Search results for: definite article error
3950 Brain Age Prediction Based on Brain Magnetic Resonance Imaging by 3D Convolutional Neural Network
Authors: Leila Keshavarz Afshar, Hedieh Sajedi
Abstract:
Estimation of biological brain age from MR images is a topic that has been much addressed in recent years due to the importance it attaches to early diagnosis of diseases such as Alzheimer's. In this paper, we use a 3D Convolutional Neural Network (CNN) to provide a method for estimating the biological age of the brain. The 3D-CNN model is trained by MRI data that has been normalized. In addition, to reduce computation while saving overall performance, some effectual slices are selected for age estimation. By this method, the biological age of individuals using selected normalized data was estimated with Mean Absolute Error (MAE) of 4.82 years.Keywords: brain age estimation, biological age, 3D-CNN, deep learning, T1-weighted image, SPM, preprocessing, MRI, canny, gray matter
Procedia PDF Downloads 1483949 The Impact of Project Management Approaches in Enhancing Entrepreneurial Growth: A Study Using the Theory of Planned Behaviour as a Lens to Understand
Authors: Akunna Agunwah, Kevin Gallimore, Kathryn Kinnmond
Abstract:
Entrepreneurship and project management are widely associated and seen as a vehicle for economic growth, but are studied separately. A few authors have considered the interconnectivity existing between these two fields, but relatively little empirical data currently exist in the literature. The purpose of the present empirical study is to explore whether successful entrepreneurs utilise project management approaches in enhancing enterprise growth by understanding the working practices and experiences of the entrepreneurs’ using the Theory of Planned Behaviour (TPB) as a lens. In order to understand those experiences, ten successful entrepreneurs in various business sectors in the North West of England were interviewed through a face-to-face semi-structured interview method. The collected audio tape-recorded data was transcribed and analysed using the deductive thematic technique (qualitative approach). The themes were viewed through the lens of Theory of Planned Behaviour to identify the three intentional antecedents (attitude, subjective norms, and perceived behavioural control) and to understand how they relate to the project management approaches (Planning, execution, and monitoring). The findings are twofold, the first evidence of the three intentional antecedents, which make up Theory of Planned Behaviour was present. Secondly, the analysis of project management approaches themes (planning, execution, and monitoring) using the lens of the theory of planned behaviour shows evidence of the three intentional antecedents. There were more than one intentional antecedents found in a particular project management theme, which indicates that the entrepreneur does utilise these approaches without categorising them into definite themes. However, the entrepreneur utilised these intentional antecedents as processes to enhanced business growth. In conclusion, the work presented here showed a way of understanding the interconnectivity between entrepreneurship and project management towards enhancing enterprise growth by examining the working practices and experiences of the successful entrepreneurs in the North-West England.Keywords: business growth, entrepreneurship, project management approaches, theory of planned behaviour
Procedia PDF Downloads 2053948 An Accurate Method for Phylogeny Tree Reconstruction Based on a Modified Wild Dog Algorithm
Authors: Essam Al Daoud
Abstract:
This study solves a phylogeny problem by using modified wild dog pack optimization. The least squares error is considered as a cost function that needs to be minimized. Therefore, in each iteration, new distance matrices based on the constructed trees are calculated and used to select the alpha dog. To test the suggested algorithm, ten homologous genes are selected and collected from National Center for Biotechnology Information (NCBI) databanks (i.e., 16S, 18S, 28S, Cox 1, ITS1, ITS2, ETS, ATPB, Hsp90, and STN). The data are divided into three categories: 50 taxa, 100 taxa and 500 taxa. The empirical results show that the proposed algorithm is more reliable and accurate than other implemented methods.Keywords: least square, neighbor joining, phylogenetic tree, wild dog pack
Procedia PDF Downloads 3203947 Approximating Fixed Points by a Two-Step Iterative Algorithm
Authors: Safeer Hussain Khan
Abstract:
In this paper, we introduce a two-step iterative algorithm to prove a strong convergence result for approximating common fixed points of three contractive-like operators. Our algorithm basically generalizes an existing algorithm..Our iterative algorithm also contains two famous iterative algorithms: Mann iterative algorithm and Ishikawa iterative algorithm. Thus our result generalizes the corresponding results proved for the above three iterative algorithms to a class of more general operators. At the end, we remark that nothing prevents us to extend our result to the case of the iterative algorithm with error terms.Keywords: contractive-like operator, iterative algorithm, fixed point, strong convergence
Procedia PDF Downloads 5503946 The Impact of Varying the Detector and Modulation Types on Inter Satellite Link (ISL) Realizing the Allowable High Data Rate
Authors: Asmaa Zaki M., Ahmed Abd El Aziz, Heba A. Fayed, Moustafa H. Aly
Abstract:
ISLs are the most popular choice for deep space communications because these links are attractive alternatives to present day microwave links. This paper explored the allowable high data rate in this link over different orbits, which is affected by variation in modulation scheme and detector type. Moreover, the objective of this paper is to optimize and analyze the performance of ISL in terms of Q-factor and Minimum Bit Error Rate (Min-BER) based on different detectors comprising some parameters.Keywords: free space optics (FSO), field of view (FOV), inter satellite link (ISL), optical wireless communication (OWC)
Procedia PDF Downloads 3973945 Cooperative CDD scheme Based on Adaptive Modulation in Wireless Communiation System
Authors: Seung-Jun Yu, Hwan-Jun Choi, Hyoung-Kyu Song
Abstract:
Among spatial diversity scheme, orthogonal space-time block code (OSTBC) and cyclic delay diversity (CDD) have been widely studied for the cooperative wireless relaying system. However, conventional OSTBC and CDD cannot cope with change in the number of relays owing to low throughput or error performance. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation at the source and adaptive modulation based on cyclic redundancy check (CRC) code at the relays.Keywords: adaptive modulation, cooperative communication, CDD, OSTBC
Procedia PDF Downloads 4313944 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks
Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos
Abstract:
Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.Keywords: in-house networks, fiber optics, security risk, money
Procedia PDF Downloads 4203943 A Trapezoidal-Like Integrator for the Numerical Solution of One-Dimensional Time Dependent Schrödinger Equation
Authors: Johnson Oladele Fatokun, I. P. Akpan
Abstract:
In this paper, the one-dimensional time dependent Schrödinger equation is discretized by the method of lines using a second order finite difference approximation to replace the second order spatial derivative. The evolving system of stiff ordinary differential equation (ODE) in time is solved numerically by an L-stable trapezoidal-like integrator. Results show accuracy of relative maximum error of order 10-4 in the interval of consideration. The performance of the method as compared to an existing scheme is considered favorable.Keywords: Schrodinger’s equation, partial differential equations, method of lines (MOL), stiff ODE, trapezoidal-like integrator
Procedia PDF Downloads 4183942 Sexual Harassment at University: Male Students' Perspectives
Authors: Shakila Singh
Abstract:
Sexual harassment continues to be a problem both in educational institutions and workplaces with the main victims being women and the main perpetrators being men. The achievement of quality education demands to create safe learning spaces for all students and requires extensive and integrated interventions. This article draws on the data from a broader study that aims to create safer learning environments at university by addressing gender violence. It attempts to understand male students’ perspectives about their role in sexual harassment on the campus. It is a move away from interventions that place the responsibility of prevention of sexual harassment, on women. The study adopts an interpretive paradigm within a qualitative approach. The sample comprises twenty male university students who were purposively selected because they live in the campus residences. The main data generation methods included focus group discussions and individual interviews. Findings show that while many male students agree that victims of sexual harassment are mainly women, they also suggest that men are victims of sexual harassment by women. Male students have varying understandings of what constitutes sexual harassment. They position themselves as victims who feel harassed by women’s dress and behaviour. Male students also felt under pressure by sexual advances made by women that forced them to comply in order to protect their masculinity. This article argues that social norms of masculinity are powerful drivers of behaviour that play a key role in the perpetuation of sexual harassment. Male students who feel strongly against sexual harassment of female students are constrained by their masculinities in their ability to act against it. Effective interventions need to actively engage students in reflecting on and challenging social and cultural norms that contribute to violent expressions and to develop alternatives with them.Keywords: gender violence, male students, sexual harassment, university students
Procedia PDF Downloads 2113941 Life Expansion: Visual Autobiography, Identity, Representation and the Degrees of Fictionalization of the Self on Instagram
Authors: Pablo De Macedo Silveira Vallejos
Abstract:
This article aims to observe autobiographical and visual narrative practices among users on Instagram. In this way, the work proposes to reflect on how image resources are used to develop edited representations of the self in that social network. The research aims to explore the uses of editing and the degrees of fictionalization present on Instagram.Keywords: autobiography, visual narratives, representation, fiction, social media
Procedia PDF Downloads 753940 The Use of Social Media by Companies Operating on the Polish Market in the Context of the Corporate Reputation Management
Authors: Danuta Szwajca
Abstract:
Reputation The exponential growth of the Internet and social media (SM) in the recent years has contributed to changing the communication environment, in which stakeholders: customers, investors, business partners, employees, like their users, may post and distribute their opinions about the company and its products. This generates a number of potential threats to the image and reputation of both people and organizations. Social media create new opportunities not only for rapid and interactive communication but also for organizing themselves into strong pressure groups which may effectively affect the decisions of various organized bodies. Companies cannot ignore this fact and should use SM not only as an additional communication marketing channel but in a broader context - as a tool to build and protect their reputation. This article aims to identify the extent, scope, and directions of the use of SM in the activities of companies operating in the Polish market, as well as to identify threats and opportunities generated by the media in the area of reputation management. The results of research presented in the article showed that Polish companies recognize the potential of SM and try to apply them in their marketing efforts. However, his activity is limited only to maintain communication with customers through two portals: Facebook and Twitter. In the approach to the SM as a communication channel, the traditional way of thinking dominates, in which they are treated as just another promotional tool used by two departments: marketing and PR. This approach is called "silo" and is not integrated. This way of using SM does not allow effective building and protecting reputation in the Internet environment. To achieve this goal, the following research methods were used: the critical analysis of literature, analysis of secondary sources in a form of the report from the research conducted by Harvard Business Review Poland together with Capgemini Poland and case study.Keywords: corporate reputation, reputation management, social media, risk reputation
Procedia PDF Downloads 1963939 Unmanned Aerial Vehicle Use for Emergency Purpose
Authors: Shah S. M. A., Aftab U.
Abstract:
It is imperative in today’s world to get a real time information about different emergency situation occurred in the environment. Helicopters are mostly used to access places which are hard to access in emergencies like earthquake, floods, bridge failure or in any other disasters conditions. Use of helicopters are considered more costly to properly collect the data. Therefore a new technique has been introduced in this research to promptly collect data using drones. The drone designed in this research is based on trial and error experimental work with objective to construct an economical drone. Locally available material have been used for this purpose. And a mobile camera were also attached to prepare video during the flight. It was found that within very limited resources the result were quite successful.Keywords: UAV, real time, camera, disasters
Procedia PDF Downloads 2373938 Network Based Speed Synchronization Control for Multi-Motor via Consensus Theory
Authors: Liqin Zhang, Liang Yan
Abstract:
This paper addresses the speed synchronization control problem for a network-based multi-motor system from the perspective of cluster consensus theory. Each motor is considered as a single agent connected through fixed and undirected network. This paper presents an improved control protocol from three aspects. First, for the purpose of improving both tracking and synchronization performance, this paper presents a distributed leader-following method. The improved control protocol takes the importance of each motor’s speed into consideration, and all motors are divided into different groups according to speed weights. Specifically, by using control parameters optimization, the synchronization error and tracking error can be regulated and decoupled to some extent. The simulation results demonstrate the effectiveness and superiority of the proposed strategy. In practical engineering, the simplified models are unrealistic, such as single-integrator and double-integrator. And previous algorithms require the acceleration information of the leader available to all followers if the leader has a varying velocity, which is also difficult to realize. Therefore, the method focuses on an observer-based variable structure algorithm for consensus tracking, which gets rid of the leader acceleration. The presented scheme optimizes synchronization performance, as well as provides satisfactory robustness. What’s more, the existing algorithms can obtain a stable synchronous system; however, the obtained stable system may encounter some disturbances that may destroy the synchronization. Focus on this challenging technological problem, a state-dependent-switching approach is introduced. In the presence of unmeasured angular speed and unknown failures, this paper investigates a distributed fault-tolerant consensus tracking algorithm for a group non-identical motors. The failures are modeled by nonlinear functions, and the sliding mode observer is designed to estimate the angular speed and nonlinear failures. The convergence and stability of the given multi-motor system are proved. Simulation results have shown that all followers asymptotically converge to a consistent state when one follower fails to follow the virtual leader during a large enough disturbance, which illustrates the good performance of synchronization control accuracy.Keywords: consensus control, distributed follow, fault-tolerant control, multi-motor system, speed synchronization
Procedia PDF Downloads 1253937 Corporate Sustainability Practices in Asian Countries: Pattern of Disclosure and Impact on Financial Performance
Authors: Santi Gopal Maji, R. A. J. Syngkon
Abstract:
The changing attitude of the corporate enterprises from maximizing economic benefit to corporate sustainability after the publication of Brundtland Report has attracted the interest of researchers to investigate the sustainability practices of firms and its impact on financial performance. To enrich the empirical literature in Asian context, this study examines the disclosure pattern of corporate sustainability and the influence of sustainability reporting on financial performance of firms from four Asian countries (Japan, South Korea, India and Indonesia) that are publishing sustainability report continuously from 2009 to 2016. The study has used content analysis technique based on Global Reporting Framework (3 and 3.1) reporting framework to compute the disclosure score of corporate sustainability and its components. While dichotomous coding system has been employed to compute overall quantitative disclosure score, a four-point scale has been used to access the quality of the disclosure. For analysing the disclosure pattern of corporate sustainability, box plot has been used. Further, Pearson chi-square test has been used to examine whether there is any difference in the proportion of disclosure between the countries. Finally, quantile regression model has been employed to examine the influence of corporate sustainability reporting on the difference locations of the conditional distribution of firm performance. The findings of the study indicate that Japan has occupied first position in terms of disclosure of sustainability information followed by South Korea and India. In case of Indonesia, the quality of disclosure score is considerably less as compared to other three countries. Further, the gap between the quality and quantity of disclosure score is comparatively less in Japan and South Korea as compared to India and Indonesia. The same is evident in respect of the components of sustainability. The results of quantile regression indicate that a positive impact of corporate sustainability becomes stronger at upper quantiles in case of Japan and South Korea. But the study fails to extricate any definite pattern on the impact of corporate sustainability disclosure on the financial performance of firms from Indonesia and India.Keywords: corporate sustainability, quality and quantity of disclosure, content analysis, quantile regression, Asian countries
Procedia PDF Downloads 1943936 An Analysis of Millennials Using Secondhand Clothing as an Ongoing Fashion Trend
Authors: Patricia Sumod
Abstract:
There is a unique movement of fashion that features a trend around secondhand clothing. This is especially observed in the lifestyles of the millennials, where the concept of reusing apparel and accessories is noticeable and, therefore, slowly diminishing the high consumption of fast fashion and generating environmental awareness. This paper will focus on how this clothing trend influences and engages consumers in buying secondhand clothing and creating fashionable looks simultaneously. To further examine the millennials’ motivation towards consumption and using secondhand fashion, a concept as a trendsetter, this paper will take a closer look at their idea of concern for the environment. Considering second-hand clothing is a sustainable consumption practice, it will investigate the role of social influencers, trendsetters, and millennials in overall fashion consumption in this context. This study aims to understand how secondhand clothing and millennials differ from other consumers regarding the perception of fast-depleting natural resources, price sensitivity, vintage attachments, and psychographics. Secondly, the paper will also present the connection of emotion between millennials and secondhand clothing that may not be necessarily purchased but received. This study will reflect on the already identified influences in increased purchase behavior and an uncharted positive relationship between the consumer and the products. This behavior will further formulate into a habit by consumer segments, creating an expanded market for secondhand clothing. There is no definite indication that fast fashion will cease to exist, but slowing its rapid movement is an attempt to work toward a sustainable future. The conclusion will present possibilities for consumers to engage in C2C online interaction, thereby reinforcing a notable change in consumer behavior and attitude in contradiction to today’s extreme consumerism and willingness to be adaptable to a minimalist way of life. Fashion brands will then begin a new forecast to actively accommodate the new millennial concept of fashion that will advertise more concern than insatiability. The research will be with literature from various authors, insights provided by researchers on this new wave of consumers, and a qualitative approach with face-to-face interviews with a sample group who are in the practice of secondhand clothing consumption.Keywords: second-hand clothing, millennials, sustainability, consumption practice, fashion environment.
Procedia PDF Downloads 613935 Philosophy, Geometry, and Purpose in Islamic and Gothic Architecture as Two Religious-Based Styles
Authors: P. Nafisi Poor, P. Javid
Abstract:
Religion and divinity have always held important meaning to humans, and therefore it affects different aspects of life including art and architecture. Numerous works of art are related to religion whether supporting or denying it. Religion and religious scholars have influenced and changed art throughout history. This paper focuses on Islam and Christianity because these two religions have been the most discussed and most popular of all time, starting from the birth of Jesus to the arrival of Mohammad. Based on this popularity, these religions have influenced the arts and especially architecture. Islam on one hand changed Iranian and Arabian architecture and they applied it in different places around the world. From the appearance of Islam at 622 AD to this day, Islamic architecture has been evolving; however, one of the most important periods for this style was between 1501 AD and 1736 AD in Iran. Christianity, on the other hand, changed European architecture especially between 1150 AD and 1450 AD or the so-called "Gothic" era, which begins at medieval time and reaches its peak at International Gothic ages. At both of these periods, designing buildings based on spiritual concepts and divine statements reached its peak, and architects were considering God and religion as their center of attention. This article studies the focus on the religions of Islam and Christianity in terms of architecture and presents a general philosophy of both styles to comprehend the idea behind each one, followed by an analysis of their geometry and architectural aspects derived from the best examples, all to understand the purpose of each style and to realize, which one was more successful in reaching their purpose. Subsequently, a comprehensive review of each building is provided including 3D visualizations to help achieve the goal of the article. These studies can support diverse inquiries about both Islamic and Gothic architecture and can be used as a resource to support studies and research towards designing based on religion or for divine purposes.Keywords: architecture, Gothic, Islamic, religion
Procedia PDF Downloads 1393934 Selecting the Best RBF Neural Network Using PSO Algorithm for ECG Signal Prediction
Authors: Najmeh Mohsenifar, Narjes Mohsenifar, Abbas Kargar
Abstract:
In this paper, has been presented a stable method for predicting the ECG signals through the RBF neural networks, by the PSO algorithm. In spite of quasi-periodic ECG signal from a healthy person, there are distortions in electro cardiographic data for a patient. Therefore, there is no precise mathematical model for prediction. Here, we have exploited neural networks that are capable of complicated nonlinear mapping. Although the architecture and spread of RBF networks are usually selected through trial and error, the PSO algorithm has been used for choosing the best neural network. In this way, 2 second of a recorded ECG signal is employed to predict duration of 20 second in advance. Our simulations show that PSO algorithm can find the RBF neural network with minimum MSE and the accuracy of the predicted ECG signal is 97 %.Keywords: electrocardiogram, RBF artificial neural network, PSO algorithm, predict, accuracy
Procedia PDF Downloads 6273933 Design and Evaluation of a Prototype for Non-Invasive Screening of Diabetes – Skin Impedance Technique
Authors: Pavana Basavakumar, Devadas Bhat
Abstract:
Diabetes is a disease which often goes undiagnosed until its secondary effects are noticed. Early detection of the disease is necessary to avoid serious consequences which could lead to the death of the patient. Conventional invasive tests for screening of diabetes are mostly painful, time consuming and expensive. There’s also a risk of infection involved, therefore it is very essential to develop non-invasive methods to screen and estimate the level of blood glucose. Extensive research is going on with this perspective, involving various techniques that explore optical, electrical, chemical and thermal properties of the human body that directly or indirectly depend on the blood glucose concentration. Thus, non-invasive blood glucose monitoring has grown into a vast field of research. In this project, an attempt was made to device a prototype for screening of diabetes by measuring electrical impedance of the skin and building a model to predict a patient’s condition based on the measured impedance. The prototype developed, passes a negligible amount of constant current (0.5mA) across a subject’s index finger through tetra polar silver electrodes and measures output voltage across a wide range of frequencies (10 KHz – 4 MHz). The measured voltage is proportional to the impedance of the skin. The impedance was acquired in real-time for further analysis. Study was conducted on over 75 subjects with permission from the institutional ethics committee, along with impedance, subject’s blood glucose values were also noted, using conventional method. Nonlinear regression analysis was performed on the features extracted from the impedance data to obtain a model that predicts blood glucose values for a given set of features. When the predicted data was depicted on Clarke’s Error Grid, only 58% of the values predicted were clinically acceptable. Since the objective of the project was to screen diabetes and not actual estimation of blood glucose, the data was classified into three classes ‘NORMAL FASTING’,’NORMAL POSTPRANDIAL’ and ‘HIGH’ using linear Support Vector Machine (SVM). Classification accuracy obtained was 91.4%. The developed prototype was economical, fast and pain free. Thus, it can be used for mass screening of diabetes.Keywords: Clarke’s error grid, electrical impedance of skin, linear SVM, nonlinear regression, non-invasive blood glucose monitoring, screening device for diabetes
Procedia PDF Downloads 3253932 Need for Privacy in the Technological Era: An Analysis in the Indian Perspective
Authors: Amrashaa Singh
Abstract:
In the digital age and the large cyberspace, Data Protection and Privacy have become major issues in this technological era. There was a time when social media and online shopping websites were treated as a blessing for the people. But now the tables have turned, and the people have started to look at them with suspicion. They are getting aware of the privacy implications, and they do not feel as safe as they used to initially. When Edward Snowden informed the world about the snooping United States Security Agencies had been doing, that is when the picture became clear for the people. After the Cambridge Analytica case where the data of Facebook users were stored without their consent, the doubts arose in the minds of people about how safe they actually are. In India, the case of spyware Pegasus also raised a lot of concerns. It was used to snoop on a lot of human right activists and lawyers and the company which invented the spyware claims that it only sells it to the government. The paper will be dealing with the privacy concerns in the Indian perspective with an analytical methodology. The Supreme Court here had recently declared a right to privacy a Fundamental Right under Article 21 of the Constitution of India. Further, the Government is also working on the Data Protection Bill. The point to note is that India is still a developing country, and with the bill, the government aims at data localization. But there are doubts in the minds of many people that the Government would actually be snooping on the data of the individuals. It looks more like an attempt to curb dissenters ‘lawfully’. The focus of the paper would be on these issues in India in light of the European Union (EU) General Data Protection Regulation (GDPR). The Indian Data Protection Bill is also said to be loosely based on EU GDPR. But how helpful would these laws actually be is another concern since the economic and social conditions in both countries are very different? The paper aims at discussing these concerns, how good or bad is the intention of the government behind the bill, and how the nations can act together and draft common regulations so that there is some uniformity in the laws and their application.Keywords: Article 21, data protection, dissent, fundamental right, India, privacy
Procedia PDF Downloads 1143931 Language Transfer in Graduate Candidates’ Essays
Authors: Erika Martínez Lugo
Abstract:
Candidates to some graduate studies are asked to write essays in English to prove their competence to write essays and to do it in English. In the present study, language transfer (LT) in 15 written essays is identified, documented, analyzed, and classified. The essays were written in 2019, and the graduate program is a Masters in Modern Languages in a North-Western Mexican city border with USA. This study is of interest since it is important to determine whether or not some errors have been fossilized and have become mistakes, or if it is part of the candidates’ interlanguage. The results show that most language transfer is negative and syntactic, where the influence of candidates L1 (Spanish) is evident in their use of L2 (English).Keywords: language transfer, cross-linguistic influence, interlanguage, error vs mistake
Procedia PDF Downloads 1783930 Patchwork City: An Affective Map for a Patchwork Zone
Authors: Maria Lucília Borges
Abstract:
This article presents the creation and design process of the "patchwork map" made for the project “Santo Amaro em Rede” (Santo Amaro on Web). The project was carried out in 2009 by SESC – SP – Brazil (Social Service for the Commerce of São Paulo) in partnership with Instituto Pólis. It is a mapping of socio-cultural dynamics of São Paulo’s South Zone and neighboring municipalities.Keywords: affective map, cartography, São Paulo city, space, patchwork
Procedia PDF Downloads 3803929 The Finite Element Method for Nonlinear Fredholm Integral Equation of the Second Kind
Authors: Melusi Khumalo, Anastacia Dlamini
Abstract:
In this paper, we consider a numerical solution for nonlinear Fredholm integral equations of the second kind. We work with uniform mesh and use the Lagrange polynomials together with the Galerkin finite element method, where the weight function is chosen in such a way that it takes the form of the approximate solution but with arbitrary coefficients. We implement the finite element method to the nonlinear Fredholm integral equations of the second kind. We consider the error analysis of the method. Furthermore, we look at a specific example to illustrate the implementation of the finite element method.Keywords: finite element method, Galerkin approach, Fredholm integral equations, nonlinear integral equations
Procedia PDF Downloads 3773928 Using Pump as Turbine in Drinking Water Networks to Monitor and Control Water Processes Remotely
Authors: Sara Bahariderakhshan, Morteza Ahmadifar
Abstract:
Leakage is one of the most important problems that water distribution networks face which first reason is high-pressure existence. There are many approaches to control this excess pressure, which using pressure reducing valves (PRVs) or reducing pipe diameter are ones. In the other hand, Pumps are using electricity or fossil fuels to supply needed pressure in distribution networks but excess pressure are made in some branches due to topology problems and water networks’ variables therefore using pressure valves will be inevitable. Although using PRVs is inevitable but it leads to waste electricity or fuels used by pumps because PRVs just waste excess hydraulic pressure to lower it. Pumps working in reverse or Pumps as Turbine (called PaT in this article) are easily available and also effective sources of reducing the equipment cost in small hydropower plants. Urban areas of developing countries are facing increasing in area and maybe water scarcity in near future. These cities need wider water networks which make it hard to predict, control and have a better operation in the urban water cycle. Using more energy and, therefore, more pollution, slower repairing services, more user dissatisfaction and more leakage are these networks’ serious problems. Therefore, more effective systems are needed to monitor and act in these complicated networks than what is used now. In this article a new approach is proposed and evaluated: Using PAT to produce enough energy for remote valves and sensors in the water network. These sensors can be used to determine the discharge, pressure, water quality and other important network characteristics. With the help of remote valves pipeline discharge can be controlled so Instead of wasting excess hydraulic pressure which may be destructive in some cases, obtaining extra pressure from pipeline and producing clean electricity used by remote instruments is this articles’ goal. Furthermore due to increasing the area of the network there is unwanted high pressure in some critical points which is not destructive but lowering the pressure results to longer lifetime for pipeline networks without users’ dissatisfaction. This strategy proposed in this article, leads to use PaT widely for pressure containment and producing energy needed for remote valves and sensors like what happens in supervisory control and data acquisition (SCADA) systems which make it easy for us to monitor, receive data from urban water cycle and make any needed changes in discharge and pressure of pipelines easily and remotely. This is a clean project of energy production without significant environmental impacts and can be used in urban drinking water networks, without any problem for consumers which leads to a stable and dynamic network which lowers leakage and pollution.Keywords: new energies, pump as turbine, drinking water, distribution network, remote control equipments
Procedia PDF Downloads 4633927 Densities and Viscosities of Binary Mixture Containing Diethylamine and 2-Alkanol
Authors: Elham jassemi Zargani, Mohammad almasi
Abstract:
Densities and viscosities for binary mixtures of diethylamine + 2 Alkanol (2 propanol up to 2 pentanol) were measured over the entire composition range and temperature interval of 293.15 to 323.15 K. Excess molar volumes V_m^E and viscosity deviations Δη were calculated and correlated by the Redlich−Kister type function to derive the coefficients and estimate the standard error. For mixtures of diethylamine with used 2-alkanols, V_m^E and Δη are negative over the entire range of mole fraction. The observed variations of these parameters, with alkanols chain length and temperature, are discussed in terms of the inter-molecular interactions between the unlike molecules of the binary mixtures.Keywords: densities, viscosities, diethylamine, 2-alkanol, Redlich-Kister
Procedia PDF Downloads 3883926 Standards of Toxicity and Food Security in Brazil
Authors: Ana Luiza Da Gama E Souza
Abstract:
This article aims to discuss the problem of food insecurity in Brazil in what it refers to contamination of food by chemical substances such as herbicides, pesticides, and other contaminants. The issue will be faced by analyzing, on the one hand, the standards that guide the food system in the world and, on the other hand, human rights indicators whose purpose is to provide an effective monitoring of the State's obligations to guarantee food security, analyzing the implications of the former for the success of the latter. The methodology adopted in this article was bibliographic-documentary and consists of three moments of analysis. The first moment consists in the analysis of the reports of the Commission on Human Rights of the Organization of American States to identify the set of progress indicators developed by the Commission. This analysis will involve the new methodology used to evaluate the efficiency in monitoring food security in Brazil the case of using pesticides in the production of food at levels of toxicity not admitted by the inspection bodies. The second moment consists in evaluating the mechanism for monitoring food security in Brazil, which was initially established by the National Food Security Plan (PLANSAN) for 2012-2015 and improved by the II National Food Security Plan for 2016-2019. Those mechanisms were prepared by the Chamber (CAISAN), and have the function to compare the monitoring proposals with the results presented by CAISAN on the Indicators and Results Report of the National Plan for Food and Nutrition Security 2012-2015. The third moment was intended to understand, analyze and evaluate the standardization process of the agri-food system, especially regarding the level of toxicity standards, that is related to food safety monitoring as a guarantee of pesticide-free food. The results show the dependence between private standards of toxicity and the indicators of food safety that leads to inefficiency on monitoring that mechanism in Brazil.Keywords: standards, indicators, human rights, food security
Procedia PDF Downloads 3333925 Some Generalized Multivariate Estimators for Population Mean under Multi Phase Stratified Systematic Sampling
Authors: Muqaddas Javed, Muhammad Hanif
Abstract:
The generalized multivariate ratio and regression type estimators for population mean are suggested under multi-phase stratified systematic sampling (MPSSS) using multi auxiliary information. Estimators are developed under the two different situations of availability of auxiliary information. The expressions of bias and mean square error (MSE) are developed. Special cases of suggested estimators are also discussed and simulation study is conducted to observe the performance of estimators.Keywords: generalized estimators, multi-phase sampling, stratified random sampling, systematic sampling
Procedia PDF Downloads 7293924 The Right to Family Reunification of Immigrants in Spain
Authors: María José Benitez Jimenez
Abstract:
This study seeks to make clear the importance of family reunification in order to establish consolidated habits of coexistence of immigrants, directly favoring the relationship of the family nucleus and indirectly the social integration of foreigners. In addition to the theoretical analysis of the subject, information has been reviewed by the National Institute of Statistics and Reports of Spanish organizations that compile data on immigrants and specifically on family reunification. The Spanish regulations on foreigners include the right of foreigners legally residing in Spain to regroup their families. The general conditions required to exercise this right are having legally resided in Spain for one year and having obtained authorization to reside for one more year. There are exceptions to the requirement of having resided for one year in our country. Article 39 of the Spanish Constitution, although it does not express what is to be understood as a family, does refer to the fact that ‘the public authorities ensure the social, economic and legal protection of the family’. Therefore for the Spanish State, the family institution, in a broad sense, enjoys a privileged treatment that is revealed in the Supreme Norm and that reflects the interest of our society to address the relationships that subjects have in their immediate environment. Although we are aware of the reluctant position of the Spanish Constitutional Court to consider as a fundamental right the right to family life despite being enshrined in Article 8 of the European Convention on Human Rights, it is questionable whether access to authorization for family reunification should be more uniform in terms of requirements related to nationality, employment or training of applicants in order to have an egalitarian character. The requirement of having resided one year in Spain to be able to request successful family reunification seems dispensable because if foreigners can obviate this requirement by having a certain status, its abolition would be feasible by equating all situations and benefiting foreigners in general. The achievement of this proposal would help to strengthen the family life of immigrants from the beginning of their life in Spain.Keywords: family, immigrants, social integration, reunification
Procedia PDF Downloads 3493923 A New Approach to Predicting Physical Biometrics from Behavioural Biometrics
Authors: Raid R. O. Al-Nima, S. S. Dlay, W. L. Woo
Abstract:
A relationship between face and signature biometrics is established in this paper. A new approach is developed to predict faces from signatures by using artificial intelligence. A multilayer perceptron (MLP) neural network is used to generate face details from features extracted from signatures, here face is the physical biometric and signatures is the behavioural biometric. The new method establishes a relationship between the two biometrics and regenerates a visible face image from the signature features. Furthermore, the performance efficiencies of our new technique are demonstrated in terms of minimum error rates compared to published work.Keywords: behavioural biometric, face biometric, neural network, physical biometric, signature biometric
Procedia PDF Downloads 4753922 Using Pump as Turbine in Urban Water Networks to Control, Monitor, and Simulate Water Processes Remotely
Authors: Morteza Ahmadifar, Sarah Bahari Derakhshan
Abstract:
Leakage is one of the most important problems that water distribution networks face which first reason is high-pressure existence. There are many approaches to control this excess pressure, which using pressure reducing valves (PRVs) or reducing pipe diameter are ones. On the other hand, Pumps are using electricity or fossil fuels to supply needed pressure in distribution networks but excess pressure are made in some branches due to topology problems and water networks’ variables, therefore using pressure valves will be inevitable. Although using PRVs is inevitable but it leads to waste electricity or fuels used by pumps because PRVs just waste excess hydraulic pressure to lower it. Pumps working in reverse or Pumps as Turbine (called PAT in this article) are easily available and also effective sources of reducing the equipment cost in small hydropower plants. Urban areas of developing countries are facing increasing in area and maybe water scarcity in near future. These cities need wider water networks which make it hard to predict, control and have a better operation in the urban water cycle. Using more energy and therefore more pollution, slower repairing services, more user dissatisfaction and more leakage are these networks’ serious problems. Therefore, more effective systems are needed to monitor and act in these complicated networks than what is used now. In this article a new approach is proposed and evaluated: Using PAT to produce enough energy for remote valves and sensors in the water network. These sensors can be used to determine the discharge, pressure, water quality and other important network characteristics. With the help of remote valves pipeline discharge can be controlled so Instead of wasting excess hydraulic pressure which may be destructive in some cases, obtaining extra pressure from pipeline and producing clean electricity used by remote instruments is this articles’ goal. Furthermore, due to increasing the area of network there is unwanted high pressure in some critical points which is not destructive but lowering the pressure results to longer lifetime for pipeline networks without users’ dissatisfaction. This strategy proposed in this article, leads to use PAT widely for pressure containment and producing energy needed for remote valves and sensors like what happens in supervisory control and data acquisition (SCADA) systems which make it easy for us to monitor, receive data from urban water cycle and make any needed changes in discharge and pressure of pipelines easily and remotely. This is a clean project of energy production without significant environmental impacts and can be used in urban drinking water networks, without any problem for consumers which leads to a stable and dynamic network which lowers leakage and pollution.Keywords: clean energies, pump as turbine, remote control, urban water distribution network
Procedia PDF Downloads 3943921 Application of Artificial Neural Network to Prediction of Feature Academic Performance of Students
Authors: J. K. Alhassan, C. S. Actsu
Abstract:
This study is on the prediction of feature performance of undergraduate students with Artificial Neural Networks (ANN). With the growing decline in the quality academic performance of undergraduate students, it has become essential to predict the students’ feature academic performance early in their courses of first and second years and to take the necessary precautions using such prediction-based information. The feed forward multilayer neural network model was used to train and develop a network and the test carried out with some of the input variables. A result of 80% accuracy was obtained from the test which was carried out, with an average error of 0.009781.Keywords: academic performance, artificial neural network, prediction, students
Procedia PDF Downloads 468