Search results for: hard thresholding
496 Anthropomorphism in the Primate Mind-Reading Debate: A Critique of Sober's Justification Argument
Authors: Boyun Lee
Abstract:
This study aims to discuss whether anthropomorphism some scientists tend to use in cross-species comparison can be justified epistemologically, especially in the primate mind-reading debate. Concretely, this study critically analyzes Elliott Sober’s argument about mind-reading hypothesis (MRH), an anthropomorphic hypothesis which states that nonhuman primates (e.g., chimpanzee) are mind-readers like humans. Although many scientists consider anthropomorphism as an error and choosing anthropomorphic hypothesis like MRH without any definite evidence invalid, Sober advocates that anthropomorphism is supported by cladistic parsimony that suggests choosing the simplest hypothesis postulating the minimum number of evolutionary changes, which can be justified epistemologically in the mind-reading debate. However, his argument has several problems. First, Reichenbach’s theorem which Sober uses in process of showing that MRH has the higher likelihood than its competing hypothesis, behavior-reading hypothesis (BRH), does not fit in the context of inferring the evolutionary relationship. Second, the phylogenetic tree Sober supports is one of the possible scenarios of MRH, and even without this problem, it is difficult to prove that the possibility nonhuman primate species and human share mind-reading ability is higher than the possibility of the other case, considering how evolution occurs. Consequently, it seems hard to justify anthropomorphism of MRH under Sober’s argument. Some scientists and philosophers say that anthropomorphism sometimes helps observe interesting phenomena or make hypotheses in comparative biology. Nonetheless, we cannot determine that it provides answers about why and how the interesting phenomena appear or which of the hypotheses is better, at least the mind-reading debate, under the current state.Keywords: anthropomorphism, cladistic parsimony, comparative biology, mind-reading debate
Procedia PDF Downloads 172495 Sub-Pixel Mapping Based on New Mixed Interpolation
Authors: Zeyu Zhou, Xiaojun Bi
Abstract:
Due to the limited environmental parameters and the limited resolution of the sensor, the universal existence of the mixed pixels in the process of remote sensing images restricts the spatial resolution of the remote sensing images. Sub-pixel mapping technology can effectively improve the spatial resolution. As the bilinear interpolation algorithm inevitably produces the edge blur effect, which leads to the inaccurate sub-pixel mapping results. In order to avoid the edge blur effect that affects the sub-pixel mapping results in the interpolation process, this paper presents a new edge-directed interpolation algorithm which uses the covariance adaptive interpolation algorithm on the edge of the low-resolution image and uses bilinear interpolation algorithm in the low-resolution image smooth area. By using the edge-directed interpolation algorithm, the super-resolution of the image with low resolution is obtained, and we get the percentage of each sub-pixel under a certain type of high-resolution image. Then we rely on the probability value as a soft attribute estimate and carry out sub-pixel scale under the ‘hard classification’. Finally, we get the result of sub-pixel mapping. Through the experiment, we compare the algorithm and the bilinear algorithm given in this paper to the results of the sub-pixel mapping method. It is found that the sub-pixel mapping method based on the edge-directed interpolation algorithm has better edge effect and higher mapping accuracy. The results of the paper meet our original intention of the question. At the same time, the method does not require iterative computation and training of samples, making it easier to implement.Keywords: remote sensing images, sub-pixel mapping, bilinear interpolation, edge-directed interpolation
Procedia PDF Downloads 229494 Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World
Authors: Fehmeen Anwar, Ujala Liaqat
Abstract:
For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics.Keywords: Anti-Ballistic Missile System (ABMS), cold-war, axis of evil, power dynamics
Procedia PDF Downloads 292493 Heterogeneity of Soil Moisture and Its Impacts on the Mountainous Watershed Hydrology in Northwest China
Authors: Chansheng He, Zhongfu Wang, Xiao Bai, Jie Tian, Xin Jin
Abstract:
Heterogeneity of soil hydraulic properties directly affects hydrological processes at different scales. Understanding heterogeneity of soil hydraulic properties such as soil moisture is therefore essential for modeling watershed ecohydrological processes, particularly in hard to access, topographically complex mountainous watersheds. This study maps spatial variations of soil moisture by in situ observation network that consists of sampling points, zones, and tributaries, and monitors corresponding hydrological variables of air and soil temperatures, evapotranspiration, infiltration, and runoff in the Upper Reach of the Heihe River Watershed, a second largest inland river (terminal lake) with a drainage area of over 128,000 km² in Northwest China. Subsequently, the study uses a hydrological model, SWAT (Soil and Water Assessment Tool) to simulate the effects of heterogeneity of soil moisture on watershed hydrological processes. The spatial clustering method, Full-Order-CLK was employed to derive five soil heterogeneous zones (Configuration 97, 80, 65, 40, and 20) for soil input to SWAT. Results show the simulations by the SWAT model with the spatially clustered soil hydraulic information from the field sampling data had much better representation of the soil heterogeneity and more accurate performance than the model using the average soil property values for each soil type derived from the coarse soil datasets. Thus, incorporating detailed field sampling soil heterogeneity data greatly improves performance in hydrologic modeling.Keywords: heterogeneity, soil moisture, SWAT, up-scaling
Procedia PDF Downloads 346492 The Prevalence of Intubation Induced Dental Complications among Hospitalized Patients
Authors: Dorsa Rahi, Arghavan Tonkanbonbi, Soheila Manifar, Behzad Jafvarnejad
Abstract:
Background and Aim: Intraoral manipulation is performed during endotracheal intubation for general anesthesia, which can traumatize the soft and hard tissue in the oral cavity and cause postoperative pain and discomfort. Dental trauma is the most common complication of intubation. This study aimed to assess the prevalence of dental complications due to intubation in patients hospitalized in Imam Khomeini Hospital during 2018-2019. Materials and Methods: A total of 805 patients presenting to the Cancer Institute of Imam Khomeini Hospital for preoperative anesthesia consultation were randomly enrolled. A dentist interviewed the patients and performed a comprehensive clinical oral examination preoperatively. The patients underwent clinical oral examination by another dentist postoperatively. Results: No significant correlation was found between dental trauma (tooth fracture, tooth mobility, or soft tissue injury) after intubation with the age or gender of patients. According to the Wilcoxon test and McNemar-Bowker Test, the rate of mobility before the intubation was significantly different from that after the intubation (P=0.000). Maxillary central incisors, maxillary left canine and mandibular right and left central incisors had the highest rate of fracture. Conclusion: Mobile teeth before the intubation are at higher risk of avulsion and aspiration during the procedure. Patients with primary temporomandibular joint disorders are more susceptible to post-intubation trismus.Keywords: oral trauma, dental trauma, intubation, anesthesia
Procedia PDF Downloads 148491 Helicopter Exhaust Gases Cooler in Terms of Computational Fluid Dynamics (CFD) Analysis
Authors: Mateusz Paszko, Ksenia Siadkowska
Abstract:
Due to the low-altitude and relatively low-speed flight, helicopters are easy targets for actual combat assets e.g. infrared-guided missiles. Current techniques aim to increase the combat effectiveness of the military helicopters. Protection of the helicopter in flight from early detection, tracking and finally destruction can be realized in many ways. One of them is cooling hot exhaust gasses, emitting from the engines to the atmosphere in special heat exchangers. Nowadays, this process is realized in ejective coolers, where strong heat and momentum exchange between hot exhaust gases and cold air ejected from atmosphere takes place. Flow effects of air, exhaust gases; mixture of those two and the heat transfer between cold air and hot exhaust gases are given by differential equations of: Mass transportation–flow continuity, ejection of cold air through expanding exhaust gasses, conservation of momentum, energy and physical relationship equations. Calculation of those processes in ejective cooler by means of classic mathematical analysis is extremely hard or even impossible. Because of this, it is necessary to apply the numeric approach with modern, numeric computer programs. The paper discussed the general usability of the Computational Fluid Dynamics (CFD) in a process of projecting the ejective exhaust gases cooler cooperating with helicopter turbine engine. In this work, the CFD calculations have been performed for ejective-based cooler cooperating with the PA W3 helicopter’s engines.Keywords: aviation, CFD analysis, ejective-cooler, helicopter techniques
Procedia PDF Downloads 332490 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique
Authors: Mario A. Blanco, Nicholas Burkhardt
Abstract:
An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer
Procedia PDF Downloads 361489 Use of Machine Learning Algorithms to Pediatric MR Images for Tumor Classification
Authors: I. Stathopoulos, V. Syrgiamiotis, E. Karavasilis, A. Ploussi, I. Nikas, C. Hatzigiorgi, K. Platoni, E. P. Efstathopoulos
Abstract:
Introduction: Brain and central nervous system (CNS) tumors form the second most common group of cancer in children, accounting for 30% of all childhood cancers. MRI is the key imaging technique used for the visualization and management of pediatric brain tumors. Initial characterization of tumors from MRI scans is usually performed via a radiologist’s visual assessment. However, different brain tumor types do not always demonstrate clear differences in visual appearance. Using only conventional MRI to provide a definite diagnosis could potentially lead to inaccurate results, and so histopathological examination of biopsy samples is currently considered to be the gold standard for obtaining definite diagnoses. Machine learning is defined as the study of computational algorithms that can use, complex or not, mathematical relationships and patterns from empirical and scientific data to make reliable decisions. Concerning the above, machine learning techniques could provide effective and accurate ways to automate and speed up the analysis and diagnosis for medical images. Machine learning applications in radiology are or could potentially be useful in practice for medical image segmentation and registration, computer-aided detection and diagnosis systems for CT, MR or radiography images and functional MR (fMRI) images for brain activity analysis and neurological disease diagnosis. Purpose: The objective of this study is to provide an automated tool, which may assist in the imaging evaluation and classification of brain neoplasms in pediatric patients by determining the glioma type, grade and differentiating between different brain tissue types. Moreover, a future purpose is to present an alternative way of quick and accurate diagnosis in order to save time and resources in the daily medical workflow. Materials and Methods: A cohort, of 80 pediatric patients with a diagnosis of posterior fossa tumor, was used: 20 ependymomas, 20 astrocytomas, 20 medulloblastomas and 20 healthy children. The MR sequences used, for every single patient, were the following: axial T1-weighted (T1), axial T2-weighted (T2), FluidAttenuated Inversion Recovery (FLAIR), axial diffusion weighted images (DWI), axial contrast-enhanced T1-weighted (T1ce). From every sequence only a principal slice was used that manually traced by two expert radiologists. Image acquisition was carried out on a GE HDxt 1.5-T scanner. The images were preprocessed following a number of steps including noise reduction, bias-field correction, thresholding, coregistration of all sequences (T1, T2, T1ce, FLAIR, DWI), skull stripping, and histogram matching. A large number of features for investigation were chosen, which included age, tumor shape characteristics, image intensity characteristics and texture features. After selecting the features for achieving the highest accuracy using the least number of variables, four machine learning classification algorithms were used: k-Nearest Neighbour, Support-Vector Machines, C4.5 Decision Tree and Convolutional Neural Network. The machine learning schemes and the image analysis are implemented in the WEKA platform and MatLab platform respectively. Results-Conclusions: The results and the accuracy of images classification for each type of glioma by the four different algorithms are still on process.Keywords: image classification, machine learning algorithms, pediatric MRI, pediatric oncology
Procedia PDF Downloads 149488 Results of Longitudinal Assessments of Very Low Birth Weight and Extremely Low Birth Weight Infants
Authors: Anett Nagy, Anna Maria Beke, Rozsa Graf, Magda Kalmar
Abstract:
Premature birth involves developmental risks – the earlier the baby is born and the lower its birth weight, the higher the risks. The developmental outcomes for immature, low birth weight infants are hard to predict. Our aim is to identify the factors influencing infant and preschool-age development in very low birth weight (VLBW) and extremely low birth weight (ELBW) preterms. Sixty-one subjects participated in our longitudinal study, which consisted of thirty VLBW and thirty-one ELBW children. The psychomotor development of the infants was assessed using the Brunet-Lezine Developmental Scale at the corrected ages of one and two years; then at three years of age, they were tested with the WPPSI-IV IQ test. Birth weight, gestational age, perinatal complications, gender, and maternal education, were added to the data analysis as independent variables. According to our assessments, our subjects as a group scored in the average range in each subscale of the Brunet-Lezine Developmental Scale. The scores were the lowest in language at both measurement points. The children’s performances improved between one and two years of age, particularly in the domain of coordination. At three years of age the mean IQ test results, although still in the average range, were near the low end of it in each index. The ELBW preterms performed significantly poorer in Perceptual Reasoning Index. The developmental level at two years better predicted the IQ than that at one year. None of the measures distinguished the genders.Keywords: preterm, extremely low birth-weight, perinatal complication, psychomotor development, intelligence, follow-up
Procedia PDF Downloads 244487 Synthesis, Structural and Vibrational Studies of a New Lacunar Apatite: LIPB2CA2(PO4)3
Authors: A. Chari, A. El Bouari, B. Orayech, A. Faik, J. M. Igartua
Abstract:
The phosphate is a natural resource of great importance in Morocco. In order to exploit this wealth, synthesis and studies of new a material based phosphate, were carried out. The apatite structure present o lot of characteristics, One of the main characteristics is to allow large and various substitutions for both cations and anions. Beside their biological importance in hard tissue (bone and teeth), apatites have been extensively studied for their potential use as fluorescent lamp phosphors or laser host materials.The apatite have interesting possible application fields such as in medicine as materials of bone filling, coating of dental implants, agro chemicals as artificial fertilizers. The LiPb2Ca2(PO4)3 was synthesized by the solid-state method, its crystal structure was investigated by Rietveld analysis using XRPD data. This material crystallizes with a structure of lacunar apatite anion deficit. The LiPb2Ca2(PO4)3 is hexagonal apatite at room temperature, adopting the space group P63/m (ITA No. 176), Rietveld refinements showed that the site 4f is shared by three cations Ca, Pb and Li. While the 6h is occupied by the Pb and Li cations. The structure can be described as built up from the PO4 tetrahedra and the sixfold coordination cavities, which delimit hexagonal tunnels along the c-axis direction. These tunnels are linked by the cations occupying the 4 f sites. Raman and Infrared spectroscopy analyses were carried out. The observed frequencies were assigned and discussed on the basis of unit-cell group analysis and by comparison to other apatite-type materials.Keywords: apatite, Lacunar, crystal structure, Rietveldmethod, LiPb2Ca2(PO4)3, Phase transition
Procedia PDF Downloads 404486 Happiness and Its Political Consequences: A Proposal for a Socially Constructed Object
Authors: Luciano E. Sewaybricker
Abstract:
Psychology has faced many challenges in order to claim its right to study happiness. Probably the major issue has been to present a clear definition of happiness, which has a long history outside the scientific field and has been used imprecisely in the daily life. Even after years of great improvement, different meanings of happiness still have been seen in academic studies. This scenario allows to question if any definition is consistent enough to sustain the recent findings of the psychological processes behind happiness. Moreover, does it make sense to seek a single definition of happiness? By investigating the history of happiness and the theoretical foundations of Positive Psychology, it can be advocated that it’s proper for happiness to be polysemic. Since Ancient Greece most attempts to outline happiness consists of an appreciation of the "best way to live" and consequently requires a delineation of the most important things in life. Besides this generic definition, it’s hard to find consensus about happiness. In fact, what and how much something will be considered important to happiness depend on social influence. This compels happiness to vary between groups, historical periods, and even for the same person over time. Therefore, the same psychological processes will not necessarily be behind all forms of happiness. Consequently, three assumptions should be considered when studying happiness: it’s intrinsic of happiness to be transitory and socially influenced; happiness refers not only to what is possible in the present, but also to an ideal future; when someone (including a scientist) talks about happiness they describe and prescribe a better way to live. Because any attempt to define happiness will be limited in space and time, it's more suitable to study its variations than its universalities. This may have considerable consequences to political agenda on happiness evaluation and maximization, like Gross National Happiness and utilitarian initiatives. Happiness policies should be understood as an arbitrary choice amongst all kinds of happiness and as prescriptive of what “the best way to live” should be.Keywords: happiness, politics, positive psychology, well-being
Procedia PDF Downloads 258485 Mediating and Moderating Function of Corporate Governance on Firm Tax Planning and Firm Tax Disclosure Relationship
Authors: Mahfoudh Hussein Mgammal
Abstract:
The purpose of this paper is to investigate the moderating and mediating effect of corporate governance mechanisms proxy on the relationship of tax planning measured by effective tax rate components and tax disclosure. This paper tested the hypotheses by a 3-step hierarchical regression with 2010 to 2012 Malaysian-listed nonfinancial firms. We found companies positively value tax-planning activities. This indicates that tax planning is seen as a source of companies' wealth creation as the results show that there is an association between the tax disclosure and the extent of tax planning, and this relationship is highly significant. Examination of the implications of corporate governance mechanisms on the tax disclosure-tax planning association showed the lack of a significant coefficient related to any of the interactive variables. This makes it hard to understand the nature of the association. Finally, we further study the sensitivity of the results, the outcomes were also examined for the robustness and strength of the model specification utilizing OLS-effect estimators and the absence of tax planning related factors (GRTH, LEVE, and CAPNT). The findings of these tests display there is no effect on the tax planning-tax disclosure association. The outcomes of the annual regressions test show that the panel regressions results differ over time because there is a time difference impact on the associations, and the different models are not completely proportionate as a whole. Moreover, our paper lends some support to recent theory on the importance of taxes to corporate governance by demonstrating how the agency costs of tax planning allow certain shareholders to benefit from firm activities at the expense of others.Keywords: tax disclosure, tax planning, corporate governance, effective tax rate
Procedia PDF Downloads 151484 Penetrating Neck Injury: No Zone Approach
Authors: Abhishek Sharma, Amit Gupta, Manish Singhal
Abstract:
Background: The management of patients with penetrating neck injuries in the prehospital setting and in the emergency department has evolved with regard to the use of multidetector computed tomographic (MDCT) imaging. Hence, there is a shift in the management of neck injuries from mandatory exploration in certain anatomic areas to more conservative approach using imaging and so-called “no zone approach”. Objective: To study the no zone approach in the management of penetrating neck injury using routine imaging in all stable patients. Methods: 137 patients with penetrating neck injury attending emergency department of level 1 trauma centre at AIIMS between 2008–2014 were retrospectively analysed. All hemodynamically stable patients were evaluated using CT scanning. Results: Stab injury is most common (55.91%) mode of pni in civilian population followed by gunshot(18.33%). The majority of patients could be managed with imaging and close observation. 39 patients (28.46%) required operative intervention. The most common indication for operative intervention was vascular followed by airway injury manifesting as hemodynamic destabilisation.There was no statistical difference between the zonal distribution of injuries in patients managed conservatively and those taken to OR. Conclusions: Study shows that patients with penetrating neck trauma who are haemodynamically stable and exhibit no “hard signs” of vascular injury or airway injury may be evaluated initially by MDCT imaging even when platysma violation is present. “No Zone” policy may be superior to traditional zone wise management.Keywords: penetrating neck injury, zone approach, CT scanning, multidetector computed tomographic (MDCT)
Procedia PDF Downloads 402483 Machine Learning for Rational Decision-Making: Introducing Creativity to Teachers within a School System
Authors: Larry Audet
Abstract:
Creativity is suddenly and fortunately a new educational focus in the United Arab Emirates and around the world. Yet still today many leaders of creativity are not sure how to introduce it to their teachers. It is impossible to simultaneously introduce every aspect of creativity into a work climate and reach any degree of organizational coherence. The number of alternatives to explore is so great; the information teachers need to learn is so vast, that even an approximation to including every concept and theory of creativity into the school organization is hard to conceive. Effective leaders of creativity need evidence-based and practical guidance for introducing and stimulating creativity in others. Machine learning models reveal new findings from KEYS Survey© data about teacher perceptions of stimulants and barriers to their individual and collective creativity. Findings from predictive and causal models provide leaders with a rational for decision-making when introducing creativity into their organization. Leaders should focus on management practices first. Analyses reveal that creative outcomes are more likely to occur when teachers perceive supportive management practices: providing teachers with challenging work that calls for their best efforts; allowing freedom and autonomy in their practice of work; allowing teachers to form creative work-groups; and, recognizing them for their efforts. Once management practices are in place, leaders should focus their efforts on modeling risk-taking, providing optimal amounts of preparation time, and evaluating teachers fairly.Keywords: creativity, leadership, KEYS survey, teaching, work climate
Procedia PDF Downloads 166482 Arithmetic Operations Based on Double Base Number Systems
Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan
Abstract:
Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm
Procedia PDF Downloads 396481 The Impact of Bitcoin and Cryptocurrency on the Development of Community
Authors: Felib Ayman Shawky Salem
Abstract:
Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics
Procedia PDF Downloads 41480 Development of a Plug-In Hybrid Powertrain System with Double Continuously Variable Transmissions
Authors: Cheng-Chi Yu, Chi-Shiun Chiou
Abstract:
This study developed a plug-in hybrid powertrain system which consisted of two continuous variable transmissions. By matching between the engine, motor, generator, and dual continuous variable transmissions, this integrated power system can take advantages of the components. The hybrid vehicle can be driven by the internal combustion engine, or electric motor alone, or by these two power sources together when the vehicle is driven in hard acceleration or high load. The energy management of this integrated hybrid system controls the power systems based on rule-based control strategy to achieve better fuel economy. When the vehicle driving power demand is low, the internal combustion engine is operating in the low efficiency region, so the internal combustion engine is shut down, and the vehicle is driven by motor only. When the vehicle driving power demand is high, internal combustion engine would operate in the high efficiency region; then the vehicle could be driven by internal combustion engine. This strategy would operate internal combustion engine only in optimal efficiency region to improve the fuel economy. In this research, the vehicle simulation model was built in MATLAB/ Simulink environment. The analysis results showed that the power coupled efficiency of the hybrid powertrain system with dual continuous variable transmissions was better than that of the Honda hybrid system on the market.Keywords: plug-in hybrid power system, fuel economy, performance, continuously variable transmission
Procedia PDF Downloads 289479 Velocity Profiles of Vowel Perception by Javanese and Sundanese English Language Learners
Authors: Arum Perwitasari
Abstract:
Learning L2 sounds is influenced by the first language (L1) sound system. This current study seeks to examine how the listeners with a different L1 vowel system perceive L2 sounds. The fact that English has a bigger number of vowel inventory than Javanese and Sundanese L1 might cause problems for Javanese and Sundanese English language learners perceiving English sounds. To reveal the L2 sound perception over time, we measured the mouse trajectories related to the hand movements made by Javanese and Sundanese language learners, two of Indonesian local languages. Do the Javanese and Sundanese listeners show higher velocity than the English listeners when they perceive English vowels which are similar and new to their L1 system? The study aims to map the patterns of real-time processing through compatible hand movements to reveal any uncertainties when making selections. The results showed that the Javanese listeners exhibited significantly slower velocity values than the English listeners for similar vowels /I, ɛ, ʊ/ in the 826-1200ms post stimulus. Unlike the Javanese, the Sundanese listeners showed slow velocity values except for similar vowel /ʊ/. For the perception of new vowels /i:, æ, ɜ:, ʌ, ɑː, u:, ɔ:/, the Javanese listeners showed slower velocity in making the lexical decision. In contrast, the Sundanese listeners showed slow velocity only for vowels /ɜ:, ɔ:, æ, I/ indicating that these vowels are hard to perceive. Our results fit well with the second language model representing how the L1 vowel system influences the L2 sound perception.Keywords: velocity profiles, EFL learners, speech perception, experimental linguistics
Procedia PDF Downloads 217478 Geoelectrical Investigation Around Bomo Area, Kaduna State, Nigeria
Authors: B. S. Jatau, Baba Adama, S. I. Fadele
Abstract:
Electrical resistivity investigation was carried out around Bomo area, Zaria, Kaduna state in order to study the subsurface geologic layer with a view of determining the depth to the bedrock and thickness of the geologic layers. Vertical Electrical Sounding (VES) using Schlumberger array was carried out at fifteen (15) VES stations. ABEM terrameter (SAS 300) was used for the data acquisition. The field data obtained have been analyzed using computer software (IPI2win) which gives an automatic interpretation of the apparent resistivity. The VES results revealed heterogeneous nature of the subsurface geological sequence. The geologic sequence beneath the study area is composed of hard pan top soil (clayey and sandy-lateritic), weathered layer, partly weathered or fractured basement and fresh basement. The resistivity value for the topsoil layer varies from 40Ωm to 450Ωm with thickness ranging from 1.25 to 7.5 m. The weathered basement has resistivity values ranging from 50Ωm to 593Ωm and thickness between 1.37 and 20.1 m. The fractured basement has resistivity values ranging from 218Ωm to 520Ωm and thickness of between 12.9 and 26.3 m. The fresh basement (bedrock) has resistivity values ranging from 1215Ωm to 2150Ωm with infinite depth. However, the depth of the earth’s surface to the bedrock surface varies between 2.63 and 34.99 m. The study further stressed the importance of the findings in civil engineering structures and groundwater prospecting.Keywords: electrical resistivity, CERT (CT), vertical electrical sounding (VES), top soil (TP), weathered basement (WB), partly weathered basement (PWB), fresh basement (FB)
Procedia PDF Downloads 327477 Effect of Varying Scaffold Architecture and Porosity of Calcium Alkali Orthophosphate Based-Scaffolds for Bone Tissue Engineering
Authors: D. Adel, F. Giacomini, R. Gildenhaar, G. Berger, C. Gomes, U. Linow, M. Hardt, B. Peleskae, J. Günster, A. Houshmand, M. Stiller, A. Rack, K. Ghaffar, A. Gamal, M. El Mofty, C. Knabe
Abstract:
The goal of this study was to develop 3D scaffolds from a silica containing calcium alkali orthophosphate utilizing two different fabrication processes, first a replica technique namely the Schwartzwalder Somers method (SSM), and second 3D printing, i.e. Rapid prototyping (RP). First, the mechanical and physical properties of the scaffolds (porosity, compressive strength, and solubility) was assessed and second their potential to facilitate homogenous colonization with osteogenic cells and extracellular bone matrix formation throughout the porous scaffold architecture. To this end murine and rat calavarie osteoblastic cells were dynamically seeded on both scaffold types under perfusion with concentrations of 3 million cells. The amount of cells and extracellular matrix as well as osteogenic marker expression was evaluated using hard tissue histology, immunohistochemistry, and histomorphometric analysis. Total porosities of both scaffolds were 86.9 % and 50% for SSM and RP respectively, Compressive strength values were 0.46 ± 0.2 MPa for SSM and 6.6± 0.8 MPa for RP. Regarding the cellular behavior, RP scaffolds displayed a higher cell and matrix percentage of 24.45%. Immunoscoring yielded strong osteocalcin expression of cells and matrix in RP scaffolds and a moderate expression in SSM scaffolds. 3D printed RP scaffolds displayed superior mechanical and biological properties compared to SSM. 3D printed scaffolds represent excellent candidates for bone tissue engineering.Keywords: calcium alkali orthophosphate, extracellular matrix mineralization, osteoblast differentiation, rapid prototyping, scaffold
Procedia PDF Downloads 329476 Applications of Drones in Infrastructures: Challenges and Opportunities
Authors: Jin Fan, M. Ala Saadeghvaziri
Abstract:
Unmanned aerial vehicles (UAVs), also referred to as drones, equipped with various kinds of advanced detecting or surveying systems, are effective and low-cost in data acquisition, data delivery and sharing, which can benefit the building of infrastructures. This paper will give an overview of applications of drones in planning, designing, construction and maintenance of infrastructures. The drone platform, detecting and surveying systems, and post-data processing systems will be introduced, followed by cases with details of the applications. Challenges from different aspects will be addressed. Opportunities of drones in infrastructure include but not limited to the following. Firstly, UAVs equipped with high definition cameras or other detecting equipment are capable of inspecting the hard to reach infrastructure assets. Secondly, UAVs can be used as effective tools to survey and map the landscape to collect necessary information before infrastructure construction. Furthermore, an UAV or multi-UVAs are useful in construction management. UVAs can also be used in collecting roads and building information by taking high-resolution photos for future infrastructure planning. UAVs can be used to provide reliable and dynamic traffic information, which is potentially helpful in building smart cities. The main challenges are: limited flight time, the robustness of signal, post data analyze, multi-drone collaboration, weather condition, distractions to the traffic caused by drones. This paper aims to help owners, designers, engineers and architects to improve the building process of infrastructures for higher efficiency and better performance.Keywords: bridge, construction, drones, infrastructure, information
Procedia PDF Downloads 124475 Effective Stacking of Deep Neural Models for Automated Object Recognition in Retail Stores
Authors: Ankit Sinha, Soham Banerjee, Pratik Chattopadhyay
Abstract:
Automated product recognition in retail stores is an important real-world application in the domain of Computer Vision and Pattern Recognition. In this paper, we consider the problem of automatically identifying the classes of the products placed on racks in retail stores from an image of the rack and information about the query/product images. We improve upon the existing approaches in terms of effectiveness and memory requirement by developing a two-stage object detection and recognition pipeline comprising of a Faster-RCNN-based object localizer that detects the object regions in the rack image and a ResNet-18-based image encoder that classifies the detected regions into the appropriate classes. Each of the models is fine-tuned using appropriate data sets for better prediction and data augmentation is performed on each query image to prepare an extensive gallery set for fine-tuning the ResNet-18-based product recognition model. This encoder is trained using a triplet loss function following the strategy of online-hard-negative-mining for improved prediction. The proposed models are lightweight and can be connected in an end-to-end manner during deployment to automatically identify each product object placed in a rack image. Extensive experiments using Grozi-32k and GP-180 data sets verify the effectiveness of the proposed model.Keywords: retail stores, faster-RCNN, object localization, ResNet-18, triplet loss, data augmentation, product recognition
Procedia PDF Downloads 156474 Hydrothermal Synthesis of Hydrosodalite by Using Ultrasounds
Authors: B. Białecka, Z. Adamczyk, M. Cempa
Abstract:
The use of ultrasounds in zeolization of fly ash can increase the efficiency of this process. The molar ratios of the reagents, as well as the time and temperature of the synthesis, are the main parameters determining the type and properties of the zeolite formed. The aim of the work was to create hydrosodalite in a short time (8h), with low NaOH concentration (3 M) and in low temperature (80°C). A zeolite material contained in fly ash from hard coal combustion in one of Polish Power Plant was subjected to hydrothermal alkaline synthesis. The phase composition of the ash consisted mainly of glass, mullite, quartz, and hematite. The dominant chemical components of the ash were SiO₂ (over 50%mas.) and Al₂O₃ (more than 28%mas.), whereas the contents of the remaining components, except Fe₂O₃ (6.34%mas.), did not exceed 4% mas. The hydrothermal synthesis of the zeolite material was carried out in the following conditions: 3M-solution of NaOH, synthesis time – 8 hours, 40 kHz-frequency ultrasounds during the first two hours of synthesis. The mineral components of the input ash as well as product after synthesis were identified in microscopic observations, in transmitted light, using X-ray diffraction (XRD) and electron scanning microscopy (SEM/EDS). The chemical composition of the input ash was identified by the method of X-ray fluorescence (XRF). The obtained material apart from phases found in the initial fly ash sample, also contained new phases, i.e., hydrosodalite and NaP-type zeolite. The chemical composition in micro areas of grains indicated their diversity: i) SiO₂ content was in the range 30-59%mas., ii) Al₂O₃ content was in the range 24-35%mas., iii) Na₂O content was in the range 6-15%mas. This clearly indicates that hydrosodalite forms hypertrophies with NaP type zeolite as well as relict grains of fly ash. A small amount of potassium in the examined grains is noteworthy, which may indicate the substitution of sodium with potassium. This is confirmed by the high value of the correlation coefficient between these two components.Keywords: fly ash, hydrosodalite, ultrasounds, zeolite
Procedia PDF Downloads 152473 A Model for Helicopter Routing Problem
Authors: Aydin Sipahioglu, Gokhan Celik
Abstract:
Helicopter routing problem (HRP) is finding good tours for helicopter so as to pick up and deliver personnel or material among specified nodes, mutually. It can be encountered in case of being lots of supply and demand points for different commodities and requiring delivering commodities with helicopter. For instance, to deliver personnel or material from shore to oil rig is a good example. In fact, HRP is a branch of vehicle routing problem with pickup and delivery (VRPPD). However, it has additional constraints such that fuel capacity, performance of helicopter in different altitude and temperature, and the number of maximum takeoff and landing allowed. This kind of pickup and delivery problems can be classified into 3 groups, basically. 1-1 (one to one), M-M (many to many) and 1-M-1 (one to many to one). 1-1 means each commodity has only one supply and one demand point. M-M means there can be more than one supply and demand points for each kind of commodity. 1-M-1 means commodities at depot are delivered to demand points and commodities at customers are delivered to depot. In this case helicopter takes off from its own base, complete its tour and return to its own base. In this study, we define 1-M-M-1 type HRP. That means helicopter takes off from its home base, deliver commodities among the nodes as well as between depot and customers and return to its home base. These problems have NP-hard nature. Therefore, obtaining a good solution in a reasonable time is not easy. In this study, a model is offered for 1-M-M-1 type HRP. It is shown on small scale test instances that the model can find the optimal solution.Keywords: helicopter routing problem, vehicle routing with pickup and delivery, integer programming
Procedia PDF Downloads 430472 Design of a Virtual Reality System for Children with Developmental Coordination Disorder
Authors: Ya-Ju Ju, Li-Chen Yang, Yi-Chun Du, Rong-Ju Cherng
Abstract:
Introduction: It is estimated that 5-6% of school-aged children may be diagnosed to have developmental coordination disorder (DCD). Children with DCD are characterized with motor skill difficulty which cannot be explained by any medical or intellectual reasons. Such motor difficulties limit children’s participation to sports activity, further affect their physical fitness, cardiopulmonary function and balance, and may lead to obesity. The purpose of the project was to develop an exergaming system for children with DCD aiming to improve their physical fitness, cardiopulmonary function and balance ability. Methods: This study took five steps to build up the system: system planning, tasks selection, tasks programming, system integration and usability test. The system basically adopted virtual reality technique to integrate self-developed training programs. The training programs were developed to brainstorm among team members and after literature review. The selected tasks for training in the system were a combination of fundamental movement tor skill. Results and Discussion: Based on the theory of motor development, we design the training task from easy ones to hard ones, from single tasks to dual tasks. The tasks included walking, sit to stand, jumping, kicking, weight shifting, side jumping and their combination. Preliminary study showed that the tasks presented an order of development. Further study is needed to examine its effect on motor skill and cardiovascular fitness in children with DCD.Keywords: virtual reality, virtual reality system, developmental coordination disorder, children
Procedia PDF Downloads 113471 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes
Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv
Abstract:
As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment
Procedia PDF Downloads 209470 Comparison of the Factor of Safety and Strength Reduction Factor Values from Slope Stability Analysis of a Large Open Pit
Authors: James Killian, Sarah Cox
Abstract:
The use of stability criteria within geotechnical engineering is the way the results of analyses are conveyed, and sensitivities and risk assessments are performed. Historically, the primary stability criteria for slope design has been the Factor of Safety (FOS) coming from a limit calculation. Increasingly, the value derived from Strength Reduction Factor (SRF) analysis is being used as the criteria for stability analysis. The purpose of this work was to study in detail the relationship between SRF values produced from a numerical modeling technique and the traditional FOS values produced from Limit Equilibrium (LEM) analyses. This study utilized a model of a 3000-foot-high slope with a 45-degree slope angle, assuming a perfectly plastic mohr-coulomb constitutive model with high cohesion and friction angle values typical of a large hard rock mine slope. A number of variables affecting the values of the SRF in a numerical analysis were tested, including zone size, in-situ stress, tensile strength, and dilation angle. This paper demonstrates that in most cases, SRF values are lower than the corresponding LEM FOS values. Modeled zone size has the greatest effect on the estimated SRF value, which can vary as much as 15% to the downside compared to FOS. For consistency when using SRF as a stability criteria, the authors suggest that numerical model zone sizes should not be constructed to be smaller than about 1% of the overall problem slope height and shouldn’t be greater than 2%. Future work could include investigations of the effect of anisotropic strength assumptions or advanced constitutive models.Keywords: FOS, SRF, LEM, comparison
Procedia PDF Downloads 307469 Distributed System Computing Resource Scheduling Algorithm Based on Deep Reinforcement Learning
Authors: Yitao Lei, Xingxiang Zhai, Burra Venkata Durga Kumar
Abstract:
As the quantity and complexity of computing in large-scale software systems increase, distributed system computing becomes increasingly important. The distributed system realizes high-performance computing by collaboration between different computing resources. If there are no efficient resource scheduling resources, the abuse of distributed computing may cause resource waste and high costs. However, resource scheduling is usually an NP-hard problem, so we cannot find a general solution. However, some optimization algorithms exist like genetic algorithm, ant colony optimization, etc. The large scale of distributed systems makes this traditional optimization algorithm challenging to work with. Heuristic and machine learning algorithms are usually applied in this situation to ease the computing load. As a result, we do a review of traditional resource scheduling optimization algorithms and try to introduce a deep reinforcement learning method that utilizes the perceptual ability of neural networks and the decision-making ability of reinforcement learning. Using the machine learning method, we try to find important factors that influence the performance of distributed system computing and help the distributed system do an efficient computing resource scheduling. This paper surveys the application of deep reinforcement learning on distributed system computing resource scheduling proposes a deep reinforcement learning method that uses a recurrent neural network to optimize the resource scheduling, and proposes the challenges and improvement directions for DRL-based resource scheduling algorithms.Keywords: resource scheduling, deep reinforcement learning, distributed system, artificial intelligence
Procedia PDF Downloads 111468 Confluence of Relations: An Auto-Ethnographic Account of Field Recording in the Anthropocene Age
Authors: Freya Zinovieff
Abstract:
In the age of the Anthropocene, all ecosystems, no matter how remote, is influenced by the relations between humans and technology. These influences are evidenced by current extinction rates, changes in species diversity, and species adaptation to pollution. Field recording is a tool through which we are able to document the extent to which life forms associated with the place are entangled with human-technology relationships. This paper documents the convergence of interaction between technologies, species, and landscape via an auto-ethnographic account of a field recording taken from a cell phone tower in Bali, Indonesia. In the recording, we hear a confluence of relations where critter and technology meet. The electrical hum of the tower merges with frogs and the amaranthine throb of crickets, in such a way that it is hard to tell where technology begins and the voice of creatures ends. The outcomes of this venture resulted in a framework for evaluating the sensorial relations within field recording. The framework calls for the soundscape to be understood as a multilayered ontology through which there is a convergence of multispecies relationships, or entanglements, across time and geographic location. These entanglements are not necessarily obvious. Sometimes quiet, sometimes elusive, sometimes only audible through the mediated conduit of digital technology. The paper argues that to be aware of these entanglements is to open ourselves to a type of beauty that is firmly rooted in the present paradigm of extinction and loss. By virtue of this understanding, we are bestowed with an opportunity to embrace the grave reality of the current sixth mass extinction and move forwards with what activist Joanna Macy calls the compassionate action.Keywords: anthropocene, human-technology relationships, multispecies ethnography, field recording
Procedia PDF Downloads 150467 Recognition and Counting Algorithm for Sub-Regional Objects in a Handwritten Image through Image Sets
Authors: Kothuri Sriraman, Mattupalli Komal Teja
Abstract:
In this paper, a novel algorithm is proposed for the recognition of hulls in a hand written images that might be irregular or digit or character shape. Identification of objects and internal objects is quite difficult to extract, when the structure of the image is having bulk of clusters. The estimation results are easily obtained while going through identifying the sub-regional objects by using the SASK algorithm. Focusing mainly to recognize the number of internal objects exist in a given image, so as it is shadow-free and error-free. The hard clustering and density clustering process of obtained image rough set is used to recognize the differentiated internal objects, if any. In order to find out the internal hull regions it involves three steps pre-processing, Boundary Extraction and finally, apply the Hull Detection system. By detecting the sub-regional hulls it can increase the machine learning capability in detection of characters and it can also be extend in order to get the hull recognition even in irregular shape objects like wise black holes in the space exploration with their intensities. Layered hulls are those having the structured layers inside while it is useful in the Military Services and Traffic to identify the number of vehicles or persons. This proposed SASK algorithm is helpful in making of that kind of identifying the regions and can useful in undergo for the decision process (to clear the traffic, to identify the number of persons in the opponent’s in the war).Keywords: chain code, Hull regions, Hough transform, Hull recognition, Layered Outline Extraction, SASK algorithm
Procedia PDF Downloads 348