Search results for: critical point of the second kind
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10794

Search results for: critical point of the second kind

9924 Rethinking International Relations Theory through the Lens of Outside-in Logic of State-Building

Authors: Nana Kwasi Amoateng

Abstract:

The paper uses secondary information to investigate some longstanding limitations in International Relations (IR) theory. Specifically, the analysis highlights IR theory through the lens of J. C. Sharman’s brilliant concept of outside-in state-building logic in which some states, particularly those in Africa, have relied mainly on foreign resources to address local threats. The key findings are that IR theory has been largely understood from the perspective of an inside-out state-building logic, whereby Western and other advanced states have heavily relied on local resources to address foreign threats. In this vein, IR theorists, including Critical Theorists, have not been able to fully grasp African states and states elsewhere that have generally relied on an outside-in logic of state-building. The paper helps to fill a major gap in IR theory, which has mainly addressed criticisms of being Euro- or Western-centric or failing to include the unique experiences of states and other actors in the Global South by developing critical theories such as post-colonial theory and neo-colonialism. Although this has helped to understand some experiences of actors in the Global South, the fundamental difference between state-building in the West and the Global South, particularly Africa, has not been adequately explored to fully comprehend why, despite the works of Critical Theorists, IR theory still fails to capture many political and socioeconomic realities in Africa and elsewhere.

Keywords: international relations theory, outside-in state-building logic, inside-out state-building logic, Africa

Procedia PDF Downloads 74
9923 The Effect of Critical Audit Matters on Financial Information Quality: The Role of Audit Committee Expertise

Authors: Khawla Hlel

Abstract:

Purpose: This study aims to examine whether critical audit matters (CAM) affect financial information quality. We also investigate the moderating role of the audit committee on the association between CAM and financial information quality. Design/Methodology/Approach: The analysis is based on GLS and GMM regressions explaining the absolute value of discretionary accruals by using 52 Tunisian listed firms on the Tunisia Stock Exchange (TSE) for the period 2017-2020. Findings: We find evidence that managers react to the CAM by increasing the quality of financial disclosures. This study provides insights into how a change in the auditor’s report model might impact the quality of financial information. It suggests that external auditors and audit committees serve as a beneficial mechanism for enhancing financial information quality by reducing information asymmetry. In addition, our results indicate that CAM is an efficient monitoring mechanism that increases financial reporting quality and supervises managers. Originality: This study is important for potential investors who should assess CAM when evaluating firms. Furthermore, the authors expect the findings to be interesting to firms, as this study highlights the effectiveness of the auditor in reducing managerial opportunistic behavior and improving information quality. The results could encourage audit regulators to ameliorate the standards, as this research reinforces the role of the auditor in increasing the quality of financial disclosure by offering the required information for shareholders.

Keywords: critical audit matters, audit committee, information quality, Tunisian firms

Procedia PDF Downloads 76
9922 A Critical Discourse Analysis of Corporate Annual Reports in a Cross-Cultural Perspective: Views from Grammatical Metaphor and Systemic Functional Linguistics

Authors: Antonio Piga

Abstract:

The study of language strategies in financial and corporate discourse has always been vital for understanding how companies manage to communicate effectively with a wider customer base and offers new perspectives on how companies interact with key stakeholders, not only to convey transparency and an image of trustworthiness, but also to create affiliation and attract investment. In the light of Systemic Functional Linguistics, the purpose of this study is to examine and analyse the annual reports of Asian and Western joint-stock companies involved in oil refining and power generation from the point of view of the functions and frequency of grammatical metaphors. More specifically, grammatical metaphor - through the lens of Critical Discourse Analysis (CDA) - is used as a theoretical tool for analysing a synchronic cross-cultural study of the communicative strategies adopted by Asian and Western companies to communicate social and environmental sustainability and showcase their ethical values, performance and competitiveness to local and global communities and key stakeholders. According to Systemic Functional Linguistics, grammatical metaphor can be divided into two broad areas: ideational and interpersonal. This study focuses on the first type, ideational grammatical metaphor (IGM), which includes de-adjectival and de-verbal nominalisation. The dominant and more effective grammatical tropes used by Asian and Western corporations in their annual reports were examined from both a qualitative and quantitative perspective. The aim was to categorise and explain how ideational grammatical metaphor is constructed cross-culturally and presented through structural language patterns involving re-mapping between semantics and lexico-grammatical features. The results show that although there seem to be more differences than similarities in terms of the categorisation of the ideational grammatical metaphors conceptualised in the two case studies analysed, there are more similarities than differences in terms of the occurrence, the congruence of process types and the role and function of IGM. Through the immediacy and essentialism of compacting and condensing information, IGM seems to be an important linguistic strategy adopted in the rhetoric of corporate annual reports, contributing to the ideologies and actions of companies to report and promote efficiency, profit and social and environmental sustainability, thus advocating the engagement and investment of key stakeholders.

Keywords: corporate annual reports, cross-cultural perspective, ideational grammatical metaphor, rhetoric, systemic functional linguistics

Procedia PDF Downloads 26
9921 Using Printouts as Social Media Evidence and Its Authentication in the Courtroom

Authors: Chih-Ping Chang

Abstract:

Different from traditional objective evidence, social media evidence has its own characteristics with easily tampering, recoverability, and cannot be read without using other devices (such as a computer). Simply taking a screenshot from social network sites must be questioned its original identity. When the police search and seizure digital information, a common way they use is to directly print out digital data obtained and ask the signature of the parties at the presence, without taking original digital data back. In addition to the issue on its original identity, this conduct to obtain evidence may have another two results. First, it will easily allege that is tampering evidence because the police wanted to frame the suspect and falsified evidence. Second, it is not easy to discovery hidden information. The core evidence associated with crime may not appear in the contents of files. Through discovery the original file, data related to the file, such as the original producer, creation time, modification date, and even GPS location display can be revealed from hidden information. Therefore, how to show this kind of evidence in the courtroom will be arguably the most important task for ruling social media evidence. This article, first, will introduce forensic software, like EnCase, TCT, FTK, and analyze their function to prove the identity with another digital data. Then turning back to the court, the second part of this article will discuss legal standard for authentication of social media evidence and application of that forensic software in the courtroom. As the conclusion, this article will provide a rethinking, that is, what kind of authenticity is this rule of evidence chase for. Does legal system automatically operate the transcription of scientific knowledge? Or furthermore, it wants to better render justice, not only under scientific fact, but through multivariate debating.

Keywords: federal rule of evidence, internet forensic, printouts as evidence, social media evidence, United States v. Vayner

Procedia PDF Downloads 278
9920 Simulation of Maximum Power Point Tracking in a Photovoltaic System: A Circumstance Using Pulse Width Modulation Analysis

Authors: Asowata Osamede

Abstract:

Optimized gain in respect to output power of stand-alone photovoltaic (PV) systems is one of the major focus of PV in recent times. This is evident to its low carbon emission and efficiency. Power failure or outage from commercial providers in general does not promote development to the public and private sector, these basically limit the development of industries. The need for a well-structured PV system is of importance for an efficient and cost-effective monitoring system. The purpose of this paper is to validate the maximum power point of an off-grid PV system taking into consideration the most effective tilt and orientation angles for PV's in the southern hemisphere. This paper is based on analyzing the system using a solar charger with MPPT from a pulse width modulation (PWM) perspective. The power conditioning device chosen is a solar charger with MPPT. The practical setup consists of a PV panel that is set to an orientation angle of 0o north, with a corresponding tilt angle of 36 o, 26o and 16o. The load employed in this set-up are three Lead Acid Batteries (LAB). The percentage fully charged, charging and not charging conditions are observed for all three batteries. The results obtained in this research is used to draw the conclusion that would provide a benchmark for researchers and scientist worldwide. This is done so as to have an idea of the best tilt and orientation angles for maximum power point in a basic off-grid PV system. A quantitative analysis would be employed in this research. Quantitative research tends to focus on measurement and proof. Inferential statistics are frequently used to generalize what is found about the study sample to the population as a whole. This would involve: selecting and defining the research question, deciding on a study type, deciding on the data collection tools, selecting the sample and its size, analyzing, interpreting and validating findings Preliminary results which include regression analysis (normal probability plot and residual plot using polynomial 6) showed the maximum power point in the system. The best tilt angle for maximum power point tracking proves that the 36o tilt angle provided the best average on time which in turns put the system into a pulse width modulation stage.

Keywords: power-conversion, meteonorm, PV panels, DC-DC converters

Procedia PDF Downloads 132
9919 Finite Time Blow-Up and Global Solutions for a Semilinear Parabolic Equation with Linear Dynamical Boundary Conditions

Authors: Xu Runzhang, Yang Yanbing, Niu Yi, Zhang Mingyou, Liu Yu

Abstract:

For a class of semilinear parabolic equations with linear dynamical boundary conditions in a bounded domain, we obtain both global solutions and finite time blow-up solutions when the initial data varies in the phase space H1(Ω). Our main tools are the comparison principle, the potential well method and the concavity method. In particular, we discuss the behavior of the solutions with the initial data at critical and high energy level.

Keywords: high energy level, critical energy level, linear dynamical boundary condition, semilinear parabolic equation

Procedia PDF Downloads 425
9918 Investigating Transformative Practices in the Bangladeshi Classroom

Authors: Rubaiyat Jahan, Nasreen Sultana Mitu

Abstract:

This paper examines the theoretical construct of transformative practices, and reports some evidence of transformative practices from a couple of Bangladeshi English teachers. The idea of transformative practices calls for teachers’ capabilities to invest their intellectual labor in teaching with an assumption that along with the academic advancement of the learners, it aims for the personal transformation for both the learners as well for themselves. Following an ethnographic research approach, data for this study were collected through in-depth interviews, informal talks and classroom observations for a period of one year. In relevance to the English classroom of the Bangladeshi context, from this study, references of transformative practices have been underlined from the participant teachers’ views on English language teaching as well as from their actual practices. According to data of this research, some evidence of transformative practices in the form of critical language awareness and personal theories of practices emerge from the participants’ articulation of the beliefs on teaching; and from the participant teachers’ classroom practices evidence of self-directed acts of teaching, self-directed acts of professional development, and liberatory autonomy have been highlighted as the reflections of transformative practices. The implication of this paper refers to the significance of practicing teachers’ articulation of beliefs and views on teaching along with their orientation to critical pedagogical relations.

Keywords: critical language awareness, personal theories of practice, teacher autonomy, transformative practices

Procedia PDF Downloads 211
9917 Design and Implementation of Bluetooth Controlled Autonomous Vehicle

Authors: Amanuel Berhanu Kesamo

Abstract:

This paper presents both circuit simulation and hardware implementation of a robot vehicle that can be either controlled manually via Bluetooth with video streaming or navigate autonomously to a target point by avoiding obstacles. In manual mode, the user controls the mobile robot using C# windows form interfaced via Bluetooth. The camera mounted on the robot is used to capture and send the real time video to the user. In autonomous mode, the robot plans the shortest path to the target point while avoiding obstacles along the way. Ultrasonic sensor is used for sensing the obstacle in its environment. An efficient path planning algorithm is implemented to navigate the robot along optimal route.

Keywords: Arduino Uno, autonomous, Bluetooth module, path planning, remote controlled robot, ultra sonic sensor

Procedia PDF Downloads 128
9916 Geomatic Techniques to Filter Vegetation from Point Clouds

Authors: M. Amparo Núñez-Andrés, Felipe Buill, Albert Prades

Abstract:

More and more frequently, geomatics techniques such as terrestrial laser scanning or digital photogrammetry, either terrestrial or from drones, are being used to obtain digital terrain models (DTM) used for the monitoring of geological phenomena that cause natural disasters, such as landslides, rockfalls, debris-flow. One of the main multitemporal analyses developed from these models is the quantification of volume changes in the slopes and hillsides, either caused by erosion, fall, or land movement in the source area or sedimentation in the deposition zone. To carry out this task, it is necessary to filter the point clouds of all those elements that do not belong to the slopes. Among these elements, vegetation stands out as it is the one we find with the greatest presence and its constant change, both seasonal and daily, as it is affected by factors such as wind. One of the best-known indexes to detect vegetation on the image is the NVDI (Normalized Difference Vegetation Index), which is obtained from the combination of the infrared and red channels. Therefore it is necessary to have a multispectral camera. These cameras are generally of lower resolution than conventional RGB cameras, while their cost is much higher. Therefore we have to look for alternative indices based on RGB. In this communication, we present the results obtained in Georisk project (PID2019‐103974RB‐I00/MCIN/AEI/10.13039/501100011033) by using the GLI (Green Leaf Index) and ExG (Excessive Greenness), as well as the change to the Hue-Saturation-Value (HSV) color space being the H coordinate the one that gives us the most information for vegetation filtering. These filters are applied both to the images, creating binary masks to be used when applying the SfM algorithms, and to the point cloud obtained directly by the photogrammetric process without any previous filter or the one obtained by TLS (Terrestrial Laser Scanning). In this last case, we have also tried to work with a Riegl VZ400i sensor that allows the reception, as in the aerial LiDAR, of several returns of the signal. Information to be used for the classification on the point cloud. After applying all the techniques in different locations, the results show that the color-based filters allow correct filtering in those areas where the presence of shadows is not excessive and there is a contrast between the color of the slope lithology and the vegetation. As we have advanced in the case of using the HSV color space, it is the H coordinate that responds best for this filtering. Finally, the use of the various returns of the TLS signal allows filtering with some limitations.

Keywords: RGB index, TLS, photogrammetry, multispectral camera, point cloud

Procedia PDF Downloads 125
9915 Experimental and Theoretical Study on Flexural Behaviors of Reinforced Concrete Cement (RCC) Beams by Using Carbonfiber Reinforcedpolymer (CFRP) Laminate as Retrofitting and Rehabilitation Method

Authors: Fils Olivier Kamanzi

Abstract:

This research Paper shows that materials CFRP were used to rehabilitate 9 Beams and retrofitting of 9 Beams with size (125x250x2300) mm each for M50 grade of concrete with 20% of Volume of Cement replaced by GGBS as a mineral Admixture. Superplasticizer (ForscoConplast SP430) used to reduce the water-cement ratio and maintaining good workability of fresh concrete (Slump test 57mm). Concrete Mix ratio 1:1.56:2.66 with a water-cement ratio of 0.31(ACI codebooks). A sample of 6cubes sized (150X150X150) mm, 6cylinders sized (150ФX300H) mm and 6Prisms sized (100X100X500) mm were cast, cured, and tested for 7,14&28days by compressive, tensile and flexure test; finally, mix design reaches the compressive strength of 59.84N/mm2. 21 Beams were cast and cured for up to 28 days, 3Beams were tested by a two-point loading machine as Control beams. 9 Beams were distressed in flexure by adopting failure up to final Yielding point under two-point loading conditions by taking 90% off Ultimate load. Three sets, each composed of three distressed beams, were rehabilitated by using CFRP sheets, one, two & three layers, respectively, and after being retested up to failure mode. Another three sets were freshly retrofitted also by using CFRP sheets one, two & three layers, respectively, and being tested by a two-point load method of compression strength testing machine. The aim of this study is to determine the flexural Strength & behaviors of repaired and retrofitted Beams by CFRP sheets for gaining good strength and considering economic aspects. The results show that rehabilitated beams increase its strength 47 %, 78 % & 89 %, respectively, to thickness of CFRP sheets and 41%, 51 %& 68 %, respectively too, for retrofitted Beams. The conclusion is that three layers of CFRP sheets are the best applicable in repairing and retrofitting the bonded beams method.

Keywords: retrofitting, rehabilitation, cfrp, rcc beam, flexural strength and behaviors, ggbs, and epoxy resin

Procedia PDF Downloads 86
9914 An Ensemble System of Classifiers for Computer-Aided Volcano Monitoring

Authors: Flavio Cannavo

Abstract:

Continuous evaluation of the status of potentially hazardous volcanos plays a key role for civil protection purposes. The importance of monitoring volcanic activity, especially for energetic paroxysms that usually come with tephra emissions, is crucial not only for exposures to the local population but also for airline traffic. Presently, real-time surveillance of most volcanoes worldwide is essentially delegated to one or more human experts in volcanology, who interpret data coming from different kind of monitoring networks. Unfavorably, the high nonlinearity of the complex and coupled volcanic dynamics leads to a large variety of different volcanic behaviors. Moreover, continuously measured parameters (e.g. seismic, deformation, infrasonic and geochemical signals) are often not able to fully explain the ongoing phenomenon, thus making the fast volcano state assessment a very puzzling task for the personnel on duty at the control rooms. With the aim of aiding the personnel on duty in volcano surveillance, here we introduce a system based on an ensemble of data-driven classifiers to infer automatically the ongoing volcano status from all the available different kind of measurements. The system consists of a heterogeneous set of independent classifiers, each one built with its own data and algorithm. Each classifier gives an output about the volcanic status. The ensemble technique allows weighting the single classifier output to combine all the classifications into a single status that maximizes the performance. We tested the model on the Mt. Etna (Italy) case study by considering a long record of multivariate data from 2011 to 2015 and cross-validated it. Results indicate that the proposed model is effective and of great power for decision-making purposes.

Keywords: Bayesian networks, expert system, mount Etna, volcano monitoring

Procedia PDF Downloads 231
9913 Implementation of Total Quality Management in a Small Scale Industry: A Case Study

Authors: Soham Lalwala, Ronita Singh, Yaman Pattanaik

Abstract:

In the present scenario of globalization and privatization, it becomes difficult for small scale industries to sustain due to rapidly increasing competition. In a developing country, most of the gross output is generally obtained from small scale industries. Thus, quality plays a vital role in maintaining customer satisfaction. Total quality management (TQM) is an approach which enables employees to focus on quality rather quantity, further improving the competitiveness, effectiveness and flexibility of the whole organization. The objective of the paper is to present the application of TQM and develop a TQM Model in a small scale industry of narrow fabrics in Surat, India named ‘Rajdhani Lace & Borders’. Further, critical success factors relating all the fabric processes involved were identified. The data was collected by conducting a questionnaire survey. After data was collected, critical areas were visualized using different tools of TQM such as cause and effect diagram, control charts and run charts. Overall, responses were analyzed, and factor analysis was used to develop the model. The study presented here will aid the management of the above-mentioned industry in identifying the weaker areas and thus give a plausible solution to improve the total productivity of the firm along with effective utilization of resources and better customer satisfaction.

Keywords: critical success factors, narrow fabrics, quality, small scale industries, total quality management (TQM)

Procedia PDF Downloads 241
9912 Reusing of HSS Hacksaw Blades as Rough Machining Tool

Authors: Raja V., Chokkalingam B.

Abstract:

For rough cutting, in many industries and educational institutions using carbon steels or HSS single point cutting tools in center lathe machine. In power hacksaw blades, only the cutter teeth region used to parting off the given material. The portions other than the teeth can be used as a single point cutting tool for rough turning and facing on soft materials. The hardness and Tensile strength of this used Power hacksaw blade is almost same as conventional cutting tools. In this paper, the effect of power hacksaw blades over conventional tool has been compared. Thickness of the blade (1.6 mm) is very small compared to its length and width. Hence, a special tool holding device is designed to hold the tool.

Keywords: hardness, high speed steels, power hacksaw blade, tensile strength

Procedia PDF Downloads 444
9911 Control of Spherical Robot with Sliding Mode

Authors: Roya Khajepour, Alireza B. Novinzadeh

Abstract:

A major issue with spherical robot is it surface shape, which is not always predictable. This means that given only the dynamic model of the robot, it is not possible to control the robot. Due to the fact that in certain conditions it is not possible to measure surface friction, control methods must be prepared for these conditions. Moreover, although spherical robot never becomes unstable or topples thanks to its special shape, since it moves by rolling it has a non-holonomic constraint at point of contact and therefore it is considered a non-holonomic system. Existence of such a point leads to complexity and non-linearity of robot's kinematic equations and makes the control problem difficult. Due to the non-linear dynamics and presence of uncertainty, the sliding-mode control is employed. The proposed method is based on Lyapunov Theory and guarantees system stability. This controller is insusceptible to external disturbances and un-modeled dynamics.

Keywords: sliding mode, spherical robot, non-holomonic constraint, system stability

Procedia PDF Downloads 375
9910 Perception of Indoor Environmental Qualities in Residential Buildings: A Quantitative Case Survey for Turkey and Iran

Authors: Majid Bahramian, Kaan Yetilmezsoy

Abstract:

Environmental performance of residential buildings been a hotspot for the research community, however, the indoor environmental quality significantly overlooked in the literature. The paper is motivated by the understanding of the occupants from the indoor environmental qualities and seeks to find the satisfaction level in two high-rise green-certified residential buildings. Views of more than 250 respondents in each building were solicited on 15 Indoor Environmental Qualities (IEQ) parameters. Findings suggest that occupants are generally satisfied with five critical aspects of IEQ, but some unsatisfaction exists during operation phase. The results also indicate that the green build certification systems for new buildings have some deficiencies which affect the actual environmental performance of green buildings during operation. Some reasons were suggested by the occupants of which the design-focus construction and lack of monitoring after certification were the most critical factors. Among the crucial criteria for environmental performance assessment of green buildings, energy saving, reduction of Greenhouse Gases (GHG) emissions, environmental impacts on neighborhood area, waste reduction and IEQs, were the most critical factors dominating the performance, in a descending order. This study provides valuable information on the performance of IEQ parameters of green building and gives a deeper understanding for stakeholders and companies involved in construction sector with the relevant feedback for their decision-making on current and future projects.

Keywords: indoor environmental qualities, green buildings, occupant satisfaction, environmental performance

Procedia PDF Downloads 70
9909 Safety-Security Co-Engineering of Control Systems

Authors: Elena A. Troubitsyna

Abstract:

Designers of modern safety-critical control systems are increasingly relying on networking to provide the systems with advanced functionality and satisfy customer’s needs. However, networking nature of modern control systems also brings new technological challenges associated with ensuring system safety in the presence of openness and hence, potential security threats. In this paper, we propose a methodology that relies on systems-theoretic analysis to enable an integrated analysis of safety and security requirements of controlling software. We demonstrate how to create a safety case – a structured argument about system safety – with explicit representation of both safety and security goals. Our approach provides the designers with a systematic approach to analysing safety and security interdependencies while designing safety-critical control systems.

Keywords: controlling software, integrated analysis, security, safety-security co-engineering

Procedia PDF Downloads 485
9908 Determination of Mechanical Properties of Tomato Fruits: Experimental and Finite Element Analysis

Authors: Mallikarjunachari G., Venkata Ravi M.

Abstract:

The objective of this research work is to evaluate the mechanical properties such as elastic modulus and critical rupture load of tomato fruits. Determination of mechanical properties of tomato fruits is essential in various material handling applications, especially as related to robot harvesting, packaging, and transportation. However, extracting meaningful mechanical properties of tomato fruits are extremely challenging due to its layered structure, i.e., the combination of exocarp, mesocarp, and locular gel tissues. Apart from this layered structure, other physical parameters such as diameter, sphericity, locule number, and, the surface to volume ratio also influence the mechanical properties. In this research work, tomato fruits are cultivated in two different ways, namely organic and inorganic farming. Static compression tests are performed to extract the mechanical properties of tomato fruits. Finite element simulations are done to complement the experimental results. It is observed that the effective modulus decreases as the compression depth increase from 0.5 mm to 10 mm and also a critical load of fracture decreases as the locule number increases from 3 to 5. Significant differences in mechanical properties are observed between organically and inorganically cultivated tomato fruits. The current study significantly helps in the design of material handling systems to avoid damage of tomato fruits.

Keywords: elastic modulus, critical load of fracture, locule number, finite element analysis

Procedia PDF Downloads 106
9907 Proximal Method of Solving Split System of Minimization Problem

Authors: Anteneh Getachew Gebrie, Rabian Wangkeeree

Abstract:

The purpose of this paper is to introduce iterative algorithm solving split system of minimization problem given as a task of finding a common minimizer point of finite family of proper, lower semicontinuous convex functions and whose image under a bounded linear operator is also common minimizer point of another finite family of proper, lower semicontinuous convex functions. We obtain strong convergence of the sequence generated by our algorithm under some suitable conditions on the parameters. The iterative schemes are developed with a way of selecting the step sizes such that the information of operator norm is not necessary. Some applications and numerical experiment is given to analyse the efficiency of our algorithm.

Keywords: Hilbert Space, minimization problems, Moreau-Yosida approximate, split feasibility problem

Procedia PDF Downloads 126
9906 Offline Signature Verification in Punjabi Based On SURF Features and Critical Point Matching Using HMM

Authors: Rajpal Kaur, Pooja Choudhary

Abstract:

Biometrics, which refers to identifying an individual based on his or her physiological or behavioral characteristics, has the capabilities to the reliably distinguish between an authorized person and an imposter. The Signature recognition systems can categorized as offline (static) and online (dynamic). This paper presents Surf Feature based recognition of offline signatures system that is trained with low-resolution scanned signature images. The signature of a person is an important biometric attribute of a human being which can be used to authenticate human identity. However the signatures of human can be handled as an image and recognized using computer vision and HMM techniques. With modern computers, there is need to develop fast algorithms for signature recognition. There are multiple techniques are defined to signature recognition with a lot of scope of research. In this paper, (static signature) off-line signature recognition & verification using surf feature with HMM is proposed, where the signature is captured and presented to the user in an image format. Signatures are verified depended on parameters extracted from the signature using various image processing techniques. The Off-line Signature Verification and Recognition is implemented using Mat lab platform. This work has been analyzed or tested and found suitable for its purpose or result. The proposed method performs better than the other recently proposed methods.

Keywords: offline signature verification, offline signature recognition, signatures, SURF features, HMM

Procedia PDF Downloads 369
9905 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation

Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud

Abstract:

Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.

Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing

Procedia PDF Downloads 80
9904 Effects of Moisture on Fatigue Behavior of Asphalt Concrete Mixtures Using Four-Point Bending Test

Authors: Mohit Chauhan, Atul Narayan

Abstract:

Moisture damage is the continuous deterioration of asphalt concrete mixtures by the loss of adhesive bond between the asphalt binder and aggregates, or loss of cohesive bonds within the asphalt binder in the presence of moisture. Moisture has been known to either cause or exacerbates distresses in asphalt concrete pavements. Since moisture would often retain for a relatively long duration at the bottom of asphalt concrete layer, the movement of traffic loading in this saturated condition would cause excess stresses or strains within the mixture. This would accelerate the degradation of the adhesion and cohesion within the mixture and likely to contribute the development of fatigue cracking in asphalt concrete pavements. In view of this, it is important to investigate the effect of moisture on the fatigue behavior of asphalt concrete mixtures. In this study, changes in fatigue characteristics after moisture conditioning were evaluated by conducting four-point beam fatigue tests on dry and moisture conditioned specimens. For this purpose, mixtures with two different types of binders were prepared and saturated with moisture using 700 mm Hg vacuum. Beam specimens, in this way, were taken to a saturation level of 65-75 percent. After preconditioning specimens in this degree of saturation and 60°C for a period of 24 hours, they were subjected to four point beam fatigue tests in strain-controlled mode with a strain amplitude of 400 microstrain. The results were then compared with the fatigue test results obtained with beam specimens that were not subjected to moisture conditioning. Test results show that the conditioning reduces both fatigue life and initial flexural stiffness of specimen significantly. The moisture conditioning was also found to increase the rate of reduction of flexural stiffness. Moreover, it was observed that the fatigue life ratio (FLR), the ratio of the fatigue life of the moisture conditioned sample to that of the dry sample, is significantly lower than the flexural stiffness ratio (FSR). The study indicates that four-point bending test is an appropriate tool with FLR and FSR as the potential parameters for moisture-sensitivity evaluation.

Keywords: asphalt concrete, fatigue cracking, moisture damage, preconditioning

Procedia PDF Downloads 127
9903 Influence of Densification Process and Material Properties on Final Briquettes Quality from FastGrowing Willows

Authors: Peter Križan, Juraj Beniak, Ľubomír Šooš, Miloš Matúš

Abstract:

Biomass treatment through densification is very suitable and important technology before its effective energy recovery. Densification process of biomass is significantly influenced by various technological and also material parameters which are ultimately reflected on the final solid Biofuels quality. The paper deals with the experimental research of the relationship between technological and material parameters during densification of fast-growing trees, roundly fast-rowing willow. The main goal of presented experimental research is to determine the relationship between pressing pressure raw material fraction size from a final briquettes density point of view. Experimental research was realized by single-axis densification. The impact of fraction size with interaction of pressing pressure and stabilization time on the quality properties of briquettes was determined. These parameters interaction affects the final solid biofuels (briquettes) quality. From briquettes production point of view and also from densification machines constructions point of view is very important to know about mutual interaction of these parameters on final briquettes quality. The experimental findings presented here are showing the importance of mentioned parameters during the densification process.

Keywords: briquettes density, densification, fraction size, pressing pressure, stabilization time

Procedia PDF Downloads 354
9902 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 87
9901 Agony and Agency: Discursive Construction of Barren women in the Bible and Traditional African Society

Authors: Vicky Khasandi-Telewa, Sinfree Makoni

Abstract:

Barrenness is a fundamentally agonizing condition that leads to identity disruption in its victims. In Africa, women are usually referred to as ‘Mother of X,’ and this causes grief to one who does not have a child to be identified with. This paper is an examination and critical appraisal of the impact of barrenness on the self-perception of women and the underlying power relations in how they are discursively constructed in the Bible and Traditional African Society (TAS). It is an analysis of expressive practices to examine how barrenness is constructed in Christianity and TAS with the aim of understanding the intersecting power systems. We approach this from an integrationism and Critical Discourse Analysis perspective that takes seriously both the radical harassment of barren women and the possibilities offered by the ensuing desperation calling for inclusive reinterpretation. We also seek to understand barren women’s coping mechanisms and suggestions on how best to improve their lives. The purpose of this study is to explain how discursive construction of barrenness affects the fundamental rights and freedoms of women and what linguistic strategies they adopt to navigate through the maze of stigma. It seeks to illustrate a more nuanced complexity of barren women's lives through women's own exegesis of the Biblical accounts of barrenness and their traditions and to explore alternative narratives. We explore the linguistic strategies the barren women employ to communicate their coping with limitations imposed upon their rights by the negative constructions.

Keywords: integrationism, critical discourse analysis, barrenness, communication strategies, women rights

Procedia PDF Downloads 53
9900 A Structuring and Classification Method for Assigning Application Areas to Suitable Digital Factory Models

Authors: R. Hellmuth

Abstract:

The method of factory planning has changed a lot, especially when it is about planning the factory building itself. Factory planning has the task of designing products, plants, processes, organization, areas, and the building of a factory. Regular restructuring is becoming more important in order to maintain the competitiveness of a factory. Restrictions in new areas, shorter life cycles of product and production technology as well as a VUCA world (Volatility, Uncertainty, Complexity and Ambiguity) lead to more frequent restructuring measures within a factory. A digital factory model is the planning basis for rebuilding measures and becomes an indispensable tool. Furthermore, digital building models are increasingly being used in factories to support facility management and manufacturing processes. The main research question of this paper is, therefore: What kind of digital factory model is suitable for the different areas of application during the operation of a factory? First, different types of digital factory models are investigated, and their properties and usabilities for use cases are analysed. Within the scope of investigation are point cloud models, building information models, photogrammetry models, and these enriched with sensor data are examined. It is investigated which digital models allow a simple integration of sensor data and where the differences are. Subsequently, possible application areas of digital factory models are determined by means of a survey and the respective digital factory models are assigned to the application areas. Finally, an application case from maintenance is selected and implemented with the help of the appropriate digital factory model. It is shown how a completely digitalized maintenance process can be supported by a digital factory model by providing information. Among other purposes, the digital factory model is used for indoor navigation, information provision, and display of sensor data. In summary, the paper shows a structuring of digital factory models that concentrates on the geometric representation of a factory building and its technical facilities. A practical application case is shown and implemented. Thus, the systematic selection of digital factory models with the corresponding application cases is evaluated.

Keywords: building information modeling, digital factory model, factory planning, maintenance

Procedia PDF Downloads 97
9899 ATC in Competitive Electricity Market Using TCSC

Authors: S. K. Gupta, Richa Bansal

Abstract:

In a deregulated power system structure, power producers, and customers share a common transmission network for wheeling power from the point of generation to the point of consumption. All parties in this open access environment may try to purchase the energy from the cheaper source for greater profit margins, which may lead to overloading and congestion of certain corridors of the transmission network. This may result in violation of line flow, voltage and stability limits and thereby undermine the system security. Utilities therefore need to determine adequately their Available Transfer Capability (ATC) to ensure that system reliability is maintained while serving a wide range of bilateral and multilateral transactions. This paper presents power transfer distribution factor based on AC load flow for the determination and enhancement of ATC. The study has been carried out for IEEE 24 bus Reliability Test System.

Keywords: available transfer capability, FACTS devices, power transfer distribution factors, electric

Procedia PDF Downloads 487
9898 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 199
9897 The Universal Cultural Associations in the Conceptual Metaphors Used in the Headlines of Arab News and Saudi Gazette Newspapers: A Critical Cognitive Study

Authors: Hind Hassan Arruwaite

Abstract:

Conceptual metaphor is a cognitive semantic tool that provides access to people's conceptual systems. The correlation in the human conceptual system surpasses limited time and specific cultures. The universal associations provide universal schemas that organize people's conceptualization of the world. The study aims to explore how the cultural associations used in conceptual metaphors create commonalities and harmony between people of the world. In the research methodology, the researcher implemented Critical Metaphor Analysis, Metaphor Candidate Identification and Metaphor Identification Procedure models to deliver qualitative and descriptive findings. The semantic tension was the key criterion in identifying metaphorically used words in the headlines. The research materials are the oil trade conceptual metaphors used in the headlines of Arab News and Saudi Gazette Newspapers. The data will be uploaded to the self-constructed corpus to examine electronic lists for identifying conceptual metaphors. The study investigates the types of conceptual metaphors used in the headlines of the newspapers, the cultural associations identified in the conceptual metaphors, and whether the identified cultural associations in conceptual metaphors create universal conceptual schemas. The study aligned with previous seminal works on conceptual metaphor theory in emphasizing the distinctive power of conceptual metaphors in exposing the cultural associations that unify people's perceptions. The correlation of people conceptualization provides universal schemas that involve elements of human sensorimotor experiences. The study contributes to exposing the shared cultural associations that ensure the commonality of all humankind's thinking mechanism.

Keywords: critical discourse analysis, critical metaphor analysis, conceptual metaphor theory, primary and specific metaphors, corpus-driven approach, universal associations, image schema, sensorimotor experience, oil trade

Procedia PDF Downloads 189
9896 Sixth-Order Two-Point Efficient Family of Super-Halley Type Methods

Authors: Ramandeep Behl, S. S. Motsa

Abstract:

The main focus of this manuscript is to provide a highly efficient two-point sixth-order family of super-Halley type methods that do not require any second-order derivative evaluation for obtaining simple roots of nonlinear equations, numerically. Each member of the proposed family requires two evaluations of the given function and two evaluations of the first-order derivative per iteration. By using Mathematica-9 with its high precision compatibility, a variety of concrete numerical experiments and relevant results are extensively treated to confirm t he t heoretical d evelopment. From their basins of attraction, it has been observed that the proposed methods have better stability and robustness as compared to the other sixth-order methods available in the literature.

Keywords: basins of attraction, nonlinear equations, simple roots, super-Halley

Procedia PDF Downloads 505
9895 Search for APN Permutations in Rings ℤ_2×ℤ_2^k

Authors: Daniel Panario, Daniel Santana de Freitas, Brett Stevens

Abstract:

Almost Perfect Nonlinear (APN) permutations with optimal resistance against differential cryptanalysis can be found in several domains. The permutation used in the standard for symmetric cryptography (the AES), for example, is based on a special kind of inversion in GF(28). Although very close to APN (2-uniform), this permutation still contains one number 4 in its differential spectrum, which means that, rigorously, it must be classified as 4-uniform. This fact motivates the search for fully APN permutations in other domains of definition. The extremely high complexity associated to this kind of problem precludes an exhaustive search for an APN permutation with 256 elements to be performed without the support of a suitable mathematical structure. On the other hand, in principle, there is nothing to indicate which mathematically structured domains can effectively help the search, and it is necessary to test several domains. In this work, the search for APN permutations in rings ℤ2×ℤ2k is investigated. After a full, exhaustive search with k=2 and k=3, all possible APN permutations in those rings were recorded, together with their differential profiles. Some very promising heuristics in these cases were collected so that, when used as a basis to prune backtracking for the same search in ℤ2×ℤ8 (search space with size 16! ≅244), just a few tenths of a second were enough to produce an APN permutation in a single CPU. Those heuristics were empirically extrapolated so that they could be applied to a backtracking search for APNs over ℤ2×ℤ16 (search space with size 32! ≅2117). The best permutations found in this search were further refined through Simulated Annealing, with a definition of neighbors suitable to this domain. The best result produced with this scheme was a 3-uniform permutation over ℤ2×ℤ16 with only 24 values equal to 3 in the differential spectrum (all the other 968 values were less than or equal 2, as it should be the case for an APN permutation). Although far from being fully APN, this result is technically better than a 4-uniform permutation and demanded only a few seconds in a single CPU. This is a strong indication that the use of mathematically structured domains, like the rings described in this work, together with heuristics based on smaller cases, can lead to dramatic cuts in the computational resources involved in the complexity of the search for APN permutations in extremely large domains.

Keywords: APN permutations, heuristic searches, symmetric cryptography, S-box design

Procedia PDF Downloads 145