Search results for: mutual%20information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 495

Search results for: mutual%20information

405 The Tiv Oral Poet and Taraba Crisis: Anger, Frustration and Uncotrollable Emotionalism in Obadia Kehemen Orkor's Ballads

Authors: Peter Nave Shirga

Abstract:

Obadia Kehemen Orkor’s songs that focus on the predicament of the Tiv man in Taraba in North Central Nigeria handle themes such as poverty, social inequality, discrimination and tyranny perpetrated by Jukun against the Tiv. The major thrust of his focus in the songs is the overriding longing for mutual understanding between the Jukun and Tiv that would usher in love, equality, peace and harmonious co-existence for the two antagonistic ethnic groups. This paper examines Obadia’s hard-hitting lyrics that reveal the anger, frustration and boiling emotionalism of Tiv people in Taraba state of Nigeria.

Keywords: poet, crisis, emotionalism, frustration

Procedia PDF Downloads 307
404 Film Diplomacy: An Approach to International Relations

Authors: Lawrence Akande

Abstract:

Despite the efforts of African countries' governments and the foreign countries' governments, there are cautions between the people of Africa and the people of other countries. The cautions are based on the ideology of misconception, which comes from the narratives about Africa and African people and narratives about other people also. The film is a medium of educating people about people from foreign countries they have never been to. Negative or misconceived narratives about a people will affect the relations between the peoples, despite the efforts of the government. Using pop-culture medium of film as a diplomatic tool will promote mutual understanding and respect.

Keywords: film diplomacy, international relations, narratives, Nollywood, partnership

Procedia PDF Downloads 196
403 The Zen Socrates Archetype and the Priority of the Unanswerable Question

Authors: Shawn Thompson

Abstract:

Socrates and Zen Buddhism are separated by time, distance, and cultures in a way that it is unlikely that they influenced each other. And yet the two have an amazing similarity in the principle that paradoxical and unanswerable questions can be a form of wisdom that produces a healthy psyche. Both have a sense that the limit of human awareness is a wisdom of this uncertainty. Both are at odds with the dogma of answers and of a western rationality that prioritizes the answer. Both have enigmatic answers that perpetuate the question. Both use the form of a dialogue of interaction with mutual illumination rather than the form of a lecture to passive recipients. If these premises are true, Socrates and Zen Buddhism has elements in common that reflect basic human needs for a good life. It can be argued that there is a joint archetypal experience of the wisdom of uncertainty and unanswerable questions in Socrates and Zen Buddhism.

Keywords: zen buddhism, socrates, unanswerable questions, aporia

Procedia PDF Downloads 72
402 Digital Image Correlation: Metrological Characterization in Mechanical Analysis

Authors: D. Signore, M. Ferraiuolo, P. Caramuta, O. Petrella, C. Toscano

Abstract:

The Digital Image Correlation (DIC) is a newly developed optical technique that is spreading in all engineering sectors because it allows the non-destructive estimation of the entire surface deformation without any contact with the component under analysis. These characteristics make the DIC very appealing in all the cases the global deformation state is to be known without using strain gages, which are the most used measuring device. The DIC is applicable to any material subjected to distortion caused by either thermal or mechanical load, allowing to obtain high-definition mapping of displacements and deformations. That is why in the civil and the transportation industry, DIC is very useful for studying the behavior of metallic materials as well as of composite materials. DIC is also used in the medical field for the characterization of the local strain field of the vascular tissues surface subjected to uniaxial tensile loading. DIC can be carried out in the two dimension mode (2D DIC) if a single camera is used or in a three dimension mode (3D DIC) if two cameras are involved. Each point of the test surface framed by the cameras can be associated with a specific pixel of the image, and the coordinates of each point are calculated knowing the relative distance between the two cameras together with their orientation. In both arrangements, when a component is subjected to a load, several images related to different deformation states can be are acquired through the cameras. A specific software analyzes the images via the mutual correlation between the reference image (obtained without any applied load) and those acquired during the deformation giving the relative displacements. In this paper, a metrological characterization of the digital image correlation is performed on aluminum and composite targets both in static and dynamic loading conditions by comparison between DIC and strain gauges measures. In the static test, interesting results have been obtained thanks to an excellent agreement between the two measuring techniques. In addition, the deformation detected by the DIC is compliant with the result of a FEM simulation. In the dynamic test, the DIC was able to follow with a good accuracy the periodic deformation of the specimen giving results coherent with the ones given by FEM simulation. In both situations, it was seen that the DIC measurement accuracy depends on several parameters such as the optical focusing, the parameters chosen to perform the mutual correlation between the images and, finally, the reference points on image to be analyzed. In the future, the influence of these parameters will be studied, and a method to increase the accuracy of the measurements will be developed in accordance with the requirements of the industries especially of the aerospace one.

Keywords: accuracy, deformation, image correlation, mechanical analysis

Procedia PDF Downloads 309
401 A Study on the Mechanism of the Regeneration of ‘Villages-in-City’ under Rapid Urbanization: Cases Study of Luojiazhuang

Authors: Mengying Du, Xiang Chen

Abstract:

‘villages-in-city’ is the unique product of rapid urbanization in China which embodies the contradiction between historical context and urbanization. This article mainly analyzes the corresponding strategy to the common problems such as urban texture, historical context, community structure, and industry pattern during the regeneration of ‘villages-in-city’ of Luojiazhuang. Taking government investment, community demands, the trend of urban renewal and transformation models of the ‘villages-in-city’ into consideration, the author propose a mechanism to balance those factors, and to achieve mutual confirmation with the instance of Luojiazhuang.

Keywords: community demands, historical context, villages-in-city, urbanization

Procedia PDF Downloads 307
400 Lesson of Moral Teaching of the Sokoto Caliphate in the Quest for Genuine National Development in Nigeria

Authors: Murtala Marafa

Abstract:

It’s been 50 years now since we began the desperate search for a genuine all round development as a nation. Painfully though, like a wild goose chase, the search for that promised land had remain elusive. In this piece, recourse is made to the sound administrative qualities of the 19th century Sokoto Caliphate leaders. It enabled them to administer the vast entity on the basis of mutual peace and justice. It also guaranteed a just political order built on a sound and viable economy. The paper is of the view that if the Nigerian society can allow for a replication of such moral virtues as exemplified by the founding fathers of the Caliphate, Nigeria could transform into a politically coherent and economically viable nation aspired by all.

Keywords: administration, religion, sokoto caliphate, moral teachings

Procedia PDF Downloads 272
399 An Ultra-Low Output Impedance Power Amplifier for Tx Array in 7-Tesla Magnetic Resonance Imaging

Authors: Ashraf Abuelhaija, Klaus Solbach

Abstract:

In Ultra high-field MRI scanners (3T and higher), parallel RF transmission techniques using multiple RF chains with multiple transmit elements are a promising approach to overcome the high-field MRI challenges in terms of inhomogeneity in the RF magnetic field and SAR. However, mutual coupling between the transmit array elements disturbs the desirable independent control of the RF waveforms for each element. This contribution demonstrates a 18 dB improvement of decoupling (isolation) performance due to the very low output impedance of our 1 kW power amplifier.

Keywords: EM coupling, inter-element isolation, magnetic resonance imaging (mri), parallel transmit

Procedia PDF Downloads 492
398 Decoding Democracy's Notion in Aung San Suu Kyi's Speeches

Authors: Woraya Som-Indra

Abstract:

This article purposes to decode the notion of democracy embedded in the political speeches of Aung San Su Kyi by adopting critical discourse analysis approach, using Systemic Function Linguistics (SFL) and transitivity as a vital analytical tool. Two main objectives of the study are 1) to analyze linguistic strategies constituted the crucial characteristics of Su Kyi's political speeches by employing SFL and transitivity and 2) to examine ideology manifested the notion of democracy behind Su Kyi’s political speeches. The data consists of four speeches of Su Kyi delivering in different places within the year 2011 broadcasted through the website of US campaign for Burma. By employing linguistic tool and the concept of ideology as an analytical frame, the word choice selection found in the speeches assist explaining the manifestation of Su Kyi’s ideology toward democracy and power struggle. The finding revealed eight characters of word choice projected from Su Kyi’s political speeches, as follows; 1) support, hope and encouragement which render the recipients to uphold with the mutual aim to fight for democracy together and moving forwards for change and solution in the future, 2) aim and achievement evoke the recipients to attach with the purpose to fight for democracy, 3) challenge and change release energy to challenge the present political regime of Burma to change to the new political regime of democracy, 4) action, doing and taking signify the action and practical process to call for a new political regime, 5) struggle represents power struggle during the process of democracy requesting and it could refer to her long period of house arrest in Burma, 6) freedom implies what she has been long fighting for- to be released from house arrest, be able to access to the freedom of speech related to political ideology, and moreover, be able to speak out for the people of Burmese about their desirable political regime and political participation, 7) share and scarify call the recipients to have the spirit of shared value in the process of acquiring democracy, and 8) solution and achievement remind her recipients of what they have been long fighting for, and what could lead them to reach out the mutual achievement of a new political regime, i.e. democracy. Those word choice selections are plausible representation of democracy notion in Su Kyi’s terms. Due to her long journey of fighting for democracy in Burma, Suu Kyi’s political speeches always possess tremendously strong leadership characteristic, using words of wisdom and moreover, they are encoded with a wide range of words related to democracy ideology in order to push forward the future change into the Burma’s political regime.

Keywords: Aung San Su Kyi’s speeches, critical discourse analysis, democracy ideology, systemic function linguistics, transitivity

Procedia PDF Downloads 273
397 Phonetic Variability of Arabic /x/, /ɣ/

Authors: Mohammad Anani

Abstract:

In Jordanian Arabic, the phonetic realization of the Arabic voiceless velar fricative /x/ and the voiced velar fricative /ɣ/ is highly context-sensitive and is largely influenced by the preceding or following consonants. In particular, the place of articulation, viz. velar or uvular, is determined by co-occurrence restrictions and mutual dependency between various ‘emphatic’/’non-emphatic’ consonantal and vocalic articulations. Anticipation of an upcoming ‘emphatic’ consonant: a uvular plosive or a voiced alveolar trill alters the place of articulation of the fricative so that it becomes uvular. On the other hand, the anticipation of an upcoming ‘non-emphatic’ consonant entails constraints of a different order than those relevant to the ‘emphatics.’

Keywords: Arabic velar/ uvular articulation dependency, emphatic/non-emphatic environment, lip protrusion and positioning of tongue, vowel formant frequencies values

Procedia PDF Downloads 14
396 Humanity in Public Policy: The Polemic of Death Penalty Policy in Indonesia

Authors: Alvian R. E. Purnomo, K. Noni Srijati, Hernawan Adi

Abstract:

Government regulation is a result of agreement on the struggle of ideas, interests, and ideologies among elites in state institution. The polemic about death penalty policy in Indonesia is still becoming an interesting discussion and also a complex issue. There are pros/ cons of whether the policy is humane or not. Indonesia becomes the concern of the world’s community because the policy of death penalty applied is considered not reflecting the values of Indonesian culture including tolerance, mutual cooperation, and love. This paper examines them using literature study on how public policy theories respond to humanity issues and how Indonesian government should take steps to the issue of the death penalty that has become polemic until now.

Keywords: government regulation, public policy, death penalty policy, humanity

Procedia PDF Downloads 309
395 Comparative Study of Poetics of Ancient China and Greece

Authors: Junwu Tian

Abstract:

Chinese poetics originated in the pre-Qin period, while Western poetics came into being in the Hellenistic period. Although there was no mutual communication and influence between the two kinds of poetics due to both geographical distance and chronological displacement, the Sino-Western thinkers shared much in common, particularly in the social function of literature and art, the pursuit of unified and harmonious aesthetics, the advocacy of poets’ subjective initiative in the creative process of literature and art. In the sphere of rhetoric, the poetics of the pre-Qin scholars and their Greek counterparts also had heterogeneous similarities. By comparing the aesthetic ideas of Confucius, Mencius, Xun Zi, and Deng Xi with those of Plato, Aristotle, and Protagoras, this paper intends to reveal the common concerns of Chinese and Western poetics in the context of heterogeneous cultures and in their respective origin periods.

Keywords: Pre-Qin poetics, ancient Greek poetics, heterogeneous similarity, origin period

Procedia PDF Downloads 77
394 Computation of Induction Currents in a Set of Dendrites

Authors: R. B. Mishra, Sudhakar Tripathi

Abstract:

In this paper, the cable model of dendrites have been considered. The dendrites are cylindrical cables of various segments having variable length and reducing radius from start point at synapse and end points. For a particular event signal being received by a neuron in response only some dendrite are active at a particular instance. Initial current signals with different current flows in dendrite are assumed. Due to overlapping and coupling of active dendrite, they induce currents in the dendrite segments of each other at a particular instance. But how these currents are induced in the various segments of active dendrites due to coupling between these dendrites, It is not presented in the literature. Here the paper presents a model for induced currents in active dendrite segments due to mutual coupling at the starting instance of an activity in dendrite. The model is as discussed further.

Keywords: currents, dendrites, induction, simulation

Procedia PDF Downloads 392
393 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 166
392 Assessment of Trust in Virtual Teams of College Students in Egypt

Authors: Bashayer Alsana

Abstract:

Emerging technologies present human interaction with new challenges. Individuals are required to interact and collaborate to achieve mutual gain. Accomplishing shared goals requires all parties involved to trust others commitment to fulfill their specified obligations. Trust is harder to establish when groups work virtually and members transcend time, space, and culture. This paper identifies the importance of trust in virtual groups of students at Cairo University by exposing them to electronic projects on which they collaborate.Students respond to a survey to assess their range of trust within their teams and how the outcome is affected. Gender differences and other demographic factors are analyzed to understand results and rates of trust. The paper concludes with summarizing factors influencing trust development and possible implications.

Keywords: students, teams, trust, virtual

Procedia PDF Downloads 257
391 Generalized Synchronization in Systems with a Complex Topology of Attractor

Authors: Olga I. Moskalenko, Vladislav A. Khanadeev, Anastasya D. Koloskova, Alexey A. Koronovskii, Anatoly A. Pivovarov

Abstract:

Generalized synchronization is one of the most intricate phenomena in nonlinear science. It can be observed both in systems with a unidirectional and mutual type of coupling including the complex networks. Such a phenomenon has a number of practical applications, for example, for the secure information transmission through the communication channel with a high level of noise. Known methods for the secure information transmission needs in the increase of the privacy of data transmission that arises a question about the observation of such phenomenon in systems with a complex topology of chaotic attractor possessing two or more positive Lyapunov exponents. The present report is devoted to the study of such phenomenon in two unidirectionally and mutually coupled dynamical systems being in chaotic (with one positive Lyapunov exponent) and hyperchaotic (with two or more positive Lyapunov exponents) regimes, respectively. As the systems under study, we have used two mutually coupled modified Lorenz oscillators and two unidirectionally coupled time-delayed generators. We have shown that in both cases the generalized synchronization regime can be detected by means of the calculation of Lyapunov exponents and phase tube approach whereas due to the complex topology of attractor the nearest neighbor method is misleading. Moreover, the auxiliary system approaches being the standard method for the synchronous regime observation, for the mutual type of coupling results in incorrect results. To calculate the Lyapunov exponents in time-delayed systems we have proposed an approach based on the modification of Gram-Schmidt orthogonalization procedure in the context of the time-delayed system. We have studied in detail the mechanisms resulting in the generalized synchronization regime onset paying a great attention to the field where one positive Lyapunov exponent has already been become negative whereas the second one is a positive yet. We have found the intermittency here and studied its characteristics. To detect the laminar phase lengths the method based on a calculation of local Lyapunov exponents has been proposed. The efficiency of the method has been verified using the example of two unidirectionally coupled Rössler systems being in the band chaos regime. We have revealed the main characteristics of intermittency, i.e. the distribution of the laminar phase lengths and dependence of the mean length of the laminar phases on the criticality parameter, for all systems studied in the report. This work has been supported by the Russian President's Council grant for the state support of young Russian scientists (project MK-531.2018.2).

Keywords: complex topology of attractor, generalized synchronization, hyperchaos, Lyapunov exponents

Procedia PDF Downloads 274
390 Quick Response(QR) Code for Vehicle Registration and Identification

Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh

Abstract:

This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.

Keywords: QR code, QR reader, registration, authentication, idenfication

Procedia PDF Downloads 489
389 Exciting Voltage Control for Efficiency Maximization for 2-D Omni-Directional Wireless Power Transfer Systems

Authors: Masato Sasaki, Masayoshi Yamamoto

Abstract:

The majority of wireless power transfer (WPT) systems transfer power in a directional manner. This paper describes a discrete exciting voltage control technique for WPT via magnetic resonant coupling with two orthogonal transmitter coils (2D omni-directional WPT system) which can maximize the power transfer efficiency in response to the change of coupling status. The theory allows the equations of the efficiency of the system to be determined at all the rate of the mutual inductance. The calculated results are included to confirm the advantage to one directional WPT system and the validity of the theory and the equations.

Keywords: wireless power transfer, omni-directional, orthogonal, efficiency

Procedia PDF Downloads 316
388 Nonlinear Mathematical Model of the Rotor Motion in a Thin Hydrodynamic Gap

Authors: Jaroslav Krutil, Simona Fialová, , František Pochylý

Abstract:

A nonlinear mathematical model of mutual fluid-structure interaction is presented in the work. The model is applicable to the general shape of sealing gaps. An in compressible fluid and turbulent flow is assumed. The shaft carries a rotational and procession motion, the gap is axially flowed through. The achieved results of the additional mass, damping and stiffness matrices may be used in the solution of the rotor dynamics. The usage of this mathematical model is expected particularly in hydraulic machines. The method of control volumes in the ANSYS Fluent was used for the simulation. The obtained results of the pressure and velocity fields are used in the mathematical model of additional effects.

Keywords: nonlinear mathematical model, CFD modeling, hydrodynamic sealing gap, matrices of mass, stiffness, damping

Procedia PDF Downloads 533
387 The Interaction and Relations Between Civil and Military Logistics

Authors: Cumhur Cansever, Selcuk Er

Abstract:

There is an increasing cooperation and interaction between the military logistic systems and civil organizations operating in today's market. While the scope and functions of civilian logistics have different characteristics, military logistics tries to import some applications that are conducted by private sectors successfully. Also, at this point, the determination of the optimal point of integration and interaction between civilian and military logistics has emerged as a key issue. In this study, the mutual effects between military and civilian logistics and their most common integration areas, (Supply Chain Management (SCM), Integrated Logistics Support (ILS) and Outsourcing) will be examined with risk analysis and determination of basic skills evaluation methods for determining the optimum point in the integration.

Keywords: core competency, integrated logistics support, outsourcing, supply chain management

Procedia PDF Downloads 524
386 Trust in Virtual Groups: An Exploratory Study Applied to University Students in Kuwait

Authors: Bashaiar Alsanaa

Abstract:

Emerging technologies present human interaction with new challenges. Individuals are required to interact and collaborate to achieve mutual gain. Accomplishing shared goals requires all parties involved to trust others’ commitment to fulfilling their specified obligations. Trust is harder to establish when groups work virtually and members transcend time, space, and culture. This paper identifies the importance of trust in virtual groups of students at Kuwait University by exposing them to electronic projects on which they collaborate. Students respond to a survey to assess their range of trust within their teams and how the outcome is affected. Gender differences and other demographic factors are analyzed to understand results and rates of trust. The paper concludes with summarizing factors influencing trust development and possible implications.

Keywords: groups, students, trust, virtual

Procedia PDF Downloads 290
385 Data Refinement Enhances The Accuracy of Short-Term Traffic Latency Prediction

Authors: Man Fung Ho, Lap So, Jiaqi Zhang, Yuheng Zhao, Huiyang Lu, Tat Shing Choi, K. Y. Michael Wong

Abstract:

Nowadays, a tremendous amount of data is available in the transportation system, enabling the development of various machine learning approaches to make short-term latency predictions. A natural question is then the choice of relevant information to enable accurate predictions. Using traffic data collected from the Taiwan Freeway System, we consider the prediction of short-term latency of a freeway segment with a length of 17 km covering 5 measurement points, each collecting vehicle-by-vehicle data through the electronic toll collection system. The processed data include the past latencies of the freeway segment with different time lags, the traffic conditions of the individual segments (the accumulations, the traffic fluxes, the entrance and exit rates), the total accumulations, and the weekday latency profiles obtained by Gaussian process regression of past data. We arrive at several important conclusions about how data should be refined to obtain accurate predictions, which have implications for future system-wide latency predictions. (1) We find that the prediction of median latency is much more accurate and meaningful than the prediction of average latency, as the latter is plagued by outliers. This is verified by machine-learning prediction using XGBoost that yields a 35% improvement in the mean square error of the 5-minute averaged latencies. (2) We find that the median latency of the segment 15 minutes ago is a very good baseline for performance comparison, and we have evidence that further improvement is achieved by machine learning approaches such as XGBoost and Long Short-Term Memory (LSTM). (3) By analyzing the feature importance score in XGBoost and calculating the mutual information between the inputs and the latencies to be predicted, we identify a sequence of inputs ranked in importance. It confirms that the past latencies are most informative of the predicted latencies, followed by the total accumulation, whereas inputs such as the entrance and exit rates are uninformative. It also confirms that the inputs are much less informative of the average latencies than the median latencies. (4) For predicting the latencies of segments composed of two or three sub-segments, summing up the predicted latencies of each sub-segment is more accurate than the one-step prediction of the whole segment, especially with the latency prediction of the downstream sub-segments trained to anticipate latencies several minutes ahead. The duration of the anticipation time is an increasing function of the traveling time of the upstream segment. The above findings have important implications to predicting the full set of latencies among the various locations in the freeway system.

Keywords: data refinement, machine learning, mutual information, short-term latency prediction

Procedia PDF Downloads 167
384 Increase of Atmosphere CO2 Concentration and Its Effects on Culture/Weed Interaction

Authors: J. I. Santos, A. E. Cesarin, C. A. R. Sales, M. B. B. Triano, P. F. R. B. Martins, A. F. Braga, N. J. Neto, A., A. M. Barroso, P. L. C. A. Alves, C. A. M. Huaman

Abstract:

Climate change projections based on the emission of greenhouse effect gases suggest an increase in the concentration of atmospheric carbon dioxide, in up to 750 ppm. In this scenario, we have significant changes in plant development, and consequently, in agricultural systems. This study aims to evaluate the interaction between culture (Glycine max) and weed (Amaranthus viridis and Euphorbia heterophylla) in two conditions of CO2, 400 and 800 ppm. The results showed that the coexistence of culture with both weed species resulted in a mutual loss, with decrease in dry mass productivity of culture + weeds, in both conditions of CO2. However, when the culture is grown in association with E. heterophylla, total dry mass of culture + weed was smaller at 800 ppm. Soybean was more aggressive in comparison to the A. viridis in both the concentrations of CO2, but not in relation to the E. heterophylla.

Keywords: plants interaction, increase of [CO₂], plants of metabolismo C3, glycine max

Procedia PDF Downloads 396
383 A Fault Analysis Cracked-Rotor-to-Stator Rub and Unbalance by Vibration Analysis Technique

Authors: B. X. Tchomeni, A. A. Alugongo, L. M. Masu

Abstract:

An analytical 4-DOF nonlinear model of a de Laval rotor-stator system based on Energy Principles has been used theoretically and experimentally to investigate fault symptoms in a rotating system. The faults, namely rotor-stator-rub, crack and unbalance are modelled as excitations on the rotor shaft. Mayes steering function is used to simulate the breathing behaviour of the crack. The fault analysis technique is based on waveform signal, orbits and Fast Fourier Transform (FFT) derived from simulated and real measured signals. Simulated and experimental results manifest considerable mutual resemblance of elliptic-shaped orbits and FFT for a same range of test data.

Keywords: a breathing crack, fault, FFT, nonlinear, orbit, rotor-stator rub, vibration analysis

Procedia PDF Downloads 306
382 Development of People's Participation in Environmental Development in Pathumthani Province

Authors: Sakapas Saengchai

Abstract:

Study on the development of people's participation in environmental development was a qualitative research method. Data were collected by participant observation, in-depth interview and discussion group in Pathumthani province. The study indicated that 1) People should be aware of environmental information from government agencies. 2) People in the community should be able to brainstorm information, exchange information about community environment development. 3) People should have a role with community leaders. 4) People in the community should have a role to play in the implementation of projects and activities in the development of the environment and 5) citizens, community leaders, village committee have directed the development of the area. Maintaining a community environment with a shared decision. By emphasizing the process of participation, self-reliance, mutual help, and responsibility for one's own community. Community empowerment strengthens the sustainable spatial development of the environment.

Keywords: people, participation, community, environment

Procedia PDF Downloads 277
381 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 287
380 Comparison of the Effectiveness of Tree Algorithms in Classification of Spongy Tissue Texture

Authors: Roza Dzierzak, Waldemar Wojcik, Piotr Kacejko

Abstract:

Analysis of the texture of medical images consists of determining the parameters and characteristics of the examined tissue. The main goal is to assign the analyzed area to one of two basic groups: as a healthy tissue or a tissue with pathological changes. The CT images of the thoracic lumbar spine from 15 healthy patients and 15 with confirmed osteoporosis were used for the analysis. As a result, 120 samples with dimensions of 50x50 pixels were obtained. The set of features has been obtained based on the histogram, gradient, run-length matrix, co-occurrence matrix, autoregressive model, and Haar wavelet. As a result of the image analysis, 290 descriptors of textural features were obtained. The dimension of the space of features was reduced by the use of three selection methods: Fisher coefficient (FC), mutual information (MI), minimization of the classification error probability and average correlation coefficients between the chosen features minimization of classification error probability (POE) and average correlation coefficients (ACC). Each of them returned ten features occupying the initial place in the ranking devised according to its own coefficient. As a result of the Fisher coefficient and mutual information selections, the same features arranged in a different order were obtained. In both rankings, the 50% percentile (Perc.50%) was found in the first place. The next selected features come from the co-occurrence matrix. The sets of features selected in the selection process were evaluated using six classification tree methods. These were: decision stump (DS), Hoeffding tree (HT), logistic model trees (LMT), random forest (RF), random tree (RT) and reduced error pruning tree (REPT). In order to assess the accuracy of classifiers, the following parameters were used: overall classification accuracy (ACC), true positive rate (TPR, classification sensitivity), true negative rate (TNR, classification specificity), positive predictive value (PPV) and negative predictive value (NPV). Taking into account the classification results, it should be stated that the best results were obtained for the Hoeffding tree and logistic model trees classifiers, using the set of features selected by the POE + ACC method. In the case of the Hoeffding tree classifier, the highest values of three parameters were obtained: ACC = 90%, TPR = 93.3% and PPV = 93.3%. Additionally, the values of the other two parameters, i.e., TNR = 86.7% and NPV = 86.6% were close to the maximum values obtained for the LMT classifier. In the case of logistic model trees classifier, the same ACC value was obtained ACC=90% and the highest values for TNR=88.3% and NPV= 88.3%. The values of the other two parameters remained at a level close to the highest TPR = 91.7% and PPV = 91.6%. The results obtained in the experiment show that the use of classification trees is an effective method of classification of texture features. This allows identifying the conditions of the spongy tissue for healthy cases and those with the porosis.

Keywords: classification, feature selection, texture analysis, tree algorithms

Procedia PDF Downloads 175
379 Friction Behavior of Wood-Plastic Composites against Uncoated Cemented Carbide

Authors: Almontas Vilutis, Vytenis Jankauskas

Abstract:

The paper presents the results of the investigation of the dry sliding friction of wood-plastic composites (WPCs) against WC-Co cemented carbide. The dependence of the dynamic coefficient of friction on the main influencing factors (vertical load, temperature, and sliding distance) was investigated by evaluating their mutual interaction. Multiple regression analysis showed a high polynomial dependence (adjusted R2 > 0.98). The resistance of the composite to thermo-mechanical effects determines how temperature and force factors affect the magnitude of the coefficient of friction. WPC-B composite has the lowest friction and highest resistance compared to WPC-A, while composite and cemented carbide materials wear the least. Energy dispersive spectroscopy (EDS), based on elemental composition, provided important insights into the friction process.

Keywords: friction, composite, carbide, factors

Procedia PDF Downloads 80
378 Evidence-Based Approaches and Effective Practices for Preventing Bullying

Authors: Nato Asatiani

Abstract:

The research underscores the critical role of a positive school climate in combating bullying. The results can be generalized and assumed that bullying behavior occurs when there is a victim, and the environment allows the realization of aggression; school culture is a strong predictor of bullying behavior; the probability of becoming a victim (victimhood) is high among those teenagers who experience high levels of stress in the environment; when a teenager experiences a sense of threat, such physical, psychological, or social symptoms are developed that makes teenagers vulnerable to bullying; the school culture that is oriented to adherence to the rules of communication and mutual respect in the group reduces the likelihood of a teenager to become a victim; consequently, when a teenager has a sense of wellness even in combination with aggression, this sense reduces the likelihood of a teenager to become a victim.

Keywords: bullying, adolescence, aggression, school climate

Procedia PDF Downloads 24
377 The Interaction between Human and Environment on the Perspective of Environmental Ethics

Authors: Mella Ismelina Farma Rahayu

Abstract:

Environmental problems could not be separated from unethical human perspectives and behaviors toward the environment. There is a fundamental error in the philosophy of people’s perspective about human and nature and their relationship with the environment, which in turn will create an inappropriate behavior in relation to the environment. The aim of this study is to investigate and to understand the ethics of the environment in the context of humans interacting with the environment by using the hermeneutic approach. The related theories and concepts collected from literature review are used as data, which were analyzed by using interpretation, critical evaluation, internal coherence, comparisons, and heuristic techniques. As a result of this study, there will be a picture related to the interaction of human and environment in the perspective of environmental ethics, as well as the problems of the value of ecological justice in the interaction of humans and environment. We suggest that the interaction between humans and environment need to be based on environmental ethics, in a spirit of mutual respect between humans and the natural world.

Keywords: environment, environmental ethics, interaction, value

Procedia PDF Downloads 420
376 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 329