Search results for: quantum information encoding scheme
11806 Temperature-Stable High-Speed Vertical-Cavity Surface-Emitting Lasers with Strong Carrier Confinement
Authors: Yun Sun, Meng Xun, Jingtao Zhou, Ming Li, Qiang Kan, Zhi Jin, Xinyu Liu, Dexin Wu
Abstract:
Higher speed short-wavelength vertical-cavity surface-emitting lasers (VCSELs) working at high temperature are required for future optical interconnects. In this work, the high-speed 850 nm VCSELs are designed, fabricated and characterized. The temperature dependent static and dynamic performance of devices are investigated by using current-power-voltage and small signal modulation measurements. Temperature-stable high-speed properties are obtained by employing highly strained multiple quantum wells and short cavity length of half wavelength. The temperature dependent photon lifetimes and carrier radiative times are determined from damping factor and resonance frequency obtained by fitting the intrinsic optical bandwidth with the two-pole transfer function. In addition, an analytical theoretical model including the strain effect is development based on model-solid theory. The calculation results indicate that the better high temperature performance of VCSELs can be attributed to the strong confinement of holes in the quantum wells leading to enhancement of the carrier transit time.Keywords: vertical cavity surface emitting lasers, high speed modulation, optical interconnects, semiconductor lasers
Procedia PDF Downloads 12711805 Mitigating the Unwillingness of e-Forums Members to Engage in Information Exchange
Authors: Dora Triki, Irena Vida, Claude Obadia
Abstract:
Social networks such as e-Forums or dating sites often face the reluctance of key members to participate. Relying on the conation theory, this study investigates this phenomenon and proposes solutions to mitigate the issue. We show that highly experienced e-Forum members refuse to share business information in a peer to peer information exchange forums. However, forums managers can mitigate this behavior by developing a sentiment of belongingness to the network. Furthermore, by selecting only elite forum participants with ample experience, they can reduce the reluctance of key information providers to engage in information exchange. Our hypotheses are tested with PLS structural equations modeling using survey data from members of a French e-Forum dedicated to the exchange of business information about exporting.Keywords: conation, e-Forum, information exchange, members participation
Procedia PDF Downloads 15911804 Developing a Systems Dynamics Model for Security Management
Authors: Kuan-Chou Chen
Abstract:
This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.Keywords: system thinking, information security systems, security management, simulation
Procedia PDF Downloads 43111803 A Computational Fluid Dynamics Study of Turbulence Flow and Parameterization of an Aerofoil
Authors: Mohamed Z. M. Duwahir, Shian Gao
Abstract:
The main objective of this project was to introduce and test a new scheme for parameterization of subsonic aerofoil, using a function called Shape Function. Python programming was used to create a user interactive environment for geometry generation of aerofoil using NACA and Shape Function methodologies. Two aerofoils, NACA 0012 and NACA 1412, were generated using this function. Testing the accuracy of the Shape Function scheme was done by Linear Square Fitting using Python and CFD modelling the aerofoil in Fluent. NACA 0012 (symmetrical aerofoil) was better approximated using Shape Function than NACA 1412 (cambered aerofoil). The second part of the project involved comparing two turbulent models, k-ε and Spalart-Allmaras (SA), in Fluent by modelling the aerofoils NACA 0012 and NACA 1412 in conditions of Reynolds number of 3 × 106. It was shown that SA modelling is better for aerodynamic purpose. The experimental coefficient of lift (Cl) and coefficient of drag (Cd) were compared with empirical wind tunnel data for a range of angle of attack (AOA). As a further step, this project involved drawing and meshing 3D wings in Gambit. The 3D wing flow was solved and compared with 2D aerofoil section experimental results and wind tunnel data.Keywords: CFD simulation, shape function, turbulent modelling, aerofoil
Procedia PDF Downloads 35911802 Research on the United Navigation Mechanism of Land, Sea and Air Targets under Multi-Sources Information Fusion
Authors: Rui Liu, Klaus Greve
Abstract:
The navigation information is a kind of dynamic geographic information, and the navigation information system is a kind of special geographic information system. At present, there are many researches on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing is not deeply applied into the research of navigation information service. And the imperfection of navigation target coordination and navigation information sharing mechanism under certain navigation tasks has greatly affected the reliability and scientificity of navigation service such as path planning. Considering this, the project intends to study the multi-source information fusion and multi-objective united navigation information interaction mechanism: first of all, investigate the actual needs of navigation users in different areas, and establish the preliminary navigation information classification and importance level model; and then analyze the characteristics of the remote sensing and GIS vector data, and design the fusion algorithm from the aspect of improving the positioning accuracy and extracting the navigation environment data. At last, the project intends to analyze the feature of navigation information of the land, sea and air navigation targets, and design the united navigation data standard and navigation information sharing model under certain navigation tasks, and establish a test navigation system for united navigation simulation experiment. The aim of this study is to explore the theory of united navigation service and optimize the navigation information service model, which will lay the theory and technology foundation for the united navigation of land, sea and air targets.Keywords: information fusion, united navigation, dynamic path planning, navigation information visualization
Procedia PDF Downloads 28911801 Performance Analysis of a Combined Ordered Successive and Interference Cancellation Using Zero-Forcing Detection over Rayleigh Fading Channels in Mimo Systems
Authors: Jamal R. Elbergali
Abstract:
Multiple Input Multiple Output (MIMO) systems are wireless systems with multiple antenna elements at both ends of the link. Wireless communication systems demand high data rate and spectral efficiency with increased reliability. MIMO systems have been popular techniques to achieve these goals because increased data rate is possible through spatial multiplexing scheme and diversity. Spatial Multiplexing (SM) is used to achieve higher possible throughput than diversity. In this paper, we propose a Zero-Forcing (ZF) detection using a combination of Ordered Successive Interference Cancellation (OSIC) and Zero Forcing using Interference Cancellation (ZF-IC). The proposed method used an OSIC based on Signal to Noise Ratio (SNR) ordering to get the estimation of last symbol (x ̃_(N_T )), then the estimated last symbol is considered to be an input to the ZF-IC. We analyze the Bit Error Rate (BER) performance of the proposed MIMO system over Rayleigh Fading Channel, using Binary Phase Shift Keying (BPSK) modulation scheme. The results show better performance than the previous methods.Keywords: SNR, BER, BPSK, MIMO, modulation, zero forcing (ZF), OSIC, ZF-IC, spatial multiplexing (SM)
Procedia PDF Downloads 42311800 A Study of Cavity Quantum States Induced by Cavity-Matter Coupling Using Negativity in the Wigner Distribution
Authors: Anneswa Paul, Upendra Harbola
Abstract:
Interaction between light and matter is the primary tool to probe matter at the microscopic level. In recent years, light-matter interaction in optical cavity has found interesting applications in manipulating chemical reactions and material properties by modifying matter states in the cavity. However, not much attention has been given to study modifications in the cavity-field states, which is the focus of study in this work. The classical to non-classical transition in the field state due to interaction with the matter inside the cavity is discussed. The effect of the initial state of the matter on the cavity states as well as the role of photon-fluctuations are explored by considering different initial states of the matter and the field. The results demonstrate that the initial states of the field and the matter play a significant role in generating non-classicality in the cavity-field state as quantified in terms of negativity in the (Wigner) phase-space distribution of the cavity. It is found that the coherences induced between different photon-number states due to the interaction always contribute to enhance the non-classicality, while populations may suppress or enhance it depending on the relative weight of the vacuum state over other states. An increased weight of the vacuum state diminishes the non-classicality. It is shown that the energy exchange takes place between different photon-number states in the cavity field while matter acts as the facilitating agent.Keywords: cavity QED, light-matter interaction, phase space methods, quantum optics
Procedia PDF Downloads 811799 The Role of Information Technology in the Supply Chain Management
Authors: Azar Alizadeh, Mohammad Reza Naserkhaki
Abstract:
The application of the IT systems for collecting and analyzing the data can have a significant effect on the performance of any company. In recent decade, different advancements and achievements in the field of information technology have changed the industry compared to the previous decade. The adoption and application of the information technology are one of the ways to achieve a distinctive competitive personality to the companies and their supply chain. The acceptance of the IT and its proper implementation cam reinforce and improve the cooperation between different parts of the supply chain by rapid transfer and distribution of the precise information and the application of the informational systems, leading to the increase in the supply chain efficiency. The main objective of this research is to study the effects and applications of the information technology on and in the supply chain management and to introduce the effective factors on the acceptance of information technology in the companies. Moreover, in order to understand the subject, we will investigate the role and importance of the information and electronic commerce in the supply chain and the characteristics of the supply chain based on the information flow approach.Keywords: electronic commerce, industry, information technology, management, supply chain, system
Procedia PDF Downloads 48611798 Slope Stabilisation of Highly Fractured Geological Strata Consisting of Mica Schist Layers While Construction of Tunnel Shaft
Authors: Saurabh Sharma
Abstract:
Introduction: The case study deals with the ground stabilisation of Nabi Karim Metro Station in Delhi, India, wherein an extremely complex geology was encountered while excavating the tunnelling shaft for launching Tunnel Boring Machine. The borelog investigation and the Seismic Refraction Technique (SRT) indicated towards the presence of an extremely hard rocky mass from a depth of 3-4 m itself, and accordingly, the Geotechnical Interpretation Report (GIR) concluded the presence of Grade-IV rock from 3m onwards and presence of Grade-III and better rock from 5-6m onwards. Accordingly, it was planned to retain the ground by providing secant piles all around the launching shaft and then excavating the shaft vertically after leaving a berm of 1.5m to prevent secant piles from getting exposed. To retain the side slopes, rock bolting with shotcreting and wire meshing were proposed, which is a normal practice in such strata. However, with the increase in depth of excavation, the rock quality kept on decreasing at an unexpected and surprising pace, with the Grade-III rock mass at 5-6 m converting to conglomerate formation at the depth of 15m. This worsening of geology from high grade rock to slushy conglomerate formation can never be predicted and came as a surprise to even the best geotechnical engineers. Since the excavation had already been cut down vertically to manage the shaft size, the execution was continued with enhanced cautions to stabilise the side slopes. But, when the shaft work was about to finish, a collapse was encountered on one side of the excavation shaft. This collapse was unexpected and surprising since all measures to stabilise the side slopes had been taken after face mapping, and the grid size, diameter, and depth of the rockbolts had already been readjusted to accommodate rock fractures. The above scenario was baffling even to the best geologists and geotechnical engineers, and it was decided that any further slope stabilisation scheme shall have to be designed in such a way to ensure safe completion of works. Accordingly, following revisions to excavation scheme were made: The excavation would be carried while maintaining a slope based on type of soil/rock. The rock bolt type was changed from SN rockbolts to Self Drilling type anchor. The grid size of the bolts changed on real time assessment. the excavation carried out by implementing a ‘Bench Release Approach’. Aggressive Real Time Instrumentation Scheme. Discussion: The above case Study again asserts vitality of correct interpretation of the geological strata and the need of real time revisions of the construction schemes based on the actual site data. The excavation is successfully being done with the above revised scheme, and further details of the Revised Slope Stabilisation Scheme, Instrumentation Schemes, Monitoring results, along with the actual site photographs, shall form the part of the final Paper.Keywords: unconfined compressive strength (ucs), rock mass rating (rmr), rock bolts, self drilling anchors, face mapping of rock, secant pile, shotcrete
Procedia PDF Downloads 6711797 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State
Authors: Rebecca Rumbul
Abstract:
The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.Keywords: digital, ICT, transparency, civic technology
Procedia PDF Downloads 66311796 Author Profiling: Prediction of Learners’ Gender on a MOOC Platform Based on Learners’ Comments
Authors: Tahani Aljohani, Jialin Yu, Alexandra. I. Cristea
Abstract:
The more an educational system knows about a learner, the more personalised interaction it can provide, which leads to better learning. However, asking a learner directly is potentially disruptive, and often ignored by learners. Especially in the booming realm of MOOC Massive Online Learning platforms, only a very low percentage of users disclose demographic information about themselves. Thus, in this paper, we aim to predict learners’ demographic characteristics, by proposing an approach using linguistically motivated Deep Learning Architectures for Learner Profiling, particularly targeting gender prediction on a FutureLearn MOOC platform. Additionally, we tackle here the difficult problem of predicting the gender of learners based on their comments only – which are often available across MOOCs. The most common current approaches to text classification use the Long Short-Term Memory (LSTM) model, considering sentences as sequences. However, human language also has structures. In this research, rather than considering sentences as plain sequences, we hypothesise that higher semantic - and syntactic level sentence processing based on linguistics will render a richer representation. We thus evaluate, the traditional LSTM versus other bleeding edge models, which take into account syntactic structure, such as tree-structured LSTM, Stack-augmented Parser-Interpreter Neural Network (SPINN) and the Structure-Aware Tag Augmented model (SATA). Additionally, we explore using different word-level encoding functions. We have implemented these methods on Our MOOC dataset, which is the most performant one comparing with a public dataset on sentiment analysis that is further used as a cross-examining for the models' results.Keywords: deep learning, data mining, gender predication, MOOCs
Procedia PDF Downloads 14911795 An Investigation for Information Asymmetry Nexus IPO Under-Pricing: A Case of Pakistan
Authors: Saqib Mehmood, Naveed Iqbal Chaudhry, Asif Mehmood
Abstract:
This study intends to investigate the information asymmetry theories of IPO and under-pricing in Pakistan. The purpose of the study is to validate the information asymmetry about firm value which leads to under-pricing. A total of 55 IPOs listed from 2000-2011 were included in this study. OLS multiple regression was applied to achieve the objectives of this study. The findings of the study confirm the significance of information asymmetry on under-pricing in Pakistan. The findings have implications for issuing firms and prospective investors.Keywords: information asymmetry, initial public offerings, under-pricing, firm value
Procedia PDF Downloads 48211794 Impact of Artificial Intelligence Technologies on Information-Seeking Behaviors and the Need for a New Information Seeking Model
Authors: Mohammed Nasser Al-Suqri
Abstract:
Former information-seeking models are proposed more than two decades ago. These already existed models were given prior to the evolution of digital information era and Artificial Intelligence (AI) technologies. Lack of current information seeking models within Library and Information Studies resulted in fewer advancements for teaching students about information-seeking behaviors, design of library tools and services. In order to better facilitate the aforementioned concerns, this study aims to propose state-of-the-art model while focusing on the information seeking behavior of library users in the Sultanate of Oman. This study aims for the development, designing and contextualizing the real-time user-centric information seeking model capable of enhancing information needs and information usage along with incorporating critical insights for the digital library practices. Another aim is to establish far-sighted and state-of-the-art frame of reference covering Artificial Intelligence (AI) while synthesizing digital resources and information for optimizing information-seeking behavior. The proposed study is empirically designed based on a mix-method process flow, technical surveys, in-depth interviews, focus groups evaluations and stakeholder investigations. The study data pool is consist of users and specialist LIS staff at 4 public libraries and 26 academic libraries in Oman. The designed research model is expected to facilitate LIS by assisting multi-dimensional insights with AI integration for redefining the information-seeking process, and developing a technology rich model.Keywords: artificial intelligence, information seeking, information behavior, information seeking models, libraries, Sultanate of Oman
Procedia PDF Downloads 11611793 Social Media, Society, and Criminal Victimization: A Qualitative Study on University Students of Bangladesh
Authors: Md. Tawohidul Haque
Abstract:
The main objective of this study is to explore the nature, types and, causes of the involvement of criminal activities of the university students using social media namely Social Networking Sites (SNS). The evidence shows that the students have greater chance to involve such criminal activities during sharing their personal messages, photos, and even sharing their academic works. Used qualitative case studies with six students from two universities, this study provides a detail information about the processes how this media provokes the students to commit to the criminal activities such as unethical pose, naked picture, post against persona’s prestige and dignity as well as social position, phone call at midnight, personal threats, sexual offer, kidnapping attitude, and so on. This finding would be an important guideline for the media persons, policy makers, restorative justice, and human rights workers.Keywords: social media, criminal victimization, human gathering scheme, social code of ethics
Procedia PDF Downloads 15611792 Double Negative Differential Resistance Features in Series AIN/GaN Double-Barrier Resonant Tunneling Diodes Vertically Integrated by Plasma-Assisted Molecular Beam Epitaxy
Authors: Jiajia Yao, Guanlin Wu, Fang Liu, Junshuai Xue, Yue Hao
Abstract:
This study reports on the epitaxial growth of a GaN-based resonant tunneling diode (RTD) structure with stable and repeatable double negative differential resistance (NDR) characteristics at room temperature on a c-plane GaN-on-sapphire template using plasma-assisted molecular beam epitaxy (PA-MBE) technology. In this structure, two independent AlN/GaN RTDs are epitaxially connected in series in the vertical growth direction through a silicon-doped GaN layer. As the collector electrode bias voltage increases, the two RTDs respectively align the ground state energy level in the quantum well with the 2DEG energy level in the emitter accumulation well to achieve quantum resonant tunneling and then reach the negative differential resistance (NDR) region. The two NDR regions exhibit similar peak current densities and peak-to-valley current ratios, which are 230 kA/cm² and 249 kA/cm², 1.33 and 1.38, respectively, for a device with a collector electrode mesa diameter of 1 µm. The consistency of the NDR is much higher than the results of on-chip discrete RTD device interconnection, resulting from the smaller chip area, fewer interconnect parasitic parameters, and less process complexity. The methods and results presented in this paper show the brilliant prospects of GaN RTDs in the development of multi-value logic digital circuits.Keywords: MBE, AlN/GaN, RTDs, double NDR
Procedia PDF Downloads 6411791 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 38111790 Efficient Photocatalytic Degradation of Tetracycline Hydrochloride Using Modified Carbon Nitride CCN/Bi₂WO₆ Heterojunction
Authors: Syed Najeeb-Uz-Zaman Haider, Yang Juan
Abstract:
Antibiotic overuse raises environmental concerns, boosting the demand for efficient removal from pharmaceutical wastewater. Photocatalysis, particularly using semiconductor photocatalysts, offers a promising solution and garners significant scientific interest. In this study, a Z-scheme 0.15BWO/CCN heterojunction was developed, analyzed, and employed for the photocatalytic degradation of tetracycline hydrochloride (TC) under visible light. The study revealed that the dosage of 0.15BWO@CCN and the presence of coexisting ions significantly influenced the degradation efficiency, achieving up to 87% within 20 minutes under optimal conditions (at pH 9-11/strongly basic conditions) while maintaining 84% efficiency under standard conditions (unaltered pH). Photoinduced electrons gathered on the conduction band of BWO while holes accumulated on the valence band of CCN, creating more favorable conditions to produce superoxide and hydroxyl radicals. Additionally, through comprehensive experimental analysis, the degradation pathway and mechanism were thoroughly explored. The superior photocatalytic performance of 0.15BWO@CCN was attributed to its Z-scheme heterojunction structure, which significantly reduced the recombination of photoinduced electrons and holes. The radicals produced were identified using ESR, and their involvement in tetracycline degradation was further analyzed through active species trapping experiments.Keywords: CCN, Bi₂WO₆, TC, photocatalytic degradation, heterojunction
Procedia PDF Downloads 4511789 Environmental Risk Assessment of Mechanization Waste Collection Scheme in Tehran
Authors: Amin Padash, Javad Kazem Zadeh Khoiy, Hossein Vahidi
Abstract:
Purpose: The mechanization system for the urban services was implemented in Tehran City in the year 2004 to promote the collection of domestic wastes; in 2010, in order to achieve the objectives of the project of urban services mechanization and qualitative promotion and improve the urban living environment, sustainable development and optimization of the recyclable solid wastes collection systems as well as other dry and non-organic wastes and conformity of the same to the modern urban management methods regarding integration of the mechanized urban services contractors and recycling contractors and in order to better and more correct fulfillment of the waste separation and considering the success of the mechanization plan of the dry wastes in most of the modern countries. The aim of this research is analyzing of Environmental Risk Assessment of the mechanization waste collection scheme in Tehran. Case Study: Tehran, the capital of Iran, with the population of 8.2 million people, occupies 730 km land expanse, which is 4% of total area of country. Tehran generated 2,788,912 ton (7,641 ton/day) of waste in year 2008. Hospital waste generation rate in Tehran reaches 83 ton/day. Almost 87% of total waste was disposed of by placing in a landfill located in Kahrizak region. This large amount of waste causes a significant challenge for the city. Methodology: To conduct the study, the methodology proposed in the standard Mil-St-88213 is used. This method is an efficient method to examine the position in opposition to the various processes and the action is effective. The method is based on the method of Military Standard and Specialized in the military to investigate and evaluate options to locate and identify the strengths and weaknesses of powers to decide on the best determining strategy has been used. Finding and Conclusion: In this study, the current status of mechanization systems to collect waste and identify its possible effects on the environment through a survey and assessment methodology Mil-St-88213, and then the best plan for action and mitigation of environmental risk has been proposed as Environmental Management Plan (EMP).Keywords: environmental risk assessment, mechanization waste collection scheme, Mil-St-88213
Procedia PDF Downloads 44111788 The Adoption of Process Management for Accounting Information Systems in Thailand
Authors: Manirath Wongsim
Abstract:
Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption
Procedia PDF Downloads 46711787 Designing for Sustainable Public Housing from Property Management and Financial Feasibility Perspectives
Authors: Kung-Jen Tu
Abstract:
Many public housing properties developed by local governments in Taiwan in the 1980s have deteriorated severely as these rental apartment buildings aged. The lack of building maintainability considerations during project design phase as well as insufficient maintenance funds have made it difficult and costly for local governments to maintain and keep public housing properties in good shape. In order to assist the local governments in achieving and delivering sustainable public housing, this paper intends to present a developed design evaluation method to be used to evaluate the presented design schemes from property management and financial feasibility perspectives during project design phase of public housing projects. The design evaluation results, i.e. the property management and financial implications of presented design schemes that could occur later during the building operation and maintenance phase, will be reported to the client (the government) and design schemes revised consequently. It is proposed that the design evaluation be performed from two main perspectives: (1) Operation and property management perspective: Three criteria such as spatial appropriateness, people and vehicle circulation and control, property management working spaces are used to evaluate the ‘operation and PM effectiveness’ of a design scheme. (2) Financial feasibility perspective: Four types of financial analyses are performed to assess the long term financial feasibility of a presented design scheme, such as operational and rental income analysis, management fund analysis, regular operational and property management service expense analysis, capital expense analysis. The ongoing Chung-Li Public Housing Project developed by the Taoyuan City Government will be used as a case to demonstrate how the presented design evaluation method is implemented. The results of property management assessment as well as the annual operational and capital expenses of a proposed design scheme are presented.Keywords: design evaluation method, management fund, operational and capital expenses, rental apartment buildings
Procedia PDF Downloads 31111786 Distributed Coverage Control by Robot Networks in Unknown Environments Using a Modified EM Algorithm
Authors: Mohammadhosein Hasanbeig, Lacra Pavel
Abstract:
In this paper, we study a distributed control algorithm for the problem of unknown area coverage by a network of robots. The coverage objective is to locate a set of targets in the area and to minimize the robots’ energy consumption. The robots have no prior knowledge about the location and also about the number of the targets in the area. One efficient approach that can be used to relax the robots’ lack of knowledge is to incorporate an auxiliary learning algorithm into the control scheme. A learning algorithm actually allows the robots to explore and study the unknown environment and to eventually overcome their lack of knowledge. The control algorithm itself is modeled based on game theory where the network of the robots use their collective information to play a non-cooperative potential game. The algorithm is tested via simulations to verify its performance and adaptability.Keywords: distributed control, game theory, multi-agent learning, reinforcement learning
Procedia PDF Downloads 46011785 Online Information Seeking: A Review of the Literature in the Health Domain
Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad
Abstract:
The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT
Procedia PDF Downloads 27611784 Modified Newton's Iterative Method for Solving System of Nonlinear Equations in Two Variables
Authors: Sara Mahesar, Saleem M. Chandio, Hira Soomro
Abstract:
Nonlinear system of equations in two variables is a system which contains variables of degree greater or equal to two or that comprises of the transcendental functions. Mathematical modeling of numerous physical problems occurs as a system of nonlinear equations. In applied and pure mathematics it is the main dispute to solve a system of nonlinear equations. Numerical techniques mainly used for finding the solution to problems where analytical methods are failed, which leads to the inexact solutions. To find the exact roots or solutions in case of the system of non-linear equations there does not exist any analytical technique. Various methods have been proposed to solve such systems with an improved rate of convergence and accuracy. In this paper, a new scheme is developed for solving system of non-linear equation in two variables. The iterative scheme proposed here is modified form of the conventional Newton’s Method (CN) whose order of convergence is two whereas the order of convergence of the devised technique is three. Furthermore, the detailed error and convergence analysis of the proposed method is also examined. Additionally, various numerical test problems are compared with the results of its counterpart conventional Newton’s Method (CN) which confirms the theoretic consequences of the proposed method.Keywords: conventional Newton’s method, modified Newton’s method, order of convergence, system of nonlinear equations
Procedia PDF Downloads 25911783 A Sentence-to-Sentence Relation Network for Recognizing Textual Entailment
Authors: Isaac K. E. Ampomah, Seong-Bae Park, Sang-Jo Lee
Abstract:
Over the past decade, there have been promising developments in Natural Language Processing (NLP) with several investigations of approaches focusing on Recognizing Textual Entailment (RTE). These models include models based on lexical similarities, models based on formal reasoning, and most recently deep neural models. In this paper, we present a sentence encoding model that exploits the sentence-to-sentence relation information for RTE. In terms of sentence modeling, Convolutional neural network (CNN) and recurrent neural networks (RNNs) adopt different approaches. RNNs are known to be well suited for sequence modeling, whilst CNN is suited for the extraction of n-gram features through the filters and can learn ranges of relations via the pooling mechanism. We combine the strength of RNN and CNN as stated above to present a unified model for the RTE task. Our model basically combines relation vectors computed from the phrasal representation of each sentence and final encoded sentence representations. Firstly, we pass each sentence through a convolutional layer to extract a sequence of higher-level phrase representation for each sentence from which the first relation vector is computed. Secondly, the phrasal representation of each sentence from the convolutional layer is fed into a Bidirectional Long Short Term Memory (Bi-LSTM) to obtain the final sentence representations from which a second relation vector is computed. The relations vectors are combined and then used in then used in the same fashion as attention mechanism over the Bi-LSTM outputs to yield the final sentence representations for the classification. Experiment on the Stanford Natural Language Inference (SNLI) corpus suggests that this is a promising technique for RTE.Keywords: deep neural models, natural language inference, recognizing textual entailment (RTE), sentence-to-sentence relation
Procedia PDF Downloads 34911782 Formulating Rough Approximations in Information Tables with Possibilistic Information
Authors: Michinori Nakata, Hiroshi Sakai
Abstract:
A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations
Procedia PDF Downloads 32111781 Optical Design and Modeling of Micro Light-Emitting Diodes for Display Applications
Authors: Chaya B. M., C. Dhanush, Inti Sai Srikar, Akula Pavan Parvatalu, Chirag Gowda R
Abstract:
Recently, there has been a lot of interest in µ-LED technology because of its exceptional qualities, including auto emission, high visibility, low consumption of power, rapid response and longevity. Light-emitting diodes (LED) using III-nitride, such as lighting sources, visible light communication (VLC) devices, and high-power devices, are finding increasing use as miniaturization technology advances. The use of micro-LED displays in place of traditional display technologies like liquid crystal displays (LCDs) and organic light-emitting diodes (OLEDs) is one of the most prominent recent advances, which may even represent the next generation of displays. The development of fully integrated, multifunctional devices and the incorporation of extra capabilities into micro-LED displays, such as sensing, light detection, and solar cells, are the pillars of advanced technology. Due to the wide range of applications for micro-LED technology, the effectiveness and dependability of these devices in numerous harsh conditions are becoming increasingly important. Enough research has been conducted to overcome the under-effectiveness of micro-LED devices. In this paper, different Micro LED design structures are proposed in order to achieve optimized optical properties. In order to attain improved external quantum efficiency (EQE), devices' light extraction efficiency (LEE) has also been boosted.Keywords: finite difference time domain, light out coupling efficiency, far field intensity, power density, quantum efficiency, flat panel displays
Procedia PDF Downloads 8011780 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 14911779 Characterization of Crustin from Litopenaeus vannamei
Authors: Suchao Donpudsa, Anchalee Tassanakajon, Vichien Rimphanitchayakit
Abstract:
A crustin gene, LV-SWD1, previously found in the hemocyte cDNA library of Litopenaeus vannamei, contains the open reading frames of 288 bp encoding a putative protein of 96 amino acid residues. The putative signal peptides of the LV-SWD1 were identified using the online SignalP 3.0 with predicted cleavage sites between Ala24-Val25, resulting in 72 residue mature protein with calculated molecular mass of 7.4 kDa and predicted pI of 8.5. This crustin contains a Arg-Pro rich region at the amino-terminus and a single whey acidic protein (WAP) domain at the carboxyl-terminus. In order to characterize their properties and biological activities, the recombinant crustin protein was produced in the Escherichia coli expression system. Antimicrobial assays showed that the growth of Bacillus subtilis was inhibited by this recombinant crustin with MIC of about 25-50 µM.Keywords: crustin, single whey acidic protein, Litopenaeus vannamei, antimicrobial activity
Procedia PDF Downloads 24511778 Preschool Story Retelling: Actions and Verb Use
Authors: Eva Nwokah, Casey Taliancich-Klinger, Lauren Luna, Sarah Rodriguez
Abstract:
Story-retelling is a technique frequently used to assess children’s language skills and support their development of narratives. Fourteen preschool children listened to one of two stories from the wordless, illustrated Frog book series and then retold the story using the pictures. A comparison of three verb types (action, mental and other) in the original story model, and children's verb use in their retold stories revealed the salience of action events. The children's stories contained a similar proportion of verb types to the original story. However, the action verbs they used were rarely those they had heard in the original. The implications for the process of lexical encoding and narrative recall are discussed, as well as suggestions for the use of wordless picture books and the language teaching of new verbs.Keywords: story re-telling, verb use, preschool language, wordless picture books
Procedia PDF Downloads 27211777 Two-Photon Ionization of Silver Clusters
Authors: V. Paployan, K. Madoyan, A. Melikyan, H. Minassian
Abstract:
Resonant two-photon ionization (TPI) is a valuable technique for the study of clusters due to its ultrahigh sensitivity. The comparison of the observed TPI spectra with results of calculations allows to deduce important information on the shape, rotational and vibrational temperatures of the clusters with high accuracy. In this communication we calculate the TPI cross-section for pump-probe scheme in Ag neutral cluster. The pump photon energy is chosen to be close to the surface plasmon (SP) energy of cluster in dielectric media. Since the interband transition energy in Ag exceeds the SP resonance energy, the main contribution into the TPI comes from the latter. The calculations are performed by separating the coordinates of electrons corresponding to the collective oscillations and the individual motion that allows to take into account the resonance contribution of excited SP oscillations. It is shown that the ionization cross section increases by two orders of magnitude if the energy of the pump photon matches the surface plasmon energy in the cluster.Keywords: resonance enhancement, silver clusters, surface plasmon, two-photon ionization
Procedia PDF Downloads 427