Search results for: computing paradigm
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1775

Search results for: computing paradigm

875 Nanomechanical Devices Vibrating at Microwave Frequencies in Simple Liquids

Authors: Debadi Chakraborty, John E. Sader

Abstract:

Nanomechanical devices have emerged as a versatile platform for a host of applications due to their extreme sensitivity to environmental conditions. For example, mass measurements with sensitivity at the atomic level have recently been demonstrated. Ultrafast laser spectroscopy coherently excite the vibrational modes of metal nanoparticles and permits precise measurement of the vibration characteristics as a function of nanoparticle shape, size and surrounding environment. This study reports that the vibration of metal nanoparticles in simple liquids, like water and glycerol are not described by conventional fluid mechanics, i.e., Navier Stokes equations. The intrinsic molecular relaxation processes in the surrounding liquid are found to have a profound effect on the fluid-structure interaction of mechanical devices at nanometre scales. Theoretical models have been developed based on the non-Newtonian viscoelastic fluid-structure interaction theory to investigate the vibration of nanoparticles immersed in simple fluids. The utility of this theoretical framework is demonstrated by comparison to measurements on single nanowires and ensembles of metal rods. This study provides a rigorous foundation for the use of metal nanoparticles as ultrasensitive mechanical sensors in fluid and opens a new paradigm for understanding extremely high frequency fluid mechanics, nanoscale sensing technologies, and biophysical processes.

Keywords: fluid-structure interaction, nanoparticle vibration, ultrafast laser spectroscopy, viscoelastic damping

Procedia PDF Downloads 263
874 Memorabilia of Suan Sunandha through Interactive User Interface

Authors: Nalinee Sophatsathit

Abstract:

The objectives of memorabilia of Suan Sunandha are to develop a general knowledge presentation about the historical royal garden through interactive graphic simulation technique and to employ high-functionality context in enhancing interactive user navigation. The approach infers non-intrusive display of relevant history in response to situational context. User’s navigation runs through the virtual reality campus, consisting of new and restored buildings. A flash back presentation of information pertaining to the history in the form of photos, paintings, and textual descriptions are displayed along each passing-by building. To keep the presentation lively, graphical simulation is created in a serendipity game play so that the user can both learn and enjoy the educational tour. The benefits of this human-computer interaction development are two folds. First, lively presentation technique and situational context modeling are developed that entail a usable paradigm of knowledge and information presentation combinations. Second, cost effective training and promotion for both internal personnel and public visitors to learn and keep informed of this historical royal garden can be furnished without the need for a dedicated public relations service. Future improvement on graphic simulation and ability based display can extend this work to be more realistic, user-friendly, and informative for all.

Keywords: interactive user navigation, high-functionality context, situational context, human-computer interaction

Procedia PDF Downloads 350
873 Multi-Level Priority Based Task Scheduling Algorithm for Workflows in Cloud Environment

Authors: Anju Bala, Inderveer Chana

Abstract:

Task scheduling is the key concern for the execution of performance-driven workflow applications. As efficient scheduling can have major impact on the performance of the system, task scheduling is often chosen for assigning the request to resources in an efficient way based on cloud resource characteristics. In this paper, priority based task scheduling algorithm has been proposed that prioritizes the tasks based on the length of the instructions. The proposed scheduling approach prioritize the tasks of Cloud applications according to the limits set by six sigma control charts based on dynamic threshold values. Further, the proposed algorithm has been validated through the CloudSim toolkit. The experimental results demonstrate that the proposed algorithm is effective for handling multiple task lists from workflows and in considerably reducing Makespan and Execution time.

Keywords: cloud computing, priority based scheduling, task scheduling, VM allocation

Procedia PDF Downloads 509
872 Perceiving Casual Speech: A Gating Experiment with French Listeners of L2 English

Authors: Naouel Zoghlami

Abstract:

Spoken-word recognition involves the simultaneous activation of potential word candidates which compete with each other for final correct recognition. In continuous speech, the activation-competition process gets more complicated due to speech reductions existing at word boundaries. Lexical processing is more difficult in L2 than in L1 because L2 listeners often lack phonetic, lexico-semantic, syntactic, and prosodic knowledge in the target language. In this study, we investigate the on-line lexical segmentation hypotheses that French listeners of L2 English form and then revise as subsequent perceptual evidence is revealed. Our purpose is to shed further light on the processes of L2 spoken-word recognition in context and better understand L2 listening difficulties through a comparison of skilled and unskilled reactions at the point where their working hypothesis is rejected. We use a variant of the gating experiment in which subjects transcribe an English sentence presented in increments of progressively greater duration. The spoken sentence was “And this amazing athlete has just broken another world record”, chosen mainly because it included common reductions and phonetic features in English, such as elision and assimilation. Our preliminary results show that there is an important difference in the manner in which proficient and less-proficient L2 listeners handle connected speech. Less-proficient listeners delay recognition of words as they wait for lexical and syntactic evidence to appear in the gates. Further statistical results are currently being undertaken.

Keywords: gating paradigm, spoken word recognition, online lexical segmentation, L2 listening

Procedia PDF Downloads 456
871 Automatic Number Plate Recognition System Based on Deep Learning

Authors: T. Damak, O. Kriaa, A. Baccar, M. A. Ben Ayed, N. Masmoudi

Abstract:

In the last few years, Automatic Number Plate Recognition (ANPR) systems have become widely used in the safety, the security, and the commercial aspects. Forethought, several methods and techniques are computing to achieve the better levels in terms of accuracy and real time execution. This paper proposed a computer vision algorithm of Number Plate Localization (NPL) and Characters Segmentation (CS). In addition, it proposed an improved method in Optical Character Recognition (OCR) based on Deep Learning (DL) techniques. In order to identify the number of detected plate after NPL and CS steps, the Convolutional Neural Network (CNN) algorithm is proposed. A DL model is developed using four convolution layers, two layers of Maxpooling, and six layers of fully connected. The model was trained by number image database on the Jetson TX2 NVIDIA target. The accuracy result has achieved 95.84%.

Keywords: ANPR, CS, CNN, deep learning, NPL

Procedia PDF Downloads 296
870 The UAV Feasibility Trajectory Prediction Using Convolution Neural Networks

Authors: Adrien Marque, Daniel Delahaye, Pierre Maréchal, Isabelle Berry

Abstract:

Wind direction and uncertainty are crucial in aircraft or unmanned aerial vehicle trajectories. By computing wind covariance matrices on each spatial grid point, these spatial grids can be defined as images with symmetric positive definite matrix elements. A data pre-processing step, a specific convolution, a specific max-pooling, and a specific flatten layers are implemented to process such images. Then, the neural network is applied to spatial grids, whose elements are wind covariance matrices, to solve classification problems related to the feasibility of unmanned aerial vehicles based on wind direction and wind uncertainty.

Keywords: wind direction, uncertainty level, unmanned aerial vehicle, convolution neural network, SPD matrices

Procedia PDF Downloads 18
869 Memory and Matrilineage: Is the Siri Mass Possession Tradition of Tulunadu a Death Ritual?

Authors: Yogitha Shetty

Abstract:

Tulunadu, a Tulu-speaking ethno-linguistic minority region in the west coast of India is abundant with oral narratives and associated rituals very unique to this region. One such major worship tradition prevalent here is the mass possession cult of women called Siri Jatre. Deriving its referential script from the Siri epic or pāḍdana, Siri rituals are performed annually in many places of Tulunadu. During these rituals thousands of afflicted women gather at the temple premises and get possessed by the pantheon of seven Siri spirits. While mapping the existing corpus of literature on Siri Jatre – analyzing it as a mode of spirit possession, its psycho-therapeutic significance, its emancipatory potential, etc – this paper offers a paradigm shift by perceiving the entire Siri ritual as a death rite offered to Siri’s grandfather Berma Alva. It draws its arguments from the fieldworks conducted recently in some Siri shrines, interviews conducted among adept Siri women and by analyzing the death rites performed among Bunt caste of the region, and locating it within the historically matrilineal fabric. Thereby, it problematizes the existing analytical frames and raises the question of – if annual Siri ceremonies are a means to bemoan the end of a matrilineal family of Siri? It would delve on the gender configuration as manifested in the Siri cult, having its base in the Tuluva society’s matrilineage, and thereby add to the prevalent ethnographic investigative approaches.

Keywords: death rite, matrilineage, possession, women

Procedia PDF Downloads 291
868 Application of Deep Learning in Top Pair and Single Top Quark Production at the Large Hadron Collider

Authors: Ijaz Ahmed, Anwar Zada, Muhammad Waqas, M. U. Ashraf

Abstract:

We demonstrate the performance of a very efficient tagger applies on hadronically decaying top quark pairs as signal based on deep neural network algorithms and compares with the QCD multi-jet background events. A significant enhancement of performance in boosted top quark events is observed with our limited computing resources. We also compare modern machine learning approaches and perform a multivariate analysis of boosted top-pair as well as single top quark production through weak interaction at √s = 14 TeV proton-proton Collider. The most relevant known background processes are incorporated. Through the techniques of Boosted Decision Tree (BDT), likelihood and Multlayer Perceptron (MLP) the analysis is trained to observe the performance in comparison with the conventional cut based and count approach

Keywords: top tagger, multivariate, deep learning, LHC, single top

Procedia PDF Downloads 103
867 Peak Frequencies in the Collective Membrane Potential of a Hindmarsh-Rose Small-World Neural Network

Authors: Sun Zhe, Ruggero Micheletto

Abstract:

As discussed extensively in many studies, noise in neural networks have an important role in the functioning and time evolution of the system. The mechanism by which noise induce stochastic resonance enhancing and influencing certain operations is not clarified nor is the mechanism of information storage and coding. With the present research we want to study the role of noise, especially focusing on the frequency peaks in a three variable Hindmarsh−Rose Small−World network. We investigated the behaviour of the network to external noises. We demonstrate that a variation of signal to noise ratio of about 10 dB induces an increase in membrane potential signal of about 15%, averaged over the whole network. We also considered the integral of the whole membrane potential as a paradigm of internal noise, the one generated by the brain network. We showed that this internal noise is attenuated with the size of the network or with the number of random connections. By means of Fourier analysis we found that it has distinct peaks of frequencies, moreover, we showed that increasing the size of the network introducing more neurons, reduced the maximum frequencies generated by the network, whereas the increase in the number of random connections (determined by the small-world probability p) led to a trend toward higher frequencies. This study may give clues on how networks utilize noise to alter the collective behaviour of the system in their operations.

Keywords: neural networks, stochastic processes, small-world networks, discrete Fourier analysis

Procedia PDF Downloads 283
866 Application of Statistical Linearized Models for Investigations of Digital Dynamic Pulse-Frequency Control Systems

Authors: B. H. Aitchanov, Sh. K. Aitchanova, O. A. Baimuratov

Abstract:

This paper is focused on dynamic pulse-frequency modulation (DPFM) control systems. Currently, the control law based on DPFM control signals is widely used in direct digital control subsystems introduced in the automated control systems of technological processes. Statistical analysis of automatic control systems is reduced to its construction of functional relationships between the statistical characteristics of the errors processes and input processes. Structural and dynamic Volterra models of digital pulse-frequency control systems can be used to develop methods for generating the dependencies, differing accuracy, requiring the amount of information about the statistical characteristics of input processes and computing labor intensity of their use.

Keywords: digital dynamic pulse-frequency control systems, dynamic pulse-frequency modulation, control object, discrete filter, impulse device, microcontroller

Procedia PDF Downloads 482
865 Forward Stable Computation of Roots of Real Polynomials with Only Real Distinct Roots

Authors: Nevena Jakovčević Stor, Ivan Slapničar

Abstract:

Any polynomial can be expressed as a characteristic polynomial of a complex symmetric arrowhead matrix. This expression is not unique. If the polynomial is real with only real distinct roots, the matrix can be chosen as real. By using accurate forward stable algorithm for computing eigen values of real symmetric arrowhead matrices we derive a forward stable algorithm for computation of roots of such polynomials in O(n^2 ) operations. The algorithm computes each root to almost full accuracy. In some cases, the algorithm invokes extended precision routines, but only in the non-iterative part. Our examples include numerically difficult problems, like the well-known Wilkinson’s polynomials. Our algorithm compares favorably to other method for polynomial root-finding, like MPSolve or Newton’s method.

Keywords: roots of polynomials, eigenvalue decomposition, arrowhead matrix, high relative accuracy

Procedia PDF Downloads 405
864 Power Relation, Symbolic Rules and the Position of Belis in the Habitus of the East Nusa Tenggara Society’s Customary Marriage

Authors: Siti Rodliyah, Andrik Purwasito, Bani Sudardi, Abdullah Wakit

Abstract:

This study employs sociological-ethnographic basic method and the cultural studies paradigm as the approach in understanding the habitus within the customary marriage of the East Nusa Tenggara society who require belis as a bride-price. The conceptual basis underlying the application of habitus theory and symbolic power in East Nusa Tenggara (NTT) society refers to the Bourdieu’s framework. This study is a result of participatory observation on habitus of a marital system using belis observed by the NTT society as a cognitive structure which connects individuals to the social activities of the customary marriage and makes it unquestionable habits. Knowledge of the social world under the pretext of prosperity for the recipients (family) of a bride-price can be a political instrument for the sustainability of power relations. The ritual-mythical system in the society has never been fully present as a neutral habit. The habitus reflected in the marital relationship among the NTT society enables the men to obtain and exercise their power relations. The sustainability of power relations can be seen from the representation of the social status of a girl and the properties attached to her. This is what gave birth to a symbolic rule, in which the social rules about bride-price or belis eventually will serve the interests of those who occupy a dominant position in the social structure, namely the rich men.

Keywords: belis, habitus, East Nusa Tenggara, marital system, power, symbolic

Procedia PDF Downloads 235
863 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 135
862 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 190
861 Mean Square Responses of a Cantilever Beam with Various Damping Mechanisms

Authors: Yaping Zhao, Yimin Zhang

Abstract:

In the present paper, the stationary random vibration of a uniform cantilever beam is investigated. Two types of damping mechanism, i.e. the external and internal viscous dampings, are taken into account simultaneously. The excitation form is the support motion, and it is ideal white. Because two type of damping mechanism are considered concurrently, the product of the modal damping ratio and the natural frequency is not a constant anymore. As a result, the infinite definite integral encountered in the process of computing the mean square response is more complex than that in the existing literature. One signal progress of this work is to have calculated these definite integrals accurately. The precise solution of the mean square response is thus obtained in the infinite series form finally. Numerical examples are supplied and the numerical outcomes acquired confirm the validity of the theoretical analyses.

Keywords: random vibration, cantilever beam, mean square response, white noise

Procedia PDF Downloads 375
860 Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World

Authors: Fehmeen Anwar, Ujala Liaqat

Abstract:

For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics.

Keywords: Anti-Ballistic Missile System (ABMS), cold-war, axis of evil, power dynamics

Procedia PDF Downloads 284
859 Software Transactional Memory in a Dynamic Programming Language at Virtual Machine Level

Authors: Szu-Kai Hsu, Po-Ching Lin

Abstract:

As more and more multi-core processors emerge, traditional sequential programming paradigm no longer suffice. Yet only few modern dynamic programming languages can leverage such advantage. Ruby, for example, despite its wide adoption, only includes threads as a simple parallel primitive. The global virtual machine lock of official Ruby runtime makes it impossible to exploit full parallelism. Though various alternative Ruby implementations do eliminate the global virtual machine lock, they only provide developers dated locking mechanism for data synchronization. However, traditional locking mechanism error-prone by nature. Software Transactional Memory is one of the promising alternatives among others. This paper introduces a new virtual machine: GobiesVM to provide a native software transactional memory based solution for dynamic programming languages to exploit parallelism. We also proposed a simplified variation of Transactional Locking II algorithm. The empirical results of our experiments show that support of STM at virtual machine level enables developers to write straightforward code without compromising parallelism or sacrificing thread safety. Existing source code only requires minimal or even none modi cation, which allows developers to easily switch their legacy codebase to a parallel environment. The performance evaluations of GobiesVM also indicate the difference between sequential and parallel execution is significant.

Keywords: global interpreter lock, ruby, software transactional memory, virtual machine

Procedia PDF Downloads 273
858 Corporate Social Responsibility: A Paradigm Shift in the New Indian Companies Act, 2013

Authors: Suvankar Chakraborty

Abstract:

Introduction: Corporate Social Responsibility means the obligations of business to act in a manner which will serve the best interests of the Society. The Companies Act , 2013 for the first time has emphasized on the fact that every company having net worth of rupees five hundred crore or more, or turnover of rupees one thousand crore or more or a net profit of rupees five crore or more during any financial year shall constitute a Corporate Social Responsibility Committee of the Board consisting of three or more directors, out of which at least one director shall be an independent director. In the previous Companies Act, 1956 there was no such compulsion for constituting a Corporate Social Responsibility Committee. Objective: This study examines the changes in the perception of corporate sectors so far as social responsibility is concerned. Methodology: The study is based on secondary data obtained from various websites of different corporate sectors and the Gazette of India related to Companies Act, 1956 and the new Companies Act, 2013. For capturing the perception of the corporate world regarding the provisions of CSR in the new Companies Act, 2013, primary data has been collected through structured questionnaire. Findings: Corporate Social Responsibility can put a company on a strong base of sustainable development and in facing the business risk of foreclosure or winding up. Shouldering social responsibility on a long-term basis can help a company not only in increasing its reputation in the business world but also helps in minimizing Government intervention. . But, there can hardly be any universal rule that the area of social responsibility being wholly and solely dependent on the ethical aspect of the corporate sectors. But having said that it may be asserted that business ethics may be a key driver of CSR activities rather than rule based CSR activities in the years to come.

Keywords: business ethics, corporate social responsibility, companies act, 2013, CSR committee

Procedia PDF Downloads 292
857 Hardware for Genetic Algorithm

Authors: Fariborz Ahmadi, Reza Tati

Abstract:

Genetic algorithm is a soft computing method that works on set of solutions. These solutions are called chromosome and the best one is the absolute solution of the problem. The main problem of this algorithm is that after passing through some generations, it may be produced some chromosomes that had been produced in some generations ago that causes reducing the convergence speed. From another respective, most of the genetic algorithms are implemented in software and less works have been done on hardware implementation. Our work implements genetic algorithm in hardware that doesn’t produce chromosome that have been produced in previous generations. In this work, most of genetic operators are implemented without producing iterative chromosomes and genetic diversity is preserved. Genetic diversity causes that not only do not this algorithm converge to local optimum but also reaching to global optimum. Without any doubts, proposed approach is so faster than software implementations. Evaluation results also show the proposed approach is faster than hardware ones.

Keywords: hardware, genetic algorithm, computer science, engineering

Procedia PDF Downloads 494
856 A Critical Analysis on Gaps Associated with Culture Policy Milieu Governing Traditional Male Circumcision in the Eastern Cape, South Africa

Authors: Thanduxolo Nomngcoyiya, Simon M. Kang’ethe

Abstract:

The paper aimed to critically analyse gaps pertaining to the cultural policy environments governing traditional male circumcision in the Eastern Cape as exemplified by an empirical case study. The original study which this paper is derived from utilized qualitative paradigm; and encompassed 28 participants. It used in-depth one-on-one interviews complemented by focus group discussions and key informants as a method of data collection. It also adopted interview guide as a data collection instrument. The original study was cross-sectional in nature, and the data was audio recorded and transcribed later during the data analysis and coding process. The study data analysis was content thematic analysis and identified the following key major findings on the culture of male circumcision policy: Lack of clarity on culture of male circumcision policy operations; Myths surrounding procedures on culture of male circumcision; Divergent views on cultural policies between government and male circumcision custodians; Unclear cultural policies on selection criteria of practitioners; and Lack of policy enforcement and implementation on transgressors of culture of male circumcision. It recommended: a stringent selection criteria of practitioners; a need to carry out death-free male circumcision; a need for male circumcision stakeholders to work with other culture and tradition-friendly stakeholders.

Keywords: human rights, policy enforcement, traditional male circumcision, traditional surgeons and nurses

Procedia PDF Downloads 284
855 reconceptualizing the place of empire in european women’s travel writing through the lens of iberian texts

Authors: Gayle Nunley

Abstract:

Between the mid-nineteenth and early twentieth century, a number of Western European women broke with gender norms of their time and undertook to write and publish accounts of their own international journeys. In addition to contributing to their contemporaries’ progressive reimagining of the space and place of female experience within the public sphere, these often orientalism-tinged texts have come to provide key source material for the analysis of gendered voice in the narration of Empire, particularly with regard to works associated with Europe’s then-ascendant imperial powers, Britain and France. Incorporation of contemporaneous writings from the once-dominant Empires of Iberian Europe introduces an important additional lens onto this process. By bringing to bear geographic notions of placedness together with discourse analysis, the examination of works by Iberian Europe’s female travelers in conjunction with those of their more celebrated Northern European peers reveals a pervasive pattern of conjoined belonging and displacement traceable throughout the broader corpus, while also underscoring the insufficiency of binary paradigms of gendered voice. The re-situating of women travelers’ participation in the European imperial project to include voices from the Iberian south creates a more robust understanding of these writers’ complex, and often unexpectedly modern, engagement with notions of gender, mobility, ‘otherness’ and contact-zone encounter acted out both within and against the imperial paradigm.

Keywords: colonialism, orientalism, Spain, travel writing, women travelers

Procedia PDF Downloads 102
854 Bilateral Relations in Matter of Defense between Argentina-United States and Argentina-China along the Period 2005-2015: Advice to Develop a Rational Defense Foreign Policy for Peripheral Countries

Authors: Alvarez Magañini, María Victoria-Rubbi, Lautaro Nahuel

Abstract:

At present, we are facing an unstable international context, conditioned by a relative decline of the US power, primarily in the economic sphere and, to a lesser extent, in the military sphere. This scenario of multipolarity creates tension and uncertainty in the peripheral countries when the issue of their foreign policy arises. This paper presents an analysis of the bilateral relations that were maintained by the Argentine Republic, a peripheral country, along with the United States and China during the period of 2005-2015 in matters of defense in order to identify the empirical consequences resulted from the Argentine actions. Based on the conceptual framework of Peripheral Realism, we analyze indicators related to the weapon trade, defense loans, joint exercises, and personnel training, among others. There will also be a comparative analysis of the conventional military forces of the two powers in question, United States and China. As a conclusion, the cost of having closer relations with China instead of the United States in the defense agenda has been clearly higher than the benefits obtained. The conclusions drawn are empirically aligned with the theoretical paradigm of peripheral realism. Although there are certain conceptual and methodological digressions, these conclusions they could be useful to update and adapt the theory to the current complex international scenario.

Keywords: China, United States, Argentine, peripheral country, peripheral realism

Procedia PDF Downloads 370
853 Deploying a Platform as a Service Cloud Solution to Support Student Learning

Authors: Jiangping Wang

Abstract:

This presentation describes the design and implementation of PaaS (platform as a service) cloud-based labs that are used in database-related courses to teach students practical skills. Traditionally, all labs are implemented in a desktop-based environment where students have to install heavy client software to access database servers. In order to release students from that burden, we have successfully deployed the cloud-based solution to support database-related courses, from which students and teachers can practice and learn database topics in various database courses via cloud access. With its development environment, execution runtime, web server, database server, and collaboration capability, it offers a shared pool of configurable computing resources and comprehensive environment that supports students’ needs without the complexity of maintaining the infrastructure.

Keywords: PaaS, database environment, e-learning, web server

Procedia PDF Downloads 259
852 An Early Detection Type 2 Diabetes Using K - Nearest Neighbor Algorithm

Authors: Ng Liang Shen, Ngahzaifa Abdul Ghani

Abstract:

This research aimed at developing an early warning system for pre-diabetic and diabetics by analyzing simple and easily determinable signs and symptoms of diabetes among the people living in Malaysia using Particle Swarm Optimized Artificial. With the skyrocketing prevalence of Type 2 diabetes in Malaysia, the system can be used to encourage affected people to seek further medical attention to prevent the onset of diabetes or start managing it early enough to avoid the associated complications. The study sought to find out the best predictive variables of Type 2 Diabetes Mellitus, developed a system to diagnose diabetes from the variables using Artificial Neural Networks and tested the system on accuracy to find out the patent generated from diabetes diagnosis result in machine learning algorithms even at primary or advanced stages.

Keywords: diabetes diagnosis, Artificial Neural Networks, artificial intelligence, soft computing, medical diagnosis

Procedia PDF Downloads 324
851 The Changing Role of the Chief Academic Officer in American Higher Education: Causes and Consequences

Authors: Michael W. Markowitz, Jeffrey Gingerich

Abstract:

The landscape of higher education in the United States has undergone significant changes in the last 25 years. What was once a domain of competition among prospective students for a limited number of college and university seats has become a marketplace in which institutions vie for the enrollment of educational consumers. A central figure in this paradigm shift has been the Chief Academic Officer (CAO), whose institutional role has also evolved beyond academics to include such disparate responsibilities as strategic planning, fiscal oversight, student recruitment, fundraising and personnel management. This paper explores the scope and impact of this transition by, first, explaining its context: the intersection of key social, economic and political factors in neo-conservative, late 20th Century America that redefined the value and accountability of institutions of higher learning. This context, in turn, is shown to have redefined the role and function of the CAO from a traditional academic leader to one centered on the successful application of corporate principles of organizational and fiscal management. Information gathered from a number of sitting Provosts, Vice-Presidents of Academic Affairs and Deans of Faculty is presented to illustrate the parameters of this change, as well as the extent to which today’s academic officers feel prepared and equipped to fulfill this broader institutional role. The paper concludes with a discussion of the impact of this transition on the American academy and whether it serves as a portend of change to come in higher education systems around the globe.

Keywords: academic administration, higher education, leadership, organizational management

Procedia PDF Downloads 211
850 Reflections of Nocturnal Librarian: Attaining a Work-Life Balance in a Mega-City of Lagos State Nigeria

Authors: Oluwole Durodolu

Abstract:

The rationale for this study is to explore the adaptive strategy that librarians adopt in performing night shifts in a mega-city like Lagos state. Maslach Burnout Theory would be used to measure the three proportions of burnout in understanding emotional exhaustion, depersonalisation, and individual accomplishment to scrutinise job-related burnout syndrome allied with longstanding, unsolved stress. The qualitative methodology guided by a phenomenological research paradigm, which is an approach that focuses on the commonality of real-life experience in a particular group, would be used, focus group discussion adopted as a method of data collection from library staff who are involved in night-shift. The participant for the focus group discussion would be selected using a convenience sampling technique in which staff at the cataloguing unit would be included in the sample because of the representative characteristics of the unit. This would be done to enable readers to understand phenomena as it is reasonable than from a remote perspective. The exploratory interviews which will be in focus group method to shed light on issues relating to security, housing, transportation, budgeting, energy supply, employee duties, time management, information access, and sustaining professional levels of service and how all these variables affect the productivity of all the 149 library staff and their work-life balance.

Keywords: nightshift, work-life balance, mega-city, academic library, Maslach Burnout Theory, Lagos State, University of Lagos

Procedia PDF Downloads 120
849 Animation: A Footpath for Enhanced Awareness Creation on Malaria Prevention in Rural Communities

Authors: Stephen Osei Akyiaw, Divine Kwabena Atta Kyere-Owusu

Abstract:

Malaria has been a worldwide menace of a health condition to human beings for several decades with majority of people on the African continent with most causalities where Ghana is no exception. Therefore, this study employed the use of animation to enhance awareness creation on the spread and prevention of Malaria in Effutu Communities in the Central Region of Ghana. Working with the interpretivist paradigm, this study adopted Art-Based Research, where the AIDA Model and Cognitive Theory of Multimedia Learning (CTML) served as the theories underpinning the study. Purposive and convenience sampling techniques were employed in selecting sample for the study. The data collection instruments included document review and interviews. Besides, the study developed an animation using the local language of the people as the voice over to foster proper understanding by the rural community folks. Also, indigenous characters were used for the animation for the purpose of familiarization with the local folks. The animation was publicized at Health Town Halls within the communities. The outcomes of the study demonstrated that the use of animation was effective in enhancing the awareness creation for preventing and controlling malaria disease in rural communities in Effutu Communities in the Central Region of Ghana. Health officers and community folks expressed interest and desire to practice the preventive measures outlined in the animation to help reduce the spread of Malaria in their communities. The study, therefore, recommended that animation could be used to curtail the spread and enhanced the prevention of Malaria.

Keywords: malaria, animation, prevention, communities

Procedia PDF Downloads 71
848 New Approaches to the Determination of the Time Costs of Movements

Authors: Dana Kristalova

Abstract:

This article deals with geographical conditions in terrain and their effect on the movement of vehicles, their effect on speed and safety of movement of people and vehicles. Finding of the optimal routes outside the communication is studied in the army environment, but it occur in civilian as well, primarily in crisis situation, or by the provision of assistance when natural disasters such as floods, fires, storms, etc. have happened. These movements require the optimization of routes when effects of geographical factors should be included. The most important factor is surface of the terrain. It is based on several geographical factors as are slopes, soil conditions, micro-relief, a type of surface and meteorological conditions. Their mutual impact has been given by coefficient of deceleration. This coefficient can be used for commander´s decision. New approaches and methods of terrain testing, mathematical computing, mathematical statistics or cartometric investigation are necessary parts of this evaluation.

Keywords: surface of a terrain, movement of vehicles, geographical factor, optimization of routes

Procedia PDF Downloads 457
847 Classification of EEG Signals Based on Dynamic Connectivity Analysis

Authors: Zoran Šverko, Saša Vlahinić, Nino Stojković, Ivan Markovinović

Abstract:

In this article, the classification of target letters is performed using data from the EEG P300 Speller paradigm. Neural networks trained with the results of dynamic connectivity analysis between different brain regions are used for classification. Dynamic connectivity analysis is based on the adaptive window size and the imaginary part of the complex Pearson correlation coefficient. Brain dynamics are analysed using the relative intersection of confidence intervals for the imaginary component of the complex Pearson correlation coefficient method (RICI-imCPCC). The RICI-imCPCC method overcomes the shortcomings of currently used dynamical connectivity analysis methods, such as the low reliability and low temporal precision for short connectivity intervals encountered in constant sliding window analysis with wide window size and the high susceptibility to noise encountered in constant sliding window analysis with narrow window size. This method overcomes these shortcomings by dynamically adjusting the window size using the RICI rule. This method extracts information about brain connections for each time sample. Seventy percent of the extracted brain connectivity information is used for training and thirty percent for validation. Classification of the target word is also done and based on the same analysis method. As far as we know, through this research, we have shown for the first time that dynamic connectivity can be used as a parameter for classifying EEG signals.

Keywords: dynamic connectivity analysis, EEG, neural networks, Pearson correlation coefficients

Procedia PDF Downloads 202
846 Predicting Data Center Resource Usage Using Quantile Regression to Conserve Energy While Fulfilling the Service Level Agreement

Authors: Ahmed I. Alutabi, Naghmeh Dezhabad, Sudhakar Ganti

Abstract:

Data centers have been growing in size and dema nd continuously in the last two decades. Planning for the deployment of resources has been shallow and always resorted to over-provisioning. Data center operators try to maximize the availability of their services by allocating multiple of the needed resources. One resource that has been wasted, with little thought, has been energy. In recent years, programmable resource allocation has paved the way to allow for more efficient and robust data centers. In this work, we examine the predictability of resource usage in a data center environment. We use a number of models that cover a wide spectrum of machine learning categories. Then we establish a framework to guarantee the client service level agreement (SLA). Our results show that using prediction can cut energy loss by up to 55%.

Keywords: machine learning, artificial intelligence, prediction, data center, resource allocation, green computing

Procedia PDF Downloads 102