Search results for: linguistic capabilities
925 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States
Authors: Muhammad Jawad Hashmi
Abstract:
The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan
Procedia PDF Downloads 356924 Made-in-Japan English and the Negative Impact on English Language Learning
Authors: Anne Crescini
Abstract:
The number of loanwords borrowed into the Japanese language is increasing rapidly in recent years, and many linguists argue that loanwords make up more than 10% of the Japanese lexicon. While these loanwords come from various Western languages, 80%-90% are borrowed from English. Also, there is a separate group of words and phrases categorized as ‘Japanese English’. These made-in-Japan linguistic creations may look and sound like English, but in fact are not used by native speakers and are often incomprehensible to them. Linguistically, the important thing to remember is that these terms are not English ones, but in fact, 100% Japanese words. A problem arises in language teaching, however, when Japanese English learners are unable to distinguish authentic loans from Japanese English terms. This confusion could greatly impede language acquisition and communication. The goal of this paper is to determine to what degree this potential misunderstanding may interfere with communication. Native English speakers living in the United States were interviewed and shown a list of romanized Japanese English terms, which are both commonly used and often mistaken for authentic loans. Then, the words were put into the context of a sentence in order to ascertain if context in any way aided comprehension. The results showed that while some terms are understood on their own, and others are understood better in context, a large number of the terms are entirely incomprehensible to native English speakers. If that is the case, and a Japanese learner mistakes a Japanese English term for an authentic loan, a communication breakdown may occur during interaction in English. With the ever-increasing presence of both groups of terms in the Japanese language, it is more important than ever that teaching professionals address this topic in the language classroom.Keywords: Japanese, Japanese English, language acquisition, loanwords
Procedia PDF Downloads 223923 Characteristic Sentence Stems in Academic English Texts: Definition, Identification, and Extraction
Authors: Jingjie Li, Wenjie Hu
Abstract:
Phraseological units in academic English texts have been a central focus in recent corpus linguistic research. A wide variety of phraseological units have been explored, including collocations, chunks, lexical bundles, patterns, semantic sequences, etc. This paper describes a special category of clause-level phraseological units, namely, Characteristic Sentence Stems (CSSs), with a view to describing their defining criteria and extraction method. CSSs are contiguous lexico-grammatical sequences which contain a subject-predicate structure and which are frame expressions characteristic of academic writing. The extraction of CSSs consists of six steps: Part-of-speech tagging, n-gram segmentation, structure identification, significance of occurrence calculation, text range calculation, and overlapping sequence reduction. Significance of occurrence calculation is the crux of this study. It includes the computing of both the internal association and the boundary independence of a CSS and tests the occurring significance of the CSS from both inside and outside perspectives. A new normalization algorithm is also introduced into the calculation of LocalMaxs for reducing overlapping sequences. It is argued that many sentence stems are so recurrent in academic texts that the most typical of them have become the habitual ways of making meaning in academic writing. Therefore, studies of CSSs could have potential implications and reference value for academic discourse analysis, English for Academic Purposes (EAP) teaching and writing.Keywords: characteristic sentence stem, extraction method, phraseological unit, the statistical measure
Procedia PDF Downloads 170922 Conceptual Study on 4PL and Activities in Turkey
Authors: Berna Kalkan, Kenan Aydin
Abstract:
Companies give importance customer satisfaction to compete the developing and changing market. This is possible when customer reaches the right product, right quality, place, time and cost. In this regard, the extension of logistics services has played active role on formation and development of the different logistics services concept. The concept of logistics services has played important role involved in the healing of economic indicators today. Companies can use logistics providers, thus have competitive advantage and low cost, reducing time, tobe flexibility. In recent years, Fourth Party Logistics (4PL) has emerged as a new concept that includes relationship between suppliers and firms in outsourcing. 4PL provider is an integrator that offers comprehensive supply chain solutions with the technology, resources and capabilities that it possesses. Also, 4PL has attracted as a popular research topic attention in the recent past. In this paper, logistics outsourcing and 4PL concepts are analyzed and a literature review on 4PL activities is given. Also, the previous studies in literature and the approaches that are used in previous studies in literature is presented by analysing on 4PL activities. In this context, a field study will be applied to 4PL providers and service buyer in Turkey. If necessary, results related to this study will be shared in scientific areas.Keywords: fourth party logistics, literature review, outsourcing, supply chain management
Procedia PDF Downloads 178921 Mechanism of Action of Troxerutin in Reducing Oxidative Stress
Authors: Nasrin Hosseinzad
Abstract:
Troxerutin, a trihydroxyethylated derived of rutin, is a flavonoid existing in tea, coffee, cereal grains, various fruits and vegetables have been conveyed to display radioprotective, antithrombotic, nephron-protective and hepato-protective possessions. Troxerutin, has been well-proved to utilize hepatoprotective assets. Troxerutin could upturn the resistance of hippocampal neurons alongside apoptosis by lessening the action of AChE and oxidative stress. Consequently, troxerutin may have advantageous properties in the administration of Alzheimer's disease and cancer. Troxerutin has been testified to have several welfares and medicinal stuffs. It could shelter the mouse kidney against d-gal-induced damage by refining renal utility, decreasing histopathologic changes, dropping ROS construction, reintroducing the activities of antioxidant enzymes and reducing DNA oxidative destruction. The DNA cleavage study clarifies that troxerutin showed DNA protection against hydroxyl radical persuaded DNA mutilation. Troxerutin uses anti-cancer effect in HuH-7 hepatocarcinoma cells conceivably through synchronized regulation of the molecular signalling pathways, Nrf2 and NF-κB. DNA binding at slight channel by troxerutin may have donated to feature breaks leading to improved radiation brought cell death. Furthermore, the mechanism principal the observed variance in the antioxidant activities of troxerutin and its esters was qualified to equally their free radical scavenging capabilities and dissemination on the cell membrane outward.Keywords: troxerutin, DNA, oxidative stress, antioxidant, free radical
Procedia PDF Downloads 160920 Isolation, Identification and Crude Oil Biodegradation Potential of Providencia sp. BAZ 01
Authors: Aisami A., Z. A. Adamu, Lawan Bulama
Abstract:
Due to growing issues of crude oil pollution in both marine and terrestrial environments, Billions to Trillions of US Dollars were spent over the years for the treatment of this spill. There is an urgent need for effective bioremediation strategies. This current study focuses on the isolation and characterization of a crude oil-degrading bacterium from hydrocarbon-contaminated soil samples. Soil samples were collected from an oil spill site and subjected to enrichment culture techniques in a mineral salt medium supplemented with crude oil as the singular carbon source. The isolates were screened for their crude oil-degrading capabilities using gravimetric analysis. The most efficient isolation was identified through 16S rRNA gene sequencing. Cultural and physical conditions such pH, temperature salinity and crude oil concentrations were optimized. The isolates showed significant crude oil degradation efficiency, reducing oil concentration (2.5%) by 75% within 15 days of incubation. The strain was identified as Providencia sp. through molecular characterization, the sequence was deposited at the NCBI Genbank with accession number MN880494. The bacterium exhibited optimal growth at 32.5°C, pH 7.0 to 7.5, and in the presence of 1.5% (w/v) NaCl. The isolated Providencia sp. shows encouraging potential for bioremediation of crude oil-contaminated environments. This study successfully isolated and characterized a crude oil-degrading Providencia sp., highlighting its potential in bioremediation.Keywords: crude oil degradation, providencia sp., bioremediation, hydrocarbon utilization, environmental pollution.
Procedia PDF Downloads 44919 Alpha: A Groundbreaking Avatar Merging User Dialogue with OpenAI's GPT-3.5 for Enhanced Reflective Thinking
Authors: Jonas Colin
Abstract:
Standing at the vanguard of AI development, Alpha represents an unprecedented synthesis of logical rigor and human abstraction, meticulously crafted to mirror the user's unique persona and personality, a feat previously unattainable in AI development. Alpha, an avant-garde artefact in the realm of artificial intelligence, epitomizes a paradigmatic shift in personalized digital interaction, amalgamating user-specific dialogic patterns with the sophisticated algorithmic prowess of OpenAI's GPT-3.5 to engender a platform for enhanced metacognitive engagement and individualized user experience. Underpinned by a sophisticated algorithmic framework, Alpha integrates vast datasets through a complex interplay of neural network models and symbolic AI, facilitating a dynamic, adaptive learning process. This integration enables the system to construct a detailed user profile, encompassing linguistic preferences, emotional tendencies, and cognitive styles, tailoring interactions to align with individual characteristics and conversational contexts. Furthermore, Alpha incorporates advanced metacognitive elements, enabling real-time reflection and adaptation in communication strategies. This self-reflective capability ensures continuous refinement of its interaction model, positioning Alpha not just as a technological marvel but as a harbinger of a new era in human-computer interaction, where machines engage with us on a deeply personal and cognitive level, transforming our interaction with the digital world.Keywords: chatbot, GPT 3.5, metacognition, symbiose
Procedia PDF Downloads 72918 Patterns and Effects of International Trade in Technology: Firm-Level Evidence
Authors: Heeyong Noh, Seongryong Kang, Sungjoo Lee
Abstract:
As the world becomes increasingly interconnected, firms have tried to explore market opportunities not only in the domestic market but also abroad. In particular, transactions of intangible assets in the global market now take on great importance. Accordingly, technology transfer activities such as patent licensing, copyright transfer, or workforce trainings which are considered significant to leverage an organization’s internal capabilities, are occurring more frequently and briskly across the world than ever before. Though a number of studies have addressed the issues regarding technology transfer, most of them have focused on university-industry technology transfer. Of course, some have investigated international technology transfer phenomenon but used patent citations data as a proxy. In order to understand the phenomena more clearly, it would be necessary to collect and analyze data that can measure technology transfer activities between firms more directly. Therefore, this study aims to examine the patterns of international trade in technology by employing data about international technology in-licensing activities in Korean firms. We also investigate the effect of international technology in-licensing strategy on a firm’s innovation performance. The research findings are expected to help R&D managers understand how firms have absorbed technological knowledge from foreign firms in the form of licensing and further develop effective international collaboration strategies. In addition, significant implications can be offered for political decision-making regarding technology trade within increasing international interconnections.Keywords: international technology trade, technology trade effect, technology transfer, R&D managers
Procedia PDF Downloads 379917 Fusion Models for Cyber Threat Defense: Integrating Clustering, Random Forests, and Support Vector Machines to Against Windows Malware
Authors: Azita Ramezani, Atousa Ramezani
Abstract:
In the ever-escalating landscape of windows malware the necessity for pioneering defense strategies turns into undeniable this study introduces an avant-garde approach fusing the capabilities of clustering random forests and support vector machines SVM to combat the intricate web of cyber threats our fusion model triumphs with a staggering accuracy of 98.67 and an equally formidable f1 score of 98.68 a testament to its effectiveness in the realm of windows malware defense by deciphering the intricate patterns within malicious code our model not only raises the bar for detection precision but also redefines the paradigm of cybersecurity preparedness this breakthrough underscores the potential embedded in the fusion of diverse analytical methodologies and signals a paradigm shift in fortifying against the relentless evolution of windows malicious threats as we traverse through the dynamic cybersecurity terrain this research serves as a beacon illuminating the path toward a resilient future where innovative fusion models stand at the forefront of cyber threat defense.Keywords: fusion models, cyber threat defense, windows malware, clustering, random forests, support vector machines (SVM), accuracy, f1-score, cybersecurity, malicious code detection
Procedia PDF Downloads 72916 Advanced Technologies for Detector Readout in Particle Physics
Authors: Y. Venturini, C. Tintori
Abstract:
Given the continuous demand for improved readout performances in particle and dark matter physics, CAEN SpA is pushing on the development of advanced technologies for detector readout. We present the Digitizers 2.0, the result of the success of the previous Digitizers generation, combined with expanded capabilities and a renovation of the user experience introducing the open FPGA. The first product of the family is the VX2740 (64 ch, 125 MS/s, 16 bit) for advanced waveform recording and Digital Pulse Processing, fitting with the special requirements of Dark Matter and Neutrino experiments. In parallel, CAEN is developing the FERS-5200 platform, a Front-End Readout System designed to read out large multi-detector arrays, such as SiPMs, multi-anode PMTs, silicon strip detectors, wire chambers, GEM, gas tubes, and others. This is a highly-scalable distributed platform, based on small Front-End cards synchronized and read out by a concentrator board, allowing to build extremely large experimental setup. We plan to develop a complete family of cost-effective Front-End cards tailored to specific detectors and applications. The first one available is the A5202, a 64-channel unit for SiPM readout based on CITIROC ASIC by Weeroc.Keywords: dark matter, digitizers, front-end electronics, open FPGA, SiPM
Procedia PDF Downloads 129915 Effects of Artificial Intelligence Technology on Children: Positives and Negatives
Authors: Paula C. Latorre Arroyo, Andrea C. Latorre Arroyo
Abstract:
In the present society, children are exposed to and impacted by technology from very early on in various ways. Artificial intelligence (AI), in particular, directly affects them, be it positively or negatively. The concept of artificial intelligence is commonly defined as the technological programming of computers or robotic mechanisms with humanlike capabilities and characteristics. These technologies are often designed as helpful machines or disguised as handy tools that could ultimately steal private information for illicit purposes. Children, being one of the most vulnerable groups due to their lack of experience and knowledge, do not have the ability to recognize or have the malice to distinguish if an apparatus with artificial intelligence is good or bad for them. For this reason, as a society, there must be a sense of responsibility to regulate and monitor different types of uses for artificial intelligence to protect children from potential risks that might arise. This article aims to investigate the many implications that artificial intelligence has in the lives of children, starting from a home setting, within the classroom, and, ultimately, in online spaces. Irrefutably, there are numerous beneficial aspects to the use of artificial intelligence. However, due to its limitless potential and lack of specific and substantial regulations to prevent the illicit use of this technology, safety and privacy concerns surface, specifically regarding the youth. This written work aims to provide an in-depth analysis of how artificial intelligence can both help children and jeopardize their safety. Concluding with resources and data supporting the aforementioned statement.Keywords: artificial intelligence, children, privacy, rights, safety
Procedia PDF Downloads 67914 Application of Cloud Based Healthcare Information System through a Smart Card in Kingdom of Saudi Arabia
Authors: Wasmi Woishi
Abstract:
Smart card technology is a secure and safe technology that is expanding its capabilities day by day in terms of holding important information without alteration. It is readily available, and its ease of portability makes it more efficient in terms of its usage. The smart card is in use by many industries such as financial, insurance, governmental industries, personal identification, to name a few. Smart card technology is popular for its wide familiarity, adaptability, accessibility, benefits, and portability. This research aims to find out the perception toward the application of a cloud-based healthcare system through a smart card in KSA. The research has compiled the countries using a smart card or smart healthcare card and indicated the potential benefits of implementing smart healthcare cards. 120 participants from Riyadh city were surveyed by the means of a closed-ended questionnaire. Data were analyzed through SPSS. This research extends the research body in the healthcare system. Empirical evidence regarding smart healthcare cards is scarce and hence undertaken in this study. The study provides a useful insight into collecting, storing, analyzing, manipulating, and accessibility of medical information regarding smart healthcare cards. Research findings can help achieve KSA's Vision 2030 goals in terms of the digitalization of healthcare systems in improving its efficiency and effectiveness in storing and accessing healthcare data.Keywords: smart card technology, healthcare using smart cards, smart healthcare cards, KSA healthcare information system, cloud-based healthcare cards
Procedia PDF Downloads 163913 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 154912 Developing a Knowledge-Based Lean Six Sigma Model to Improve Healthcare Leadership Performance
Authors: Yousuf N. Al Khamisi, Eduardo M. Hernandez, Khurshid M. Khan
Abstract:
Purpose: This paper presents a model of a Knowledge-Based (KB) using Lean Six Sigma (L6σ) principles to enhance the performance of healthcare leadership. Design/methodology/approach: Using L6σ principles to enhance healthcare leaders’ performance needs a pre-assessment of the healthcare organisation’s capabilities. The model will be developed using a rule-based approach of KB system. Thus, KB system embeds Gauging Absence of Pre-requisite (GAP) for benchmarking and Analytical Hierarchy Process (AHP) for prioritization. A comprehensive literature review will be covered for the main contents of the model with a typical output of GAP analysis and AHP. Findings: The proposed KB system benchmarks the current position of healthcare leadership with the ideal benchmark one (resulting from extensive evaluation by the KB/GAP/AHP system of international leadership concepts in healthcare environments). Research limitations/implications: Future work includes validating the implementation model in healthcare environments around the world. Originality/value: This paper presents a novel application of a hybrid KB combines of GAP and AHP methodology. It implements L6σ principles to enhance healthcare performance. This approach assists healthcare leaders’ decision making to reach performance improvement against a best practice benchmark.Keywords: Lean Six Sigma (L6σ), Knowledge-Based System (KBS), healthcare leadership, Gauge Absence Prerequisites (GAP), Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 167911 A Clear Language Is Essential: A Qualitative Exploration of Doctor-Patient Health Interaction in Jordan
Authors: Etaf Khlaed Haroun Alkhlaifat
Abstract:
When doctors and patients do not share the same first language, language barriers may exist, which may have negative effects on the quality of communication and care provided. Doctors’ use of medical jargon and patients’ inability to fully express their illness, to a potential loss of relevant information can often create misunderstanding. This study sought to examine the extent to which a lack of “common” language represents one of the linguistic obstacles that may adversely influence the quality of healthcare services in Jordan. Communication Accommodation Theory (CAT) was used to interpret the phenomena under study. Doctors (n=9) and patients (n=18) were observed and interviewed in natural Jordanian medical settings. A thematic qualitative approach was employed to analyse the data. The preliminary findings of the study revealed that most doctors appeared to have a good sense of appropriate ways to break through communication barriers by changing medical terminologies or jargons into lay terms. However, for some, there were two main challenges: 1) the use of medical jargon in explaining medication and side effects and 2) the lack of patients’ knowledge in providing a full explanation about their illnesses. The study revealed that language barriers adversely affect health outcomes for patients with limited fluency in the English language. It argues that it is doctors’ responsibility to guarantee mutual understanding, educate patients on their condition and improve their health outcomes.Keywords: communication accommodation theory, doctor-patient interaction, language barrier, medical jargon, misunderstanding
Procedia PDF Downloads 87910 Retrospective Insight on the Changing Status of the Romanian Language Spoken in the Republic of Moldova
Authors: Gina Aurora Necula
Abstract:
From its transformation into a taboo and its hiding under the so-called “Moldovan language” or under the euphemistic expression “state language” to its regained status recognition as an official language, the Romanian language spoken in the Republic of Moldova has undergone impressive reforms in the last 60 years. Meant to erase the awareness of citizens’ ethnic identity and turn a majority language into a minority one, all the laws and regulations issued on the field succeeded into setting numerous barriers for speakers of Romanian. Either manifested as social constraints or materialized into assumed rejection of mother tongue usage, all these laws have demonstrated their usefulness and major impact on the Romanian-speaking population. This article is the result of our research carried out over 10 years with the support of students, and Moldovan citizens, from the master's degree program "Romanian language - identity and cultural awareness." We present here a retrospective insight of the reforms, laws, and regulations that contributed to the shifted status of the Romanian language from the official language, seen as the language of common use both in the public and private spheres, in the minority language that surrendered its privileged place to the Russian language, firstly in the public sphere, and then, slowly but surely, in the private sphere. Our main goal here is to identify and make speakers understand what the barriers to learning Romanian language are nowadays when the social pressure on using Russian no longer exists.Keywords: linguistic barriers, lingua franca, private sphere, public sphere, reformation
Procedia PDF Downloads 117909 The Role of Police in Counterinsurgency: A Case Study of Tripura
Authors: Yagnik Patel
Abstract:
This paper will analyze and explain two main objectives. First, it will examine the emergence of the insurgency in the state of Tripura. The State of Tripura was facing the full blow of insurgency problem since 1978 after the formation of Tripura National Volunteers (TNV). But, the roots of this insurgency were found even before 1978. This study will analyze the roots and trajectory of insurgency in the Tripura. Second, it will examine the role played by the police in counterinsurgency in the State of Tripura. Even though state police are mandated for the maintenance of the law and order and public order (like every police), the state police of Tripura have played a significant role in curbing the insurgency by enhancing their counterinsurgency (COIN) capabilities and re-structuring the new comprehensive COIN doctrine. And by the end of May 2015, the State Government has lifted The Armed Forces (Special Powers) Act (AFSPA) from the State of Tripura, as declaiming of the violence. The fight against the insurgency, usually done by the military or para-military, but nowadays the police organization is also becoming a vital state apparatus. After Punjab police and Andhra Pradesh police, Tripura police have also successfully curbed the insurgency from the state. This was the third time when successful counterinsurgency did by the state police in India. This has shown the importance of the police in the fight against the insurgency. In this regard, this paper will use both quantitative and qualitative research methods for an explanatory case study to analyze and explain the roots, causes and the trajectory of insurgency in the state of Tripura and the role played by the police in COIN in Tripura. Along with this, the paper will also examine the successful ‘Police Model of Tripura’.Keywords: counterinsurgency, insurgency, police, Tripura state rifles
Procedia PDF Downloads 190908 Application of the Global Optimization Techniques to the Optical Thin Film Design
Authors: D. Li
Abstract:
Optical thin films are used in a wide variety of optical components and there are many software tools programmed for advancing multilayer thin film design. The available software packages for designing the thin film structure may not provide optimum designs. Normally, almost all current software programs obtain their final designs either from optimizing a starting guess or by technique, which may or may not involve a pseudorandom process, that give different answers every time, depending upon the initial conditions. With the increasing power of personal computers, functional methods in optimization and synthesis of optical multilayer systems have been developed such as DGL Optimization, Simulated Annealing, Genetic Algorithms, Needle Optimization, Inductive Optimization and Flip-Flop Optimization. Among these, DGL Optimization has proved its efficiency in optical thin film designs. The application of the DGL optimization technique to the design of optical coating is presented. A DGL optimization technique is provided, and its main features are discussed. Guidelines on the application of the DGL optimization technique to various types of design problems are given. The innovative global optimization strategies used in a software tool, OnlyFilm, to optimize multilayer thin film designs through different filter designs are outlined. OnlyFilm is a powerful, versatile, and user-friendly thin film software on the market, which combines optimization and synthesis design capabilities with powerful analytical tools for optical thin film designers. It is also the only thin film design software that offers a true global optimization function.Keywords: optical coatings, optimization, design software, thin film design
Procedia PDF Downloads 316907 A Neural Network Control for Voltage Balancing in Three-Phase Electric Power System
Authors: Dana M. Ragab, Jasim A. Ghaeb
Abstract:
The three-phase power system suffers from different challenging problems, e.g. voltage unbalance conditions at the load side. The voltage unbalance usually degrades the power quality of the electric power system. Several techniques can be considered for load balancing including load reconfiguration, static synchronous compensator and static reactive power compensator. In this work an efficient neural network is designed to control the unbalanced condition in the Aqaba-Qatrana-South Amman (AQSA) electric power system. It is designed for highly enhanced response time of the reactive compensator for voltage balancing. The neural network is developed to determine the appropriate set of firing angles required for the thyristor-controlled reactor to balance the three load voltages accurately and quickly. The parameters of AQSA power system are considered in the laboratory model, and several test cases have been conducted to test and validate the proposed technique capabilities. The results have shown a high performance of the proposed Neural Network Control (NNC) technique for correcting the voltage unbalance conditions at three-phase load based on accuracy and response time.Keywords: three-phase power system, reactive power control, voltage unbalance factor, neural network, power quality
Procedia PDF Downloads 197906 Dynamics of India's Nuclear Identity
Authors: Smita Singh
Abstract:
Through the constructivist perspective, this paper explores the transformation of India’s nuclear identity from an irresponsible nuclear weapon power to a ‘de-facto nuclear power’ in the emerging international nuclear order From a nuclear abstainer to a bystander and finally as a ‘de facto nuclear weapon state’, India has put forth its case as a unique and exceptional nuclear power as opposed to Iran, Iraq and North Korea with similar nuclear ambitions, who have been snubbed as ‘rogue states’ by the international community. This paper investigates the reasons behind international community’s gradual acceptance of India’s nuclear weapons capabilities and nuclear identity after the Indo-U.S. Nuclear Deal. In this paper, the central concept of analysis is the inter-subjective nature of identity in the nuclear arena. India’s nuclear behaviour has been discursively constituted by India through evolving images of the ‘self’ and the ‘other.’ India’s sudden heightened global status is not solely the consequence of its 1998 nuclear tests but a calibrated projection as a responsible stakeholder in other spheres such as economic potential, market prospects, democratic credentials and so on. By examining India’s nuclear discourse this paper contends that India has used its material and discursive power in presenting a n striking image as a responsible nuclear weapon power (though not yet a legal nuclear weapon state as per the NPT). By historicising India’s nuclear trajectory through an inter-subjective analysis of identities, this paper moves a step ahead in providing a theoretical interpretation of state actions and nuclear identity construction.Keywords: nuclear identity, India, constructivism, international stakeholder
Procedia PDF Downloads 440905 Utilization of Composite Components for Land Vehicle Systems: A Review
Authors: Kivilcim Ersoy, Cansu Yazganarikan
Abstract:
In recent years, composite materials are more frequently utilized not only in aviation but also in automotive industry due to its high strength to weight ratio, fatigue and corrosion resistances as well as better performances in specific environments. The market demand also favors lightweight design for wheeled and tracked armored vehicles due to the increased demand for land and amphibious mobility features. This study represents the current application areas and trends in automotive, bus and armored land vehicles industries. In addition, potential utilization areas of fiber composite and hybrid material concepts are being addressed. This work starts with a survey of current applications and patent trends of composite materials in automotive and land vehicle industries. An intensive investigation is conducted to determine the potential of these materials for application in land vehicle industry, where small series production dominates and challenging requirements are concerned. In the end, potential utilization areas for combat land vehicle systems are offered. By implementing these light weight solutions with alternative materials and design concepts, it is possible to achieve drastic weight reduction, which will enable both land and amphibious mobility without unyielding stiffness and survivability capabilities.Keywords: land vehicle, composite, light-weight design, armored vehicle
Procedia PDF Downloads 464904 Impact of Homestay Tourism on the Traditional Lifestyle and Culture of the Indigenous Tharu People: A Case Study of Nepal
Authors: Durga Prasad Neupane
Abstract:
This study investigates the impacts of homestay tourism on the traditional lifestyle and culture of the indigenous Tharu people in Nepal. It explores how this form of tourism has influenced the lives of Tharu individuals and their community as a whole. The study delves into the effects of tourism on various aspects, including language, socio-economic development, and cultural promotion and revival. Employing a qualitative approach and a case study design, the study gathers in-depth and comprehensive data on the impacts of homestay tourism on the Amaltari Tharu community. Building rapport with respondents, including homestay management committees, Tharu homestay owners, and non-Tharu residents, is achieved through various channels like personal interactions, phone conversations, and repeated visits. The research further combines document analysis with in-depth interviews to glean diverse perspectives and insights. The study's findings reveal that while homestay tourism presents challenges, it also holds significant potential for promoting and revitalizing the Tharu culture. Tourism has not only fostered the flourishing of Tharu traditions but has also contributed to improved educational opportunities within the community. However, the study recognizes the influence of globalization in driving changes to Tharu customs and rituals, potentially leading to a new form of cultural colonization. In this context, homestay tourism emerges as a crucial tool for preserving and revitalizing the unique ethnic identity and traditions of the Amaltari Tharu community.Keywords: homestay, tourism, Tharu culture, cultural revival, linguistic variations
Procedia PDF Downloads 31903 Morpho-Syntactic Analysis of Temporal Realities in Esan and English Languages
Authors: Oremire Judith Ehibor, Goddy Uwa Osimen, Rebecca Uduakobong Adesiyan
Abstract:
Temporal realities/expressions are crucial in human conversations, and they vary across languages. This study assesses areas of temporal realities. It examines how tense and aspect are marked in Esan and English languages and uncovers temporal expressions. Esan language, an indigenous language within the Edo linguistic group in Nigeria, exhibits a different structural system of tense aspects from that of the English language. The different representations, usage, and flow of these elements may possibly impinge on usage, which could result in limited usage by Esan-English learners. Theoretical insights are drawn from Chomsky’s Principles and Parameters of the Universal Grammar, with the descriptive method of analysis employed. Findings revealed that temporal realities in both languages vary in representation and usage; identifying the differences would enable effective usage and avoid any challenge in the morphosyntactic analysis of these aspects. Given this insight, the study recommends improved teaching and learning strategies by providing teaching resources that highlight differences in Esan and English tense and aspect. Educators should first identify the differences that exist before teaching. This should be sufficiently handled, as it would enable improved learning and effective usage, as well as avoid challenging morphosyntactic analysis. The study concludes that understanding the varying temporal realities of both languages would enhance effective usage and curb unnecessary generalisations.Keywords: tense, aspect, Esan and English languages, principles and parameters
Procedia PDF Downloads 0902 Concept for Determining the Focus of Technology Monitoring Activities
Authors: Guenther Schuh, Christina Koenig, Nico Schoen, Markus Wellensiek
Abstract:
Identification and selection of appropriate product and manufacturing technologies are key factors for competitiveness and market success of technology-based companies. Therefore many companies perform technology intelligence (TI) activities to ensure the identification of evolving technologies at the right time. Technology monitoring is one of the three base activities of TI, besides scanning and scouting. As the technological progress is accelerating, more and more technologies are being developed. Against the background of limited resources it is therefore necessary to focus TI activities. In this paper, we propose a concept for defining appropriate search fields for technology monitoring. This limitation of search space leads to more concentrated monitoring activities. The concept will be introduced and demonstrated through an anonymized case study conducted within an industry project at the Fraunhofer Institute for Production Technology. The described concept provides a customized monitoring approach, which is suitable for use in technology-oriented companies especially those that have not yet defined an explicit technology strategy. It is shown in this paper that the definition of search fields and search tasks are suitable methods to define topics of interest and thus to direct monitoring activities. Current as well as planned product, production and material technologies as well as existing skills, capabilities and resources form the basis of the described derivation of relevant search areas. To further improve the concept of technology monitoring the proposed concept should be extended during future research e.g. by the definition of relevant monitoring parameters.Keywords: monitoring radar, search field, technology intelligence, technology monitoring
Procedia PDF Downloads 474901 A Low Cost Non-Destructive Grain Moisture Embedded System for Food Safety and Quality
Authors: Ritula Thakur, Babankumar S. Bansod, Puneet Mehta, S. Chatterji
Abstract:
Moisture plays an important role in storage, harvesting and processing of food grains and related agricultural products. It is an important characteristic of most agricultural products for maintenance of quality. Accurate knowledge of the moisture content can be of significant value in maintaining quality and preventing contamination of cereal grains. The present work reports the design and development of microcontroller based low cost non-destructive moisture meter, which uses complex impedance measurement method for moisture measurement of wheat using parallel plate capacitor arrangement. Moisture can conveniently be sensed by measuring the complex impedance using a small parallel-plate capacitor sensor filled with the kernels in-between the two plates of sensor, exciting the sensor at 30 KHz and 100 KHz frequencies. The effects of density and temperature variations were compensated by providing suitable compensations in the developed algorithm. The results were compared with standard dry oven technique and the developed method was found to be highly accurate with less than 1% error. The developed moisture meter is low cost, highly accurate, non-destructible method for determining the moisture of grains utilizing the fast computing capabilities of microcontroller.Keywords: complex impedance, moisture content, electrical properties, safety of food
Procedia PDF Downloads 463900 Automation of AAA Game Development Using AI
Authors: Branden Heng, Harsheni Siddharthan, Allison Tseng, Paul Toprac, Sarah Abraham, Etienne Vouga
Abstract:
The goal of this project was to evaluate and document the capabilities and limitations of AI tools for empowering small teams to create high-budget, high-profile (AAA) 3D games typically developed by large studios. Two teams of novice game developers attempted to create two different games using AI and Unreal Engine 5.3. First, the teams evaluated 60 AI art, design, sound, and programming tools by considering their capability, ease of use, cost, and license restrictions. Then, the teams used a shortlist of 12 AI tools for game development. During this process, the following tools were found to be the most productive: (i) ChatGPT 4.0 for both game and narrative concepts and documentation; (ii) Dall-E 3 and OpenArt for concept art; (iii) Beatoven for music drafting; (iv) ChatGPT 4.0 and Github Copilot for generating simple code and to complement human-made tutorials as an additional learning resource. While current generative AI may appear impressive at first glance, the assets they produce fall short of AAA industry standards. Generative AI tools are helpful when brainstorming ideas such as concept art and basic storylines, but they still cannot replace human input or creativity at this time. Regarding programming, AI can only effectively generate simple code and act as an additional learning resource. Thus, generative AI tools are, at best, tools to enhance developer productivity rather than as a system to replace developers.Keywords: AAA games, AI, automation tools, game development
Procedia PDF Downloads 28899 Building Intercultural Competence in English Language Learners: Practices and Materials of Cultural-Based Language Teaching
Authors: Randa Alahmadi
Abstract:
Because the world has become a global village, English is not only used by native speakers, but also by non-native speakers from culturally diverse backgrounds. Even though learning a second/foreign language requires development of the four skills: reading, writing, listening, and speaking, there is also an intertwined relationship between language and culture, making it difficult to teach language without knowing the cultural context in which it is to be used. In the past decade, the number of international students enrolled in universities around the world has increased significantly. Having the urge to communicate effectively would serve as a motivation for both international and domestic students. The teaching of culture is important because linguistic competence is not enough for successful communication with speakers of other languages. Therefore, whether teaching natives or non-natives, students need to improve their cross-cultural communication skills and become culturally prepared to communicate successfully with people from other cultures. Teachers can equip their students for this environment by giving them appropriate knowledge and skills for effective intercultural communication. This paper will focus on the importance of intercultural communicative competence and its role in developing students’ understanding of diverse cultures as part of learning foreign/second languages. It will also explain how teachers can decide which culture should be taught: the target culture, the learners’ culture, or both. Moreover, practical and effective techniques that can be used in cultural-based language teaching will be shared.Keywords: cultural-based language teaching, English as a lingua franca, English language learners, intercultural communicative competence
Procedia PDF Downloads 328898 The Political Biographies of Social Workers: A Qualitative Study of the Political Lives of Social Workers
Authors: Hefin Gwilym
Abstract:
This paper will explore the political biographies of social workers in a neoliberal era. The findings are based on a research project for a successfully completed professional doctorate in social work. The methodology deployed for the research is a combination of constructivist grounded theory and biographical inquiry. The paper will present findings from 14 biographical interviews and will focus on one case study of a participant whose life story is richly informed by political social work. The 14 participants reflect different genders, ethnic identities, cultural and linguistic identities, age and length of social work careers. The participants also reflect different forms of political engagement, such as, as political activists and members of political parties, including parliamentarians. The findings demonstrate how deeply ingrained the social work identity is amongst the participants and how their political identity has remained strongly social democratic in nature despite the many changes in the social work profession since the rise of neoliberalism as a thought collective and policy package. The individual case study will explore the early roots of political identity in the childhood and nurturing years and the interface with subsequent social work and political careers. It will also explore the evolution of the participant’s political identity in the social work career. The case study will also present findings on how the participant has contributed to the political field with policy involvement and initiatives. The presentation will conclude with a discussion on how this particular group of social workers can best contribute to the future direction of the social work profession.Keywords: political social work, political biographies, neoliberal, grounded theory
Procedia PDF Downloads 282897 Achieving High Renewable Energy Penetration in Western Australia Using Data Digitisation and Machine Learning
Authors: A. D. Tayal
Abstract:
The energy industry is undergoing significant disruption. This research outlines that, whilst challenging; this disruption is also an emerging opportunity for electricity utilities. One such opportunity is leveraging the developments in data analytics and machine learning. As the uptake of renewable energy technologies and complimentary control systems increases, electricity grids will likely transform towards dense microgrids with high penetration of renewable generation sources, rich in network and customer data, and linked through intelligent, wireless communications. Data digitisation and analytics have already impacted numerous industries, and its influence on the energy sector is growing, as computational capabilities increase to manage big data, and as machines develop algorithms to solve the energy challenges of the future. The objective of this paper is to address how far the uptake of renewable technologies can go given the constraints of existing grid infrastructure and provides a qualitative assessment of how higher levels of renewable energy penetration can be facilitated by incorporating even broader technological advances in the fields of data analytics and machine learning. Western Australia is used as a contextualised case study, given its abundance and diverse renewable resources (solar, wind, biomass, and wave) and isolated networks, making a high penetration of renewables a feasible target for policy makers over coming decades.Keywords: data, innovation, renewable, solar
Procedia PDF Downloads 367896 Traffic Analysis and Prediction Using Closed-Circuit Television Systems
Authors: Aragorn Joaquin Pineda Dela Cruz
Abstract:
Road traffic congestion is continually deteriorating in Hong Kong. The largest contributing factor is the increase in vehicle fleet size, resulting in higher competition over the utilisation of road space. This study proposes a project that can process closed-circuit television images and videos to provide real-time traffic detection and prediction capabilities. Specifically, a deep-learning model involving computer vision techniques for video and image-based vehicle counting, then a separate model to detect and predict traffic congestion levels based on said data. State-of-the-art object detection models such as You Only Look Once and Faster Region-based Convolutional Neural Networks are tested and compared on closed-circuit television data from various major roads in Hong Kong. It is then used for training in long short-term memory networks to be able to predict traffic conditions in the near future, in an effort to provide more precise and quicker overviews of current and future traffic conditions relative to current solutions such as navigation apps.Keywords: intelligent transportation system, vehicle detection, traffic analysis, deep learning, machine learning, computer vision, traffic prediction
Procedia PDF Downloads 103