Search results for: Graph Library
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1115

Search results for: Graph Library

515 Solution to Riemann Hypothesis Critical Strip Zone Using Non-Linear Complex Variable Functions

Authors: Manojkumar Sabanayagam

Abstract:

The Riemann hypothesis is an unsolved millennium problem and the search for a solution to the Riemann hypothesis is to study the pattern of prime number distribution. The scope of this paper is to identify the solution for the critical strip and the critical line axis, which has the non-trivial zero solutions using complex plane functions. The Riemann graphical plot is constructed using a linear complex variable function (X+iY) and is applicable only when X>1. But the investigation shows that complex variable behavior has two zones. The first zone is the transformation zone, where the definition of the complex plane should be a non-linear variable which is the critical strip zone in the graph (X=0 to 1). The second zone is the transformed zone (X>1) defined using linear variables conventionally. This paper deals with the Non-linear function in the transformation zone derived using cosine and sinusoidal time lag w.r.t imaginary number ‘i’. The alternate complex variable (Cosθ+i Sinθ) is used to understand the variables in the critical strip zone. It is concluded that the non-trivial zeros present in the Real part 0.5 are because the linear function is not the correct approach in the critical strip. This paper provides the solution to Reimann's hypothesis.

Keywords: Reimann hypothesis, critical strip, complex plane, transformation zone

Procedia PDF Downloads 208
514 A Mobile Application for Analyzing and Forecasting Crime Using Autoregressive Integrated Moving Average with Artificial Neural Network

Authors: Gajaanuja Megalathan, Banuka Athuraliya

Abstract:

Crime is one of our society's most intimidating and threatening challenges. With the majority of the population residing in cities, many experts and data provided by local authorities suggest a rapid increase in the number of crimes committed in these cities in recent years. There has been an increasing graph in the crime rates. People living in Sri Lanka have the right to know the exact crime rates and the crime rates in the future of the place they are living in. Due to the current economic crisis, crime rates have spiked. There have been so many thefts and murders recorded within the last 6-10 months. Although there are many sources to find out, there is no solid way of searching and finding out the safety of the place. Due to all these reasons, there is a need for the public to feel safe when they are introduced to new places. Through this research, the author aims to develop a mobile application that will be a solution to this problem. It is mainly targeted at tourists, and people who recently relocated will gain advantage of this application. Moreover, the Arima Model combined with ANN is to be used to predict crime rates. From the past researchers' works, it is evidently clear that they haven’t used the Arima model combined with Artificial Neural Networks to forecast crimes.

Keywords: arima model, ANN, crime prediction, data analysis

Procedia PDF Downloads 135
513 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 308
512 Superconductor-Insulator Transition in Disordered Spin-1/2 Systems

Authors: E. Cuevas, M. Feigel'man, L. Ioffe, M. Mezard

Abstract:

The origin of continuous energy spectrum in large disordered interacting quantum systems is one of the key unsolved problems in quantum physics. While small quantum systems with discrete energy levels are noiseless and stay coherent forever in the absence of any coupling to external world, most large-scale quantum systems are able to produce thermal bath, thermal transport and excitation decay. This intrinsic decoherence is manifested by a broadening of energy levels which acquire a finite width. The important question is: What is the driving force and mechanism of transition(s) between two different types of many-body systems - with and without decoherence and thermal transport? Here, we address this question via two complementary approaches applied to the same model of quantum spin-1/2 system with XY-type exchange interaction and random transverse field. Namely, we develop analytical theory for this spin model on a Bethe lattice and implement numerical study of exact level statistics for the same spin model on random graph. This spin model is relevant to the study of pseudogaped superconductivity and S-I transition in some amorphous materials.

Keywords: strongly correlated electrons, quantum phase transitions, superconductor, insulator

Procedia PDF Downloads 584
511 Analysis and Modeling of Stresses and Creeps Resulting from Soil Mechanics in Southern Plains of Kerman Province

Authors: Kourosh Nazarian

Abstract:

Many of the engineering materials, such as behavioral metals, have at least a certain level of linear behavior. It means that if the stresses are doubled, the deformations would be also doubled. In fact, these materials have linear elastic properties. Soils do not follow this law, for example, when compressed, soils become gradually tighter. On the surface of the ground, the sand can be easily deformed with a finger, but in high compressive stresses, they gain considerable hardness and strength. This is mainly due to the increase in the forces among the separate particles. Creeps also deform the soils under a constant load over time. Clay and peat soils have creep behavior. As a result of this phenomenon, structures constructed on such soils will continue their collapse over time. In this paper, the researchers analyzed and modeled the stresses and creeps in the southern plains of Kerman province in Iran through library-documentary, quantitative and software techniques, and field survey. The results of the modeling showed that these plains experienced severe stresses and had a collapse of about 26 cm in the last 15 years and also creep evidence was discovered in an area with a gradient of 3-6 degrees.

Keywords: Stress, creep, faryab, surface runoff

Procedia PDF Downloads 180
510 Anemia Maternal in Pregnancy as a Risk Factor of Low Birth Weight: A Systematic Review

Authors: Herlena Hayati, Diyan Reni Jayathi, Hairida Anggun, Citra Amelia

Abstract:

This systematic review research is aimed to find out anemia maternal during pregnancy as a risk factor of low birth weight. This research was done by searching some journals which have associated to maternal anemia during pregnancy with low birth weight that had been published in journal accreditation and scopus index. Study literature that researcher had been done by March – April 2016 through online library of UI. The journals that had been selected according to inclusive criteria and exclusive criteria had been through the critial appraisal process. This systematic review towards 4 journals that had been selected and published showed the significant result statistically that anemia maternal is one of the risk factors which causes low birth weight. Anemia maternal on the first-trimester pregnancy showed significant association with low birth weight. Moderate anemia and severe anemia also showed significant association with low birth weight. Meanwhile, mild anemia doesn’t have an association with low birth weight. The conclusion of this study is anemia maternal (as an independent risk factor) have an influence towards low birth weight.

Keywords: anemia maternal, low birth weight, pregnancy, systematic review

Procedia PDF Downloads 286
509 Liberal Thoughts in the Modern Centuries

Authors: Siavash Soltani Hemmat

Abstract:

Although 21st-century humanity is at the height of technology and has stepped toward the endless boundaries of knowledge, there are still people in many parts of the world who are deprived of even the most fundamental freedoms. Whereas without freedom, no possible meaning can be imagined for human life, none of the human talents will have the chance to flourish, and that man will be reduced to the level of an animal, removing the obstacles to human freedom, especially from the viewpoint of thoughts, is of utmost importance, in which the liberal ideas of the modern centuries have played an incomparable role. The aim of the present study is to introduce and explain the liberal ideas in the modern centuries and their role in the expansion of human freedoms in order to weaken and discredit the ideological and intellectual barriers to restricting the freedom of individuals and to pave the way for the liberation of humanity. A descriptive method has been employed in order to achieve the objectives of the research. Besides, for data collection, a library method has been conducted. In this study, three ideological teachings of the social contract , resistance against unjust governance and natural law were recognized as the foundations of the realization of fundamental freedoms of the people in the modern centuries and their content was explained and examined.

Keywords: freedom, natural law, social contract, resistance

Procedia PDF Downloads 213
508 Design, Synthesis, and Evaluation of Small Peptides for Managing Inflammation: Inhibition to Substrate Approach

Authors: Palwinder Singh, Baljit Kaur, Sukhmeet Kaur

Abstract:

Amongst a library of rationally designed small peptides, (H)Gly-Gly-Phe-Leu(OMe) was identified, reducing prostaglandin production of COX-2 with IC50 60 nM vs. 6000 nM for COX-1. The 5 mg Kg-1 dose of this compound rescued albino mice by 80% from capsaicin-induced paw licking and recovered it by 60% from carrageenan-induced inflammation. The mode of action of the compound for targeting COX-2, iNOS, and VGSC was investigated by using substances P, L-arginine, and veratrine, respectively, as the biomarkers. The interactions of the potent compound with COX-2 were supported by the isothermal calorimetry experiments showing Ka 6.10±1.10x104 mol-1 and ΔG -100.3 k J mol-1 in comparison to Ka 0.41x103 ±0.09 mol-1 and ΔG -19.2±0.06 k J mol-1 for COX-1. This compound did not show toxicity up to 2000 mg Kg-1 dose. Furthermore, beyond the conventional mode of working with anti-inflammatory agents through enzyme inhibition, COX-2 was provided with a peptide-based alternate substrate. Proline-centered pentapeptide iso-conformational to arachidonic acid exhibited appreciable selectivity for COX-2 overcoming acetic acid and formalin-induced pain in rats to almost 80% and was treated as a substrate by the enzyme. Hence, we suggest small peptides as highly potent and promising candidates for their further development into an anti-inflammatory drug.

Keywords: small peptides, cyclooxygenase, inflammation, substrate

Procedia PDF Downloads 88
507 Study of Human Position in Architecture with Contextual Approach

Authors: E. Zarei, M. Bazaei, A. seifi, A. Keshavarzi

Abstract:

Contextuallism has been always the main component of urban science. It not only has great direct and indirect impact on behaviors, events and interactions, but also is one of the basic factors of an urban values and identity. Nowadays there might be some deficiencies in the cities. In the theories of environment designing, humanistic orientations with the focus on culture and cultural variables would enable us to transfer information. To communicate with the context in which human lives, he needs some common memories, understandable symbols and daily activities in that context. The configuration of a place can impact on human’s behaviors. The goal of this research is to review 7 projects in different parts of the world with various usages and some factors such as ‘sense of place’, ‘sense of belonging’ and ‘social and cultural relations’ will be discussed in these projects. The method used for research in this project is descriptive- analytic. Library information and Internet are the main sources of gathering information and the method of reasoning used in this project is inductive. The consequence of this research will be some data in the form of tables that has been extracted from mentioned projects.

Keywords: contextuallism with humanistic approach, sense of place, sense of belonging, social and cultural relations

Procedia PDF Downloads 397
506 EduEasy: Smart Learning Assistant System

Authors: A. Karunasena, P. Bandara, J. A. T. P. Jayasuriya, P. D. Gallage, J. M. S. D. Jayasundara, L. A. P. Y. P. Nuwanjaya

Abstract:

Usage of smart learning concepts has increased rapidly all over the world recently as better teaching and learning methods. Most educational institutes such as universities are experimenting those concepts with their students. Smart learning concepts are especially useful for students to learn better in large classes. In large classes, the lecture method is the most popular method of teaching. In the lecture method, the lecturer presents the content mostly using lecture slides, and the students make their own notes based on the content presented. However, some students may find difficulties with the above method due to various issues such as speed in delivery. The purpose of this research is to assist students in large classes in the following content. The research proposes a solution with four components, namely note-taker, slide matcher, reference finder, and question presenter, which are helpful for the students to obtain a summarized version of the lecture note, easily navigate to the content and find resources, and revise content using questions.

Keywords: automatic summarization, extractive text summarization, speech recognition library, sentence extraction, automatic web search, automatic question generator, sentence scoring, the term weight

Procedia PDF Downloads 149
505 Comparing Bestseller Books in Japanese Public Libraries Managed by Outsourcing and by Local Governments

Authors: Yuhiro Mizunuma, Keita Tsuji

Abstract:

In Japan, local governments have long managed public libraries; however, organizations including private enterprises took over their management with the introduction of an outsourcing system in 2003. Now, whether local governments should apply this system to public libraries is under discussion, and many argue that it is inappropriate for public libraries. In this study, to provide basic data for such discussions, the differences between public libraries managed by outsourcing (henceforth, 'outsourcing libraries') and those managed directly by local governments (henceforth 'direct management libraries') were examined, focusing on bestsellers. We chose the 435 books on the top-20 bestseller lists published from 1996 to 2015 inclusive, as our sample bestseller books; and 413 outsourcing libraries' and 2,619 direct management libraries' holdings of them were investigated using the Calil API (a free Web service that can perform cross-library searches on libraries in Japan). Results show that outsourcing libraries tend to hold fewer bestsellers than direct management libraries. It was also found that direct management libraries tend to hold many duplicates of bestsellers, and that, in many cases, many of those were not being borrowed in direct management libraries.

Keywords: bestseller books, book collection, Japanese public libraries, outsourcing

Procedia PDF Downloads 218
504 The Effects of Information Technology in Urban Health

Authors: Safdari Reza, Zahmatkeshan Maryam, Goli Arji

Abstract:

Background and Aim: Urban health is one of the challenges of the 21st century. Rapid growth and expanding urbanization have implications for health. In this regard, information technology can remove a large number of modern cities’ problems. Therefore, the present article aims to study modern information technologies in the development of urban health. Materials and Methods:. This is a review article based on library research and Internet searches on valid websites such as Science Direct, Magiran, Springer and advanced searches in Google. Some 164 domestic and foreign texts were studied on such topics as the application of ICT tools including cell phones and wireless tools, GIS, and RFID in the field of urban health in 2011. Finally, 30 sources were used. Conclusion: Information and communication technologies play an important role in improving people's health and enhancing the quality of their lives. Effective utilization of information and communication technologies requires the identification of opportunities and constraints, and the formulation of appropriate planning principles with regard to social and economic factors together with preparing the technological, communication and telecommunications, legal and administrative infrastructures.

Keywords: Urban Health, Information Technology, Information & Communication, Technology

Procedia PDF Downloads 465
503 Suitability of Indonesia's Tax Administration with Abu Yusuf Thought

Authors: Dina Safrina

Abstract:

This paper aims to discuss the suitability of tax administration in Indonesia based on Islamic Shari'a by looking at Abu Yusuf's idea of taxation. This research is a qualitative research and using data collection method by library research, that is by studying, deepening and citing theories or concepts from a number of literature. The purpose of this paper is to find out whether taxation in Indonesia is consistent with the thinking of Islamic economists, namely Abu Yusuf's idea which became known by economists as the canons of taxation. The ability to pay, lax time giving for taxpayers and the centralization of decision-making in the tax administration are some of the principles it emphasizes. In taxation he recommends the use of the Muqassamah (Proportional Tax) system rather than the Mixed (Fixed Tax) system. In this case, the determination of tax rates in Indonesia there are using fixed tax system, proportional tax, progressive tax and regressive tax. Abu Yusuf opposed the existence of Qabalah institution (the guarantor of tax payments to the state) at the time and suggested a tax administration centered and paid directly to the state. This is in accordance with those already applied in Indonesia where tax collection is done centrally. The tax system in Indonesia using self assessment system, which is the authority and responsibility given by the government to the taxpayer to calculate, pay and report the tax itself becomes the gap for taxpayers to commit fraud. Prerequisites that must be met for the success of this system is with the tax consciousness, tax honesty, tax mindedness, and tax discipline.

Keywords: Abu Yusuf, Indonesia, tax, tax administration

Procedia PDF Downloads 419
502 Optimization of Reliability and Communicability of a Random Two-Dimensional Point Patterns Using Delaunay Triangulation

Authors: Sopheak Sorn, Kwok Yip Szeto

Abstract:

Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a complex system will perform satisfactorily. When the system is described by a network of N components (nodes) and their L connection (links), the reliability of the system becomes a network design problem that is an NP-hard combinatorial optimization problem. In this paper, we address the network design problem for a random point set’s pattern in two dimensions. We make use of a Voronoi construction with each cell containing exactly one point in the point pattern and compute the reliability of the Voronoi’s dual, i.e. the Delaunay graph. We further investigate the communicability of the Delaunay network. We find that there is a positive correlation and a negative correlation between the homogeneity of a Delaunay's degree distribution with its reliability and its communicability respectively. Based on the correlations, we alter the communicability and the reliability by performing random edge flips, which preserve the number of links and nodes in the network but can increase the communicability in a Delaunay network at the cost of its reliability. This transformation is later used to optimize a Delaunay network with the optimum geometric mean between communicability and reliability. We also discuss the importance of the edge flips in the evolution of real soap froth in two dimensions.

Keywords: Communicability, Delaunay triangulation, Edge Flip, Reliability, Two dimensional network, Voronio

Procedia PDF Downloads 420
501 Systematic Review of Functional Analysis in Brazil

Authors: Felipe Magalhaes Lemos

Abstract:

Functional behavior analysis is a procedure that has been studied for several decades by behavior analysts. In Brazil, we still have few studies in the area, so it was decided to carry out a systematic review of the articles published in the area by Brazilians. A search was done on the following scientific article registration sites: PsycINFO, ERIC, ISI Web of Science, Virtual Health Library. The research includes (a) peer-reviewed studies that (b) have been carried out in Brazil containing (c) functional assessment as a pre-treatment through (d) experimental procedures, direct or indirect observation and measurement of behavior problems (e) demonstrating a relationship between environmental events and behavior. During the review, 234 papers were found; however, only 9 were included in the final analysis. Of the 9 articles extracted, only 2 presented functional analysis procedures with manipulation of environmental variables, while the other 7 presented different procedures for a descriptive behavior assessment. Only the two studies using "functional analysis" used graphs to demonstrate the prevalent function of the behavior. Other studies described procedures and did not make clear the causal relationship between environment and behavior. There is still confusion in Brazil regarding the terms "functional analysis", "descriptive assessment" and "contingency analysis," which are generally treated in the same way. This study shows that few articles are published with a focus on functional analysis in Brazil.

Keywords: behavior, contingency, descriptive assessment, functional analysis

Procedia PDF Downloads 146
500 Antioxidant Activity of Essential Oils and Ethanolic Extracts of Four Medicinal Plants Alone and in Combination

Authors: Fatiha Bedjou, Meriem Meddas, Tadjajikt Chekkal

Abstract:

The present work aims to evaluate the antioxidant activity of ethanolic extracts and essential oils of aromatic plants of the Lamiaceae family: Thymus algeriensis and Salvia rosmarinus, and Anacardiaceae: Pistacia lentiscus, Myrtaceae: Eucalyptus polybracetea. The polyphenols were measured using the Folin-Ciocalteu method; the results showed that the essential oils studied as well as the ethanolic extracts are relatively rich in polyphenols. Their antioxidant properties were tested by the synthetic DPPH radical trapping method. The IC50 values were determined according to the graph representing the percentage of inhibition of the DPPH radical by essential oils and by ethanolic extracts, according to our results there is a correlation between the level of polyphenols present in the different essential oils and different ethanolic extracts and their ability to neutralize free radicals. Several combinations were carried out between the essential oils and also between the ethanolic extracts in order to determine the type of interactions existing between the combined substances, the results were represented in the form of isobolograms. Additive and super-additive effects were observed in combinations of essential oils, and super-additive and sub-additive effects were observed for combinations of ethanolic extracts.

Keywords: essential oils, ethanolic extracts, DPPH, combination

Procedia PDF Downloads 61
499 The Neurofunctional Dissociation between Animal and Tool Concepts: A Network-Based Model

Authors: Skiker Kaoutar, Mounir Maouene

Abstract:

Neuroimaging studies have shown that animal and tool concepts rely on distinct networks of brain areas. Animal concepts depend predominantly on temporal areas while tool concepts rely on fronto-temporo-parietal areas. However, the origin of this neurofunctional distinction for processing animal and tool concepts remains still unclear. Here, we address this question from a network perspective suggesting that the neural distinction between animals and tools might reflect the differences in their structural semantic networks. We build semantic networks for animal and tool concepts derived from McRae and colleagues’s behavioral study conducted on a large number of participants. These two networks are thus analyzed through a large number of graph theoretical measures for small-worldness: centrality, clustering coefficient, average shortest path length, as well as resistance to random and targeted attacks. The results indicate that both animal and tool networks have small-world properties. More importantly, the animal network is more vulnerable to targeted attacks compared to the tool network a result that correlates with brain lesions studies.

Keywords: animals, tools, network, semantics, small-worls, resilience to damage

Procedia PDF Downloads 545
498 Extraction of Urban Land Features from TM Landsat Image Using the Land Features Index and Tasseled Cap Transformation

Authors: R. Bouhennache, T. Bouden, A. A. Taleb, A. Chaddad

Abstract:

In this paper we propose a method to map the urban areas. The method uses an arithmetic calculation processed from the land features indexes and Tasseled cap transformation TC of multi spectral Thematic Mapper Landsat TM image. For this purpose the derived indexes image from the original image such SAVI the soil adjusted vegetation index, UI the urban Index, and EBBI the enhanced built up and bareness index were staked to form a new image and the bands were uncorrelated, also the Spectral Angle Mapper (SAM) and Spectral Information Divergence (SID) supervised classification approaches were first applied on the new image TM data using the reference spectra of the spectral library and subsequently the four urban, vegetation, water and soil land cover categories were extracted with their accuracy assessment.The urban features were represented using a logic calculation applied to the brightness, UI-SAVI, NDBI-greenness and EBBI- brightness data sets. The study applied to Blida and mentioned that the urban features can be mapped with an accuracy ranging from 92 % to 95%.

Keywords: EBBI, SAVI, Tasseled Cap Transformation, UI

Procedia PDF Downloads 484
497 Recognition of Gene Names from Gene Pathway Figures Using Siamese Network

Authors: Muhammad Azam, Micheal Olaolu Arowolo, Fei He, Mihail Popescu, Dong Xu

Abstract:

The number of biological papers is growing quickly, which means that the number of biological pathway figures in those papers is also increasing quickly. Each pathway figure shows extensive biological information, like the names of genes and how the genes are related. However, manually annotating pathway figures takes a lot of time and work. Even though using advanced image understanding models could speed up the process of curation, these models still need to be made more accurate. To improve gene name recognition from pathway figures, we applied a Siamese network to map image segments to a library of pictures containing known genes in a similar way to person recognition from photos in many photo applications. We used a triple loss function and a triplet spatial pyramid pooling network by combining the triplet convolution neural network and the spatial pyramid pooling (TSPP-Net). We compared VGG19 and VGG16 as the Siamese network model. VGG16 achieved better performance with an accuracy of 93%, which is much higher than OCR results.

Keywords: biological pathway, image understanding, gene name recognition, object detection, Siamese network, VGG

Procedia PDF Downloads 292
496 Towards Expanding the Use of the Online Judge UnitJudge for Java Programming Exercises and Web Development Practices in Computer Science Education

Authors: Iván García-Magariño, Javier Bravo-Agapito, Marta López-Fernández

Abstract:

Online judges have proven their utility in partial auto-evaluation of programming short exercises in the last decades. UnitJudge online judge has the advantage of facilitating the evaluation of separate units to provide more segregate and meaningful feedback to students in complex exercises and practices. This paper discusses the use of UnitUdge in advanced Java object-oriented programming exercises and web development practices. This later usage has been proposed by means of the Selenium Java library and classes to provide the web address. Consequently, UnitJudge is an online judge system that can be applied in several subjects, and therefore, many other students would take advantage of self-testing their exercises. This paper presents the experiments with a Java programming exercise for learning Java object-oriented classes with a generic type. Considering 10 students who voluntarily used UnitJudge, 80% successfully learned this concept, passing the judge exercise with correct results.

Keywords: online judges, programming skills, computer science education, auto-evaluation

Procedia PDF Downloads 101
495 Molecular Cloning of CSP2s, PBP1 and PBP2 Genes of Rhyzopertha dominica

Authors: Suliman A. I. Ali, Mory Mandiana Diakite, Saqib Ali, Man-Qun Wang

Abstract:

Lesser grain borer, Rhyzopertha dominica, is a causing damages of stored grains all tropical and subtropical area in the global, according to the information of antenna cDNA library of R. dominica, three olfactory protein genes, including R.domica CSPs2, R.domica PBPs1, R.domica PBPs2 genes (GenBank accessions are KJ186798.1, KJ186830.1, KJ186831.1 separately.), were successfully cloned. For sequencing and phylogenetic analysis, R.domica CSPs1 and R.domica CSPs2 belonged to Minus-C CSPs showed that have 4 conserved cysteine residues, while R.domica PBPs1 and R.domica PBPs2 showed conserved amino acids in all PBPs six conserved cysteine residues. The results of transcription expression level of PBPs1 and PBPs2 of R. dominica showed that the expression level of R.domnica PBP2 is much higher than that of R.domnica PBP1. The variation transcription level at the different developmental time suggested the PBP1, and PBP2 had their particular job in searching food sources, mates and oviposition sites.

Keywords: Rhyzopertha dominica, CSPs, PBPs, molecular cloning

Procedia PDF Downloads 148
494 Investigating the Encouraging Factors for Scholarly Works Contribution towards Institutional Repository: A Case Study at a Malaysian University

Authors: Mohd Rashid bin Ab Hamid, Noor Azura binti Omar, Zainol Bin Mustafa

Abstract:

Purpose: The aim of this paper is to study the encouraging factors for scholarly works contribution towards among academicians at Malaysian university. Methods: This paper uses questionnaire for data collection on the respondents’ perceptional level on the institutional repository efforts in one of the university under study. Several encouraging factors have been identified and to be measured using descriptive statistics. The factors are related to content contribution, i.e. personal factor, professional factor, organizational factor and technological factor. Findings: The study found that all these four encouraging factors did have a relation to the contribution of scholarly works in the university by the academician. Research Limitations: This study used a case study and generalization to all Malaysian universities should be well taken care of. Practical implications: The library at the university should look into these four encouraging factors in order to enhance the contribution from academician towards the repository. Originality/value: This research paper provides basic information for the knowledge management officers in the university by endeavouring more efforts in order to attract more contributions.

Keywords: institutional repository, information retrieval, information storage and retrieval

Procedia PDF Downloads 562
493 The Effect of Remifentanil on Emergence Agitation after Sevoflurane Anesthesia in Children: A Meta-Analysis

Authors: Jong Yeop Kim, Sung Young Park, Dae Hee Kim, Han Bum Joe, Ji Young Yoo, Jong Bum Choi, Sook Young Lee

Abstract:

Emergence agitation (EA) is commonly reported adverse events after sevoflurane anesthesia in pediatric patients. The efficacy of prophylactic remifentanil, one of mu opioid agonist, in preventing EA is controversial. This meta-analysis assessed the effectiveness of remifentanil to decrease the incidence of EA from sevoflurane anesthesia in children. We searched for randomized controlled trials comparing sevoflurane alone anesthesia with sevoflurane and remifentanil anesthesia to prevent EA in the Cochrane Library, Embase, Pubmed, and KoreaMed, and included 6 studies with 361 patients. The number of patients of reporting EA was summarized using risk ratio (RR) with 95% confidence interval (CI), with point estimates and 95CIs derived from a random effects Mantel-Haenszel method. Overall incidence of EA was about 41%. Compared with sevoflurane alone anesthesia, intravenous infusion of remifentanil with sevoflurane significantly reduced the incidence of EA (RR 0.53, 95% CI 0.39-0.73, P < 0.0001), (heterogeneity, I2 = 0, P = 0.42). This meta-analysis suggested that continuous infusion of remifentanil could be effective in decreasing the EA of about 47% after sevoflurane anesthesia. However, considering limitations of the included studies, more randomized controlled studies are required to verify our results.

Keywords: emergence agitation, meta-analysis, remifentanil, pediatrics

Procedia PDF Downloads 376
492 Past, Present, and Future of Robotics Technology in Construction Industry (Literature Review)

Authors: Samira Haghbin, Behnam Daryayelaal, Zeinab Amiri

Abstract:

As a result of rapid progress of technology in various industries, the only way to survive in a competitive market of business is to update one's situation along with the said developments. During recent decades, Robotics and automation of the construction operation has emerged as one of the important technologies grabbing the attention of various industries and specially the construction industry. Because of the coming labor shortage of the aging society in the near future, robots will be used in construction fields more than ever. By predicting the condition of Robotics in world's future construction industry, we can make necessary preparations to face with needs imposed by the time and stay ahead. This article takes a library study approach and presents a literature review of existing studies with an aim to investigate the use of robotics in past, present and future of construction industry and make predictions on its' growth and change process. Therefore, to make familiar with this kind of technology and its' requirements in the construction industry, the status of Robotics in construction industry of different countries of the world has been studied and necessary context for its' future progress is expressed. It is hoped that identifying needs and required contexts will facilitate further development of advanced technologies such as robotics industry and lead to more preparation for future.

Keywords: future of robotics, construction industry, construction automation, trends of automation

Procedia PDF Downloads 392
491 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 276
490 Exploring the Symbolic Depictions of Animals and Mythical Creatures in Gilan Tomb Wall Paintings

Authors: Zeinab Mirabulqasemi, Gholamali Hatam

Abstract:

The article discusses the rich tradition of mural art in Gilan, Iran, particularly focusing on its religious and cultural significance, with a specific emphasis on tombs and Imamzadehs (descendants of imams). It examines the presence of animals and supernatural beings in these murals, such as horses, lions, birds, snakes, and angels, each carrying symbolic meanings within the religious narratives depicted. It discusses the multifaceted symbolism of these creatures and their portrayal in various scenes, enriching the narrative and conveying spiritual themes. Moreover, the article delves into the geographical and cultural context of the Gilan region, where many of these murals are found, and the challenges posed by environmental factors on their preservation. The article concludes by emphasizing the importance of preserving these artworks as valuable cultural heritage and calls for further research into their social, religious, and artistic dimensions. It utilizes a multifaceted research approach involving library research, image analysis, field investigations, and interviews with local inhabitants to gain a deeper understanding of the significance of these murals.

Keywords: cultural ritual, Shiite imams, mural, belief foundations, religious paintings

Procedia PDF Downloads 75
489 Digital Learning Repositories for Vocational Teaching and Knowledge Sharing

Authors: Prachyanun Nilsook, Panita Wannapiroon

Abstract:

The purpose of this research is to study a Digital Learning Repository System (DLRS) on vocational teachers and teaching in Thailand. The innobpcd.net is a DLRS being utilized by the Office of Vocational Education Commission and operationalized by the Bureau of Personnel Competency Development for vocational education teachers. The aim of the system is to support and enhance the process of vocational teaching and to improve staff development by providing teachers with a variety of network connections and information. The system provides centralized hosting and access to content, and the ability to share digital objects or files, to set permissions and controls for access to content that can be used vocational education teachers for their teaching and for their own development. The elements of DLRS include; Digital learning system, Media Library, Knowledge-based system and Mobile Application. The system aims to link vocational teachers to the most effective emerging technologies available for learning, so they are better resourced to support their vocational students. The initial results from this evaluation indicate that there is a range of services provided by the system being used by vocational teachers and this paper indicates which facilities have the greatest usage and impact on vocational teaching in Thailand.

Keywords: digital learning repositories, vocational education, knowledge sharing, learning objects

Procedia PDF Downloads 467
488 Integrating Distributed Architectures in Highly Modular Reinforcement Learning Libraries

Authors: Albert Bou, Sebastian Dittert, Gianni de Fabritiis

Abstract:

Advancing reinforcement learning (RL) requires tools that are flexible enough to easily prototype new methods while avoiding impractically slow experimental turnaround times. To match the first requirement, the most popular RL libraries advocate for highly modular agent composability, which facilitates experimentation and development. To solve challenging environments within reasonable time frames, scaling RL to large sampling and computing resources has proved a successful strategy. However, this capability has been so far difficult to combine with modularity. In this work, we explore design choices to allow agent composability both at a local and distributed level of execution. We propose a versatile approach that allows the definition of RL agents at different scales through independent, reusable components. We demonstrate experimentally that our design choices allow us to reproduce classical benchmarks, explore multiple distributed architectures, and solve novel and complex environments while giving full control to the user in the agent definition and training scheme definition. We believe this work can provide useful insights to the next generation of RL libraries.

Keywords: deep reinforcement learning, Python, PyTorch, distributed training, modularity, library

Procedia PDF Downloads 83
487 Training of Future Computer Science Teachers Based on Machine Learning Methods

Authors: Meruert Serik, Nassipzhan Duisegaliyeva, Danara Tleumagambetova

Abstract:

The article highlights and describes the characteristic features of real-time face detection in images and videos using machine learning algorithms. Students of educational programs reviewed the research work "6B01511-Computer Science", "7M01511-Computer Science", "7M01525- STEM Education," and "8D01511-Computer Science" of Eurasian National University named after L.N. Gumilyov. As a result, the advantages and disadvantages of Haar Cascade (Haar Cascade OpenCV), HoG SVM (Histogram of Oriented Gradients, Support Vector Machine), and MMOD CNN Dlib (Max-Margin Object Detection, convolutional neural network) detectors used for face detection were determined. Dlib is a general-purpose cross-platform software library written in the programming language C++. It includes detectors used for determining face detection. The Cascade OpenCV algorithm is efficient for fast face detection. The considered work forms the basis for the development of machine learning methods by future computer science teachers.

Keywords: algorithm, artificial intelligence, education, machine learning

Procedia PDF Downloads 73
486 Subjective Well-Being through Coaching Process

Authors: Pendar Fazel

Abstract:

Well-being is a good or satisfactory condition of existence; a state characterized by health, happiness, and prosperity. Well-being of people is correlated with, the cognitive, social, emotional, and physical aspect of their personality. Subjective well-being, people’s emotional and cognitive evaluations of their lives, includes what lay people call happiness, peace, fulfillment, and life satisfaction. Unfortunately in this period of time people are under the pressure of financial, social problems, and other stress factors which made them vulnerable, and their well-being is threatened. Personal Coaching as a holistic orientation and novel approach is ideal for the present century which help people, to find balance, enjoyment and meaning in their lives as well as improving performance, skills and effectiveness. The aim of the present article besides introducing the personal coaching is determining how personal coaching can positively effects on subjective well-being, under this aim we tend to describe how coaching impact on the cognitive and emotional reconstruction. Present qualitative research is descriptive analytic study, which data gathered by manual library research and search within authentic article through internet; analyzed personal coaching which integrated different views into an operational one helps people promote self-awareness as well as evaluate, emotional and cognitive aspect of their personality and provide appropriate subjective well-being.

Keywords: subjective well-being, coaching, well-being, positive psychology, personal growth

Procedia PDF Downloads 527