and findings of choice of values in Georgia. Georgia is still quite far away from perfectly established values. Georgia has walked the hardest road till XXI century. Country survived miraculously many times. The study shows that the only way to survive is to strengthen national, traditional values and should not forget global factors. It is clear that for achievement of goals is important European education, legislative and economic reforms, peacefully and democratically develop Georgia.

Keywords: democracy, economical reforms, European values, human dignity, science, society, sovereignty of law, well-being

Procedia PDF Downloads 426
785 Female Subjectivity in William Faulkner's Light in August

Authors: Azza Zagouani

Abstract:

Introduction: In the work of William Faulkner, characters often evade the boundaries and categories of patriarchal standards of order. Female characters like Lena Grove and Joanna Burden cross thresholds in attempts to gain liberation, while others fail to do so. They stand as non-conformists and refuse established patterns of feminine behavior, such as marriage and motherhood after. They refute submissiveness, domesticity and abstinence to reshape their own identities. The presence of independent and creative women represents new, unconventional images of female subjectivity. This paper will examine the structures of submission and oppression faced by Lena and Joanna, and will show how, in the end, they reshape themselves and their identities, and disrupt or even destroy patriarchal structures. Objectives: Participants will understand through the examples of Lena Grove and Joanna Burden that female subjectivities are constructions, and are constantly subject to change. Approaches: Two approaches will be used in the analysis of the subjectivity formation of Lena Grove and Joanna Burden. Following the arguments propounded by Judith Butler, We explore the ways in which Lena Grove maneuvers around the restrictions and the limitations imposed on her without any physical or psychological violence. She does this by properly performing the roles prescribed to her gendered body. Her repetitious performances of these roles are both the ones that are constructed to confine women and the vehicle for her travel. Her performance parodies the prescriptive roles and thereby reveals that they are cultural constructions. Second, We will explore the argument propounded by Kristeva that subjectivity is always in a state of development because we are always changing in context with changing circumstances. For example, in Light in August, Lena Grove changes the way she defines herself in light of the events of the novel. Also, Kristeva talks about stages of development: the semiotic stage and the symbolic stage. In Light in August, Joanna shows different levels of subjectivity as time passes. Early in the novel, Joanna is very connected to her upbringing. This suggests Kristeva’s concept of the semiotic, in which the daughter identifies closely to her parents. Kristeva relates the semiotic to a strong daughter/mother connection, but in the novel it is strong daughter/father/grandfather identification instead. Then as Joanna becomes sexually involved with Joe, she breaks off, and seems to go into an identity crisis. To me, this represents Kristeva’s move from the semiotic to the symbolic. When Joanna returns to a religious fanaticism, she is returning to a semiotic state. Detailed outline: At the outset of this paper, We will investigate the subjugation of women: social constraints, and the formation of the feminine identity in Light in August. Then, through the examples of Lena Grove’s attempt to cross the boundaries of community moralities and Joanna Burden’s refusal to submit to the standards of submissiveness, domesticity, and obstinance, We will reveal the tension between progressive conceptions of individual freedom and social constraints that limit this freedom. In the second part of the paper, We will underscore the rhetoric of femininity in Light in August: subjugation through naming. The implications of both female’s names offer a powerful contrast between the two different forms of subjectivity. Conclusion: Through Faulkner’s novel, We demonstrate that female subjectivity is an open-ended issue. The spiral shaping of its form maintains its characteristics as a process changing according to different circumstances.

Keywords: female subjectivity, Faulkner’s light August, gender, sexuality, diversity

Procedia PDF Downloads 371
784 The Effects of 2016 Rio Olympics as Nation's Soft Power Strategy

Authors: Keunsu Han

Abstract:

Sports has been used as a valuable tool for countries to enhance brand image and to pursue higher political interests. Olympic games are one of the best examples as a mega sport event to achieve such nations’ purposes. The term, “soft power,” coined by Nye, refers to country’s ability to persuade and attract foreign audiences through non-coercive ways such as cultural, diplomatic, and economic means. This concept of soft power provides significant answers about why countries are willing to host a mega sport event such as Olympics. This paper reviews the concept of soft power by Nye as a theoretical framework of this study to understand critical motivation for countries to host Olympics and examines the effects of 2016 Rio Olympics as the state’s soft power strategy. Thorough data analysis including media, government and private-sector documents, this research analyzes both negative and positive aspects of the nation’s image created during Rio Olympics and discusses the effects of Rio Olympics as Brazil’s chance to showcase its soft power by highlighting the best the state has to present.

Keywords: country brand, olympics, soft power, sport diplomacy, mega sport event

Procedia PDF Downloads 442
783 Three-Stage Mining Metals Supply Chain Coordination and Product Quality Improvement with Revenue Sharing Contract

Authors: Hamed Homaei, Iraj Mahdavi, Ali Tajdin

Abstract:

One of the main concerns of miners is to increase the quality level of their products because the mining metals price depends on their quality level; however, increasing the quality level of these products has different costs at different levels of the supply chain. These costs usually increase after extractor level. This paper studies the coordination issue of a decentralized three-level supply chain with one supplier (extractor), one mineral processor and one manufacturer in which the increasing product quality level cost at the processor level is higher than the supplier and at the level of the manufacturer is more than the processor. We identify the optimal product quality level for each supply chain member by designing a revenue sharing contract. Finally, numerical examples show that the designed contract not only increases the final product quality level but also provides a win-win condition for all supply chain members and increases the whole supply chain profit.

Keywords: three-stage supply chain, product quality improvement, channel coordination, revenue sharing

Procedia PDF Downloads 169
782 Review of Research on Waste Plastic Modified Asphalt

Authors: Song Xinze, Cai Kejian

Abstract:

To further explore the application of waste plastics in asphalt pavement, this paper begins with the classification and characteristics of waste plastics. It then provides a state-of-the-art review of the preparation methods and processes of waste plastic modifiers, waste plastic-modified asphalt, and waste plastic-modified asphalt mixtures. The paper also analyzes the factors influencing the compatibility between waste plastics and asphalt and summarizes the performance evaluation indicators for waste plastic-modified asphalt and its mixtures. It explores the research approaches and findings of domestic and international scholars and presents examples of waste plastics applications in pavement engineering. The author believes that there is a basic consensus that waste plastics can improve the high-temperature performance of asphalt. The use of cracking processes to solve the storage stability of waste plastic polymer-modified asphalt is the key to promoting its application. Additionally, the author anticipates that future research will concentrate on optimizing the recycling, processing, screening, and preparation of waste plastics, along with developing composite plastic modifiers to improve their compatibility and long-term performance in asphalt pavements.

Keywords: waste plastics, asphalt pavement, asphalt performance, asphalt modification

Procedia PDF Downloads 17
781 Analysis of the Plastic Zone Under Mixed Mode Fracture in Bonded Composite Repair of Aircraft

Authors: W. Oudad, H. Fikirini, K. Boulenouar

Abstract:

Material fracture by opening (mode I) is not alone responsible for fracture propagation. Many industrial examples show the presence of mode II and mixed mode I + II. In the present work the three-dimensional and non-linear finite element method is used to estimate the performance of the bonded composite repair of metallic aircraft structures by analyzing the plastic zone size ahead of repaired cracks under mixed mode loading. The computations are made according to Von Mises and Tresca criteria. The extension of the plastic zone which takes place at the tip of a crack strictly depends on many variables, such as the yield stress of the material, the loading conditions, the crack size and the thickness of the cracked component, The obtained results show that the presence of the composite patch reduces considerably the size of the plastic zone ahead of the crack. The effects of the composite orientation layup (adhesive properties) and the patch thickness on the plastic zone size ahead of repaired cracks were analyzed.

Keywords: crack, elastic-plastic, J integral, patch, plastic zone

Procedia PDF Downloads 427
780 Crack Width Evaluation for Flexural RC Members with Axial Tension

Authors: Sukrit Ghorai

Abstract:

Proof of controlling crack width is a basic condition for securing suitable performance in serviceability limit state. The cracking in concrete can occur at any time from the casting of time to the years after the concrete has been set in place. Most codes struggle with offering procedure for crack width calculation. There is lack in availability of design charts for designers to compute crack width with ease. The focus of the study is to utilize design charts and parametric equations in calculating crack width with minimum error. The paper contains a simplified procedure to calculate crack width for reinforced concrete (RC) sections subjected to bending with axial tensile force following the guidelines of Euro code [DS EN-1992-1-1 & DS EN-1992-1-2]. Numerical examples demonstrate the application of the suggested procedure. Comparison with parallel analytical tools support the validity of result and show the percentage deviation of crack width in both the procedures. The technique is simple, user-friendly and ready to evolve for a greater spectrum of section sizes and materials.

Keywords: concrete structures, crack width calculation, serviceability limit state, structural design, bridge engineering

Procedia PDF Downloads 370
779 On Demand Transport: Feasibility Study - Local Needs and Capabilities within the Oran Wilaya

Authors: Nadjet Brahmia

Abstract:

The evolution of urban forms, the new aspects of mobility, the ways of life and economic models make public transport conventional collective low-performing on the majority of largest Algerian cities, particularly in the west of Algeria. On the other side, the information and communication technologies (ICT) open new eventualities to develop a new mode of transport which brings together both the tenders offered by the public service collective and those of the particular vehicle, suitable for urban requirements, social and environmental. Like the concrete examples made in the international countries in terms of on-demand transport systems (ODT) more particularly in the developed countries, this article has for objective the opportunity analysis to establish a service of ODT at the level of a few towns of Oran Wilaya, such a service will be subsequently spread on the totality of the Wilaya if not on the whole of Algeria. In this context, we show the different existing means of transport in the current network whose aim to illustrate the points of insufficiency accented in the present transport system, then we discuss the solutions that may exhibit a service of ODT to the problem studied all around the transport sector, to carry at the end to highlight the capabilities of ODT replying to the transformation of mobilities, this in the light of well-defined cases.

Keywords: mobility, on-demand transport, public transport collective, transport system

Procedia PDF Downloads 339
778 PrEP and Risk: Challenges for an Emerging Sanitary Pact

Authors: Roberto Rubem Silva-Brandao, Aurea Maria Zollner Ianni

Abstract:

This article discusses the use and the incorporation of Pre-exposure Prophylaxis for HIV (PrEP) within a risk society context. Considering contemporary social theoreticians, we discuss implications of biotechnological uses for health enhancement. Firstly, we explore examples of biological manipulation and its consequences of use on given ecological dynamics, particularly taking into account other Sexually Transmitted Infections. In addition, we discuss how HIV resistance cases occurred with people on PrEP and its possible consequences on population-based interventions. Moreover, we present recent studies that analyze biological modifications on bodies of those who are on consistent use of PrEP, and how these body modifications are addressed on common practices of Public Health. Secondly, we present our theoretical references, which are intended to the analysis that situates our contemporary society in the reflexive stage of modernization. We discuss limits of biological use by individuals and how this can fabric feelings of freedom and autonomy within the individualization process and health. Finally, we argue that biotechnological uses on health, specifically on Public Health, tackling the risk aspects of its application, shows that another sanitary pact is needed.

Keywords: PrEP, public health, social sciences, risk society

Procedia PDF Downloads 372
777 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 549
776 An Exploratory Study into the Suggestive Impact of Alaa Al-Aswany's Political Essays

Authors: Valerii Dudin

Abstract:

With the continuous increase in quantity and importance of the information surrounding our daily lives, it has become crucial to understand what makes information stand out and affect our point of view, regardless of the accuracy of the facts involved. Alaa Al-Aswany’s numerous works have been an inspiration for millions of his readers in Egypt and all across the Arab World. While highly factual, the author’s political essays are both lexically and stylistically rich; they also implement descriptive allusions and proverbs to support the presented opinions. We have undertaken an effort to explore the impact on the individual perception through these political works of the author. In this study, we have overviewed previously made research on similar subjects and through contextual, intertextual, linguistic and corpus analyses we have come to realize the presence of suggestive themes in these works, capable of shaping the reader’s perception regarding a certain topic, specifically targeting the reader’s emotional bias. The findings presented in the study will reveal an overview of such examples of suggestive elements used in the author’s works, as well as various new insights on what can be considered suggestive in the context of modern Arabic printed press.

Keywords: Alaa al-Aswany, cognitive linguistics, political essays, suggestion

Procedia PDF Downloads 143
775 Complex Dynamics in a Model of Management of the Protected Areas

Authors: Paolo Russu

Abstract:

This paper investigates the economic and ecological dynamics that emerge in Protected Areas (PAs) due to interactions between visitors and the animals that live there. The PAs contain two species whose interactions are determined by the Lotka-Volterra equations system. Visitors' decisions to visit PAs are influenced by the entrance cost required to enter the park and the chance of witnessing the species living there. Visitors have contradictory effects on the species and thus on the sustainability of the protected areas: on the one hand, an increase in the number of tourists damages the natural habitat of the regions and thus the species living there; on the other hand, it increases the total amount of entrance fees that the managing body of the PAs can use to perform defensive expenditures that protect the species from extinction. For a given set of parameter values, saddle-node bifurcation, Hopf bifurcation, homoclinic orbits, and a Bogdanov–Takens bifurcation of codimension two has been investigated. The system displays periodic doubling and chaotic solutions, as numerical examples demonstrate. Pontryagin's Maximum Principle was utilised to develop an optimal admission charge policy that maximised social gain and ecosystem conservation.

Keywords: chaos, bifurcation points, dynamical model, optimal control

Procedia PDF Downloads 64
774 Integrating Computational Thinking into Classroom Practice – A Case Study

Authors: Diane Vassallo., Leonard Busuttil

Abstract:

Recent educational developments have seen increasing attention attributed to Computational Thinking (CT) and its integration into primary and secondary school curricula. CT is more than simply being able to use technology but encompasses fundamental Computer Science concepts which are deemed to be very important in developing the correct mindset for our future digital citizens. The case study presented in this article explores the journey of a Maltese secondary school teacher in his efforts to plan, develop and integrate CT within the context of a local classroom. The teacher participant was recruited from the Malta EU Code week summer school, a pilot initiative that stemmed from the EU Code week Team’s Train the Trainer program. The qualitative methodology involved interviews with the participant teacher as well as an analysis of the artefacts created by the students during the lessons. The results shed light on the numerous challenges and obstacles that the teacher encountered in his integration of CT, as well as portray some brilliant examples of good practices which can substantially inform further research and practice around the integration of CT in classroom practice.

Keywords: computational thinking, digital citizens, digital literacy, technology integration

Procedia PDF Downloads 141
773 Flipped Learning in the Delivery of Structural Analysis

Authors: Ali Amin

Abstract:

This paper describes a flipped learning initiative which was trialed in the delivery of the course: structural analysis and modelling. A short series of interactive videos were developed, which introduced the key concepts of each topic. The purpose of the videos was to introduce concepts and give the students more time to develop their thoughts prior to the lecture. This allowed more time for face to face engagement during the lecture. As part of the initial study, videos were developed for half the topics covered. The videos included a short summary of the key concepts ( < 10 mins each) as well as fully worked-out examples (~30mins each). Qualitative feedback was attained from the students. On a scale from strongly disagree to strongly agree, students were rate statements such as 'The pre-class videos assisted your learning experience', 'I felt I could appreciate the content of the lecture more by watching the videos prior to class'. As a result of the pre-class engagement, the students formed more specific and targeted questions during class, and this generated greater comprehension of the material. The students also scored, on average, higher marks in questions pertaining to topics which had videos assigned to them.

Keywords: flipped learning, structural analysis, pre-class videos, engineering education

Procedia PDF Downloads 79
772 Nonlinear Analysis of Shear Deformable Deep Beam Resting on Nonlinear Two-Parameter Random Soil

Authors: M. Seguini, D. Nedjar

Abstract:

In this paper, the nonlinear analysis of Timoshenko beam undergoing moderate large deflections and resting on nonlinear two-parameter random foundation is presented, taking into account the effects of shear deformation, beam’s properties variation and the spatial variability of soil characteristics. The finite element probabilistic analysis has been performed by using Timoshenko beam theory with the Von Kàrmàn nonlinear strain-displacement relationships combined to Vanmarcke theory and Monte Carlo simulations, which is implemented in a Matlab program. Numerical examples of the newly developed model is conducted to confirm the efficiency and accuracy of this later and the importance of accounting for the foundation second parameter (Winkler-Pasternak). Thus, the results obtained from the developed model are presented and compared with those available in the literature to examine how the consideration of the shear and spatial variability of soil’s characteristics affects the response of the system.

Keywords: nonlinear analysis, soil-structure interaction, large deflection, Timoshenko beam, Euler-Bernoulli beam, Winkler foundation, Pasternak foundation, spatial variability

Procedia PDF Downloads 304
771 An Analysis of Conditions for Efficiency Gains in Large ICEs Using Cycling

Authors: Bauer Peter, Murillo Jenny

Abstract:

This paper investigates the bounds of achievable fuel efficiency improvements in engines due to cycling between two operating points assuming a series hybrid configuration . It is shown that for linear bsfc dependencies (as a function of power), cycling is only beneficial if the average power needs are smaller than the power at the optimal bsfc value. Exact expressions for the fuel efficiency gains relative to the constant output power case are derived. This asymptotic analysis is then extended to the case where transient losses due to a change in the operating point are also considered. The case of the boundary bsfc trajectory where constant power application and cycling yield the same fuel consumption.is investigated. It is shown that the boundary bsfc locations of the second non-optimal operating points is hyperbolic. The analysis of the boundary case allows to evaluate whether for a particular engine, cycling can be beneficial. The introduced concepts are illustrated through a number of real world examples, i.e. large production Diesel engines in series hybrid configurations.

Keywords: cycling, efficiency, bsfc, series hybrid, diesel, operating point

Procedia PDF Downloads 490
770 Contextual Toxicity Detection with Data Augmentation

Authors: Julia Ive, Lucia Specia

Abstract:

Understanding and detecting toxicity is an important problem to support safer human interactions online. Our work focuses on the important problem of contextual toxicity detection, where automated classifiers are tasked with determining whether a short textual segment (usually a sentence) is toxic within its conversational context. We use “toxicity” as an umbrella term to denote a number of variants commonly named in the literature, including hate, abuse, offence, among others. Detecting toxicity in context is a non-trivial problem and has been addressed by very few previous studies. These previous studies have analysed the influence of conversational context in human perception of toxicity in controlled experiments and concluded that humans rarely change their judgements in the presence of context. They have also evaluated contextual detection models based on state-of-the-art Deep Learning and Natural Language Processing (NLP) techniques. Counterintuitively, they reached the general conclusion that computational models tend to suffer performance degradation in the presence of context. We challenge these empirical observations by devising better contextual predictive models that also rely on NLP data augmentation techniques to create larger and better data. In our study, we start by further analysing the human perception of toxicity in conversational data (i.e., tweets), in the absence versus presence of context, in this case, previous tweets in the same conversational thread. We observed that the conclusions of previous work on human perception are mainly due to data issues: The contextual data available does not provide sufficient evidence that context is indeed important (even for humans). The data problem is common in current toxicity datasets: cases labelled as toxic are either obviously toxic (i.e., overt toxicity with swear, racist, etc. words), and thus context does is not needed for a decision, or are ambiguous, vague or unclear even in the presence of context; in addition, the data contains labeling inconsistencies. To address this problem, we propose to automatically generate contextual samples where toxicity is not obvious (i.e., covert cases) without context or where different contexts can lead to different toxicity judgements for the same tweet. We generate toxic and non-toxic utterances conditioned on the context or on target tweets using a range of techniques for controlled text generation(e.g., Generative Adversarial Networks and steering techniques). On the contextual detection models, we posit that their poor performance is due to limitations on both of the data they are trained on (same problems stated above) and the architectures they use, which are not able to leverage context in effective ways. To improve on that, we propose text classification architectures that take the hierarchy of conversational utterances into account. In experiments benchmarking ours against previous models on existing and automatically generated data, we show that both data and architectural choices are very important. Our model achieves substantial performance improvements as compared to the baselines that are non-contextual or contextual but agnostic of the conversation structure.

Keywords: contextual toxicity detection, data augmentation, hierarchical text classification models, natural language processing

Procedia PDF Downloads 148
769 Model-Free Distributed Control of Dynamical Systems

Authors: Javad Khazaei, Rick Blum

Abstract:

Distributed control is an efficient and flexible approach for coordination of multi-agent systems. One of the main challenges in designing a distributed controller is identifying the governing dynamics of the dynamical systems. Data-driven system identification is currently undergoing a revolution. With the availability of high-fidelity measurements and historical data, model-free identification of dynamical systems can facilitate the control design without tedious modeling of high-dimensional and/or nonlinear systems. This paper develops a distributed control design using consensus theory for linear and nonlinear dynamical systems using sparse identification of system dynamics. Compared with existing consensus designs that heavily rely on knowing the detailed system dynamics, the proposed model-free design can accurately capture the dynamics of the system with available measurements and input data and provide guaranteed performance in consensus and tracking problems. Heterogeneous damped oscillators are chosen as examples of dynamical system for validation purposes.

Keywords: consensus tracking, distributed control, model-free control, sparse identification of dynamical systems

Procedia PDF Downloads 241
768 Architectural Geometric Shapes That Have Changed the World: Heydar Aliyev Centre vs. the Pyramid of Quéops

Authors: Ayda Kurtulus

Abstract:

Heydar Aliyev Centre and Quéops Pyramid are two contrasting examples of sacred geometry perceived as metaphorical alchemy by linking cosmos and earth. Zaha Hadid’s modern building has a wave-like shape and semi-circular alternations that show fluidity and movement, while The Great Pyramid of Giza is triangular. The centre is reminding of the shape of planets, an attempt to regain the balance lost in the modern-day capitalist world, while the Great Pyramid of Giza represents a vortex of energy that connects heaven and earth, harmony and balance. The sacred geometric shapes link the past and the future through God and Ra, humanism and spiritualism in an architectural evolution continuum, mind and spirit into one. An analysis of two geometrical forms, a semi-circle, and a triangle, were carried out through a comprehensive literature review, indicating that behind the materialistic perceptual beauty of buildings, ancient and contemporary, there are mathematical and sacred geometrical constructions that add value to one superficiality can interpret.

Keywords: architectural shapes, The Great Pyramid of Giza, Heydar Aliyev Centre, sacred geometry, philosophy

Procedia PDF Downloads 87
767 How to Integrate Sustainability in Technological Degrees: Robotics at UPC

Authors: Antoni Grau, Yolanda Bolea, Alberto Sanfeliu

Abstract:

Embedding Sustainability in technological curricula has become a crucial factor for educating engineers with competences in sustainability. The Technical University of Catalonia UPC, in 2008, designed the Sustainable Technology Excellence Program STEP 2015 in order to assure a successful Sustainability Embedding. This Program takes advantage of the opportunity that the redesign of all Bachelor and Master Degrees in Spain by 2010 under the European Higher Education Area framework offered. The STEP program goals are: to design compulsory courses in each degree; to develop the conceptual base and identify reference models in sustainability for all specialties at UPC; to create an internal interdisciplinary network of faculty from all the schools; to initiate new transdisciplinary research activities in technology-sustainability-education; to spread the know/how attained; to achieve international scientific excellence in technology-sustainability-education and to graduate the first engineers/architects of the new EHEA bachelors with sustainability as a generic competence. Specifically, in this paper authors explain their experience in leading the STEP program, and two examples are presented: Industrial Robotics subject and the curriculum for the School of Architecture.

Keywords: sustainability, curricula improvement, robotics, STEP program

Procedia PDF Downloads 390
766 Unseen Classes: The Paradigm Shift in Machine Learning

Authors: Vani Singhal, Jitendra Parmar, Satyendra Singh Chouhan

Abstract:

Unseen class discovery has now become an important part of a machine-learning algorithm to judge new classes. Unseen classes are the classes on which the machine learning model is not trained on. With the advancement in technology and AI replacing humans, the amount of data has increased to the next level. So while implementing a model on real-world examples, we come across unseen new classes. Our aim is to find the number of unseen classes by using a hierarchical-based active learning algorithm. The algorithm is based on hierarchical clustering as well as active sampling. The number of clusters that we will get in the end will give the number of unseen classes. The total clusters will also contain some clusters that have unseen classes. Instead of first discovering unseen classes and then finding their number, we directly calculated the number by applying the algorithm. The dataset used is for intent classification. The target data is the intent of the corresponding query. We conclude that when the machine learning model will encounter real-world data, it will automatically find the number of unseen classes. In the future, our next work would be to label these unseen classes correctly.

Keywords: active sampling, hierarchical clustering, open world learning, unseen class discovery

Procedia PDF Downloads 156
765 Flexibility Cost and Its Application for Construction Projects

Authors: Rashmi Shahu

Abstract:

Flexibility is becoming a more widely accepted aspect of project management. Although contingency theory in project management states that the unknowns are controllable, complexity theory believes that the best way to handle the unknowns would be to have a flexible approach rather than rigidity. Designing a flexible system is a method of managing uncertainty. The present research work aims to evaluate flexibility in the initial design phase of projects taking examples of construction projects. Flexibility in the initial design phase is modeled in order to know the advantage in future. The comparison between the extra cost of flexibility in the initial design phase and the discount that can be achieved in future due to this premium will help the developers in making strategic decisions. This research uses a methodology for valuing flexibility by developing a mathematical formula for predicting future saving of cost. Two case studies were considered in this research to validate the mathematical formula. This research explains three case studies of an educational institution 28 years old for explaining the concept and giving benefits of flexible design for modification/renovation work of building.

Keywords: flexibility, future saving, flexibility cost, construction projects

Procedia PDF Downloads 341
764 On the Translation of Thai Culture-Specific Terms of Address into English

Authors: Supannee Pinmanee

Abstract:

This article focuses on the strategies in the translation of terms of address for both referential and vocative functions from Thai to English from a cultural perspective. The discussion concerns the culture-specific ways in which Thai people use address terms that depend largely on social and conventional contexts, including pragmatic factors, for example, relationships between people, levels of formality, and attitudes. Examples used to illustrate the problems and proposed solutions were drawn from the media, the internet, the novels and the language used by Thai native speakers in expressing Thai address terms. The terms used in this area show very well not only the differences in language but also the different cultures and world views of the speakers of Thai and those of English. Thai has developed its own set of address terms, particularly kinship terms for non-relatives and the Thai royal terms. Some of Newmark’s procedures (1995) are used in the article to illustrate the task of translating Thai terms into English, a language that embodies a very different culture with its own set of address terms. However, no one strategy can be applied to serve all purposes and to translate all the intended senses. One particular term can be translated by several strategies, and which strategy to choose depends largely on one’s purposes and what requirement one needs to fulfill.

Keywords: translation, terms of address, Thai-English translation, Thai culture-specific terms of address, translation strategies

Procedia PDF Downloads 175
763 Global Mittag-Leffler Stability of Fractional-Order Bidirectional Associative Memory Neural Network with Discrete and Distributed Transmission Delays

Authors: Swati Tyagi, Syed Abbas

Abstract:

Fractional-order Hopfield neural networks are generally used to model the information processing among the interacting neurons. To show the constancy of the processed information, it is required to analyze the stability of these systems. In this work, we perform Mittag-Leffler stability for the corresponding Caputo fractional-order bidirectional associative memory (BAM) neural networks with various time-delays. We derive sufficient conditions to ensure the existence and uniqueness of the equilibrium point by using the theory of topological degree theory. By applying the fractional Lyapunov method and Mittag-Leffler functions, we derive sufficient conditions for the global Mittag-Leffler stability, which further imply the global asymptotic stability of the network equilibrium. Finally, we present two suitable examples to show the effectiveness of the obtained results.

Keywords: bidirectional associative memory neural network, existence and uniqueness, fractional-order, Lyapunov function, Mittag-Leffler stability

Procedia PDF Downloads 342