Search results for: hard non-linearity
666 Definition and Core Components of the Role-Partner Allocation Problem in Collaborative Networks
Authors: J. Andrade-Garda, A. Anguera, J. Ares-Casal, M. Hidalgo-Lorenzo, J.-A. Lara, D. Lizcano, S. Suárez-Garaboa
Abstract:
In the current constantly changing economic context, collaborative networks allow partners to undertake projects that would not be possible if attempted by them individually. These projects usually involve the performance of a group of tasks (named roles) that have to be distributed among the partners. Thus, an allocation/matching problem arises that will be referred to as Role-Partner Allocation problem. In real life this situation is addressed by negotiation between partners in order to reach ad hoc agreements. Besides taking a long time and being hard work, both historical evidence and economic analysis show that such approach is not recommended. Instead, the allocation process should be automated by means of a centralized matching scheme. However, as a preliminary step to start the search for such a matching mechanism (or even the development of a new one), the problem and its core components must be specified. To this end, this paper establishes (i) the definition of the problem and its constraints, (ii) the key features of the involved elements (i.e., roles and partners); and (iii) how to create preference lists both for roles and partners. Only this way it will be possible to conduct subsequent methodological research on the solution method.Keywords: collaborative network, matching, partner, preference list, role
Procedia PDF Downloads 237665 A Polynomial Approach for a Graphical-based Integrated Production and Transport Scheduling with Capacity Restrictions
Authors: M. Ndeley
Abstract:
The performance of global manufacturing supply chains depends on the interaction of production and transport processes. Currently, the scheduling of these processes is done separately without considering mutual requirements, which leads to no optimal solutions. An integrated scheduling of both processes enables the improvement of supply chain performance. The integrated production and transport scheduling problem (PTSP) is NP-hard, so that heuristic methods are necessary to efficiently solve large problem instances as in the case of global manufacturing supply chains. This paper presents a heuristic scheduling approach which handles the integration of flexible production processes with intermodal transport, incorporating flexible land transport. The method is based on a graph that allows a reformulation of the PTSP as a shortest path problem for each job, which can be solved in polynomial time. The proposed method is applied to a supply chain scenario with a manufacturing facility in South Africa and shipments of finished product to customers within the Country. The obtained results show that the approach is suitable for the scheduling of large-scale problems and can be flexibly adapted to different scenarios.Keywords: production and transport scheduling problem, graph based scheduling, integrated scheduling
Procedia PDF Downloads 475664 South Asia’s Political Landscape: Precipitating Terrorism
Authors: Saroj Kumar Rath
Abstract:
India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens.Keywords: Al Qaeda, terrorism, Islamic state, India, haqqani network, Pakistan, Taliban
Procedia PDF Downloads 617663 A Study of the Trade-off Energy Consumption-Performance-Schedulability for DVFS Multicore Systems
Authors: Jalil Boudjadar
Abstract:
Dynamic Voltage and Frequency Scaling (DVFS) multicore platforms are promising execution platforms that enable high computational performance, less energy consumption and flexibility in scheduling the system processes. However, the resulting interleaving and memory interference together with per-core frequency tuning make real-time guarantees hard to be delivered. Besides, energy consumption represents a strong constraint for the deployment of such systems on energy-limited settings. Identifying the system configurations that would achieve a high performance and consume less energy while guaranteeing the system schedulability is a complex task in the design of modern embedded systems. This work studies the trade-off between energy consumption, cores utilization and memory bottleneck and their impact on the schedulability of DVFS multicore time-critical systems with a hierarchy of shared memories. We build a model-based framework using Parametrized Timed Automata of UPPAAL to analyze the mutual impact of performance, energy consumption and schedulability of DVFS multicore systems, and demonstrate the trade-off on an actual case study.Keywords: time-critical systems, multicore systems, schedulability analysis, energy consumption, performance analysis
Procedia PDF Downloads 108662 A Neural Network System for Predicting the Hardness of Titanium Aluminum Nitrite (TiAlN) Coatings
Authors: Omar M. Elmabrouk
Abstract:
The cutting tool, in the high-speed machining process, is consistently dealing with high localized stress at the tool tip, tip temperature exceeds 800°C and the chip slides along the rake face. These conditions are affecting the tool wear, the cutting tool performances, the quality of the produced parts and the tool life. Therefore, a thin film coating on the cutting tool should be considered to improve the tool surface properties while maintaining its bulks properties. One of the general coating processes in applying thin film for hard coating purpose is PVD magnetron sputtering. In this paper, the prediction of the effects of PVD magnetron sputtering coating process parameters, sputter power in the range of (4.81-7.19 kW), bias voltage in the range of (50.00-300.00 Volts) and substrate temperature in the range of (281.08-600.00 °C), were studied using artificial neural network (ANN). The results were compared with previously published results using RSM model. It was found that the ANN is more accurate in prediction of tool hardness, and hence, it will not only improve the tool life of the tool but also significantly enhances the efficiency of the machining processes.Keywords: artificial neural network, hardness, prediction, titanium aluminium nitrate coating
Procedia PDF Downloads 554661 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count
Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney
Abstract:
Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python
Procedia PDF Downloads 144660 Optimization of Reliability and Communicability of a Random Two-Dimensional Point Patterns Using Delaunay Triangulation
Authors: Sopheak Sorn, Kwok Yip Szeto
Abstract:
Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a complex system will perform satisfactorily. When the system is described by a network of N components (nodes) and their L connection (links), the reliability of the system becomes a network design problem that is an NP-hard combinatorial optimization problem. In this paper, we address the network design problem for a random point set’s pattern in two dimensions. We make use of a Voronoi construction with each cell containing exactly one point in the point pattern and compute the reliability of the Voronoi’s dual, i.e. the Delaunay graph. We further investigate the communicability of the Delaunay network. We find that there is a positive correlation and a negative correlation between the homogeneity of a Delaunay's degree distribution with its reliability and its communicability respectively. Based on the correlations, we alter the communicability and the reliability by performing random edge flips, which preserve the number of links and nodes in the network but can increase the communicability in a Delaunay network at the cost of its reliability. This transformation is later used to optimize a Delaunay network with the optimum geometric mean between communicability and reliability. We also discuss the importance of the edge flips in the evolution of real soap froth in two dimensions.Keywords: Communicability, Delaunay triangulation, Edge Flip, Reliability, Two dimensional network, Voronio
Procedia PDF Downloads 420659 The Impact of Experiential Learning on the Success of Upper Division Mechanical Engineering Students
Authors: Seyedali Seyedkavoosi, Mohammad Obadat, Seantorrion Boyle
Abstract:
The purpose of this study is to assess the effectiveness of a nontraditional experiential learning strategy in improving the success and interest of mechanical engineering students, using the Kinematics/Dynamics of Machine course as a case study. This upper-division technical course covers a wide range of topics, including mechanism and machine system analysis and synthesis, yet the complexities of ideas like acceleration, motion, and machine component relationships are hard to explain using standard teaching techniques. To solve this problem, a thorough design project was created that gave students hands-on experience developing, manufacturing, and testing their inventions. The main goals of the project were to improve students' grasp of machine design and kinematics, to develop problem-solving and presenting abilities, and to familiarize them with professional software. A questionnaire survey was done to evaluate the effect of this technique on students' performance and interest in mechanical engineering. The outcomes of the study shed light on the usefulness of nontraditional experiential learning approaches in engineering education.Keywords: experiential learning, nontraditional teaching, hands-on design project, engineering education
Procedia PDF Downloads 98658 The Effect of Heating-Liquid Nitrogen Cooling on Fracture Toughness of Anisotropic Rock
Authors: A. Kavandi, K. Goshtasbi, M. R. Hadei, H. Nejati
Abstract:
In geothermal energy production, the method of liquid nitrogen (LN₂) fracturing in hot, dry rock is one of the most effective methods to increase the permeability of the reservoir. The geothermal reservoirs mainly consist of hard rocks such as granites and metamorphic rocks like gneiss with high temperatures. Gneiss, as a metamorphic rock, experiences a high level of inherent anisotropy. This type of anisotropy is considered as the nature of rocks, which affects the mechanical behavior of rocks. The aim of this study is to investigate the effects of heating-liquid nitrogen (LN₂) cooling treatment and rock anisotropy on the fracture toughness of gneiss. For this aim, a series of semi-circular bend (SCB) tests were carried out on specimens of gneiss with different anisotropy plane angles (0°, 30°, 60°, and 90°). In this study, gneiss specimens were exposed to heating–cooling treatment through gradual heating to 100°C followed by LN₂ cooling. Results indicate that the fracture toughness of treated samples is lower than that of untreated samples, and with increasing the anisotropy plane angle, the fracture toughness increases. The scanning electron microscope (SEM) technique is also implemented to evaluate the fracture process zone (FPZ) ahead of the crack tip.Keywords: heating-cooling, anisotropic rock, fracture toughness, liquid nitrogen
Procedia PDF Downloads 58657 Teaching Continuities in the Great Books Tradition and Contemporary Popular Culture
Authors: Alex Kizuk
Abstract:
This paper studies the trope or meme of the Siren in terms of what long-standing cultural continuities can be found in college classrooms today. Those who have raised children may remember reading from Hans Christian Anderson's 'The Little Mermaid' (1836), not to mention regaling them with colorful Disneyesque versions when they were younger. Though Anderson tempered the darker first ending of the story to give the little mermaid more agency in her salvation—a prognostic developed in Disney adaptations—nonetheless, the tale pivots on an image of a 'heavenly realm' that the mermaid may eventually come to know or comprehend as a beloved woman on dry land. Only after 300 years, however, may she hope to see that 'which lives forever' and 'rises through thin air, up to the shining stars. Just as [sea-people] rise through the water to see the lands on earth.' What students today can see in this example is a trope of the agonistic soul in a hard-won disembarkation at a harbour of knowledge--where the seeker after truth may come to know through persistence (300 years)—all that is good and true concerning human life. This paper discusses several such examples from the Great Books and popular culture to suggest that teaching in the world of the 21st century could do worse than accede to some such perennial seeking.Keywords: the Great Books, tradition, popular culture, 21st century directions in teaching
Procedia PDF Downloads 158656 Fuzzy Population-Based Meta-Heuristic Approaches for Attribute Reduction in Rough Set Theory
Authors: Mafarja Majdi, Salwani Abdullah, Najmeh S. Jaddi
Abstract:
One of the global combinatorial optimization problems in machine learning is feature selection. It concerned with removing the irrelevant, noisy, and redundant data, along with keeping the original meaning of the original data. Attribute reduction in rough set theory is an important feature selection method. Since attribute reduction is an NP-hard problem, it is necessary to investigate fast and effective approximate algorithms. In this paper, we proposed two feature selection mechanisms based on memetic algorithms (MAs) which combine the genetic algorithm with a fuzzy record to record travel algorithm and a fuzzy controlled great deluge algorithm to identify a good balance between local search and genetic search. In order to verify the proposed approaches, numerical experiments are carried out on thirteen datasets. The results show that the MAs approaches are efficient in solving attribute reduction problems when compared with other meta-heuristic approaches.Keywords: rough set theory, attribute reduction, fuzzy logic, memetic algorithms, record to record algorithm, great deluge algorithm
Procedia PDF Downloads 456655 A Framework for Incorporating Non-Linear Degradation of Conductive Adhesive in Environmental Testing
Authors: Kedar Hardikar, Joe Varghese
Abstract:
Conductive adhesives have found wide-ranging applications in electronics industry ranging from fixing a defective conductor on printed circuit board (PCB) attaching an electronic component in an assembly to protecting electronics components by the formation of “Faraday Cage.” The reliability requirements for the conductive adhesive vary widely depending on the application and expected product lifetime. While the conductive adhesive is required to maintain the structural integrity, the electrical performance of the associated sub-assembly can be affected by the degradation of conductive adhesive. The degradation of the adhesive is dependent upon the highly varied use case. The conventional approach to assess the reliability of the sub-assembly involves subjecting it to the standard environmental test conditions such as high-temperature high humidity, thermal cycling, high-temperature exposure to name a few. In order to enable projection of test data and observed failures to predict field performance, systematic development of an acceleration factor between the test conditions and field conditions is crucial. Common acceleration factor models such as Arrhenius model are based on rate kinetics and typically rely on an assumption of linear degradation in time for a given condition and test duration. The application of interest in this work involves conductive adhesive used in an electronic circuit of a capacitive sensor. The degradation of conductive adhesive in high temperature and humidity environment is quantified by the capacitance values. Under such conditions, the use of established models such as Hallberg-Peck model or Eyring Model to predict time to failure in the field typically relies on linear degradation rate. In this particular case, it is seen that the degradation is nonlinear in time and exhibits a square root t dependence. It is also shown that for the mechanism of interest, the presence of moisture is essential, and the dominant mechanism driving the degradation is the diffusion of moisture. In this work, a framework is developed to incorporate nonlinear degradation of the conductive adhesive for the development of an acceleration factor. This method can be extended to applications where nonlinearity in degradation rate can be adequately characterized in tests. It is shown that depending on the expected product lifetime, the use of conventional linear degradation approach can overestimate or underestimate the field performance. This work provides guidelines for suitability of linear degradation approximation for such varied applicationsKeywords: conductive adhesives, nonlinear degradation, physics of failure, acceleration factor model.
Procedia PDF Downloads 135654 Study of Behavior Tribological Cutting Tools Based on Coating
Authors: A. Achour L. Chekour, A. Mekroud
Abstract:
Tribology, the science of lubrication, friction and wear, plays an important role in science "crossroads" initiated by the recent developments in the industry. Its multidisciplinary nature reinforces its scientific interest. It covers all the sciences that deal with the contact between two solids loaded and relative motion. It is thus one of the many intersections more clearly established disciplines such as solid mechanics and the fluids, rheological, thermal, materials science and chemistry. As for his experimental approach, it is based on the physical and processing signals and images. The optimization of operating conditions by cutting tool must contribute significantly to the development and productivity of advanced automation of machining techniques because their implementation requires sufficient knowledge of how the process and in particular the evolution of tool wear. In addition, technological advances have developed the use of very hard materials, refractory difficult machinability, requiring highly resistant materials tools. In this study, we present the behavior wear a machining tool during the roughing operation according to the cutting parameters. The interpretation of the experimental results is based mainly on observations and analyzes of sharp edges e tool using the latest techniques: scanning electron microscopy (SEM) and optical rugosimetry laser beam.Keywords: friction, wear, tool, cutting
Procedia PDF Downloads 331653 Reconsidering the Legitimacy of Capital Punishment in the Interpretation of the Human Right to Life in the Two Traditional Approaches
Authors: Yujie Zhang
Abstract:
There are debates around the legitimacy of capital punishment, i.e., whether death could serve as a proper execution in our legal system or not. Different arguments have been raised. However, none of them seem able to provide a determined answer to the issue; this results in a lack of instruction in the legal practice. This article, therefore, devotes itself to the effort to find such an answer. It takes the perspective of rights, through interpreting the concept of right to life, which capital punishment appears to be in confliction with in the two traditional approaches, to reveal a possibly best account of the right and its conclusion on capital punishment. However, this effort is not a normative one which focuses on what ought to be. It means the article does not try to work out which argument we should choose and solve the hot debate on whether capital punishment should be allowed or not. It, again, does not propose which perspective we should take to approach this issue or generally which account of right must be better; rather, it is more a thought experiment. It attempts to raise a new perspective to approach the issue of the legitimacy of capital punishment. Both its perspective and conclusion therefore are tentative: what if we view this issue in a way we have never tried before, for example the different accounts of right to life? In this sense, the perspective could be defied, while the conclusion could be rejected. Other perspectives and conclusions are also possible. Notwithstanding, this tentative perspective and account of the right still could not be denied from serving as a potential approach, since it does have the ability to provide us with a determined attitude toward capital punishment that is hard to achieve through existing arguments.Keywords: capital punishment, right to life, theories of rights, the choice theory
Procedia PDF Downloads 196652 Biostabilisation of Sediments for the Protection of Marine Infrastructure from Scour
Authors: Rob Schindler
Abstract:
Industry-standard methods of mitigating erosion of seabed sediments rely on ‘hard engineering’ approaches which have numerous environmental shortcomings: (1) direct loss of habitat by smothering of benthic species, (2) disruption of sediment transport processes, damaging geomorphic and ecosystem functionality (3) generation of secondary erosion problems, (4) introduction of material that may propagate non-local species, and (5) provision of pathways for the spread of invasive species. Recent studies have also revealed the importance of biological cohesion, the result of naturally occurring extra-cellular polymeric substances (EPS), in stabilizing natural sediments. Mimicking the strong bonding kinetics through the deliberate addition of EPS to sediments – henceforth termed ‘biostabilisation’ - offers a means in which to mitigate against erosion induced by structures or episodic increases in hydrodynamic forcing (e.g. storms and floods) whilst avoiding, or reducing, hard engineering. Here we present unique experiments that systematically examine how biostabilisation reduces scour around a monopile in a current, a first step to realizing the potential of this new method of scouring reduction for a wide range of engineering purposes in aquatic substrates. Experiments were performed in Plymouth University’s recirculating sediment flume which includes a recessed scour pit. The model monopile was 0.048 m in diameter, D. Assuming a prototype monopile diameter of 2.0 m yields a geometric ratio of 41.67. When applied to a 10 m prototype water depth this yields a model depth, d, of 0.24 m. The sediment pit containing the monopile was filled with different biostabilised substrata prepared using a mixture of fine sand (D50 = 230 μm) and EPS (Xanthan gum). Nine sand-EPS mixtures were examined spanning EPS contents of 0.0% < b0 < 0.50%. Scour development was measured using a laser point gauge along a 530 mm centreline at 10 mm increments at regular periods over 5 h. Maximum scour depth and excavated area were determined at different time steps and plotted against time to yield equilibrium values. After 5 hours the current was stopped and a detailed scan of the final scour morphology was taken. Results show that increasing EPS content causes a progressive reduction in the equilibrium depth and lateral extent of scour, and hence excavated material. Very small amounts equating to natural communities (< 0.1% by mass) reduce scour rate, depth and extent of scour around monopiles. Furthermore, the strong linear relationships between EPS content, equilibrium scour depth, excavation area and timescales of scouring offer a simple index on which to modify existing scour prediction methods. We conclude that the biostabilisation of sediments with EPS may offer a simple, cost-effective and ecologically sensitive means of reducing scour in a range of contexts including OWFs, bridge piers, pipeline installation, and void filling in rock armour. Biostabilisation may also reduce economic costs through (1) Use of existing site sediments, or waste dredged sediments (2) Reduced fabrication of materials, (3) Lower transport costs, (4) Less dependence on specialist vessels and precise sub-sea assembly. Further, its potential environmental credentials may allow sensitive use of the seabed in marine protection zones across the globe.Keywords: biostabilisation, EPS, marine, scour
Procedia PDF Downloads 167651 Investigating The Nexus Between Energy Deficiency, Environmental Sustainability and Renewable Energy: The Role of Energy Trade in Global Perspectives
Authors: Fahim Ullah, Muhammad Usman
Abstract:
Energy consumption and environmental sustainability are hard challenges of 21st century. Energy richness increases environmental pollution while energy poverty hinders economic growth. Considering these two aspects, present study calculates energy deficiency and examines the role of renewable energy to overcome rising energy deficiency and carbon emission for selected countries from 1990 to 2021. For empirical analysis, this study uses methods of moments panel quantile regression analysis and to check the robustness, study used panel quantile robust analysis. Graphical analysis indicated rising global energy deficiency since last three decades where energy consumption is higher than energy production. Empirical results showed that renewable energy is a significant factor for reducing energy deficiency. Secondly, the energy deficiency increases carbon emission level and again renewable energy decreases emissions level. This study recommends that global energy deficiency and rising carbon emissions can be controlled through structural change in the form of energy transition to replace non-renewable resources with renewable resources.Keywords: energy deficiency, renewable energy, carbon emission, energy trade, PQL analysis
Procedia PDF Downloads 64650 Relay Node Placement for Connectivity Restoration in Wireless Sensor Networks Using Genetic Algorithms
Authors: Hanieh Tarbiat Khosrowshahi, Mojtaba Shakeri
Abstract:
Wireless Sensor Networks (WSNs) consist of a set of sensor nodes with limited capability. WSNs may suffer from multiple node failures when they are exposed to harsh environments such as military zones or disaster locations and lose connectivity by getting partitioned into disjoint segments. Relay nodes (RNs) are alternatively introduced to restore connectivity. They cost more than sensors as they benefit from mobility, more power and more transmission range, enforcing a minimum number of them to be used. This paper addresses the problem of RN placement in a multiple disjoint network by developing a genetic algorithm (GA). The problem is reintroduced as the Steiner tree problem (which is known to be an NP-hard problem) by the aim of finding the minimum number of Steiner points where RNs are to be placed for restoring connectivity. An upper bound to the number of RNs is first computed to set up the length of initial chromosomes. The GA algorithm then iteratively reduces the number of RNs and determines their location at the same time. Experimental results indicate that the proposed GA is capable of establishing network connectivity using a reasonable number of RNs compared to the best existing work.Keywords: connectivity restoration, genetic algorithms, multiple-node failure, relay nodes, wireless sensor networks
Procedia PDF Downloads 243649 Fund Seekers’ Deception in Peer-to-Peer Lending in Times of COVID
Authors: Olivier Mesly
Abstract:
This article examines the likelihood of deception on the part of borrowers wishing to obtain credit from institutional or private lenders. In our first study, we identify five explanatory variables that account for nearly forty percent of the propensity to act deceitfully: a poor credit history, debt, risky behavior, and to a much lesser degree, irrational behavior and disconnection from the bundle of needs, goals, and preferences. For the second study, we remodeled the initial questionnaire to adapt it to the needs of institutional bankers and borrowers, especially those that engage in money on-line peer-to-peer lending, a growing business fueled by the COVID pandemic. We find that the three key psychological variables that help to indirectly predict the likelihood of deceitful behaviors and possible default on loan reimbursement, i.e., risky behaviors, ir-rationality, and dis-connection, interact with each other to form a loop. This study presents two benefits: first, we provide evidence that it is to some degree possible to tighten control over lending practices. Second, we offer a pragmatic tool: a questionnaire, that lenders can use or adapt to gauge potential borrowers’ deceit, notably by combining their results with standard hard-data measures of risk.Keywords: bundle of needs, default, debt, deception, risk, peer-to-peer lending
Procedia PDF Downloads 132648 Auditor with the Javanese Characters: Revealing the Relationship towards Its Client
Authors: Krisna Damayanti
Abstract:
Negative issue about the relationship between auditors and clients often heard. It arises in view of the rise of a variety of phenomena resulting from the audit practice of greed and do not appreciate the independence of the audit profession and professional code of ethics. It is a logical consequence of the practice of capitalism in accounting. The purpose of this paper would like to uncover the existing auditing practices in Indonesia, especially Java, which is associated with a strong influence of Javanese culture with reluctant/"shy", politely, "legowo", "ngemong" friendly, "not mentholo", "tepo seliro", "ngajeni", "acquiescent". The method used by interpretive approach that emphasizes the role of language, interpret and understand and see social reality as something other than a label, name or concept. Auditing practices in each country has a culture that will affect the standard set by those regulatory standards although there has been an adaptation of IAS. In Indonesia the majority of parties dominated by Javanesse racial regulators, so Java culture is embedded in every audit practices thus conditions in Java requires auditors to behave like that, sometimes interfere with standard Java code of conduct that must be executed by an auditor. Auditors who live in Java have the characters of Javanese culture that is hard to avoid in the audit practice. However, in practice, the auditor still are relevant in their profession.Keywords: auditors, java, character, profession, code of ethics, client
Procedia PDF Downloads 442647 Types of Neurons in the Spinal Trigeminal Nucleus of the Camel Brain: Golgi Study
Authors: Qasim A. El Dwairi, Saleh M. Banihani, Ayat S. Banihani, Ziad M. Bataineh
Abstract:
Neurons in the spinal trigeminal nucleus of the camel were studied by Golgi impregnation. Neurons were classified based on differences in size and shape of their cell bodies, density of their dendritic trees, morphology and distribution of their appendages. In the spinal trigeminal nucleus of the camel, at least twelve types of neurons were identified. These neurons include, stalked, islets, octubus-like, lobulated, boat-like, pyramidal, multipolar, round, oval and elongated neurons. They have large number of different forms of appendages not only for their dendrites but also for their cell bodies. Neurons with unique large dilatations especially at their dendritic branching points were found. The morphological features of these neurons were described and compared with their counterparts in other species. Finding of large number of neuronal types with different size and shapes and large number of different forms of appendages for cell bodies and dendrites together with the presence of cells with unique features such as large dilated parts for dendrites may indicate to a very complex information processing for pain and temperature at the level of the spinal trigeminal nucleus in the camel that traditionally live in a very hard environment (the desert).Keywords: camel, golgi, neurons , spinal trigeminal nucleus
Procedia PDF Downloads 342646 Analyzing the Factors that Cause Parallel Performance Degradation in Parallel Graph-Based Computations Using Graph500
Authors: Mustafa Elfituri, Jonathan Cook
Abstract:
Recently, graph-based computations have become more important in large-scale scientific computing as they can provide a methodology to model many types of relations between independent objects. They are being actively used in fields as varied as biology, social networks, cybersecurity, and computer networks. At the same time, graph problems have some properties such as irregularity and poor locality that make their performance different than regular applications performance. Therefore, parallelizing graph algorithms is a hard and challenging task. Initial evidence is that standard computer architectures do not perform very well on graph algorithms. Little is known exactly what causes this. The Graph500 benchmark is a representative application for parallel graph-based computations, which have highly irregular data access and are driven more by traversing connected data than by computation. In this paper, we present results from analyzing the performance of various example implementations of Graph500, including a shared memory (OpenMP) version, a distributed (MPI) version, and a hybrid version. We measured and analyzed all the factors that affect its performance in order to identify possible changes that would improve its performance. Results are discussed in relation to what factors contribute to performance degradation.Keywords: graph computation, graph500 benchmark, parallel architectures, parallel programming, workload characterization.
Procedia PDF Downloads 149645 Key Success Factors for Malaysian SMES Companies’ Entrepreneurial Leader
Authors: Zainal Abu Zarim, Hafizah Omar Zaki
Abstract:
The objective of this study is to analyse the success factors of entrepreneurs in the Malaysian SMEs in the urge to discover their entrepreneurial leadership characteristics. Data has been collected from top 50 SME award winning companies. The study has used the qualitative approach to data collection, where interviews are dispersed on these selected companies. From these 50 SMEs, only 25 accepted the interview request where one entrepreneur from each SME answered the questions. To successfully run this study, we administered some questions based on Hornaday 42 characteristics of an entrepreneurs, as well some structured questions to determine a successful of a company. The result shows that, entrepreneurs are confident, determine, diligent, flexible, responsive to challenges, responsible, foresight, courageous, aggressive, and committed. Consistent to this, several elements that makes the company successful includes (1) strong financial control, (2) continuous improvement, (3) product quality and product safety as top priority, (4) hard work and team work, and (5) eagerness in taking challenges. These results has deemed that entrepreneurs in many aspects are also leaders that are risk averse and determine, and are eager to work on continuous improvement in a financially strong company.Keywords: characteristics of entrepreneurs, success of a company, key success factors, Malaysian SMEs
Procedia PDF Downloads 593644 Ophthalmic Hashing Based Supervision of Glaucoma and Corneal Disorders Imposed on Deep Graphical Model
Authors: P. S. Jagadeesh Kumar, Yang Yung, Mingmin Pan, Xianpei Li, Wenli Hu
Abstract:
Glaucoma is impelled by optic nerve mutilation habitually represented as cupping and visual field injury frequently with an arcuate pattern of mid-peripheral loss, subordinate to retinal ganglion cell damage and death. Glaucoma is the second foremost cause of blindness and the chief cause of permanent blindness worldwide. Consequently, all-embracing study into the analysis and empathy of glaucoma is happening to escort deep learning based neural network intrusions to deliberate this substantial optic neuropathy. This paper advances an ophthalmic hashing based supervision of glaucoma and corneal disorders preeminent on deep graphical model. Ophthalmic hashing is a newly proposed method extending the efficacy of visual hash-coding to predict glaucoma corneal disorder matching, which is the faster than the existing methods. Deep graphical model is proficient of learning interior explications of corneal disorders in satisfactory time to solve hard combinatoric incongruities using deep Boltzmann machines.Keywords: corneal disorders, deep Boltzmann machines, deep graphical model, glaucoma, neural networks, ophthalmic hashing
Procedia PDF Downloads 253643 Truck Scheduling Problem in a Cross-Dock Centre with Fixed Due Dates
Authors: Mohsen S. Sajadieha, Danyar Molavia
Abstract:
In this paper, a truck scheduling problem is investigated at a two-touch cross-docking center with due dates for outbound trucks as a hard constraint. The objective is to minimize the total cost comprising penalty and delivery cost of delayed shipments. The sequence of unloading shipments is considered and is assumed that shipments are sent to shipping dock doors immediately after unloading and a First-In-First-Out (FIFO) policy is considered for loading the shipments. A mixed integer programming model is developed for the proposed model. Two meta-heuristic algorithms including genetic algorithm (GA) and variable neighborhood search (VNS) are developed to solve the problem in medium and large sized scales. The numerical results show that increase in due dates for outbound trucks has a crucial impact on the reduction of penalty costs of delayed shipments. In addition, by increase the due dates, the improvement in the objective function arises on average in comparison with the situation that the cross-dock is multi-touch and shipments are sent to shipping dock doors only after unloading the whole inbound truck.Keywords: cross-docking, truck scheduling, fixed due date, door assignment
Procedia PDF Downloads 405642 Evaluation of Features Extraction Algorithms for a Real-Time Isolated Word Recognition System
Authors: Tomyslav Sledevič, Artūras Serackis, Gintautas Tamulevičius, Dalius Navakauskas
Abstract:
This paper presents a comparative evaluation of features extraction algorithm for a real-time isolated word recognition system based on FPGA. The Mel-frequency cepstral, linear frequency cepstral, linear predictive and their cepstral coefficients were implemented in hardware/software design. The proposed system was investigated in the speaker-dependent mode for 100 different Lithuanian words. The robustness of features extraction algorithms was tested recognizing the speech records at different signals to noise rates. The experiments on clean records show highest accuracy for Mel-frequency cepstral and linear frequency cepstral coefficients. For records with 15 dB signal to noise rate the linear predictive cepstral coefficients give best result. The hard and soft part of the system is clocked on 50 MHz and 100 MHz accordingly. For the classification purpose, the pipelined dynamic time warping core was implemented. The proposed word recognition system satisfies the real-time requirements and is suitable for applications in embedded systems.Keywords: isolated word recognition, features extraction, MFCC, LFCC, LPCC, LPC, FPGA, DTW
Procedia PDF Downloads 497641 The Role of State Practices and Custom in Outer Space Law
Authors: Biswanath Gupta, Raju Kd
Abstract:
Space law is the new entry in the basket of international law in the latter half of the 20th Century. In the last hundred and fifty years, courts and scholars developed a consensus that, the custom is an important source of international law. Article 38(1) (b) of the statute of the International Court of Justice recognized international custom as a source of international law. State practices and usages have a greater role to play in formulating customary international law. This paper examines those state practices which can be qualified to become international customary law. Since, 1979 (after Moon Treaty) no hard law have been developed in the area of space exploration. It tries to link between state practices and custom in space exploration and development of customary international law in space activities. The paper uses doctrinal method of legal research for examining the current questions of international law. The paper explores different international legal documents such as General Assembly Resolutions, Treaty principles, working papers of UN, cases relating to customary international law and writing of jurists relating to space law and customary international law. It is argued that, principles such as common heritage of mankind, non-military zone, sovereign equality, nuclear weapon free zone and protection of outer space environment, etc. developed state practices among the international community which can be qualified to become international customary law.Keywords: customary international law, state practice, space law, treaty
Procedia PDF Downloads 343640 Effect of Crude Flowers Extract of Citrus reticulata Blanco Flowers on Physicochemical and Nutritional Properties of Cheddar Cheese
Authors: Usman Mir Khan, Ishtiaque Ahmad, Saima Inayat, H. M. Arslan Amin, Muhammad Ayaz, Nisar Ahmad
Abstract:
Citrus reticulata Blanco crude flowers extract (CFE) at four different concentration (1, 2, 3 and 4%, v/v) were used as natural milk coagulant instead of rennet to apply for Cheddar cheese making from buffalo milk. The physicochemical properties and nutrition composition of Cheddar cheeses were compared with cheese made with 0.002% (v/v) rennet (control cheese). Physico-chemical of Cheddar cheese showed that cheese made with 1% and 2% of CFE had a crumbly and slightly softer texture of cheese. While, cheeses containing 3 and 4% CFE had semi-hard textural properties of curd similar to rennet added cheese. The CFE made cheese had moisture 37 %, fat 45 % on dry basis similar to rennet made Cheddar cheese. Protein analysis shows that CFE made cheese had significant higher protein content than control. The Cheddar cheese with 3% and 1% CFE were preferred by consumers instead of 2% and 4% CFE for their taste, texture/appearance and overall acceptability. Conclusively, CFE coagulated Cheddar cheese fulfills the nutritional requirement with acceptable organoleptic characteristics and at the same time provides nutritional health benefits.Keywords: cheddar cheese, Citrus reticulata Blanco, buffalo milk, milk coagulant
Procedia PDF Downloads 307639 Moving towards a General Definition of Public Happiness: A Grounded Theory Approach to the Recent Academic Research on Well-Being
Authors: Cristina Sanchez-Sanchez
Abstract:
Although there seems to be a growing interest in the study of the citizen’s happiness as an alternative measure of a country’s progress to GDP, happiness as a public concern is still an ambiguous concept, hard to define. Moreover, different notions are used indiscriminately to talk about the same thing. This investigation aims to determine the conceptions of happiness, well-being and quality of life that originate from the indexes that different governments and public institutions around the world have created to study them. Through the Scoping Review method, this study identifies the recent academic research in this field (a total of 267 documents between 2006 and 2016) from some of the most popular social sciences databases around the world, Web of Science, Scopus, JSTOR, Sage, EBSCO, IBSS and Google Scholar, and in Spain, ISOC and Dialnet. These 267 documents referenced 53 different indexes and researches. The Grounded Theory method has been applied to a sample of 13 indexes in order to identify the main categories they use to determine these three concepts. The results show that these are multi-dimensional concepts and similar indicators are used indistinctly to measure happiness, well-being and quality of life.Keywords: common good, grounded theory, happiness economics, happiness index, quality of life, scoping review, well-being
Procedia PDF Downloads 280638 Influence of Vegetable Oil-Based Controlled Cutting Fluid Impinging Supply System on Micro Hardness in Machining of Ti-6Al-4V
Authors: Salah Gariani, Islam Shyha, Fawad Inam, Dehong Huo
Abstract:
A controlled cutting fluid impinging supply system (CUT-LIST) was developed to deliver an accurate amount of cutting fluid into the machining zone via well-positioned coherent nozzles based on a calculation of the heat generated. The performance of the CUT-LIST was evaluated against a conventional flood cutting fluid supply system during step shoulder milling of Ti-6Al-4V using vegetable oil-based cutting fluid. In this paper, the micro-hardness of the machined surface was used as the main criterion to compare the two systems. CUT-LIST provided significant reductions in cutting fluid consumption (up to 42%). Both systems caused increased micro-hardness value at 100 µm from the machined surface, whereas a slight reduction in micro-hardness of 4.5% was measured when using CUL-LIST. It was noted that the first 50 µm is the soft sub-surface promoted by thermal softening, whereas down to 100 µm is the hard sub-surface caused by the cyclic internal work hardening and then gradually decreased until it reached the base material nominal hardness. It can be concluded that the CUT-LIST has always given lower micro-hardness values near the machined surfaces in all conditions investigated.Keywords: impinging supply system, micro-hardness, shoulder milling, Ti-6Al-4V, vegetable oil-based cutting fluid
Procedia PDF Downloads 288637 Child Mental Abuse: An Unseen Scar
Authors: Ian C. Padgett
Abstract:
Future of society is built on the foundations built by the parents of today and how they raise their children. Strong foundations are made by accepting environments, good morals, and sound educations. Child abuse is a harm that immediately corrupts a child and everything that could do for society. Every child is a segment of modern society and future society, every child corrupted is a segment of society corrupted. Physical abuse is a clear abuse that leaves bruises and can traumatize a child for life, it can leave scars but effect a child’s mind for life. Another form of abuse, however, still impacts a child for life but with no scars to be seen. Child mental abuse directly targets children’s minds to control, manipulate, and belittle them. It becomes close to impossible to escape as there is no clear law defining mental abuse, the parent manipulates the child to stay quiet, and finally the child must come to terms that there parent is harming them. Society does not react to mental and physical abuse in the same manner. In a society that works to protect it future and it children, mental abuse is given a strange lack of attention. In order to protect children, all forms of abuse must be treated and given attention to. Mental abuse comes in many forms and can be extremely hard to spot, unlike physical abuse, but can still lead to the trauma other abuse can cause. While no abuse is worse than others, mental abuse should not be treated like it is nonexistent.Keywords: Abuse Awareness, Child Mental Abuse, Effects of Abuse, Societal Issues
Procedia PDF Downloads 206