Search results for: eco state network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11392

Search results for: eco state network

3862 Statistical Feature Extraction Method for Wood Species Recognition System

Authors: Mohd Iz'aan Paiz Bin Zamri, Anis Salwa Mohd Khairuddin, Norrima Mokhtar, Rubiyah Yusof

Abstract:

Effective statistical feature extraction and classification are important in image-based automatic inspection and analysis. An automatic wood species recognition system is designed to perform wood inspection at custom checkpoints to avoid mislabeling of timber which will results to loss of income to the timber industry. The system focuses on analyzing the statistical pores properties of the wood images. This paper proposed a fuzzy-based feature extractor which mimics the experts’ knowledge on wood texture to extract the properties of pores distribution from the wood surface texture. The proposed feature extractor consists of two steps namely pores extraction and fuzzy pores management. The total number of statistical features extracted from each wood image is 38 features. Then, a backpropagation neural network is used to classify the wood species based on the statistical features. A comprehensive set of experiments on a database composed of 5200 macroscopic images from 52 tropical wood species was used to evaluate the performance of the proposed feature extractor. The advantage of the proposed feature extraction technique is that it mimics the experts’ interpretation on wood texture which allows human involvement when analyzing the wood texture. Experimental results show the efficiency of the proposed method.

Keywords: classification, feature extraction, fuzzy, inspection system, image analysis, macroscopic images

Procedia PDF Downloads 411
3861 The Challenges Faced in Learning English as a Second Language in Sri Lanka: A Case Study of Ordinary Level Students in Kurunegala District

Authors: H. L. M. Fawzan

Abstract:

Undoubtedly, learning English as a second language (ESL) is considered a challenging task. It is more difficult for students in far-away districts when compared with the students in the capital cities, where learning resources are easily available and where the environment is conducive to learning. Thus, this study is an analysis of the challenges faced by learners in learning English as the second language within kurunegala district in Sri Lanka. Even though various efforts have been taken by the Sri Lankan Educationalists for improving the situation of English language teaching for the past few decades, a disappointing situation still exist in the achievements of English learning among Sri Lankan students. So, it is necessary to explore real reasons behind the poor achievements of the students in the English Language. It is also an attempt to highlight what can be done to improve the situation significantly. Kurunegala is far away from the capital city of Sri Lanka and is a densely populated district. In the year 2020, state university admission was 45.87% from the Kurunegala district (Department of Examinations). The researcher strived to examine some of the likely challenges faced when teaching English in secondary schools in Kurunegala. The data was collected using a questionnaire from 35 students from schools within the Kurunegala education division. The result of the study reveals that students were highly motivated to learn English for their prospects and expectations such as local and international communication, academic advancement, and employment prospects.

Keywords: english, teaching, Kurunegala, Sri Lanka, challenges

Procedia PDF Downloads 142
3860 Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers

Authors: Pankhudi Khandelwal

Abstract:

The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality.

Keywords: data protection, dominance, ex ante regulation, ex post regulation

Procedia PDF Downloads 160
3859 Initial Settlers and Gender Norms: Evidence From the United States

Authors: Joanne Haddad

Abstract:

The distinctive traits of early settlers at initial stages of institutional development may be crucial for cultural formation. In 1973, the cultural geographer Wilbur Zelinsky postulated this in his doctrine of “first effective settlement”. There is however little empirical evidence supporting the role of early settlers in shaping culture over the long run. This paper tests this hypothesis by relating early settlers’ culture to within state variation in gender norms in the United States. Settlers’ culture is captured using past female labor force participation, women’s suffrage, and financial rights at their place of origin. The paper documents the distinctive characteristics of settlers’ populations and provide suggestive evidence in support of the transmission of gender norms across space and time. Results from this analysis show that women’s labor supply is higher, in both the short and long run, in U.S. counties that historically hosted a larger settler population originating from places with favorable gender attitudes. Findings from this study shed new light on the importance of the characteristics of immigrants and their place of origin for cultural formation in hosting societies.

Keywords: female labor force participation, settlers, gender norms, cultural formation.

Procedia PDF Downloads 98
3858 From Arab Spring to Arabian Nightmare: State Failure and Identity in the Middle East

Authors: Kenneth Christie

Abstract:

Syria and Iraq are Arabian nightmares at the local, the regional and global levels in terms of human security and the protection of the vulnerable. Wracked by civil war, ethnic and political violence in the last 5 years in the case of Syria and 13 years in the case of Iraq, the body count now is staggering; the humanitarian crisis continues and there appears no end to this. A crisis that has claimed the lives of 200,000 people so far in Syria, sparked a humanitarian catastrophe fuelled violent Islamic extremism and exposed serious splits in the international community who appear to have no consensus. The international community’s failure to act is simply another sign of the desperate situation which has developed over conflicts that appears unsolvable in the immediate future and may be intractable in the long range. Three things are really at stake I’m going to argue in these continuing crises and how it will affect the human security dimensions of the conflict. Firstly, the protection of vulnerable individuals and civilians in the war, 2ndly, the dire consequences for regional instability as a result and thirdly the risks for minority and ethnic identities who are caught up in this, within and across these volatile borders. This paper will examine these elements and the consequences of the conflict in terms of human security, migration and development.

Keywords: human security, migration, Syria and Iraq, conflict and development

Procedia PDF Downloads 348
3857 Reducing Crash Risk at Intersections with Safety Improvements

Authors: Upal Barua

Abstract:

Crash risk at intersections is a critical safety issue. This paper examines the effectiveness of removing an existing off-set at an intersection by realignment, in reducing crashes. Empirical Bayes method was applied to conduct a before-and-after study to assess the effect of this safety improvement. The Transportation Safety Improvement Program in Austin Transportation Department completed several safety improvement projects at high crash intersections with a view to reducing crashes. One of the common safety improvement techniques applied was the realignment of intersection approaches removing an existing off-set. This paper illustrates how this safety improvement technique is applied at a high crash intersection from inception to completion. This paper also highlights the significant crash reductions achieved from this safety improvement technique applying Empirical Bayes method in a before-and-after study. The result showed that realignment of intersection approaches removing an existing off-set can reduce crashes by 53%. This paper also features the state of the art techniques applied in planning, engineering, designing and construction of this safety improvement, key factors driving the success, and lessons learned in the process.

Keywords: crash risk, intersection, off-set, safety improvement technique, before-and-after study, empirical Bayes method

Procedia PDF Downloads 228
3856 The Effect of Iron Deficiency on the Magnetic Properties of Ca₀.₅La₀.₅Fe₁₂₋yO₁₉₋δ M-Type Hexaferrites

Authors: Kang-Hyuk Lee, Wei Yan, Sang-Im Yoo

Abstract:

Recently, Ca₁₋ₓLaₓFe₁₂O₁₉ (Ca-La M-type) hexaferrites have been reported to possess higher crystalline anisotropy compared with SrFe₁₂O₁₉ (Sr M-type) hexaferrite without reducing its saturation magnetization (Ms), resulting in higher coercivity (Hc). While iron deficiency is known to be helpful for the growth and the formation of NiZn spinel ferrites, the effect of iron deficiency in Ca-La M-type hexaferrites has never been reported yet. In this study, therefore, we tried to investigate the effect of iron deficiency on the magnetic properties of Ca₀.₅La₀.₅Fe₁₂₋yO₁₉₋δ hexaferrites prepared by solid state reaction. As-calcined powder was pressed into pellets and sintered at 1275~1325℃ for 4 h in air. Samples were characterized by powder X-ray diffraction (XRD), vibrating sample magnetometer (VSM), and scanning electron microscope (SEM). Powder XRD analyses revealed that Ca₀.₅La₀.₅Fe₁₂₋yO₁₉₋δ (0.75 ≦ y ≦ 2.15) ferrites calcined at 1250-1300℃ for 12 h in air were composed of single phase without the second phases. With increasing the iron deficiency, y, the lattice parameters a, c and unite cell volumes were decreased first up to y=10.25 and then increased again. The highest Ms value of 77.5 emu/g was obtainable from the sample of Ca₀.₅La₀.₅Fe₁₂₋yO₁₉₋δ sintered at 1300℃ for 4 h in air. Detailed microstructures and magnetic properties of Ca-La M-type hexagonal ferrites will be presented for a discussion

Keywords: Ca-La M-type hexaferrite, magnetic properties, iron deficiency, hexaferrite

Procedia PDF Downloads 448
3855 On Enabling Miner Self-Rescue with In-Mine Robots using Real-Time Object Detection with Thermal Images

Authors: Cyrus Addy, Venkata Sriram Siddhardh Nadendla, Kwame Awuah-Offei

Abstract:

Surface robots in modern underground mine rescue operations suffer from several limitations in enabling a prompt self-rescue. Therefore, the possibility of designing and deploying in-mine robots to expedite miner self-rescue can have a transformative impact on miner safety. These in-mine robots for miner self-rescue can be envisioned to carry out diverse tasks such as object detection, autonomous navigation, and payload delivery. Specifically, this paper investigates the challenges in the design of object detection algorithms for in-mine robots using thermal images, especially to detect people in real-time. A total of 125 thermal images were collected in the Missouri S&T Experimental Mine with the help of student volunteers using the FLIR TG 297 infrared camera, which were pre-processed into training and validation datasets with 100 and 25 images, respectively. Three state-of-the-art, pre-trained real-time object detection models, namely YOLOv5, YOLO-FIRI, and YOLOv8, were considered and re-trained using transfer learning techniques on the training dataset. On the validation dataset, the re-trained YOLOv8 outperforms the re-trained versions of both YOLOv5, and YOLO-FIRI.

Keywords: miner self-rescue, object detection, underground mine, YOLO

Procedia PDF Downloads 62
3854 Multiaxial Stress Based High Cycle Fatigue Model for Adhesive Joint Interfaces

Authors: Martin Alexander Eder, Sergei Semenov

Abstract:

Many glass-epoxy composite structures, such as large utility wind turbine rotor blades (WTBs), comprise of adhesive joints with typically thick bond lines used to connect the different components during assembly. Performance optimization of rotor blades to increase power output by simultaneously maintaining high stiffness-to-low-mass ratios entails intricate geometries in conjunction with complex anisotropic material behavior. Consequently, adhesive joints in WTBs are subject to multiaxial stress states with significant stress gradients depending on the local joint geometry. Moreover, the dynamic aero-elastic interaction of the WTB with the airflow generates non-proportional, variable amplitude stress histories in the material. Empiricism shows that a prominent failure type in WTBs is high cycle fatigue failure of adhesive bond line interfaces, which in fact over time developed into a design driver as WTB sizes increase rapidly. Structural optimization employed at an early design stage, therefore, sets high demands on computationally efficient interface fatigue models capable of predicting the critical locations prone for interface failure. The numerical stress-based interface fatigue model presented in this work uses the Drucker-Prager criterion to compute three different damage indices corresponding to the two interface shear tractions and the outward normal traction. The two-parameter Drucker-Prager model was chosen because of its ability to consider shear strength enhancement under compression and shear strength reduction under tension. The governing interface damage index is taken as the maximum of the triple. The damage indices are computed through the well-known linear Palmgren-Miner rule after separate rain flow-counting of the equivalent shear stress history and the equivalent pure normal stress history. The equivalent stress signals are obtained by self-similar scaling of the Drucker-Prager surface whose shape is defined by the uniaxial tensile strength and the shear strength such that it intersects with the stress point at every time step. This approach implicitly assumes that the damage caused by the prevailing multiaxial stress state is the same as the damage caused by an amplified equivalent uniaxial stress state in the three interface directions. The model was implemented as Python plug-in for the commercially available finite element code Abaqus for its use with solid elements. The model was used to predict the interface damage of an adhesively bonded, tapered glass-epoxy composite cantilever I-beam tested by LM Wind Power under constant amplitude compression-compression tip load in the high cycle fatigue regime. Results show that the model was able to predict the location of debonding in the adhesive interface between the webfoot and the cap. Moreover, with a set of two different constant life diagrams namely in shear and tension, it was possible to predict both the fatigue lifetime and the failure mode of the sub-component with reasonable accuracy. It can be concluded that the fidelity, robustness and computational efficiency of the proposed model make it especially suitable for rapid fatigue damage screening of large 3D finite element models subject to complex dynamic load histories.

Keywords: adhesive, fatigue, interface, multiaxial stress

Procedia PDF Downloads 156
3853 Factors Affecting Corruption in Ethiopia from Higher Education Instructors' Perceptions: Evidence from Business and Economics College, Bahir Dar University

Authors: Asmamaw Yigzaw Chirkos

Abstract:

Corruption increasingly has become one of the greatest challenges of the contemporary world. It undermines good government and rule of law and in turn leads to the misallocation of public resources, harms both the private and public sector and particularly hurts the poor. Corruption is found everywhere, but it is deep-rooted in the poor countries of Sub-Saharan Africa countries. Corruption in developing countries continues to be one of the greatest factors of poverty and underdevelopment. As it is the case in other developing countries, in Ethiopia, the culture of corruption has grown roots in the society at large and become endemic. Institutions, which were designed for the regulation of the relationships between citizens and the State, are being used instead for the personal enrichment of public officials and other corrupt private agents. This paper, therefore, assesses the major factors affecting Corruption in Ethiopia from higher education instructors’ Perceptions with special reference to Business and Economics College of Bahir Dar University. The findings of the study support several previously conducted studies in that each factor examined had a moderate to high positive correlation with corruption, where r ranged between .35 and .54. In addition, the 13 variables together explain about 37 percent change in perceived corruption in Ethiopia (R²= .37).

Keywords: Bahir Dar university, corruption, Ethiopia, factors, instructors perceptions

Procedia PDF Downloads 231
3852 Integrated Navigation System Using Simplified Kalman Filter Algorithm

Authors: Othman Maklouf, Abdunnaser Tresh

Abstract:

GPS and inertial navigation system (INS) have complementary qualities that make them ideal use for sensor fusion. The limitations of GPS include occasional high noise content, outages when satellite signals are blocked, interference and low bandwidth. The strengths of GPS include its long-term stability and its capacity to function as a stand-alone navigation system. In contrast, INS is not subject to interference or outages, have high bandwidth and good short-term noise characteristics, but have long-term drift errors and require external information for initialization. A combined system of GPS and INS subsystems can exhibit the robustness, higher bandwidth and better noise characteristics of the inertial system with the long-term stability of GPS. The most common estimation algorithm used in integrated INS/GPS is the Kalman Filter (KF). KF is able to take advantages of these characteristics to provide a common integrated navigation implementation with performance superior to that of either subsystem (GPS or INS). This paper presents a simplified KF algorithm for land vehicle navigation application. In this integration scheme, the GPS derived positions and velocities are used as the update measurements for the INS derived PVA. The KF error state vector in this case includes the navigation parameters as well as the accelerometer and gyroscope error states.

Keywords: GPS, INS, Kalman filter, inertial navigation system

Procedia PDF Downloads 461
3851 Definite Article Errors and Effect of L1 Transfer

Authors: Bimrisha Mali

Abstract:

The present study investigates the type of errors English as a second language (ESL) learners produce using the definite article ‘the’. The participants were provided a questionnaire on the learner's ability test. The questionnaire consists of three cloze tests and two free composition tests. Each participant's response was received in the form of written data. A total of 78 participants from three government schools participated in the study. The participants are high-school students from Rural Assam. Assam is a north-eastern state of India. Their age ranged between 14-15. The medium of instruction and the communication among the students take place in the local language, i.e., Assamese. Pit Corder’s steps for conducting error analysis have been followed for the analysis procedure. Four types of errors were found (1) deletion of the definite article, (2) use of the definite article as modifiers as adjectives, (3) incorrect use of the definite article with singular proper nouns, (4) substitution of the definite article by the indefinite article ‘a’. Classifiers in Assamese that express definiteness is used with nouns, adjectives, and numerals. It is found that native language (L1) transfer plays a pivotal role in the learners’ errors. The analysis reveals the learners' inability to acquire the semantic connotation of definiteness in English due to native language (L1) interference.

Keywords: definite article error, l1 transfer, error analysis, ESL

Procedia PDF Downloads 116
3850 Games behind Bars: A Longitudinal Study of Inmates Pro-Social Preferences

Authors: Mario A. Maggioni, Domenico Rossignoli, Simona Beretta, Sara Balestri

Abstract:

The paper presents the results of a Longitudinal Randomized Control Trial implemented in 2016 two State Prisons in California (USA). The subjects were randomly assigned to a 10-months program (GRIP, Guiding Rage Into Power) aiming at undoing the destructive behavioral patterns that lead to criminal actions by raising the individual’s 'mindfulness'. This study tests whether the participation to this program (treatment), based on strong relationships and mutual help, affects pro-social behavior of participants, in particular with reference to trust and inequality aversion. The research protocol entails the administration of two questionnaires including a set of behavioral situations ('games') - widely used in the relevant literature in the field - to 80 inmates, 42 treated (enrolled in the program) and 38 controls. The first questionnaire has been administered before treatment and randomization took place; the second questionnaire at the end of the program. The results of a Difference-in-Differences estimation procedure, show that trust significantly increases GRIP participants to compared to the control group. The result is robust to alternative estimation techniques and to the inclusion of a set of covariates to further control for idiosyncratic characteristics of the prisoners.

Keywords: behavioral economics, difference in differences, longitudinal study, pro-social preferences

Procedia PDF Downloads 376
3849 User-Perceived Quality Factors for Certification Model of Web-Based System

Authors: Jamaiah H. Yahaya, Aziz Deraman, Abdul Razak Hamdan, Yusmadi Yah Jusoh

Abstract:

One of the most essential issues in software products is to maintain it relevancy to the dynamics of the user’s requirements and expectation. Many studies have been carried out in quality aspect of software products to overcome these problems. Previous software quality assessment models and metrics have been introduced with strengths and limitations. In order to enhance the assurance and buoyancy of the software products, certification models have been introduced and developed. From our previous experiences in certification exercises and case studies collaborating with several agencies in Malaysia, the requirements for user based software certification approach is identified and demanded. The emergence of social network applications, the new development approach such as agile method and other varieties of software in the market have led to the domination of users over the software. As software become more accessible to the public through internet applications, users are becoming more critical in the quality of the services provided by the software. There are several categories of users in web-based systems with different interests and perspectives. The classifications and metrics are identified through brain storming approach with includes researchers, users and experts in this area. The new paradigm in software quality assessment is the main focus in our research. This paper discusses the classifications of users in web-based software system assessment and their associated factors and metrics for quality measurement. The quality model is derived based on IEEE structure and FCM model. The developments are beneficial and valuable to overcome the constraints and improve the application of software certification model in future.

Keywords: software certification model, user centric approach, software quality factors, metrics and measurements, web-based system

Procedia PDF Downloads 388
3848 Safety Culture Implementation Based on Occupational Health and Safety Assessment

Authors: Nyambayar Davaadorj, Ichiro Koshijima

Abstract:

Safety or the state of being safe can be described as a condition of being not dangerous or not harmful. It is necessary for an individual to avoid dangerous situations every day. Also, an organization is subject to legal requirements for the health and safety of persons inside and around the immediate workplace, or who are exposed to the workplace activities. Although it might be difficult to keep a situation where complete safety is ensured, efforts must nonetheless be made to consider ways of removing any potential danger within an organization. In order to ensure a safe working environment, the capability of responding (i.e., resilience) to signals (i.e., information concerning events that could pose future problems that must be taken into account) that occur in and around corporations is necessary. The ability to evaluate this essential point is thus one way in which safety and security can be managed. This study focuses on OHSAS18001, an internationally applied standard for the construction and operation of occupational health and safety management systems, by using IDEF0 for Function Modeling (IDEF0) and the Resilience Matrix originally made by Bracco. Further, this study discusses a method for evaluating a manner in which Occupational Health and Safety Assessment Series (OHSAS) systematically functions within corporations. Based on the findings, this study clarifies the potential structural objection for corporations when implementing and operating the OHSAS standard.

Keywords: OHSAS18001, IDEF0, resilience engineering, safety culture

Procedia PDF Downloads 231
3847 High Order Block Implicit Multi-Step (Hobim) Methods for the Solution of Stiff Ordinary Differential Equations

Authors: J. P. Chollom, G. M. Kumleng, S. Longwap

Abstract:

The search for higher order A-stable linear multi-step methods has been the interest of many numerical analysts and has been realized through either higher derivatives of the solution or by inserting additional off step points, supper future points and the likes. These methods are suitable for the solution of stiff differential equations which exhibit characteristics that place a severe restriction on the choice of step size. It becomes necessary that only methods with large regions of absolute stability remain suitable for such equations. In this paper, high order block implicit multi-step methods of the hybrid form up to order twelve have been constructed using the multi-step collocation approach by inserting one or more off step points in the multi-step method. The accuracy and stability properties of the new methods are investigated and are shown to yield A-stable methods, a property desirable of methods suitable for the solution of stiff ODE’s. The new High Order Block Implicit Multistep methods used as block integrators are tested on stiff differential systems and the results reveal that the new methods are efficient and compete favourably with the state of the art Matlab ode23 code.

Keywords: block linear multistep methods, high order, implicit, stiff differential equations

Procedia PDF Downloads 343
3846 Data Analytics in Energy Management

Authors: Sanjivrao Katakam, Thanumoorthi I., Antony Gerald, Ratan Kulkarni, Shaju Nair

Abstract:

With increasing energy costs and its impact on the business, sustainability today has evolved from a social expectation to an economic imperative. Therefore, finding methods to reduce cost has become a critical directive for Industry leaders. Effective energy management is the only way to cut costs. However, Energy Management has been a challenge because it requires a change in old habits and legacy systems followed for decades. Today exorbitant levels of energy and operational data is being captured and stored by Industries, but they are unable to convert these structured and unstructured data sets into meaningful business intelligence. It must be noted that for quick decisions, organizations must learn to cope with large volumes of operational data in different formats. Energy analytics not only helps in extracting inferences from these data sets, but also is instrumental in transformation from old approaches of energy management to new. This in turn assists in effective decision making for implementation. It is the requirement of organizations to have an established corporate strategy for reducing operational costs through visibility and optimization of energy usage. Energy analytics play a key role in optimization of operations. The paper describes how today energy data analytics is extensively used in different scenarios like reducing operational costs, predicting energy demands, optimizing network efficiency, asset maintenance, improving customer insights and device data insights. The paper also highlights how analytics helps transform insights obtained from energy data into sustainable solutions. The paper utilizes data from an array of segments such as retail, transportation, and water sectors.

Keywords: energy analytics, energy management, operational data, business intelligence, optimization

Procedia PDF Downloads 351
3845 From the Himalayas to Australia: A Review of the Literature on Teaching and Learning with Nepalese Students in the Higher Education Sector

Authors: Sangeeta Rai

Abstract:

International education is Australia’s third largest export with significant revenue flowing to the economy in all state and territory jurisdictions. International students make significant economic, social and cultural contributions to all communities in which they are studying and often working. Among these international students are those from Nepal, who continue to seek Australian higher education in increasing numbers. This paper reports on findings from a literature review that highlights the gap in knowledge of the pedagogical issues that may need addressing in teaching Nepalese students in the higher education sector in Australia. Nepalese students bring to their studies a rich culture shaped by their country’s turbulent political and poor economic conditions. These factors may further contribute to their endeavors to seek education abroad to better themselves and their situation. This cohort of students faces various challenges undertaking their studies in Australia that may be due to factors including language, learning styles and engagement with peers. Hence, this paper highlights the importance of these students on Australian shores and forms the basis for further study on the issues and challenges that they face and those that need to be addressed by Australian educators.

Keywords: Nepalese students in Australia, challenges and coping mechanisms of Nepalese students, international students in Australia, socio-cultural background of Nepalese students

Procedia PDF Downloads 199
3844 Time Series Simulation by Conditional Generative Adversarial Net

Authors: Rao Fu, Jie Chen, Shutian Zeng, Yiping Zhuang, Agus Sudjianto

Abstract:

Generative Adversarial Net (GAN) has proved to be a powerful machine learning tool in image data analysis and generation. In this paper, we propose to use Conditional Generative Adversarial Net (CGAN) to learn and simulate time series data. The conditions include both categorical and continuous variables with different auxiliary information. Our simulation studies show that CGAN has the capability to learn different types of normal and heavy-tailed distributions, as well as dependent structures of different time series. It also has the capability to generate conditional predictive distributions consistent with training data distributions. We also provide an in-depth discussion on the rationale behind GAN and the neural networks as hierarchical splines to establish a clear connection with existing statistical methods of distribution generation. In practice, CGAN has a wide range of applications in market risk and counterparty risk analysis: it can be applied to learn historical data and generate scenarios for the calculation of Value-at-Risk (VaR) and Expected Shortfall (ES), and it can also predict the movement of the market risk factors. We present a real data analysis including a backtesting to demonstrate that CGAN can outperform Historical Simulation (HS), a popular method in market risk analysis to calculate VaR. CGAN can also be applied in economic time series modeling and forecasting. In this regard, we have included an example of hypothetical shock analysis for economic models and the generation of potential CCAR scenarios by CGAN at the end of the paper.

Keywords: conditional generative adversarial net, market and credit risk management, neural network, time series

Procedia PDF Downloads 126
3843 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case

Authors: Jordan Deliversky

Abstract:

Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.

Keywords: legislation, migrants, refugees, security, terrorism

Procedia PDF Downloads 332
3842 Evaluation of Expected Annual Loss Probabilities of RC Moment Resisting Frames

Authors: Saemee Jun, Dong-Hyeon Shin, Tae-Sang Ahn, Hyung-Joon Kim

Abstract:

Building loss estimation methodologies which have been advanced considerably in recent decades are usually used to estimate socio and economic impacts resulting from seismic structural damage. In accordance with these methods, this paper presents the evaluation of an annual loss probability of a reinforced concrete moment resisting frame designed according to Korean Building Code. The annual loss probability is defined by (1) a fragility curve obtained from a capacity spectrum method which is similar to a method adopted from HAZUS, and (2) a seismic hazard curve derived from annual frequencies of exceedance per peak ground acceleration. Seismic fragilities are computed to calculate the annual loss probability of a certain structure using functions depending on structural capacity, seismic demand, structural response and the probability of exceeding damage state thresholds. This study carried out a nonlinear static analysis to obtain the capacity of a RC moment resisting frame selected as a prototype building. The analysis results show that the probability of being extensive structural damage in the prototype building is expected to 0.004% in a year.

Keywords: expected annual loss, loss estimation, RC structure, fragility analysis

Procedia PDF Downloads 391
3841 Standard-with-Dialects in the Mandarin Dialect Region: Diglossia and Language Choice in Xinle

Authors: Xi Zhang

Abstract:

Much has been written about the promotion of Standard Mandarin and the negative effects it may have had on the development of non-Mandarin dialects. Less discussed, however, is the fate of northern Chinese dialects that are only marginally different from Standard Mandarin and the effect Standard Mandarin promotion may have had on such dialects. In this paper, we seek to bridge this gap by looking at language preferences in the family and the generational differences that they reflect. Specifically, we survey Mandarin dialect speakers from Xinle county in Hebei province, whose local dialect is similar but not identical to Standard Mandarin. We sample more than 160 families with pre-middle school children and ask the parents a series of questions that probe language behavior, language ability, and language attitude within the family with regard to educating the young. Our study shows that although most parents still speak the Xinle dialect, Standard Mandarin has become the language taught to the majority of children. We also show that only one-third of parents choose to preserve elements of Xinle dialect in the language they teach to their children. We analyze the possible factors (e.g., subjective, geographical, social, and external) that influence language choice and show how these factors collectively contribute to the current state of family language choice for educational purposes. Finally, based on our findings, we offer recommendations for coordinating the promotion of Standard Mandarin and dialect preservation in similar Mandarin-speaking regions.

Keywords: Diglossia, language planning, Mandarin, standard-with-dialects

Procedia PDF Downloads 60
3840 The Advancement of Environmental Impact Assessment for 5th Transmission Natural Gas Pipeline Project in Thailand

Authors: Penrug Pengsombut, Worawut Hamarn, Teerawuth Suwannasri, Kittiphong Songrukkiat, Kanatip Ratanachoo

Abstract:

PTT Public Company Limited or simply PTT has played an important role in strengthening national energy security of the Kingdom of Thailand by transporting natural gas to customers in power, industrial and commercial sectors since 1981. PTT has been constructing and operating natural gas pipeline system of over 4,500-km network length both onshore and offshore laid through different area classifications i.e., marine, forest, agriculture, rural, urban, and city areas. During project development phase, an Environmental Impact Assessment (EIA) is conducted and submitted to the Office of Natural Resources and Environmental Policy and Planning (ONEP) for approval before project construction commencement. Knowledge and experiences gained and revealed from EIA in the past projects definitely are developed to further advance EIA study process for newly 5th Transmission Natural Gas Pipeline Project (5TP) with approximately 415 kilometers length. The preferred pipeline route is selected and justified by SMARTi map, an advance digital one-map platform with consists of multiple layers geographic and environmental information. Sensitive area impact focus (SAIF) is a practicable impact assessment methodology which appropriate for a particular long distance infrastructure project such as 5TP. An environmental modeling simulation is adopted into SAIF methodology for impact quantified in all sensitive areas whereas other area along pipeline right-of-ways is typically assessed as an impact representative. Resulting time and cost deduction is beneficial to project for early start.

Keywords: environmental impact assessment, EIA, natural gas pipeline, sensitive area impact focus, SAIF

Procedia PDF Downloads 386
3839 Mixture of Polymers and Coating Fullerene Soft Nanoparticles

Authors: L. Bouzina, A. Bensafi, M. Duval, C. Mathis, M. Rawiso

Abstract:

We study the stability and structural properties of mixtures of model nanoparticles and non-adsorbing polymers in the 'protein limit', where the size of polymers exceeds the particle size substantially. We have synthesized in institute (Charles Sadron Strasbourg) model nanoparticles by coating fullerene C60 molecules with low molecular weight polystyrene (PS) chains (6 PS chains with a degree of polymerization close to 25 and 50 are grafted on each fullerene C60 molecule. We will present a Small Angle Neutron scattering (SANS) study of Tetrahydrofuran (THF) solutions involving long polystyrene (PS) chains and fullerene (C60) nanoparticles. Long PS chains and C60 nanoparticles with different arm lengths were synthesized either hydrogenated or deuteriated. They were characterized through Size Exclusion Chromatography (SEC) and Quasielastic Light Scattering (QLS). In this way, the solubility of the C60 nanoparticles in the usual good solvents of PS was controlled. SANS experiments were performed by use of the contrast variation method in order to measure the partial scattering functions related to both components. They allow us to obtain information about the dispersion state of the C60 nanoparticles as well as the average conformation of the long PS chains. Specifically, they show that the addition of long polymer chains leads to the existence of an additional attractive interaction in between soft nanoparticles.

Keywords: fulleren nanoparticles, polymer, small angle neutron scattering, solubility

Procedia PDF Downloads 362
3838 The Role of Information Technology in Supply Chain Management

Authors: V. Jagadeesh, K. Venkata Subbaiah, P. Govinda Rao

Abstract:

This paper explaining about the significance of information technology tools and software packages in supply chain management (SCM) in order to manage the entire supply chain. Managing materials flow and financial flow and information flow effectively and efficiently with the aid of information technology tools and packages in order to deliver right quantity with right quality of goods at right time by using right methods and technology. Information technology plays a vital role in streamlining the sales forecasting and demand planning and Inventory control and transportation in supply networks and finally deals with production planning and scheduling. It achieves the objectives by streamlining the business process and integrates within the enterprise and its extended enterprise. SCM starts with customer and it involves sequence of activities from customer, retailer, distributor, manufacturer and supplier within the supply chain framework. It is the process of integrating demand planning and supply network planning and production planning and control. Forecasting indicates the direction for planning raw materials in order to meet the production planning requirements. Inventory control and transportation planning allocate the optimal or economic order quantity by utilizing shortest possible routes to deliver the goods to the customer. Production planning and control utilize the optimal resources mix in order to meet the capacity requirement planning. The above operations can be achieved by using appropriate information technology tools and software packages for the supply chain management.

Keywords: supply chain management, information technology, business process, extended enterprise

Procedia PDF Downloads 367
3837 Left to Right-Right Most Parsing Algorithm with Lookahead

Authors: Jamil Ahmed

Abstract:

Left to Right-Right Most (LR) parsing algorithm is a widely used algorithm of syntax analysis. It is contingent on a parsing table, whereas the parsing tables are extracted from the grammar. The parsing table specifies the actions to be taken during parsing. It requires that the parsing table should have no action conflicts for the same input symbol. This requirement imposes a condition on the class of grammars over which the LR algorithms work. However, there are grammars for which the parsing tables hold action conflicts. In such cases, the algorithm needs a capability of scanning (looking-ahead) next input symbols ahead of the current input symbol. In this paper, a ‘Left to Right’-‘Right Most’ parsing algorithm with lookahead capability is introduced. The 'look-ahead' capability in the LR parsing algorithm is the major contribution of this paper. The practicality of the proposed algorithm is substantiated by the parser implementation of the Context Free Grammar (CFG) of an already proposed programming language 'State Controlled Object Oriented Programming' (SCOOP). SCOOP’s Context Free Grammar has 125 productions and 192 item sets. This algorithm parses SCOOP while the grammar requires to ‘look ahead’ the input symbols due to action conflicts in its parsing table. Proposed LR parsing algorithm with lookahead capability can be viewed as an optimization of ‘Simple Left to Right’-‘Right Most’ (SLR) parsing algorithm.

Keywords: left to right-right most parsing, syntax analysis, bottom-up parsing algorithm

Procedia PDF Downloads 111
3836 Transient Modeling of Velocity Profile and Heat Transfer of Electrohydrodynamically Augmented Micro Heat Pipe

Authors: H. Shokouhmand, M. Tajerian

Abstract:

At this paper velocity profile modeling and heat transfer in the micro heat pipes by using electrohydrodynamic (EHD) field at the transient regime have been studied. In the transient flow, one dimensional and two phase fluid flow and heat transfer for micro heat pipes with square cross section, have been studied. At this model Coulomb and dielectrophoretic forces are considered. Coupled, non-linear equations governed on the model (continuity, momentum, and energy equations) have been solved simultaneously by numerical methods. Transient behavior of affecting parameters e.g. substrate temperature, velocity of coolant liquid, radius of curvature and coolant liquid pressure, has been verified. By obtaining and plotting the mentioned parameters, it has been shown that the EHD field enhances the heat transfer process. So, the time required to reach the steady state regime decreases from 16 seconds to 2.4 seconds after applying EHD field. Another result has been observed implicitly that by increasing the heat input the effect of EHD field became more significant. The numerical results of model predict the experimental results available in the literature successfully, and it has been observed there is a good agreement between them.

Keywords: micro heat pipe, transient modeling, electrohydrodynamics, capillary, meniscus

Procedia PDF Downloads 252
3835 The Historical Perspectives of Peace Education as a Vehicle of Unity and Technological Developments in Nigeria

Authors: Oluwole Enoch Adeniran

Abstract:

Peace studies and conflict resolution; though a relatively new discipline had attracted scholars from far and near. It had enhanced a purposeful training of mind of young adult among other categories of learners. It provides a platform through which university under-graduates and post-graduates students are exposed to the rudiments of peace building, peacemaking and peace keeping towards a successful conflict resolution. The paper historicizes peace education as most desirable in any human society that desired development. It aims at educating children and young adults in the dynamics of peaceful conflicts resolution at home, in school and communities (states) throughout the world for a purposeful technological development. It also aims at exposing students to the nature of conflict and how to manage and resolve conflicts in order to promote national unity for meaningful development. The paper argues that, for a state to record any meaningful socio-economic, political and technological development; a conducive and peaceful atmosphere must be put in place. This theoretical paper emerged in the context of historical specificities of conflict resolution from a general conceptual framework. It then concludes with suggestions on the modes of conflict prevention, conflict management and conflict resolution for an ideal technologically advanced society.

Keywords: history, education, peace, unity, technology and development

Procedia PDF Downloads 349
3834 Preparation of Wireless Networks and Security; Challenges in Efficient Accession of Encrypted Data in Healthcare

Authors: M. Zayoud, S. Oueida, S. Ionescu, P. AbiChar

Abstract:

Background: Wireless sensor network is encompassed of diversified tools of information technology, which is widely applied in a range of domains, including military surveillance, weather forecasting, and earthquake forecasting. Strengthened grounds are always developed for wireless sensor networks, which usually emerges security issues during professional application. Thus, essential technological tools are necessary to be assessed for secure aggregation of data. Moreover, such practices have to be incorporated in the healthcare practices that shall be serving in the best of the mutual interest Objective: Aggregation of encrypted data has been assessed through homomorphic stream cipher to assure its effectiveness along with providing the optimum solutions to the field of healthcare. Methods: An experimental design has been incorporated, which utilized newly developed cipher along with CPU-constrained devices. Modular additions have also been employed to evaluate the nature of aggregated data. The processes of homomorphic stream cipher have been highlighted through different sensors and modular additions. Results: Homomorphic stream cipher has been recognized as simple and secure process, which has allowed efficient aggregation of encrypted data. In addition, the application has led its way to the improvisation of the healthcare practices. Statistical values can be easily computed through the aggregation on the basis of selected cipher. Sensed data in accordance with variance, mean, and standard deviation has also been computed through the selected tool. Conclusion: It can be concluded that homomorphic stream cipher can be an ideal tool for appropriate aggregation of data. Alongside, it shall also provide the best solutions to the healthcare sector.

Keywords: aggregation, cipher, homomorphic stream, encryption

Procedia PDF Downloads 245
3833 Risk Reduction of Household Refuse, a Case Study of Shagari Low-Cost, Mubi North (LGA) Adamawa State, Nigeria

Authors: Maryam Tijjani Kolo

Abstract:

Lack of refuse dumping points has made the residents of Shagari low-cost well armed with some health and environmental related hazards. These studies investigate the effect of household refuse on the resident of Shagari low-cost. A well structured questionnaire was administered to elicit views of the respondent in the study area through adopting cluster sampling method. A total of 100 questionnaires were selected and divided into 50, each to both sections of the study area. Interview was conducted to each household head. Data obtained were analyzed using simple parentages to determine the major hazard in the area. Result showed that majority of the household are civil servant and traders, earning reasonable monthly income. 68% of the respondent has experienced the effect of living close to waste dumping areas, which include unpleasant smell and polluted smoke when refuse is burnt, which causes eye and respiratory induction, human injury from broken bottles or sharp objects as well as water, insect and air borne diseases. Hence, the need to urgently address these menace before it overwhelms the capacities of the community becomes paramount. Thus, the community should be given more enlightenment and refuse dumping sites should be created by the local government area.

Keywords: household, refuse, refuse dumping points, Shagari low-cost

Procedia PDF Downloads 310