Search results for: collaborative programming
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1758

Search results for: collaborative programming

648 Mixed Integer Programing for Multi-Tier Rebate with Discontinuous Cost Function

Authors: Y. Long, L. Liu, K. V. Branin

Abstract:

One challenge faced by procurement decision-maker during the acquisition process is how to compare similar products from different suppliers and allocate orders among different products or services. This work focuses on allocating orders among multiple suppliers considering rebate. The objective function is to minimize the total acquisition cost including purchasing cost and rebate benefit. Rebate benefit is complex and difficult to estimate at the ordering step. Rebate rules vary for different suppliers and usually change over time. In this work, we developed a system to collect the rebate policies, standardized the rebate policies and developed two-stage optimization models for ordering allocation. Rebate policy with multi-tiers is considered in modeling. The discontinuous cost function of rebate benefit is formulated for different scenarios. A piecewise linear function is used to approximate the discontinuous cost function of rebate benefit. And a Mixed Integer Programing (MIP) model is built for order allocation problem with multi-tier rebate. A case study is presented and it shows that our optimization model can reduce the total acquisition cost by considering rebate rules.

Keywords: discontinuous cost function, mixed integer programming, optimization, procurement, rebate

Procedia PDF Downloads 256
647 Banning Gender: Movements to Suppress Gender Studies in the U.S. and Global Contexts

Authors: Tracey Jean Boisseau

Abstract:

In the United States and around the world, we see liberal democracies attacked, from within and without, on a number of grounds. One of the primary assaults on the liberal ideology of feminism has been to ban or severely curtail the teaching of and scholarship on gender as constructed rather than as a biological and binarist component of human identity. On every continent, women’s and gender studies at the university level have become targets of rightwing movements aligning with authoritarian regimes to suppress queer and trans people as well as feminist scholars and academics who define gender as fluid, contingent on culture, and as reflective of a political commitment rather than timeless, sacred, natural, biological, or god-given. Rightwing movements calling for an end to gender studies have put already-marginalized academic and scholarly projects under new scrutiny, in some cases resulting in the dismantlement of long-standing women’s and gender studies programs. This paper evaluates the cross-cultural effects such movements have had on our discipline worldwide and documents the strategic responses engaged in by gender studies scholars and leaders to resist the erasure of our field. Evidence is drawn from surveys of thousands of programs and dozens of interviews conducted in the past year with gender studies scholars, administrators, and practitioners. This paper’s main objective is to highlight the international linkages between movements aiming to suppress or erase gender studies as a field of research and teaching and to identify collaborative responses and promising solutions that can protect our discipline from these assaults.

Keywords: anti-feminist, anti-LGBTQ, authoritarianism, movements, gender studies, globalization

Procedia PDF Downloads 74
646 Livonian Werewolves, 1500-1700s: A Sociological Assessment of Their Historical Significance and Origins through the Case of Old Thiess

Authors: Liu Jiaxin

Abstract:

This paper seeks to do an in-depth investigation on the phenomenon of Early Modern era (1500-1700s) Livonian werewolves. Noting their uniqueness in comparison to contemporaneous werewolves hailing from other geographic areas, the paper suggests that the Livonian werewolf is a metaphor for Livonian society at that time, one which was characterized by social turmoil and strict class hierarchy. This metaphor was utilized by different classes to establish their own interests in society, and thus the paper concludes that the werewolf is a mutable artifact whose value is contingent on its social context. This is demonstrated by the particular case of Old Thiess—a poor, elderly Livonian peasant who gave an unorthodox and anomalous testimony when accused of being a werewolf. In his court statement, it is shown how Thiess was, in fact, alluding to social tensions by lambasting the rich German elite and establishing the righteousness of the peasantry, of which he was a member. A close reading method was utilized on the trial transcript of Old Thiess with heavy reference to Carlo Ginzburg and Bruce Lincoln’s collaborative work Old Thiess, a Livonian werewolf: a classic case in comparative perspective. Through a contextual reading of Livonia’s social atmosphere, the paper draws connections between the content of the trial to wider societal disturbances happening at the time. The thesis—that the werewolf is a flexible metaphor for the social milieu—is further buttressed by numerous contemporaneous sources that had similar messages as Thiess’ transcript, which are discussed as well.

Keywords: early-modern baltic, Livonia, Old Thiess, social history, werewolves

Procedia PDF Downloads 102
645 Healthcare Big Data Analytics Using Hadoop

Authors: Chellammal Surianarayanan

Abstract:

Healthcare industry is generating large amounts of data driven by various needs such as record keeping, physician’s prescription, medical imaging, sensor data, Electronic Patient Record(EPR), laboratory, pharmacy, etc. Healthcare data is so big and complex that they cannot be managed by conventional hardware and software. The complexity of healthcare big data arises from large volume of data, the velocity with which the data is accumulated and different varieties such as structured, semi-structured and unstructured nature of data. Despite the complexity of big data, if the trends and patterns that exist within the big data are uncovered and analyzed, higher quality healthcare at lower cost can be provided. Hadoop is an open source software framework for distributed processing of large data sets across clusters of commodity hardware using a simple programming model. The core components of Hadoop include Hadoop Distributed File System which offers way to store large amount of data across multiple machines and MapReduce which offers way to process large data sets with a parallel, distributed algorithm on a cluster. Hadoop ecosystem also includes various other tools such as Hive (a SQL-like query language), Pig (a higher level query language for MapReduce), Hbase(a columnar data store), etc. In this paper an analysis has been done as how healthcare big data can be processed and analyzed using Hadoop ecosystem.

Keywords: big data analytics, Hadoop, healthcare data, towards quality healthcare

Procedia PDF Downloads 411
644 An Immune-Inspired Web Defense Architecture

Authors: Islam Khalil, Amr El-Kadi

Abstract:

With the increased use of web technologies, microservices, and Application Programming Interface (API) for integration between systems, and with the development of containerization of services on the operating system level as a method of isolating system execution and for easing the deployment and scaling of systems, there is a growing need as well as opportunities for providing platforms that improve the security of such services. In our work, we propose an architecture for a containerization platform that utilizes various concepts derived from the human immune system. The goal of the proposed containerization platform is to introduce the concept of slowing down or throttling suspected malicious digital pathogens (intrusions) to reduce their damage footprint while providing more opportunities for forensic inspection of suspected pathogens in addition to the ability to snapshot, rollback, and recover from possible damage. The proposed platform also leverages existing intrusion detection algorithms by integrating and orchestrating their cooperative operation for more effective intrusion detection. We show how this model reduces the damage footprint of intrusions and gives a greater time window for forensic investigation. Moreover, during our experiments, our proposed platform was able to uncover unintentional system design flaws that resulted in internal DDoS-like attacks by submodules of the system itself rather than external intrusions.

Keywords: containers, human immunity, intrusion detection, security, web services

Procedia PDF Downloads 90
643 A Student Centered Learning Environment in Engineering Education: Design and a Longitudinal Study of Impact

Authors: Tom O'Mahony

Abstract:

This article considers the design of a student-centered learning environment in engineering education. The learning environment integrates a number of components, including project-based learning, collaborative learning, two-stage assignments, active learning lectures, and a flipped-classroom. Together these elements place the individual learner and their learning at the center of the environment by focusing on understanding, enhancing relevance, applying learning, obtaining rich feedback, making choices, and taking responsibility. The evolution of this environment from 2014 to the present day is outlined. The impact of this environment on learners and their learning is evaluated via student questionnaires that consist of both open and closed-ended questions. The closed questions indicate that students found the learning environment to be really interesting and enjoyable (rated as 4.7 on a 5 point scale) and encouraged students to adopt a deep approach towards studying the course materials (rated as 4.0 on a 5 point scale). A content analysis of the open-ended questions provides evidence that the project, active learning lectures, and flipped classroom all contribute to the success of this environment. Furthermore, this analysis indicates that the two-stage assessment process, in which feedback is provided between a draft and final assignment, is the key component and the dominant theme. A limitation of the study is the small class size (less than 20 learners per year), but, to some degree, this is compensated for by the longitudinal nature of the study.

Keywords: deep approaches, formative assessment, project-based learning, student-centered learning

Procedia PDF Downloads 110
642 Supplier Selection in a Scenario Based Stochastic Model with Uncertain Defectiveness and Delivery Lateness Rates

Authors: Abeer Amayri, Akif A. Bulgak

Abstract:

Due to today’s globalization as well as outsourcing practices of the companies, the Supply Chain (SC) performances have become more dependent on the efficient movement of material among places that are geographically dispersed, where there is more chance for disruptions. One such disruption is the quality and delivery uncertainties of outsourcing. These uncertainties could lead the products to be unsafe and, as is the case in a number of recent examples, companies may have to end up in recalling their products. As a result of these problems, there is a need to develop a methodology for selecting suppliers globally in view of risks associated with low quality and late delivery. Accordingly, we developed a two-stage stochastic model that captures the risks associated with uncertainty in quality and delivery as well as a solution procedure for the model. The stochastic model developed simultaneously optimizes supplier selection and purchase quantities under price discounts over a time horizon. In particular, our target is the study of global organizations with multiple sites and multiple overseas suppliers, where the pricing is offered in suppliers’ local currencies. Our proposed methodology is applied to a case study for a US automotive company having two assembly plants and four potential global suppliers to illustrate how the proposed model works in practice.

Keywords: global supply chains, quality, stochastic programming, supplier selection

Procedia PDF Downloads 454
641 Fostering Inclusive Learning: The Role of Intercultural Communication in Multilingual Primary Education

Authors: Ozge Yalciner

Abstract:

Intercultural communication is crucial in the education of multilingual learners in primary grades, significantly influencing their academic and social development. This study explores how intercultural communication intersects with multilingual education, highlighting the importance of culturally responsive teaching practices. It addresses the challenges and opportunities presented by diverse linguistic backgrounds and proposes strategies for creating inclusive and supportive learning environments. The research emphasizes the need for teacher training programs that equip educators with the skills to recognize and address cultural differences, thereby enhancing student engagement and participation. This study was completed in an elementary school in a city in the Midwest, USA. The data was collected through observations and interviews with students and teachers. It discusses the integration of multicultural perspectives in curricula and the promotion of language diversity as an asset. Peer interactions and collaborative learning are highlighted as crucial for developing intercultural competence among young learners. The findings suggest that meaningful intercultural communication fosters a sense of belonging and mutual respect, leading to improved educational outcomes for multilingual students. Prioritizing intercultural communication in primary education is essential for supporting the linguistic and cultural identities of multilingual learners. By adopting inclusive pedagogical approaches and fostering an environment of cultural appreciation, educators can better support their students' academic success and personal growth.

Keywords: diversity, intercultural communication, multilingual learners, primary grades

Procedia PDF Downloads 35
640 Extraction of Road Edge Lines from High-Resolution Remote Sensing Images Based on Energy Function and Snake Model

Authors: Zuoji Huang, Haiming Qian, Chunlin Wang, Jinyan Sun, Nan Xu

Abstract:

In this paper, the strategy to extract double road edge lines from acquired road stripe image was explored. The workflow is as follows: the road stripes are acquired by probabilistic boosting tree algorithm and morphological algorithm immediately, and road centerlines are detected by thinning algorithm, so the initial road edge lines can be acquired along the road centerlines. Then we refine the results with big variation of local curvature of centerlines. Specifically, the energy function of edge line is constructed by gradient feature and spectral information, and Dijkstra algorithm is used to optimize the initial road edge lines. The Snake model is constructed to solve the fracture problem of intersection, and the discrete dynamic programming algorithm is used to solve the model. After that, we could get the final road network. Experiment results show that the strategy proposed in this paper can be used to extract the continuous and smooth road edge lines from high-resolution remote sensing images with an accuracy of 88% in our study area.

Keywords: road edge lines extraction, energy function, intersection fracture, Snake model

Procedia PDF Downloads 336
639 Augmented Reality Using Cuboid Tracking as a Support for Early Stages of Architectural Design

Authors: Larissa Negris de Souza, Ana Regina Mizrahy Cuperschmid, Daniel de Carvalho Moreira

Abstract:

Augmented Reality (AR) alters the elaboration of the architectural project, which relates to project cognition: representation, visualization, and perception of information. Understanding these features from the earliest stages of the design can facilitate the study of relationships, zoning, and overall dimensions of the forms. This paper’s goal was to explore a new approach for information visualization during the early stages of architectural design using Augmented Reality (AR). A three-dimensional marker inspired by the Rubik’s Cube was developed, and its performance, evaluated. This investigation interwovens the acquired knowledge of traditional briefing methods and contemporary technology. We considered the concept of patterns (Alexander et al. 1977) to outline geometric forms and associations using visual programming. The Design Science Research was applied to develop the study. An SDK was used in a game engine to generate the AR app. The tool's functionality was assessed by verifying the readability and precision of the reconfigurable 3D marker. The results indicated an inconsistent response. To use AR in the early stages of architectural design the system must provide consistent information and appropriate feedback. Nevertheless, we conclude that our framework sets the ground for looking deep into AR tools for briefing design.

Keywords: augmented reality, cuboid marker, early design stages, graphic representation, patterns

Procedia PDF Downloads 94
638 Through Seligman’s Lenses: Creating a Culture of Well-Being in Higher-Education

Authors: Neeru Deep, Kimberly McAlister

Abstract:

Mental health issues have been increasing worldwide for many decades, but the COVID-19 pandemic has brought mental health issues into the spotlight. Within higher education, promoting the well-being of students has dramatically increased in focus. The Northwestern State University of Louisiana opened the Center for Positivity, Well-being, and Hope using the action research process of reflecting, planning, acting, and observing. The study’s purpose is two-fold: First, it highlights how to create a collaborative team to reflect, plan, and act to develop a well-being culture in higher education institutions. Second, it investigates the efficacy of the center through Seligman’s lenses. The researchers shared their experience in the first three phases of the action research process and then applied an identical concurrent mixed methods design. A purposive sample evaluated the efficacy of the center through Seligman’s lenses. The researcher administered PERMA-Profiler Measure, the PERMA-Profiler Measure overview, the CoPWH Evaluation I, and the CoPWH Evaluation II questionnaires to collect qualitative and quantitative data. The thematic analysis for qualitative and descriptive statistics for quantitative data concluded that the center creates a well-being culture and promotes well-being in college students. In conclusion, this action research shares the successful implementation of the cyclic process of research in promoting a well-being culture in higher education with the implications for promoting a well-being culture in various educational settings, workplaces, and communities.

Keywords: action research, mixed methods research design, Seligman, well-being.

Procedia PDF Downloads 127
637 Electrocardiogram-Based Heartbeat Classification Using Convolutional Neural Networks

Authors: Jacqueline Rose T. Alipo-on, Francesca Isabelle F. Escobar, Myles Joshua T. Tan, Hezerul Abdul Karim, Nouar Al Dahoul

Abstract:

Electrocardiogram (ECG) signal analysis and processing are crucial in the diagnosis of cardiovascular diseases, which are considered one of the leading causes of mortality worldwide. However, the traditional rule-based analysis of large volumes of ECG data is time-consuming, labor-intensive, and prone to human errors. With the advancement of the programming paradigm, algorithms such as machine learning have been increasingly used to perform an analysis of ECG signals. In this paper, various deep learning algorithms were adapted to classify five classes of heartbeat types. The dataset used in this work is the synthetic MIT-BIH Arrhythmia dataset produced from generative adversarial networks (GANs). Various deep learning models such as ResNet-50 convolutional neural network (CNN), 1-D CNN, and long short-term memory (LSTM) were evaluated and compared. ResNet-50 was found to outperform other models in terms of recall and F1 score using a five-fold average score of 98.88% and 98.87%, respectively. 1-D CNN, on the other hand, was found to have the highest average precision of 98.93%.

Keywords: heartbeat classification, convolutional neural network, electrocardiogram signals, generative adversarial networks, long short-term memory, ResNet-50

Procedia PDF Downloads 124
636 Encryption and Decryption of Nucleic Acid Using Deoxyribonucleic Acid Algorithm

Authors: Iftikhar A. Tayubi, Aabdulrahman Alsubhi, Abdullah Althrwi

Abstract:

The deoxyribonucleic acid text provides a single source of high-quality Cryptography about Deoxyribonucleic acid sequence for structural biologists. We will provide an intuitive, well-organized and user-friendly web interface that allows users to encrypt and decrypt Deoxy Ribonucleic Acid sequence text. It includes complex, securing by using Algorithm to encrypt and decrypt Deoxy Ribonucleic Acid sequence. The utility of this Deoxy Ribonucleic Acid Sequence Text is that, it can provide a user-friendly interface for users to Encrypt and Decrypt store the information about Deoxy Ribonucleic Acid sequence. These interfaces created in this project will satisfy the demands of the scientific community by providing fully encrypt of Deoxy Ribonucleic Acid sequence during this website. We have adopted a methodology by using C# and Active Server Page.NET for programming which is smart and secure. Deoxy Ribonucleic Acid sequence text is a wonderful piece of equipment for encrypting large quantities of data, efficiently. The users can thus navigate from one encoding and store orange text, depending on the field for user’s interest. Algorithm classification allows a user to Protect the deoxy ribonucleic acid sequence from change, whether an alteration or error occurred during the Deoxy Ribonucleic Acid sequence data transfer. It will check the integrity of the Deoxy Ribonucleic Acid sequence data during the access.

Keywords: algorithm, ASP.NET, DNA, encrypt, decrypt

Procedia PDF Downloads 228
635 Investigating the Critical Drivers of Behavior: The Case of Online Taxi Services

Authors: Rosa Hendijani, Mohammadhesam Hajighasemi

Abstract:

As of late, the sharing economy has become an important type of business model. Online taxi services are one example that has grown rapidly around the world. This study examines the factors influencing the use of online taxis as one form of IT-enabled sharing services based on the theory of planned behavior (TPB). Based on the theory of planned behavior, these factors can be divided into three categories, including the ones related to attitude (e.g., image and perceived usefulness), normative believes (e.g., subjective norms), and behavioral control (e.g., technology facilitating conditions and self-efficacy). Three other factors were also considered based on the literature, including perceived economic benefits, openness towards using shared services, and perceived availability. The effect of all these variables was tested both directly and indirectly through intention as the mediating variable. A survey method was used to test the research hypotheses. In total, 361 individuals partook in the study. The results of a multiple regression analysis on behavior showed that perceived economic benefits, compatibility, and subjective norms were important factors influencing behavior among online taxi users. In addition, intention partially mediated the effect of perceived economic benefits and compatibility on behavior. It can be concluded that perceived economic benefits, compatibility, and subjective norms are the three main factors that influence behavior among online taxi users.

Keywords: collaborative consumption, IT-enabled sharing services model, online taxi, sharing economy, theory of planned behavior

Procedia PDF Downloads 134
634 Analysis of the Role of Creative Tourism in Sustainable Tourism Development Case Study: Isfahan City

Authors: Saman Shafei

Abstract:

Tourism has improved for several reasons, with the main objective of producing economic benefits, including foreign exchange earnings, income generation, employment, rising government incomes, and contributing to the financing of tourism infrastructure, which also has public consumption. Although today the interests of the tourism industry are not overlooked by anyone, the expansion and development of tourism services and products can make it competitive, and in this competition, those who bring creativity and diversity are ahead of other competitors. Developing creative tourism as third-generation tourism can help to attract visitors, increasing demand and diversifying it, achieving new markets and boosting growth. Creative tourism is a journey aimed at achieving a brand –new experience and is along with collaborative learning of arts, cultural heritage, or specific features of a place, and provides useful communication with the inhabitants of the tourism destination who is creators of the living culture of that place. The present study aims to identify and introduce the capabilities of the city of Isfahan in IRAN for the development of creative tourism and the role of creative tourism on the destination and the local community of this city. The research method is descriptive-analytical and field method, interviewing tool and questionnaire have been applied to obtain research findings. The results indicate that the city of Isfahan has the potential to develop creative tourism in the field of traditional handicrafts and traditional foods, and developing this kind of tourism will lead to the development of sustainable tourism in this destination and will bring numerous benefits for the local community.

Keywords: creative tourism, tourism, Isfahan city, sustainable tourism development

Procedia PDF Downloads 221
633 Post Occupancy Evaluation in Higher Education

Authors: Balogun Azeez Olawale, Azeez S. A.

Abstract:

Post occupancy evaluation (POE) is a process of assessing building performance for its users and intended function during the occupation. User satisfaction impacts the performance of educational environments and their users: students, faculty, and staff. In addition, buildings are maintained and managed by teams that spend a large amount of time and capital on their long-term sustenance. By evaluating the feedback from users of higher education facilities, university planning departments are more prepared to understand the inputs for programming and future project planning. In addition, university buildings will be closer to meeting user and maintenance needs. This paper reports on a research team made up of academics, facility personnel, and users that have developed a plan to improve the quality of campus facilities through a POE exercise on a recently built project. This study utilized a process of focus group interviews representing the different users and subsequent surveys. The paper demonstrates both the theory and practice of POE in higher education and learning environment through the case example of four universities in Nigeria's POE exercise.

Keywords: post occupancy evaluation, building performance, building analysis, building evaluation, quality control, building assessment, facility management, design quality

Procedia PDF Downloads 109
632 Chairussyuhur Arman, Totti Tjiptosumirat, Muhammad Gunawan, Mastur, Joko Priyono, Baiq Tri Ratna Erawati

Authors: Maria M. Giannakou, Athanasios K. Ziliaskopoulos

Abstract:

Transmission pipelines carrying natural gas are often routed through populated cities, industrial and environmentally sensitive areas. While the need for these networks is unquestionable, there are serious concerns about the risk these lifeline networks pose to the people, to their habitat and to the critical infrastructures, especially in view of natural disasters such as earthquakes. This work presents an Integrated Pipeline Risk Management methodology (IPRM) for assessing the hazard associated with a natural gas pipeline failure due to natural or manmade disasters. IPRM aims to optimize the allocation of the available resources to countermeasures in order to minimize the impacts of pipeline failure to humans, the environment, the infrastructure and the economic activity. A proposed knapsack mathematical programming formulation is introduced that optimally selects the proper mitigation policies based on the estimated cost – benefit ratios. The proposed model is demonstrated with a small numerical example. The vulnerability analysis of these pipelines and the quantification of consequences from such failures can be useful for natural gas industries on deciding which mitigation measures to implement on the existing pipeline networks with the minimum cost in an acceptable level of hazard.

Keywords: cost benefit analysis, knapsack problem, natural gas distribution network, risk management, risk mitigation

Procedia PDF Downloads 288
631 Peer-Review as a Means to Improve Students' Translation Skills

Authors: Bahia Braktia, Ahlem Ghamri

Abstract:

Years ago, faculties and administrators realized that students entering college were not prepared for the academic sphere; however, as a type of collaborative learning, peer-review gave students a social context in which they could learn more efficiently. Peer-review has proven its effectiveness in higher education. Numerous studies have been conducted on peer review and its effects on the quality of students’ writing, and several publications recommended peer-review as part of the feedback process. Student writers showed a tendency towards making significant meaning-level revisions and surface-level revisions. Last but not least, studies reported that peer-review helps students develop their self-assessment skills as well as critical thinking. The use of peer-review has become well known and widely adopted to the L2 classroom environment. However, little is known about peer review on translation students. The purpose of this study was to investigate the students' perspective on peer-review, and whether this method affected the quality of their translation. A mixed method design was adopted. Students were requested to translate two texts from Arabic into English, and they gave and received structured feedback to their classmates' translations. A survey was administered, followed by semi-structured interviews, to examine the students' attitudes toward peer-review. The results of the study showed that peer-review was considered a good proofreading method for most students. The students also showed a positive attitude toward it, and they reported that they benefited from the interaction with their peers. The findings implied that the inclusion of peer-review can be an effective pedagogical practice for teaching translation and writing to foreign language learners.

Keywords: language teaching, feedback, peer-review, translation

Procedia PDF Downloads 195
630 Interdisciplinary Approach in Vocational Training for Orthopaedic Surgery

Authors: Mihail Nagea, Olivera Lupescu, Elena Taina Avramescu, Cristina Patru

Abstract:

Classical education of orthopedic surgeons involves lectures, self study, workshops and cadaver dissections, and sometimes supervised practical training within surgery, which quite seldom gives the young surgeons the feeling of being unable to apply what they have learned especially in surgical practice. The purpose of this paper is to present a different approach from the classical one, which enhances the practical skills of the orthopedic trainees and prepare them for future practice. The paper presents the content of the research project 2015-1-RO01-KA202-015230, ERASMUS+ VET ‘Collaborative learning for enhancing practical skills for patient-focused interventions in gait rehabilitation after orthopedic surgery’ which, using e learning as a basic tool , delivers to the trainees not only courses, but especially practical information through videos and case scenarios including gait analysis in order to build patient focused therapeutic plans, adapted to the characteristics of each patient. The outcome of this project is to enhance the practical skills in orthopedic surgery and the results are evaluated following the answers to the questionnaires, but especially the reactions within the case scenarios. The participants will thus follow the idea that any mistake within solving the cases might represent a failure of treating a real patient. This modern approach, besides using interactivity to evaluate the theoretical and practical knowledge of the trainee, increases the sense of responsibility, as well as the ability to react properly in real cases.

Keywords: interdisciplinary approach, gait analysis, orthopedic surgery, vocational training

Procedia PDF Downloads 250
629 Presentation of Transgender identities

Authors: Tony Chapman-Wilson

Abstract:

Applied theatre is not an ultimate vehicle to create social change; but is more an opportunity of hope that the production material might affect this. Theatre-makers are able to deconstruct socially and politically challenging themes to encourage their audience to witness lived experiences as they consider themes of concern and injustice. This allows writers to (re) present the lived experiences of trans people, and for social injustice, continued transphobia, and lack of equity to be presented to an audience for debate. There needs to be a stronger position and presence of trans voices and active participation presented of these rather than just that of the cisgender-lens and standpoint. This research examines the relationship between human rights and theatre and considers global examples of this practice, as well as exploring the negatives formed from this relationship, and how this may be developed in the future. This focusses on the ability of theatre to denounce the violations of human rights and considers the power of theatre to support the importance of the awareness of violations to human rights for the raised awareness and potential for action of the audience – who may themselves be part of the oppressed, or indeed an oppressor. The fundamental assertion here is not one of evidenced social change, but of awareness raising of the audience and the potential for social activism and action. The practice of applied theatre is one that is experienced by the audience and the project participants alike, with the intention that theatre may consider how people interact with one another. This paper examines the opportunity of verbatim theatre techniques to allow for a cis-led trans-collaborative research project to (re) present intergenerational trans identities.

Keywords: applied theatre, verbatim, transgender, social justice

Procedia PDF Downloads 39
628 Simulation and Experimental Research on Pocketing Operation for Toolpath Optimization in CNC Milling

Authors: Rakesh Prajapati, Purvik Patel, Avadhoot Rajurkar

Abstract:

Nowadays, manufacturing industries augment their production lines with modern machining centers backed by CAM software. Several attempts are being made to cut down the programming time for machining complex geometries. Special programs/software have been developed to generate the digital numerical data and to prepare NC programs by using suitable post-processors for different machines. By selecting the tools and manufacturing process then applying tool paths and NC program are generated. More and more complex mechanical parts that earlier were being cast and assembled/manufactured by other processes are now being machined. Majority of these parts require lots of pocketing operations and find their applications in die and mold, turbo machinery, aircraft, nuclear, defense etc. Pocketing operations involve removal of large quantity of material from the metal surface. The modeling of warm cast and clamping a piece of food processing parts which the used of Pro-E and MasterCAM® software. Pocketing operation has been specifically chosen for toolpath optimization. Then after apply Pocketing toolpath, Multi Tool Selection and Reduce Air Time give the results of software simulation time and experimental machining time.

Keywords: toolpath, part program, optimization, pocket

Procedia PDF Downloads 285
627 A Simulation-Optimization Approach to Control Production, Subcontracting and Maintenance Decisions for a Deteriorating Production System

Authors: Héctor Rivera-Gómez, Eva Selene Hernández-Gress, Oscar Montaño-Arango, Jose Ramon Corona-Armenta

Abstract:

This research studies the joint production, maintenance and subcontracting control policy for an unreliable deteriorating manufacturing system. Production activities are controlled by a derivation of the Hedging Point Policy, and given that the system is subject to deterioration, it reduces progressively its capacity to satisfy product demand. Multiple deterioration effects are considered, reflected mainly in the quality of the parts produced and the reliability of the machine. Subcontracting is available as support to satisfy product demand; also overhaul maintenance can be conducted to reduce the effects of deterioration. The main objective of the research is to determine simultaneously the production, maintenance and subcontracting rate which minimize the total incurred cost. A stochastic dynamic programming model is developed and solved through a simulation-based approach composed of statistical analysis and optimization with the response surface methodology. The obtained results highlight the strong interactions between production, deterioration and quality which justify the development of an integrated model. A numerical example and a sensitivity analysis are presented to validate our results.

Keywords: subcontracting, optimal control, deterioration, simulation, production planning

Procedia PDF Downloads 576
626 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 295
625 Classification of Myoelectric Signals Using Multilayer Perceptron Neural Network with Back-Propagation Algorithm in a Wireless Surface Myoelectric Prosthesis of the Upper-Limb

Authors: Kevin D. Manalo, Jumelyn L. Torres, Noel B. Linsangan

Abstract:

This paper focuses on a wireless myoelectric prosthesis of the upper-limb that uses a Multilayer Perceptron Neural network with back propagation. The algorithm is widely used in pattern recognition. The network can be used to train signals and be able to use it in performing a function on their own based on sample inputs. The paper makes use of the Neural Network in classifying the electromyography signal that is produced by the muscle in the amputee’s skin surface. The gathered data will be passed on through the Classification Stage wirelessly through Zigbee Technology. The signal will be classified and trained to be used in performing the arm positions in the prosthesis. Through programming using Verilog and using a Field Programmable Gate Array (FPGA) with Zigbee, the EMG signals will be acquired and will be used for classification. The classified signal is used to produce the corresponding Hand Movements (Open, Pick, Hold, and Grip) through the Zigbee controller. The data will then be processed through the MLP Neural Network using MATLAB which then be used for the surface myoelectric prosthesis. Z-test will be used to display the output acquired from using the neural network.

Keywords: field programmable gate array, multilayer perceptron neural network, verilog, zigbee

Procedia PDF Downloads 387
624 Research on the Influence of Robot Teaching on the Creativity of Primary and Secondary School Students under the Background of STEM Education

Authors: Chu Liu

Abstract:

With the development of society and the changes of the times, the requirements for the cultivation of learners are different. In the 21st century, STEM education has become a boom in the development of education in various countries, aiming to improve the comprehensive ability of learners in science, technology, engineering, and mathematics. The rise of robot education provides an effective way for STEM education to cultivate computational thinking ability, interdisciplinary ability, problem-solving ability, and teamwork ability. Although robot education has been developed in China for several years, it still lacks a standard curriculum system. This article uses programming software as a platform, through the research and analysis of 'Basic Education Information Technology Curriculum Standards (2012 Edition)', combines with the actual learning situation of learners, tries to conduct teaching project design research, and aims at providing references for the teaching ideas and method of robot education courses. In contemporary society, technological advances increasingly require creativity. Innovative comprehensive talents urgently need a radical and effective education reform to keep up with social changes. So in this context, robot teaching design can be used for students. The tendency of creativity to influence is worth to be verified.

Keywords: STEM education, robot teaching, primary and secondary school students, tendency of creativity

Procedia PDF Downloads 117
623 Hanna Arendt and Al-Farabi’s Non-Naturalistic Political Philosophy

Authors: Mohammad Hossein Badamchi

Abstract:

As Leo Strauss demonstrates in his works, Political Philosophy in the western tradition is an epistemic-naturalistic tradition insofar Hanna Arendt mentioning the deep conflict between philosophy and politics, opposed to be named “political philosopher” prefer the title “political thinker” for herself. In fact, the Western political philosophy’s tendency to derive politics from natural law and epistemic argumentations makes a paradox between the actual “the political” and the theoretical “natural politics” in the western tradition. In this paper, we want to show that Hanna Arendt, in her exploration to find a new realm of the non-naturalistic way of thinking about the political is walking on a completely different tradition of political philosophy which was first established by Al-Farabi, the founder of Islamic political philosophy around thousand years after Greek Philosophy. Despite Aristotelian Polis which is a Natural community based on true natural rationality to reach the natural purposes of mankind, Al-Farabi’s Madine (his reconstructed concept of Aristotelian Polis) is completely constructed against natural cities, which are formulated by necessity logic of natural arguments and natural deception of humanity. In fact, Farabi considers the natural understanding of politics as Ignorant ideologies used by governments to suppress people. Madine in Farabi’s work is not a natural institution but is a collaborative constitution founded by citizens. So despite Aristotelian thinking, here we don’t have just A Polis that is the one true polis, but we have various multiple Madines among one, is virtuous not by definition but by real action of citizens and civil relations. Al-Farabi’s political philosophy is not a Naturalistic-epistemic Political Philosophy but is a Phronetic Political Philosophy which Hanna Arendt wants to establish outside of western contemplative anti-active political philosophy tradition.

Keywords: al-farabi, hanna arendt, natural politics, the political, political philosophy

Procedia PDF Downloads 293
622 Supplemental VisCo-friction Damping for Dynamical Structural Systems

Authors: Sharad Singh, Ajay Kumar Sinha

Abstract:

Coupled dampers like viscoelastic-frictional dampers for supplemental damping are a newer technique. In this paper, innovative Visco-frictional damping models have been presented and investigated. This paper attempts to couple frictional and fluid viscous dampers into a single unit of supplemental dampers. Visco-frictional damping model is developed by series and parallel coupling of frictional and fluid viscous dampers using Maxwell and Kelvin-Voigat models. The time analysis has been performed using numerical simulation on an SDOF system with varying fundamental periods, subject to a set of 12 ground motions. The simulation was performed using the direct time integration method. MATLAB programming tool was used to carry out the numerical simulation. The response behavior has been analyzed for the varying time period and added damping. This paper compares the response reduction behavior of the two modes of coupling. This paper highlights the performance efficiency of the suggested damping models. It also presents a mathematical modeling approach to visco-frictional dampers and simultaneously suggests the suitable mode of coupling between the two sub-units.

Keywords: hysteretic damping, Kelvin model, Maxwell model, parallel coupling, series coupling, viscous damping

Procedia PDF Downloads 156
621 Fuzzy Total Factor Productivity by Credibility Theory

Authors: Shivi Agarwal, Trilok Mathur

Abstract:

This paper proposes the method to measure the total factor productivity (TFP) change by credibility theory for fuzzy input and output variables. Total factor productivity change has been widely studied with crisp input and output variables, however, in some cases, input and output data of decision-making units (DMUs) can be measured with uncertainty. These data can be represented as linguistic variable characterized by fuzzy numbers. Malmquist productivity index (MPI) is widely used to estimate the TFP change by calculating the total factor productivity of a DMU for different time periods using data envelopment analysis (DEA). The fuzzy DEA (FDEA) model is solved using the credibility theory. The results of FDEA is used to measure the TFP change for fuzzy input and output variables. Finally, numerical examples are presented to illustrate the proposed method to measure the TFP change input and output variables. The suggested methodology can be utilized for performance evaluation of DMUs and help to assess the level of integration. The methodology can also apply to rank the DMUs and can find out the DMUs that are lagging behind and make recommendations as to how they can improve their performance to bring them at par with other DMUs.

Keywords: chance-constrained programming, credibility theory, data envelopment analysis, fuzzy data, Malmquist productivity index

Procedia PDF Downloads 359
620 Design of Transmit Beamspace and DOA Estimation in MIMO Radar

Authors: S. Ilakkiya, A. Merline

Abstract:

A multiple-input multiple-output (MIMO) radar systems use modulated waveforms and directive antennas to transmit electromagnetic energy into a specific volume in space to search for targets. This paper deals with the design of transmit beamspace matrix and DOA estimation for multiple-input multiple-output (MIMO) radar with collocated antennas.The design of transmit beamspace matrix is based on minimizing the difference between a desired transmit beampattern and the actual one while enforcing the constraint of uniform power distribution across the transmit array elements. Rotational invariance property is established at the transmit array by imposing a specific structure on the beamspace matrix. Semidefinite programming and spatial-division based design (SDD) are also designed separately. In MIMO radar systems, DOA estimation is an essential process to determine the direction of incoming signals and thus to direct the beam of the antenna array towards the estimated direction. This estimation deals with non-adaptive spectral estimation and adaptive spectral estimation techniques. The design of the transmit beamspace matrix and spectral estimation techniques are studied through simulation.

Keywords: adaptive and non-adaptive spectral estimation, direction of arrival estimation, MIMO radar, rotational invariance property, transmit, receive beamforming

Procedia PDF Downloads 515
619 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 264