Search results for: distant named entity recognition
1413 Morphological Characteristics and Pollination Requirement in Red Pitaya (Hylocereus Spp.)
Authors: Dinh Ha, Tran, Chung-Ruey Yen
Abstract:
This study explored the morphological characteristics and effects of pollination methods on fruit set and characteristics in four red pitaya (Hylocereus spp.) clones. The distinctive morphological recognition and classification among pitaya clones were confirmed by the stem, flower and fruit features. The fruit production season was indicated from the beginning of May to the end of August, the beginning of September with 6-7 flowering cycles per year. The floral stage took from 15-19 days and fruit duration spent 30–32 days. VN White, fully self-compatible, obtained high fruit set rates (80.0-90.5 %) in all pollination treatments and the maximum fruit weight (402.6 g) in hand self- and (403.4 g) in open-pollination. Chaozhou 5 was partially self-compatible while Orejona and F11 were completely self-incompatible. Hand cross-pollination increased significantly fruit set (95.8; 88.4 and 90.2 %) and fruit weight (374.2; 281.8 and 416.3 g) in Chaozhou 5, Orejona, and F11, respectively. TSS contents were not much influenced by pollination methods.Keywords: Hylocereus spp., morphology, floral phenology, pollination requirement
Procedia PDF Downloads 3041412 Selecting a Foreign Country to Build a Naval Base Using a Fuzzy Hybrid Decision Support System
Authors: Latif Yanar, Muammer Kaçan
Abstract:
Decision support systems are getting more important in many fields of science and technology and used effectively especially when the problems to be solved are complicated with many criteria. In this kind of problems one of the main challenges for the decision makers are that sometimes they cannot produce a countable data for evaluating the criteria but the knowledge and sense of experts. In recent years, fuzzy set theory and fuzzy logic based decision models gaining more place in literature. In this study, a decision support model to determine a country to build naval base is proposed and the application of the model is performed, considering Turkish Navy by the evaluations of Turkish Navy officers and academicians of international relations departments of various Universities located in Istanbul. The results achieved from the evaluations made by the experts in our model are calculated by a decision support tool named DESTEC 1.0, which is developed by the authors using C Sharp programming language. The tool gives advices to the decision maker using Analytic Hierarchy Process, Analytic Network Process, Fuzzy Analytic Hierarchy Process and Fuzzy Analytic Network Process all at once. The calculated results for five foreign countries are shown in the conclusion.Keywords: decision support system, analytic hierarchy process, fuzzy analytic hierarchy process, analytic network process, fuzzy analytic network process, naval base, country selection, international relations
Procedia PDF Downloads 5921411 Overview of a Quantum Model for Decision Support in a Sensor Network
Authors: Shahram Payandeh
Abstract:
This paper presents an overview of a model which can be used as a part of a decision support system when fusing information from multiple sensing environment. Data fusion has been widely studied in the past few decades and numerous frameworks have been proposed to facilitate decision making process under uncertainties. Multi-sensor data fusion technology plays an increasingly significant role during people tracking and activity recognition. This paper presents an overview of a quantum model as a part of a decision-making process in the context of multi-sensor data fusion. The paper presents basic definitions and relationships associating the decision-making process and quantum model formulation in the presence of uncertainties.Keywords: quantum model, sensor space, sensor network, decision support
Procedia PDF Downloads 2271410 Chocomerr (Merr Leaves Chocolate) Alternative Food in Increasing Breastmilk Quantity
Authors: Rara Wulan Anggareni, Narita Putri, Riski Septianing Astuti
Abstract:
Breastfeeding is a key to prevent mortality and morbidity in children. It is also the second highest risk responsible for Disability Adjusted Life Years (DALYs) among children below five years old. UNICEF estimates that during 1995 – 2003, there are only about 38% infants in developing countries who get to be exclusively breastfed during the first six months of their lives. According to Demography and Health Survey in Indonesia 2007, breastfeed practice rate still considered as low which is about 41%. One of the factors causing the low breastfeed practice rate in Indonesia is the anxiety and postpartum depression, and also the weanling dilemma in which mother feels that her breastmilk cannot suffice infant needs. Those factors finally resulting into low or even stopped production of breastmilk. Breastmilk production can be enhanced by consuming food containing phytosterol and lactogoga effect. Food with the highest phytosterol level is Sauropus androgynus (L.) Merr leaf (merr leaf). In this study, we made alternative food which named Chocomerr for breastfeeding mothers. Chocomerr consists of merr leaves which have lactogoga effect and chocolate for relaxation. Based on organoleptic tests conducted towards 2 age groups, which are 18 – 21 and 25 – 40 years old, this product gets good acceptance in taste, texture, and colour categories. Chocomerr can be used as an alternative way for increasing breastmilk production to aim for the decreasing number of DALYs among children aged under 5 years old.Keywords: breastfeeding, increasing, chocolate, merr leaves
Procedia PDF Downloads 4321409 Estimation of the Road Traffic Emissions and Dispersion in the Developing Countries Conditions
Authors: Hicham Gourgue, Ahmed Aharoune, Ahmed Ihlal
Abstract:
We present in this work our model of road traffic emissions (line sources) and dispersion of these emissions, named DISPOLSPEM (Dispersion of Poly Sources and Pollutants Emission Model). In its emission part, this model was designed to keep the consistent bottom-up and top-down approaches. It also allows to generate emission inventories from reduced input parameters being adapted to existing conditions in Morocco and in the other developing countries. While several simplifications are made, all the performance of the model results are kept. A further important advantage of the model is that it allows the uncertainty calculation and emission rate uncertainty according to each of the input parameters. In the dispersion part of the model, an improved line source model has been developed, implemented and tested against a reference solution. It provides improvement in accuracy over previous formulas of line source Gaussian plume model, without being too demanding in terms of computational resources. In the case study presented here, the biggest errors were associated with the ends of line source sections; these errors will be canceled by adjacent sections of line sources during the simulation of a road network. In cases where the wind is parallel to the source line, the use of the combination discretized source and analytical line source formulas minimizes remarkably the error. Because this combination is applied only for a small number of wind directions, it should not excessively increase the calculation time.Keywords: air pollution, dispersion, emissions, line sources, road traffic, urban transport
Procedia PDF Downloads 4421408 Control of Belts for Classification of Geometric Figures by Artificial Vision
Authors: Juan Sebastian Huertas Piedrahita, Jaime Arturo Lopez Duque, Eduardo Luis Perez Londoño, Julián S. Rodríguez
Abstract:
The process of generating computer vision is called artificial vision. The artificial vision is a branch of artificial intelligence that allows the obtaining, processing, and analysis of any type of information especially the ones obtained through digital images. Actually the artificial vision is used in manufacturing areas for quality control and production, as these processes can be realized through counting algorithms, positioning, and recognition of objects that can be measured by a single camera (or more). On the other hand, the companies use assembly lines formed by conveyor systems with actuators on them for moving pieces from one location to another in their production. These devices must be previously programmed for their good performance and must have a programmed logic routine. Nowadays the production is the main target of every industry, quality, and the fast elaboration of the different stages and processes in the chain of production of any product or service being offered. The principal base of this project is to program a computer that recognizes geometric figures (circle, square, and triangle) through a camera, each one with a different color and link it with a group of conveyor systems to organize the mentioned figures in cubicles, which differ from one another also by having different colors. This project bases on artificial vision, therefore the methodology needed to develop this project must be strict, this one is detailed below: 1. Methodology: 1.1 The software used in this project is QT Creator which is linked with Open CV libraries. Together, these tools perform to realize the respective program to identify colors and forms directly from the camera to the computer. 1.2 Imagery acquisition: To start using the libraries of Open CV is necessary to acquire images, which can be captured by a computer’s web camera or a different specialized camera. 1.3 The recognition of RGB colors is realized by code, crossing the matrices of the captured images and comparing pixels, identifying the primary colors which are red, green, and blue. 1.4 To detect forms it is necessary to realize the segmentation of the images, so the first step is converting the image from RGB to grayscale, to work with the dark tones of the image, then the image is binarized which means having the figure of the image in a white tone with a black background. Finally, we find the contours of the figure in the image to detect the quantity of edges to identify which figure it is. 1.5 After the color and figure have been identified, the program links with the conveyor systems, which through the actuators will classify the figures in their respective cubicles. Conclusions: The Open CV library is a useful tool for projects in which an interface between a computer and the environment is required since the camera obtains external characteristics and realizes any process. With the program for this project any type of assembly line can be optimized because images from the environment can be obtained and the process would be more accurate.Keywords: artificial intelligence, artificial vision, binarized, grayscale, images, RGB
Procedia PDF Downloads 3781407 The Role of Context in Interpreting Emotional Body Language in Robots
Authors: Jekaterina Novikova, Leon Watts
Abstract:
In the emerging world of human-robot interaction, people and robots will interact socially in real-world situations. This paper presents the results of an experimental study probing the interaction between situational context and emotional body language in robots. 34 people rated video clips of robots performing expressive behaviours in different situational contexts both for emotional expressivity on Valence-Arousal-Dominance dimensions and by selecting a specific emotional term from a list of suggestions. Results showed that a contextual information enhanced a recognition of emotional body language of a robot, although it did not override emotional signals provided by robot expressions. Results are discussed in terms of design guidelines on how an emotional body language of a robot can be used by roboticists developing social robots.Keywords: social robotics, non-verbal communication, situational context, artificial emotions, body language
Procedia PDF Downloads 2891406 Multi-Criteria Evaluation of IDS Architectures in Cloud Computing
Authors: Elmahdi Khalil, Saad Enniari, Mostapha Zbakh
Abstract:
Cloud computing promises to increase innovation and the velocity with witch applications are deployed, all while helping any enterprise meet most IT service needs at a lower total cost of ownership and higher return investment. As the march of cloud continues, it brings both new opportunities and new security challenges. To take advantages of those opportunities while minimizing risks, we think that Intrusion Detection Systems (IDS) integrated in the cloud is one of the best existing solutions nowadays in the field. The concept of intrusion detection was known since past and was first proposed by a well-known researcher named Anderson in 1980's. Since that time IDS's are evolving. Although, several efforts has been made in the area of Intrusion Detection systems for cloud computing environment, many attacks still prevail. Therefore, the work presented in this paper proposes a multi criteria analysis and a comparative study between several IDS architectures designated to work in a cloud computing environments. To achieve this objective, in the first place we will search in the state of the art of several consistent IDS architectures designed to work in a cloud environment. Whereas, in a second step we will establish the criteria that will be useful for the evaluation of architectures. Later, using the approach of multi criteria decision analysis Mac Beth (Measuring Attractiveness by a Categorical Based Evaluation Technique we will evaluate the criteria and assign to each one the appropriate weight according to their importance in the field of IDS architectures in cloud computing. The last step is to evaluate architectures against the criteria and collecting results of the model constructed in the previous steps.Keywords: cloud computing, cloud security, intrusion detection/prevention system, multi-criteria decision analysis
Procedia PDF Downloads 4721405 Battling the Final Stages of Genocide in Bosnia and Herzegovina: Denial and Triumphalism
Authors: Ehlimana Memisevic
Abstract:
Genocide denial is considered the final stage of genocide, which in the words of Gregory H. Stanton, represents "one of the most certain indicators of future genocides”. Genocide denial in Bosnia and Herzegovina started in 1992, almost simultaneously with the genocide itself. Over the course of the three decades, different forms of genocide and war crimes denial have been developed by state officials, politicians, journalists, and civilians, both in Republika Srpska – the Serb-dominated entity within Bosnia and Herzegovina – and Serbia. Moreover, genocide and war crimes are not only denied but also glorified and celebrated, which was described as "triumphalism" by the Australian-Bosnian scholar Hariz Halilovich who suggested it be added as the 11th phase of Gregory Stanton's "10 stages of genocide." Since 2007, there have been a number of attempts to criminalize genocide denial at the state level in Bosnia and Herzegovina. However, all of them were unsuccessful due to the opposition of representatives of Republika Srpska. On July 23, 2021, the High Representative in Bosnia and Herzegovina, Valentin Inzko, used his power as the final authority in overseeing the civil implementation of the Dayton Peace Accords to impose amendments to Bosnia and Herzegovina's criminal code to ban the denial and glorification of genocide, crimes against humanity and war crimes. However, immediately after the OHR's decision was announced, Milorad Dodik, a Serb member of Bosnia's tripartite presidency, held a press conference, publicly denied the genocide, and announced that this law would never be accepted in Republika Srpska. Denial remains explicit and public and is promulgated through official channels in Bosnia and Herzegovina. This paper will analyze the forms of genocide and other war crimes denial and glorification in the period after the amendments to the Criminal Code of Bosnia and Herzegovina were introduced, which include incrimination of public condoning, denial, gross trivialization or justification of a crime of genocide, crimes against humanity or a war crime established by a final adjudication of the international and domestic courts. We aim to determine the effect of the imposed law and the impact of the denial committed by high-ranking public officials on the denial and celebration of genocide and war crimes committed by ordinary citizens.Keywords: genocide, denial, triumphalism, incrimination
Procedia PDF Downloads 751404 An Optimized RDP Algorithm for Curve Approximation
Authors: Jean-Pierre Lomaliza, Kwang-Seok Moon, Hanhoon Park
Abstract:
It is well-known that Ramer Douglas Peucker (RDP) algorithm greatly depends on the method of choosing starting points. Therefore, this paper focuses on finding such starting points that will optimize the results of RDP algorithm. Specifically, this paper proposes a curve approximation algorithm that finds flat points, called essential points, of an input curve, divides the curve into corner-like sub-curves using the essential points, and applies the RDP algorithm to the sub-curves. The number of essential points play a role on optimizing the approximation results by balancing the degree of shape information loss and the amount of data reduction. Through experiments with curves of various types and complexities of shape, we compared the performance of the proposed algorithm with three other methods, i.e., the RDP algorithm itself and its variants. As a result, the proposed algorithm outperformed the others in term of maintaining the original shapes of the input curve, which is important in various applications like pattern recognition.Keywords: curve approximation, essential point, RDP algorithm
Procedia PDF Downloads 5351403 Human Trafficking and Terrorism: A Study on the Security Challenges Imposed upon Countries in Conflict
Authors: Christopher Holroyd
Abstract:
With the various terrorist organizations and drug cartels that are currently active, there is a myriad of security concerns facing countries around the world. Organizations that focus their attacks on others through terror, such as what is seen with the Islamic State of Iraq and the Levant (ISIS), have no boundaries when it comes to doing what is needed to fulfill their desired intent. For countries such as Iraq, who have been trying to rebuild their country since the fall of the Saddam Hussein Regime, organizations such as Al-Qaeda and ISIS have been impeding the country’s efforts toward peace and stability. One method utilized by terrorist organizations around the world is human trafficking. This method is one that is seen around the world; modern slavery is still exploited by those who have no concern for human decency and morality, their only concern is to achieve their goals by any means. It is understandable that some people may not have even heard of 'modern slavery', or they just might not believe that it is even an issue in today’s world. Organizations such as ISIS are not the only ones in the world that seek to benefit from the immoral trading of humans. Various drug cartels in the world, such as those seen in Mexico and Central America, have recently begun to take part in the trade – moving humans from state to state, or country to country, to better fuel their overall operations. This now makes the possibility of human trafficking more real for those in the United States because of the proximity of the cartels to the southern border of the country. An issue that, at one time, might have only seen as a distant threat, is now close to home for those in the United States. Looking at these two examples is how we begin to understand why human trafficking is utilized by various organizations around the world. This trade of human beings and the violation of basic human rights is a plague that effects the entire world and not just those that are in a country other than your own. One of the security issues that stem from the trade includes the movement and recruitment of members of the organizations. With individuals being smuggled from one location to another in secrecy, this only puts those trying to combat this trade at a disadvantage. This creates concern over the accurate number of potential recruits, combatants, and other individuals who are working against the host nation, and for the mission of the cartel or terrorist organization they are a part of. An uphill battle is created, and the goals of peace and stability are now harder to reach. Aside from security aspects, it cannot be forgotten that those being traded and forced into slavery, are being done so against their will. Families are separated, children trained to be fighters or worse. This makes the goal of eradicating human trafficking even more dire and important.Keywords: human trafficking, reconstruction, security, terrorism
Procedia PDF Downloads 1321402 Factors Associated with Hotel Employees’ Loyalty: A Case Study of Hotel Employees in Bangkok, Thailand
Authors: Kevin Wongleedee
Abstract:
This research paper was aimed to examine the reasons associated with hotel employees’ loyalty. This was a case study of 200 hotel employees in Bangkok, Thailand. The population of this study included all hotel employees who were working in Bangkok during January to March, 2014. Based on 200 respondents who answered the questionnaire, the data were complied by using SPSS. Mean and standard deviation were utilized in analyzing the data. The findings revealed that the average mean of importance was 4.40, with 0.7585 of standard deviation. Moreover, the mean average can be used to rank the level of importance from each factor as follows: 1) salary, service charge cut, and benefits, 2) career development and possible advancement, 3) freedom of working, thinking, and ability to use my initiative, 4) training opportunities, 5) social involvement and positive environment, 6) fair treatment in the workplace and fair evaluation of job performance, and 7) personal satisfaction, participation, and recognition.Keywords: hotel employees, loyalty, reasons, case study
Procedia PDF Downloads 4041401 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis
Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng
Abstract:
Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.Keywords: attribution trace, probabilistic relevance, network attack, attacker identification
Procedia PDF Downloads 3661400 Use of Socially Assistive Robots in Early Rehabilitation to Promote Mobility for Infants with Motor Delays
Authors: Elena Kokkoni, Prasanna Kannappan, Ashkan Zehfroosh, Effrosyni Mavroudi, Kristina Strother-Garcia, James C. Galloway, Jeffrey Heinz, Rene Vidal, Herbert G. Tanner
Abstract:
Early immobility affects the motor, cognitive, and social development. Current pediatric rehabilitation lacks the technology that will provide the dosage needed to promote mobility for young children at risk. The addition of socially assistive robots in early interventions may help increase the mobility dosage. The aim of this study is to examine the feasibility of an early intervention paradigm where non-walking infants experience independent mobility while socially interacting with robots. A dynamic environment is developed where both the child and the robot interact and learn from each other. The environment involves: 1) a range of physical activities that are goal-oriented, age-appropriate, and ability-matched for the child to perform, 2) the automatic functions that perceive the child’s actions through novel activity recognition algorithms, and decide appropriate actions for the robot, and 3) a networked visual data acquisition system that enables real-time assessment and provides the means to connect child behavior with robot decision-making in real-time. The environment was tested by bringing a two-year old boy with Down syndrome for eight sessions. The child presented delays throughout his motor development with the current being on the acquisition of walking. During the sessions, the child performed physical activities that required complex motor actions (e.g. climbing an inclined platform and/or staircase). During these activities, a (wheeled or humanoid) robot was either performing the action or was at its end point 'signaling' for interaction. From these sessions, information was gathered to develop algorithms to automate the perception of activities which the robot bases its actions on. A Markov Decision Process (MDP) is used to model the intentions of the child. A 'smoothing' technique is used to help identify the model’s parameters which are a critical step when dealing with small data sets such in this paradigm. The child engaged in all activities and socially interacted with the robot across sessions. With time, the child’s mobility was increased, and the frequency and duration of complex and independent motor actions were also increased (e.g. taking independent steps). Simulation results on the combination of the MDP and smoothing support the use of this model in human-robot interaction. Smoothing facilitates learning MDP parameters from small data sets. This paradigm is feasible and provides an insight on how social interaction may elicit mobility actions suggesting a new early intervention paradigm for very young children with motor disabilities. Acknowledgment: This work has been supported by NIH under grant #5R01HD87133.Keywords: activity recognition, human-robot interaction, machine learning, pediatric rehabilitation
Procedia PDF Downloads 2921399 Different Goals and Strategies of Smart Cities: Comparative Study between European and Asian Countries
Authors: Yountaik Leem, Sang Ho Lee
Abstract:
In this paper, different goals and the ways to reach smart cities shown in many countries during planning and implementation processes will be discussed. Each country dealt with technologies which have been embedded into space as development of ICTs (information and communication technologies) for their own purposes and by their own ways. For example, European countries tried to adapt technologies to reduce greenhouse gas emission to overcome global warming while US-based global companies focused on the way of life using ICTs such as EasyLiving of Microsoft™ and CoolTown of Hewlett-Packard™ during last decade of 20th century. In the North-East Asian countries, urban space with ICTs were developed in large scale on the viewpoint of capitalism. Ubiquitous city, first introduced in Korea which named after Marc Weiser’s concept of ubiquitous computing pursued new urban development with advanced technologies and high-tech infrastructure including wired and wireless network. Japan has developed smart cities as comprehensive and technology intensive cities which will lead other industries of the nation in the future. Not only the goals and strategies but also new directions to which smart cities are oriented also suggested at the end of the paper. Like a Finnish smart community whose slogan is ‘one more hour a day for citizens,’ recent trend is forwarding everyday lives and cultures of human beings, not capital gains nor physical urban spaces.Keywords: smart cities, urban strategy, future direction, comparative study
Procedia PDF Downloads 2621398 “Congratulations, I Am Sorry for Your Loss”. A Qualitative Study to Help Healthcare Providers Search for Words When a Baby Dies
Authors: Liesbeth Van Kelst, Jozefiene Jansens
Abstract:
Background: All care providers within mother and child care are confronted, at some point in their career, with the care for parents who (will) lose or have lost a baby. Obtaining the correct attitude and communicating well during these difficult moments are aspects that many healthcare provides continue to struggle with. Parents still encounter well-intentioned but inappropriate communication from healthcare providers. Aim: To study how communication, both verbal and non-verbal, around the death of a baby during pregnancy, birth, or in the first ten days postnatal was experienced by parents and healthcare providers. Methods: A qualitative study using grounded theory principles was conducted. Data were collected through 22 individual face-to-face in-depth interviews with parents who had lost a baby (n = 12) and intramural caregivers, such as midwives, nurses, gynecologists and neonatologists (n=10). In the first phase, data were analyzed within each group separately (parents and healthcare providers) and in the second phase, findings from both groups were compared and analyzed according to meta-synthesis principles. Results: The themes that emerged from the data demonstrated congruent experiences between the group of the parents and the health care providers. Both strengths and weaknesses in current care were named and suggestions for appropriate communication were formulated. Conclusion: Since most health care providers only occasionally care for parents with a deceased baby, a communication tool can optimize communication between healthcare professionals and parents who lose a baby. This is very important as the words which are said at this difficult period last a lifetime in the heads of parents.Keywords: communication, death, perinatal loss, stillbirth
Procedia PDF Downloads 2251397 A Deep Reinforcement Learning-Based Secure Framework against Adversarial Attacks in Power System
Authors: Arshia Aflaki, Hadis Karimipour, Anik Islam
Abstract:
Generative Adversarial Attacks (GAAs) threaten critical sectors, ranging from fingerprint recognition to industrial control systems. Existing Deep Learning (DL) algorithms are not robust enough against this kind of cyber-attack. As one of the most critical industries in the world, the power grid is not an exception. In this study, a Deep Reinforcement Learning-based (DRL) framework assisting the DL model to improve the robustness of the model against generative adversarial attacks is proposed. Real-world smart grid stability data, as an IIoT dataset, test our method and improves the classification accuracy of a deep learning model from around 57 percent to 96 percent.Keywords: generative adversarial attack, deep reinforcement learning, deep learning, IIoT, generative adversarial networks, power system
Procedia PDF Downloads 371396 Passion Songs in Sri Lanka with Special Reference to Village Wahakotte
Authors: Niroshi Senevirathne
Abstract:
The history of Pasan Gee (Passion Songs) relates back to the Portuguese Colonial period (1505-1658) in Sri Lanka. It is about chants on the passion of Christ during the Lent period which is repentance for Christians lasting for 40 days. Among the other villages in Sri Lanka, Wahakotte, which is situated in Matale district, Central Province is famous for their traditional Pasan melodies. It is a village where both Christians and Buddhists live. King Rajasinghe II of Kandy, who fought against the Portuguese, allowed the captives to settle down in Wahakotte. These people fairer in complexion have assimilated themselves with locals. Pasan singing in Wahakotte is a significant event and it is influenced by traditional folk music melodies such as “Nelum Gee” (harvesting songs) sung by farmers of Matale, Welapum Gee (Lamantation songs) sung at funerals in Sri Lanka and Buddhist Pirith chanting melodies. Prose of Pasan verses are included in the book named “Deshana namaye Pasan potha” (Nine Sermon Passion Book), written by Fr. Jacome Gonsalvez. The verses are composed with Sinhala and with some Tamil words. These songs are transmitted from generation to generation in an oral tradition. Today, chanting of Pasan is not heard in many Catholic areas during the lent season. Some of them have been recorded in cassette form. This research should aim to protect these traditional Passion songs unique to village Wahakotte of Sri Lanka without changing its character and original melodies.Keywords: influence of folk melodies, passion songs, preserving traditional passion songs, traditional passion melodies
Procedia PDF Downloads 2891395 Salmon Diseases Connectivity between Fish Farm Management Areas in Chile
Authors: Pablo Reche
Abstract:
Since 1980’s aquaculture has become the biggest economic activity in southern Chile, being Salmo salar and Oncorhynchus mykiss the main finfish species. High fish density makes both species prone to contract diseases, what drives the industry to big losses, affecting greatly the local economy. Three are the most concerning infective agents, the infectious salmon anemia virus (ISAv), the bacteria Piscirickettsia salmonis and the copepod Caligus rogercresseyi. To regulate the industry the government arranged the salmon farms within management areas named as barrios, which coordinate the fallowing periods and antibiotics treatments of their salmon farms. In turn, barrios are gathered into larger management areas, named as macrozonas whose purpose is to minimize the risk of disease transmission between them and to enclose the outbreaks within their boundaries. However, disease outbreaks still happen and transmission to neighbor sites enlarges the initial event. Salmon disease agents are mostly transported passively by local currents. Thus, to understand how transmission occurs it must be firstly studied the physical environment. In Chile, salmon farming takes place in the inner seas of the southernmost regions of western Patagonia, between 41.5ºS-55ºS. This coastal marine system is characterised by western winds, latitudinally modulated by the position of the South-Eats Pacific high-pressure centre, high precipitation rates and freshwater inflows from the numerous glaciers (including the largest ice cap out of Antarctic and Greenland). All of these forcings meet in a complex bathymetry and coastline system - deep fjords, shallow sills, narrow straits, channels, archipelagos, inlets, and isolated inner seas- driving an estuarine circulation (fast outflows westwards on surface and slow deeper inflows eastwards). Such a complex system is modelled on the numerical model MIKE3, upon whose 3D current fields particle-track-biological models (one for each infective agent) are decoupled. Each agent biology is parameterized by functions for maturation and mortality (reproduction not included). Such parameterizations are depending upon environmental factors, like temperature and salinity, so their lifespan will depend upon the environmental conditions those virtual agents encounter on their way while passively transported. CLIC (Connectivity-Langrangian–IFOP-Chile) is a service platform that supports the graphical visualization of the connectivity matrices calculated from the particle trajectories files resultant of the particle-track-biological models. On CLIC users can select, from a high-resolution grid (~1km), the areas the connectivity will be calculated between them. These areas can be barrios and macrozonas. Users also can select what nodes of these areas are allowed to release and scatter particles from, depth and frequency of the initial particle release, climatic scenario (winter/summer) and type of particle (ISAv, Piscirickettsia salmonis, Caligus rogercresseyi plus an option for lifeless particles). Results include probabilities downstream (where the particles go) and upstream (where the particles come from), particle age and vertical distribution, all of them aiming to understand how currently connectivity works to eventually propose a minimum risk zonation for aquaculture purpose. Preliminary results in Chiloe inner sea shows that the risk depends not only upon dynamic conditions but upon barrios location with respect to their neighbors.Keywords: aquaculture zonation, Caligus rogercresseyi, Chilean Patagonia, coastal oceanography, connectivity, infectious salmon anemia virus, Piscirickettsia salmonis
Procedia PDF Downloads 1551394 Multifunctional Polydopamine-Silver-Polydopamine Nanofilm With Applications in Digital Microfluidics and SERS
Authors: Yilei Xue, Yat-Hing Ham, Wenting Qiu, Wan Chan, Stefan Nagl
Abstract:
Polydopamine (PDA) is a popular material in biological and medical applications due to its excellent biocompatibility, outstanding physicochemical properties, and facile fabrication. In this project, a new sandwich-structured PDA and silver (Ag) hybrid material named PDA-Ag-PDA was synthesized and characterized layer-by-layer, where silver nanoparticles (Ag NPs) are wrapped in PDA coatings, using SEM, AFM, 3D surface metrology, and contact angle meter. The silver loading capacity is positively proportional to the roughness value of the initial PDA film. This designed film was subsequently integrated within a digital microfluidic (DMF) platform coupling with an oxygen sensor layer for on-chip antibacterial assay. The concentration of E. coli was quantified on DMF by real-time monitoring oxygen consumption during E. coli growth with the optical oxygen sensor layer. The PDA-Ag-PDA coating shows an 99.9% reduction in E. coli population under non-nutritive condition with 1-hour treatment and has a strong growth inhibition of E. coliin nutrient LB broth as well. Furthermore, PDA-Ag-PDA film maintaining a low cytotoxicity effect to human cells. After treating with PDA-Ag-PDA film for 24 hours, 82% HEK 293 and 86% HeLa cells were viable. The SERS enhancement factor of PDA-Ag-PDA is estimated to be 1.9 × 104 using Rhodamine 6G (R6G). Multifunctional PDA-Ag-PDA coating provides an alternative platform to conjugate biomolecules and perform biological applications on DMF, in particular, for the adhesive protein and cell study.Keywords: polydopamine, silver nanoparticles, digital microfluidic, optical sensor, antimicrobial assay, SERS
Procedia PDF Downloads 931393 Paper-Based Colorimetric Sensor Utilizing Peroxidase-Mimicking Magnetic Nanoparticles Conjugated with Aptamers
Authors: Min-Ah Woo, Min-Cheol Lim, Hyun-Joo Chang, Sung-Wook Choi
Abstract:
We developed a paper-based colorimetric sensor utilizing magnetic nanoparticles conjugated with aptamers (MNP-Apts) against E. coli O157:H7. The MNP-Apts were applied to a test sample solution containing the target cells, and the solution was simply dropped onto PVDF (polyvinylidene difluoride) membrane. The membrane moves the sample radially to form the sample spots of different compounds as concentric rings, thus the MNP-Apts on the membrane enabled specific recognition of the target cells through a color ring generation by MNP-promoted colorimetric reaction of TMB (3,3',5,5'-tetramethylbenzidine) and H2O2. This method could be applied to rapidly and visually detect various bacterial pathogens in less than 1 h without cell culturing.Keywords: aptamer, colorimetric sensor, E. coli O157:H7, magnetic nanoparticle, polyvinylidene difluoride
Procedia PDF Downloads 4501392 Analysis of Formation Methods of Range Profiles for an X-Band Coastal Surveillance Radar
Authors: Nguyen Van Loi, Le Thanh Son, Tran Trung Kien
Abstract:
The paper deals with the problem of the formation of range profiles (RPs) for an X-band coastal surveillance radar. Two popular methods, the difference operator method, and the window-based method, are reviewed and analyzed via two tests with different datasets. The test results show that although the original window-based method achieves a better performance than the difference operator method, it has three main drawbacks that are the use of 3 or 4 peaks of an RP for creating the windows, the extension of the window size using the power sum of three adjacent cells in the left and the right sides of the windows and the same threshold applied for all types of vessels to finish the formation process of RPs. These drawbacks lead to inaccurate RPs due to the low signal-to-clutter ratio. Therefore, some suggestions are proposed to improve the original window-based method.Keywords: range profile, difference operator method, window-based method, automatic target recognition
Procedia PDF Downloads 1271391 Need Assessments of Midwives in Public's Health Center (Puskesmas) at Sukabumi Municipal, Province of Jawa Barat, Indonesia
Authors: Al Asyary, Meita Veruswati, Dian Ayyubi
Abstract:
Sukabumi municipal has highest rank for maternal mortality in Indonesia with 102 by 100,000 live birth with almost 80% of birth were not attended by skilled birth attendant (SBA). Although universal health coverage has been implemented, availability and sufficiency of SBA, such as midwife in this developing country, are problematic agenda for the quality of public healthcare as well as decreasing maternal mortality rate. This study aims to describe the equal distribution of midwives in Sukabumi municipal as support of government’s program named Millennium Development Goals (MDGs) that suppressed maternal mortality rate in Indonesia. We conducted an observational study with Workload Indicator of Staffing Need (WISN) analysis to present the dispersion of midwives by their activities and workloads in 37 Puskesmas. We also generated in-depth interview with several executive chief of health sections, including chief of health offices in Sukabumi municipal. It resulted inferentially that several activities in midwives’ program were differed at once of existing than needed condition ideally (ρ value = 0.002 < 0.05). Meanwhile, decision for midwives’ procurement and placement were held by un-systematically procedure such as based on where the midwife was staying, and it also progressed by neighborhood issue priorities. The absence of formal regulation in local government is a serious problem that indicated poor political commitment, while access to SBA shall be focused carefully.Keywords: developing country, health professional resources, health policy, need assessment
Procedia PDF Downloads 1681390 The Industrial Property in the Context of Wine Production in Brazil
Authors: Fátima R. Zan, Daniela C. Guimarães, Rosângela O. Soares, Suzana L. Russo
Abstract:
The wine until it reaches the consumer has a long way to go, from planting the wine to the bottling and the placing on the market, bringing many years of experimentation, and through several generations to have recognition for quality and excellence. The winemaking grew dramatically and are today many brands, including the associated locations, demonstrating their origin and cultural order that is associated with their production. The production, circulation and marketing of wines and products of grape and wine in Brazil is regulated by Law 7.678/88, amended by Law 10970/04, and adjusting the legislation to Regulation Wine Mercosur. This study was based on a retrospective study, and aimed to identify and characterize the modalities of industrial property used in wine production in Brazil. The wineries were selected from the 2014 ranking list, drawn up by the World Association of Journalists and Writers of Wines and Spirits (WAWWJ). The results show that the registration with INPI, regarding Patents, Trademarks, Industrial Designs and Geographical Indications, is not used by the wineries analyzed.Keywords: counterfeiting, industrial property, protection, wine production
Procedia PDF Downloads 5731389 Ethical Issues in AI: Analyzing the Gap Between Theory and Practice - A Case Study of AI and Robotics Researchers
Authors: Sylvie Michel, Emmanuelle Gagnou, Joanne Hamet
Abstract:
New major ethical dilemmas are posed by artificial intelligence. This article identifies an existing gap between the ethical questions that AI/robotics researchers grapple with in their research practice and those identified by literature review. The objective is to understand which ethical dilemmas are identified or concern AI researchers in order to compare them with the existing literature. This will enable to conduct training and awareness initiatives for AI researchers, encouraging them to consider these questions during the development of AI. Qualitative analyses were conducted based on direct observation of an AI/Robotics research team focused on collaborative robotics over several months. Subsequently, semi-structured interviews were conducted with 16 members of the team. The entire process took place during the first semester of 2023. The observations were analyzed using an analytical framework, and the interviews were thematically analyzed using Nvivo software. While the literature identifies three primary ethical concerns regarding AI—transparency, bias, and responsibility—the results firstly demonstrate that AI researchers are primarily concerned with the publication and valorization of their work, with the initial ethical concerns revolving around this matter. Questions arise regarding the extent to which to "market" publications and the usefulness of some publications. Research ethics are a central consideration for these teams. Secondly, another result shows that the researchers studied adopt a consequentialist ethics (though not explicitly formulated as such). They ponder the consequences of their development in terms of safety (for humans in relation to Robots/AI), worker autonomy in relation to the robot, and the role of work in society (can robots take over jobs?). Lastly, results indicate that the ethical dilemmas highlighted in the literature (responsibility, transparency, bias) do not explicitly appear in AI/Robotics research. AI/robotics researchers raise specific and pragmatic ethical questions, primarily concerning publications initially and consequentialist considerations afterward. Results demonstrate that these concerns are distant from the existing literature. However, the dilemmas highlighted in the literature also deserve to be explicitly contemplated by researchers. This article proposes that the journals these researchers target should mandate ethical reflection for all presented works. Furthermore, results suggest offering awareness programs in the form of short educational sessions for researchers.Keywords: ethics, artificial intelligence, research, robotics
Procedia PDF Downloads 801388 A Cross-Dialect Statistical Analysis of Final Declarative Intonation in Tuvinian
Authors: D. Beziakina, E. Bulgakova
Abstract:
This study continues the research on Tuvinian intonation and presents a general cross-dialect analysis of intonation of Tuvinian declarative utterances, specifically the character of the tone movement in order to test the hypothesis about the prevalence of level tone in some Tuvinian dialects. The results of the analysis of basic pitch characteristics of Tuvinian speech (in general and in comparison with two other Turkic languages - Uzbek and Azerbaijani) are also given in this paper. The goal of our work was to obtain the ranges of pitch parameter values typical for Tuvinian speech. Such language-specific values can be used in speaker identification systems in order to get more accurate results of ethnic speech analysis. We also present the results of a cross-dialect analysis of declarative intonation in the poorly studied Tuvinian language.Keywords: speech analysis, statistical analysis, speaker recognition, identification of person
Procedia PDF Downloads 4701387 Hydrological Evaluation of Satellite Precipitation Products Using IHACRES Rainfall-Runoff Model over a Basin in Iran
Authors: Mahmoud Zakeri Niri, Saber Moazami, Arman Abdollahipour, Hossein Ghalkhani
Abstract:
The objective of this research is to hydrological evaluation of four widely-used satellite precipitation products named PERSIANN, TMPA-3B42V7, TMPA-3B42RT, and CMORPH over Zarinehrood basin in Iran. For this aim, at first, daily streamflow of Sarough-cahy river of Zarinehrood basin was simulated using IHACRES rainfall-runoff model with daily rain gauge and temperature as input data from 1988 to 2008. Then, the model was calibrated in two different periods through comparison the simulated discharge with the observed one at hydrometric stations. Moreover, in order to evaluate the performance of satellite precipitation products in streamflow simulation, the calibrated model was validated using daily satellite rainfall estimates from the period of 2003 to 2008. The obtained results indicated that TMPA-3B42V7 with CC of 0.69, RMSE of 5.93 mm/day, MAE of 4.76 mm/day, and RBias of -5.39% performs better simulation of streamflow than those PERSIANN and CMORPH over the study area. It is noteworthy that in Iran, the availability of ground measuring station data is very limited because of the sparse density of hydro-meteorological networks. On the other hand, large spatial and temporal variability of precipitations and lack of a reliable and extensive observing system are the most important challenges to rainfall analysis, flood prediction, and other hydrological applications in this country.Keywords: hydrological evaluation, IHACRES, satellite precipitation product, streamflow simulation
Procedia PDF Downloads 2411386 Stem Covers of Leibniz n-Algebras
Authors: Natália Maria Rego
Abstract:
ALeibnizn-algebraGis aK-vector space endowed whit a n-linearbracket operation [-,…-] : GG … G→ Gsatisfying the fundamental identity, which can be expressed saying that the right multiplication map Ry2, …, ᵧₙ: Gn→ G, Rᵧ₂, …, ᵧₙn(ˣ¹, …, ₓₙ) = [[ˣ¹, …, ₓₙ], ᵧ₂, …, ᵧₙ], is a derivation. This structure, together with its skew-symmetric version, named as Lie n-algebra or Filippov algebra, arose in the setting of Nambumechanics, an n-ary generalization of the Hamiltonian mechanics. Thefirst goal of this work is to provide a characterization of various classes of central extensions of Leibniz n-algebras in terms of homological properties. Namely, Commutator extension, Quasi-commutator extension, Stem extension, and Stem cover. These kind of central extensions are characterized by means of the character of the map *(E): nHL1(G) → M provided by the five-term exact sequence in homology with trivial coefficients of Leibniz n-algebras associated to an extension E : 0 → M → K → G → 0. For a free presentation 0 →R→ F →G→ 0of a Leibniz n-algebra G,the term M(G) = (R[F,…n.., F])/[R, F,..n-1..,F] is called the Schur multiplier of G, which is a Baer invariant, i.e., it does not depend on the chosen free presentation, and it is isomorphic to the first Leibniz n-algebras homology with trivial coefficients of G. A central extension of Leibniz n-algebras is a short exact sequenceE : 0 →M→K→G→ 0such that [M, K,.. ⁿ⁻¹.., K]=0. It is said to be a stem extension if M⊆[G, .. n.., G]. Additionally, if the induced map M(K) → M(G) is the zero map, then the stem extension Eis said to be a stem cover. The second aim of this work is to analyze the interplay between stem covers of Leibniz n-algebras and the Schur multiplier. Concretely, in the case of finite-dimensional Leibniz n-algebras, we show the existence of coverings, and we prove that all stem covers with finite-dimensional Schur multiplier are isoclinic. Additionally, we characterize stem covers of perfect Leibniz n-algebras.Keywords: leibniz n-algebras, central extensions, Schur multiplier, stem cover
Procedia PDF Downloads 1571385 Scrutiny and Solving Analytically Nonlinear Differential at Engineering Field of Fluids, Heat, Mass and Wave by New Method AGM
Authors: Mohammadreza Akbari, Sara Akbari, Davood Domiri Ganji, Pooya Solimani, Reza Khalili
Abstract:
As all experts know most of engineering system behavior in practical are nonlinear process (especially heat, fluid and mass, etc.) and analytical solving (no numeric) these problems are difficult, complex and sometimes impossible like (fluids and gas wave, these problems can't solve with numeric method, because of no have boundary condition) accordingly in this symposium we are going to exposure a innovative approach which we have named it Akbari-Ganji's Method or AGM in engineering, that can solve sets of coupled nonlinear differential equations (ODE, PDE) with high accuracy and simple solution and so this issue will be emerged after comparing the achieved solutions by Numerical method (Runge-Kutte 4th) and so compare to other methods such as HPM, ADM,… and exact solutions. Eventually, AGM method will be proved that could be created huge evolution for researchers, professors and students (engineering and basic science) in whole over the world, because of AGM coding system, so by using this software we can analytically solve all complicated linear and nonlinear differential equations, with help of that there is no difficulty for solving nonlinear differential equations(ODE and PDE). In this paper, we investigate and solve 4 types of the nonlinear differential equation with AGM method : 1-Heat and fluid, 2-Unsteady state of nonlinear partial differential, 3-Coupled nonlinear partial differential in wave equation, and 4-Nonlinear integro-differential equation.Keywords: new method AGM, sets of coupled nonlinear equations at engineering field, waves equations, integro-differential, fluid and thermal
Procedia PDF Downloads 5461384 Auditing Hindi Celluloid as a Catalyst of Transition: The Eventual Delineation of LGBTQ+
Authors: Chinmayee Nanda
Abstract:
In this modern era, India is still chained up with the idea of ‘Heteronormativity’. As a result, homonormativity, transgressions, preconceived notions, and bigotry add to many raised eyebrows, the majority being the norm and overpowering the voices of the minority. In this country an undeniable space is the need of the hour to identify those unheard voices. Media can be considered as the most powerful space for the same. This paper aims to examine the representation as well as transition (if any) of the varied figments of the imagination and alternative facts relating to the LGBTQ+ community in celluloid in Hindi. This paper will also explore the visibility of the queer aspirations through this media. The portrayal of the LGBTQ community as the ‘other’ and ‘not normal’ is a matter of concern about any individual’s sexuality. The years 2014 and 2018 turned out to be remarkable in the Indian Legal System pertaining to the recognition of the ‘Third Gender’ and ‘Decriminalization of Homosexuality,’ respectively. In relation to that, this paper will also explore the impression of these dynamics on the subsequent depiction.Keywords: sexuality, hindi cinema, gender fluidity, legal framework
Procedia PDF Downloads 26