Search results for: task autonomy
1131 A Real-World Roadmap and Exploration of Quantum Computers Capacity to Trivialise Internet Security
Authors: James Andrew Fitzjohn
Abstract:
This paper intends to discuss and explore the practical aspects of cracking encrypted messages with quantum computers. The theory of this process has been shown and well described both in academic papers and headline-grabbing news articles, but with all theory and hyperbole, we must be careful to assess the practicalities of these claims. Therefore, we will use real-world devices and proof of concept code to prove or disprove the notion that quantum computers will render the encryption technologies used by many websites unfit for purpose. It is time to discuss and implement the practical aspects of the process as many advances in quantum computing hardware/software have recently been made. This paper will set expectations regarding the useful lifespan of RSA and cipher lengths and propose alternative encryption technologies. We will set out comprehensive roadmaps describing when and how encryption schemes can be used, including when they can no longer be trusted. The cost will also be factored into our investigation; for example, it would make little financial sense to spend millions of dollars on a quantum computer to factor a private key in seconds when a commodity GPU could perform the same task in hours. It is hoped that the real-world results depicted in this paper will help influence the owners of websites who can take appropriate actions to improve the security of their provisions.Keywords: quantum computing, encryption, RSA, roadmap, real world
Procedia PDF Downloads 1301130 Effects of Classroom Management Strategies on Students’ Well-Being at Secondary Level
Authors: Saba Latif
Abstract:
The study is about exploring the Impact of Classroom Management Techniques on students’ Well-being at the secondary level. The objectives of the study are to identify the classroom management practices of teachers and their impact on students’ achievement. All secondary schools of Lahore city are the population of study. The researcher randomly selected ten schools, and from these schools, two hundred students participated in this study. Data has been collected by using Classroom Management and Students’ Wellbeing questionnaire. Frequency analysis has been applied. The major findings of the study are calculated as follows: The teacher’s instructional activities affect classroom management. The secondary school students' seating arrangement can influence the learning-teaching process. Secondary school students strongly disagree with the statement that the large size of the class affects the teacher’s classroom management. The learning environment of the class helps students participate in question-and-answer sessions. All the activities of the teachers are in accordance with practices in the class. The discipline of the classroom helps the students to learn more. The role of the teacher is to guide, and it enhances the performance of the teacher. The teacher takes time on disciplinary rules and regulations of the classroom. The teacher appreciates them when they complete the given task. The teacher appreciates teamwork in the class.Keywords: classroom management, strategies, wellbeing, practices
Procedia PDF Downloads 501129 Nation Building versus Self Determination: Thai State’s Response to Insurgency in South
Authors: Sunaina Sunaina
Abstract:
The emergence of Thailand as a modern nation was amalgamation of several minority groups. Eventually, the nation tried to mitigate these diversities in the name of nationalism in the backdrop of colonial powers presence in neighboring nations. However, the continued imposition of modern nation building processes (which is a western concept) in the post-colonial era deepen the feelings of alienation among the minority groups and leads to separatist conflicts. It is significant that whatever form these conflicts take, will impact the security of nation as well as the region of Southeast Asia. This paper tries to explore the possible factors behind the state policies adopted by the government of Thailand to manage the insurgency in Southern provinces in the south. The protracted insurgency in the South has historical roots as Pattani kingdom had glorious period whether it was trade or commerce or education and its assimilation was never accepted by the leaders of these areas. But after assimilation of southern provinces in the state, it has been the state policy as an important factor in promoting or mitigating the insurgency. Initial protests from the elite class of southern provinces inflated into a more organized and violent uprising after Second World War. It was only the decade of 1990s that a relative peace could prevail for some time. The violence reemerged in 2004 with more intensity and till today this area is suffering with violence. Period of different Prime Ministers dealt this insurgency in different ways sometimes very hard line approach had been adopted especially under Primeminstership of Thaksin Shinawatra. Recently, the peace talks which were started during the period of Yinglunck Shinawatra and were carried forward by Junta government also halted. And again, the region stays in a very volatile state. Violence in these provinces not only questions the capability of government to provide political solution to the problem, but also emerges as a major threat to the internal security of the state. The current era where global terrorism is spreading fast, such vulnerable areas may work as a new ground for its proliferation in Southeast Asia. The paper attempts to understand how Thailand’s historical experience of security determines a different approach to national unity which limits the prospects for autonomy in the South. In conjunction with this experience it is nature of national politics and leadership that influences the nature of policies on the ground in Southern Thailand. The paper also tries to bring out conflict between state sovereignty and self-determination as demanded by many in the southern provinces.Keywords: insurgency, southern Thailand, security, nation building
Procedia PDF Downloads 1241128 Similarities and Differences between Psychotherapy, Coaching Psychology and Coaching
Authors: Ole Michael Spaten
Abstract:
This article presents similarities and differences between psychotherapy, coaching psychology and coaching, and hence discusses boundaries between these diverse fields of practice. The point of departure will be prevailing arguments and descriptions in the scientific community, and it shows both commonalities and major differences in relation to the application in daily practice. The results (the similarities and differences) are presented and discussed in the light of scientific research and different theoretical perspectives, including both classic and recent scholars. Some of the main differences presented are; the clinical/non-clinical perspective and the educational differences, including the different criteria and demands which professionals working in these three different professions, should undergo to obtain their certification. Further, one of the main similarities is presented: the importance of the relationship between the therapist/coach and the client/coachee. The goal and task oriented focus are also presented as a similarity between the three intervention forms – at least to some extent. Finally, some central concepts from the fields are presented in a table for a proposal of distinctions and interfaces. It is concluded that a comprehensive education in combination with an understanding of the differences and similarities between the three intervention forms is of significant importance for the professional working in either of the fields. Future studies should, however, include additional research on the similarities and differences and how to continue the educational progress in all three disciplines.Keywords: boundaries, coaching, coaching psychology, interface, psychotherapy
Procedia PDF Downloads 2281127 Spontaneous and Posed Smile Detection: Deep Learning, Traditional Machine Learning, and Human Performance
Authors: Liang Wang, Beste F. Yuksel, David Guy Brizan
Abstract:
A computational model of affect that can distinguish between spontaneous and posed smiles with no errors on a large, popular data set using deep learning techniques is presented in this paper. A Long Short-Term Memory (LSTM) classifier, a type of Recurrent Neural Network, is utilized and compared to human classification. Results showed that while human classification (mean of 0.7133) was above chance, the LSTM model was more accurate than human classification and other comparable state-of-the-art systems. Additionally, a high accuracy rate was maintained with small amounts of training videos (70 instances). The derivation of important features to further understand the success of our computational model were analyzed, and it was inferred that thousands of pairs of points within the eyes and mouth are important throughout all time segments in a smile. This suggests that distinguishing between a posed and spontaneous smile is a complex task, one which may account for the difficulty and lower accuracy of human classification compared to machine learning models.Keywords: affective computing, affect detection, computer vision, deep learning, human-computer interaction, machine learning, posed smile detection, spontaneous smile detection
Procedia PDF Downloads 1241126 Investigating the Effect of Executive Functions on Young Children’s Drawing of Familiar and Unfamiliar
Authors: Reshaa Alruwaili
Abstract:
This study was inspired by previous studies with young children that found (a) that they need both inhibitory control and working memory when drawing an unfamiliar subject (e.g., animals) by adapting their schema of the human figure and (b) that when drawing something familiar (e.g., a person) they use inhibitory control mediated through fine motor control to execute their drawing. This study, therefore, systematically investigated whether direct effects for both working memory and inhibitory control and/or effects mediated through fine motor control existed when drawing both familiar and unfamiliar subjects. Participants were 95 children (41-66 months old) required to draw both a man and a dog, scored respectively for how representational they were and for differences from a human figure. Regression and mediation analyses showed that inhibitory control alone predicted drawing a recognizable man while working memory alone predicted drawing a dog that was not human-like when fine motor control, age, and gender were controlled. Contrasting with some previous studies, these results suggest that the roles of working memory and inhibitory control are sensitive to the familiarity of the drawing task and are not necessarily mediated through fine motor control. Implications for research on drawing development are discussed.Keywords: child drawing, inhibitory control, working memory, fine motor control, mediation, familiar and unfamiliar subjects
Procedia PDF Downloads 741125 The Truism of the True and Fair View of Auditor’s Report
Authors: Ofuan James Ilaboya, Okhae J. Ibhadode
Abstract:
The objective of this paper is to theoretically examine the truism of the “true and fair view” in the context of financial reporting. The paper examines the concepts such as true, fair, true and fair view, problems of true and fair view, the origin/history of true and fair view, review of attributes and key issues relating to true and fair view. The methodological approach adopted in this paper is library-based research, focusing on the review of relevant and related extant literature. The findings based on the review of relevant and related literature is suggestive of the fact that the true and fair concept in financial reporting environment is contentious. The study concludes that given the circumstances as chronicled on this paper, it is evident that the truism of the true and fair view of the auditor’s opinion is under serious threat. The way forward may be for the auditor to certify the accuracy and the correctness of the financial statement. While this position being canvassed here may help to substantially bridge the age-long expectation gap, it may as well require an upward review of the current audit fee structure in order to be able to operationalize the onerous task of certifying the accuracy and correctness of the financial statement. This position is contentious and will require a robust consideration which is not within the purview of the present review.Keywords: fiduciary duty, financial statement, true and correct, true and fair
Procedia PDF Downloads 1321124 Bacterial Contamination of Kitchen Sponges and Cutting Surfaces and Disinfection Procedures
Authors: Hayyan I Al Taweil
Abstract:
Background: The most common of bacterium in kitchen sponges and cutting surfaces which can play a task within the cross-contamination of foods, fomites and hands by foodborne pathogens. Aims and Objectives: This study investigated the incidence of bacterium in kitchen Sponge, and cutting surfaces. Material and methods: a complete of twenty four kitchen Sponges were collected from home kitchens and therefore the numbers of mesotrophic microorganism, coliform microorganism, E. coli, Salmonella, genus {pseudomonas|bacteria genus} and staphylococci in every kitchen Sponges were determined. Microbiological tests of all sponges for total mesophilic aerobic microorganism, S. aureus, Pseudomonas, Salmonella spp., and E. coli were performed on days 3, 7, and 14 by sampling. The sponges involved in daily use in kitchens countenosely with the dishwasher detergent a minimum of doubly daily Results: Results from the overall mesophilic aerobic microorganism, indicate a major increase within the variety of log CFU/ml. the amount of E. coli was reduced, Salmonella spp. was stabled, S. aureus was enhanced from the sponges throughout fourteen days. Genus Pseudomonas was enhanced and was the dominant micro flora within the sponges throughout fourteen days.Keywords: Kitchen Sponges, Microbiological Contamination, Disinfection; cutting surface; , Cross-Contamination
Procedia PDF Downloads 1421123 Military Use of Artificial Intelligence under International Humanitarian Law: Insights from Canada
Authors: Mahshid TalebianKiakalayeh
Abstract:
As AI technologies can be used by both civilians and soldiers, it is vital to consider the consequences emanating from AI military as well as civilian use. Indeed, many of the same technologies can have a dual-use. This paper will explore the military uses of AI and assess its compliance with international legal norms. AI developments not only have changed the capacity of the military to conduct complex operations but have also increased legal concerns. The existence of a potential legal vacuum in legal principles on the military use of AI indicates the necessity of more study on compliance with International Humanitarian Law (IHL), the branch of international law which governs the conduct of hostilities. While capabilities of new means of military AI continue to advance at incredible rates, this body of law is seeking to limit the methods of warfare protecting civilian persons who are not participating in an armed conflict. Implementing AI in the military realm would result in potential issues, including ethical and legal challenges. For instance, when intelligence can perform any warfare task without any human involvement, a range of humanitarian debates will be raised as to whether this technology might distinguish between military and civilian targets or not. This is mainly because AI in fully military systems would not seem to carry legal and ethical judgment, which can interfere with IHL principles. The paper will take, as a case study, Canada’s compliance with IHL in the area of AI and the related legal issues that are likely to arise as this country continues to develop military uses of AI.Keywords: artificial intelligence, military use, international humanitarian law, the Canadian perspective
Procedia PDF Downloads 1841122 Role of Facade in Sustainability Enhancement of Contemporary Iranian Buildings
Authors: H. Nejadriahi
Abstract:
A growing demand for sustainability makes sustainability as one of the significant debates of nowadays. Energy saving is one of the main criteria to be considered in the context of sustainability. Reducing energy use in buildings is one of the most important ways to reduce humans’ overall environmental impact. Taking this into consideration, study of different design strategies, which can assist in reducing energy use and subsequently improving the sustainability level of today's buildings would be an essential task. The sustainability level of a building is highly affected by the sustainability performance of its components. One of the main building components, which can have a great impact on energy saving and sustainability level of the building, is its facade. The aim of this study is to investigate on the role of facade in sustainability enhancement of the contemporary buildings of Iran. In this study, the concept of sustainability in architecture, the building facades, and their relationship to sustainability are explained briefly. Following that, a number of contemporary Iranian buildings are discussed and analyzed in terms of different design strategies used in their facades in accordance to the sustainability concepts. The methods used in this study are descriptive and analytic. The results of this paper would assist in generating a wider vision and a source of inspiration for the current designers to design and create environmental and sustainable buildings for the future.Keywords: building facade, contemporary buildings, Iran, sustainability
Procedia PDF Downloads 3311121 Applicable Law to Intellectual and Industrial Property Agreements According to Turkish Private International Law and Rome I Regulation
Authors: Sema Cortoglu Koca
Abstract:
Intellectual and industrial property rules, have a substantial effect on the sustainable development. Intellectual and industrial property rights, as temporary privileges over the products of intellectual activity, determine the supervision of information and technology. The level and scope of intellectual property protection thus influence the flow of technology between developed and developing countries. In addition, intellectual and industrial property rights are based on the notion of balance. Since they are time-limited rights, they reconcile private and public benefits. That is, intellectual and industrial property rights respond to both private interests and public interests by rewarding innovators and by promoting the dissemination of ideas, respectively. Intellectual and industrial property rights can, therefore, be a tool for sustainable development. If countries can balance their private and public interests according to their particular context and circumstances, they can ensure the intellectual and industrial property which promotes innovation and technology transfer relevant for them. People, enterprises and countries who need technology, can transfer developed technology which is acquired by people, enterprises and countries so as to decrease their technological necessity and improve their technology. Because of the significance of intellectual and industrial property rights on the technology transfer law as mentioned above, this paper is confined to intellectual and industrial property agreements especially technology transfer contracts. These are license contract, know-how contract, franchise agreement, joint venture agreement, management agreement, research and development agreement. In Turkey, technology transfer law is still a developing subject. For developing countries, technology transfer regulations are very important for their private international law because these countries do not know which technology transfer law is applicable when conflicts arise. In most technology transfer contracts having international elements, the parties choose a law to govern their contracts. Where the parties do not choose a law, either expressly or impliedly, and matters which is not excluded in party autonomy, the court has to determine the applicable law to contracts in a matter of capacity, material, the formal and essential validity of contracts. For determining the proper law of technology transfer contracts, it is tried to build a rule for applying all technology transfer contracts. This paper is confined to the applicable law to intellectual and industrial property agreements according to ‘5718 Turkish Act on Private International Law and Civil Procedure’ and ‘Regulation (EC) No 593/2008 of the European Parliament and of the Council of 17 June 2008 on the law applicable to contractual obligations (Rome I)’. Like these complex contracts, to find a rule can be really difficult. We can arrange technology transfer contracts in groups, and we can determine the rule and connecting factors to these groups. For the contracts which are not included in these groups, we can determine a special rule considering the characteristics of the contract.Keywords: intellectual and industrial property agreements, Rome I regulation, technology transfer, Turkish act on private international law and civil procedure
Procedia PDF Downloads 1531120 Evaluating Portfolio Performance by Highlighting Network Property and the Sharpe Ratio in the Stock Market
Authors: Zahra Hatami, Hesham Ali, David Volkman
Abstract:
Selecting a portfolio for investing is a crucial decision for individuals and legal entities. In the last two decades, with economic globalization, a stream of financial innovations has rushed to the aid of financial institutions. The importance of selecting stocks for the portfolio is always a challenging task for investors. This study aims to create a financial network to identify optimal portfolios using network centralities metrics. This research presents a community detection technique of superior stocks that can be described as an optimal stock portfolio to be used by investors. By using the advantages of a network and its property in extracted communities, a group of stocks was selected for each of the various time periods. The performance of the optimal portfolios compared to the famous index. Their Sharpe ratio was calculated in a timely manner to evaluate their profit for making decisions. The analysis shows that the selected potential portfolio from stocks with low centrality measurement can outperform the market; however, they have a lower Sharpe ratio than stocks with high centrality scores. In other words, stocks with low centralities could outperform the S&P500 yet have a lower Sharpe ratio than high central stocks.Keywords: portfolio management performance, network analysis, centrality measurements, Sharpe ratio
Procedia PDF Downloads 1521119 Explaining Listening Comprehension among L2 Learners of English: The Contribution of Vocabulary Knowledge and Working Memory Capacity
Authors: Ahmed Masrai
Abstract:
Listening comprehension constitutes a considerable challenge for the second language (L2) learners, but a little is known about the explanatory power of different variables in explaining variance in listening comprehension. Since research in this area, to the researcher's knowledge, is relatively small in comparison to that focusing on the relationship between reading comprehension and factors such as vocabulary and working memory, there is a need for studies that are seeking to fill the gap in our knowledge about the specific contribution of working memory capacity (WMC), aural vocabulary knowledge and written vocabulary knowledge to explaining listening comprehension. Among 130 English as foreign language learners, the present study examines what proportion of the variance in listening comprehension is explained by aural vocabulary knowledge, written vocabulary knowledge, and WMC. Four measures were used to collect the required data for the study: (1) A-Lex, a measure of aural vocabulary knowledge; (2) XK-Lex, a measure of written vocabulary knowledge; (3) Listening Span Task, a measure of WMC and; (4) IELTS Listening Test, a measure of listening comprehension. The results show that aural vocabulary knowledge is the strongest predictor of listening comprehension, followed by WMC, while written vocabulary knowledge is the weakest predictor. The study discusses implications for the explanatory power of aural vocabulary knowledge and WMC to listening comprehension and pedagogical practice in L2 classrooms.Keywords: listening comprehension, second language, vocabulary knowledge, working memory
Procedia PDF Downloads 3811118 Social Mentoring: Towards Formal and Informal Deployment in the Structures of the Social and Solidarity Economy
Authors: Vanessa Casadella, Mourad Chouki, Agnès Ceccarelli, Sofiane Tahi
Abstract:
Mentoring is positioned in an interpersonal and intergenerational perspective, serving the transmission of interpersonal skills and organizational culture. It echoes orientation, project, self-actualization, guidance, transmission, and filiation. It is available using a formal or informal approach. The formal dimension refers to a privileged relationship between a senior and a junior. Informal mentoring is unplanned and emerges naturally between two people who choose each other. However, it remains more difficult to understand. To study the link between formal and informal mentoring and to define the notion of “social” mentoring, we conducted a qualitative study of an exploratory nature with around ten SSE organizations located in the southeast region of Tunisia. The wealth of this territory has pushed residents to found SSE organizations with a view to creating jobs but also to preserving traditions and preserving nature. These organizations developed spontaneously to solve various local problems, such as the revitalization of deserted rural areas, environmental degradation, and the reskilling and professional reintegration of people marginalized in the labor market. This research, based on semi-structured interviews in order to obtain exhaustive and sensitive data, involves an interview guide with few questions mobilized to let the respondents, leaders of the different structures, express themselves freely. The guide includes questions on activities, methods of sharing knowledge, and difficulties in understanding between stakeholders. The interviews, lasting 30 to 60 minutes, were recorded using a dictaphone and then transcribed in full. The results are as follows: 1. We see two iterative mentoring loops. A first loop can be considered a type of formal mentoring. It highlights the support organized (in the form of training) by social enterprises with the aim of developing the autonomy, know-how, and interpersonal skills of members. A second loop concerns informal mentoring. This is non-formalized support provided by members or with other members of the entourage. This informal mentoring is mainly based on the observation of good practices and learning by doing. 2. We notice an intersection between the two loops. If the first loop is not done, the second will not take place. The knowledge acquired in the first loop is used to feed the second. 3. We note a form of reluctance on the part of some members to share their knowledge for reasons of competition. Ultimately, we retain the notion of “social” mentoring as a hybridization of formal and informal mentoring while dimensioning the “social” perspective by emphasizing the reciprocal character, solidarity, confidence, and trust between the mentor and the mentee.Keywords: social innovation, social mentoring, social and solidarity economy, informal mentoring
Procedia PDF Downloads 521117 Clustering of Association Rules of ISIS & Al-Qaeda Based on Similarity Measures
Authors: Tamanna Goyal, Divya Bansal, Sanjeev Sofat
Abstract:
In world-threatening terrorist attacks, where early detection, distinction, and prediction are effective diagnosis techniques and for functionally accurate and precise analysis of terrorism data, there are so many data mining & statistical approaches to assure accuracy. The computational extraction of derived patterns is a non-trivial task which comprises specific domain discovery by means of sophisticated algorithm design and analysis. This paper proposes an approach for similarity extraction by obtaining the useful attributes from the available datasets of terrorist attacks and then applying feature selection technique based on the statistical impurity measures followed by clustering techniques on the basis of similarity measures. On the basis of degree of participation of attributes in the rules, the associative dependencies between the attacks are analyzed. Consequently, to compute the similarity among the discovered rules, we applied a weighted similarity measure. Finally, the rules are grouped by applying using hierarchical clustering. We have applied it to an open source dataset to determine the usability and efficiency of our technique, and a literature search is also accomplished to support the efficiency and accuracy of our results.Keywords: association rules, clustering, similarity measure, statistical approaches
Procedia PDF Downloads 3201116 Economic Impact of a Distribution Company under Power System Restructuring
Authors: Safa’ Abdelkarim Hammad
Abstract:
The electrical power system is one of the main parts of the nation's infrastructure, and the availability and cost of electricity are critical factors in industrial competitiveness and strategy. Restructuring of the electricity supply industries is a very complex exercise based on national energy strategies and policies, macroeconomic developments, and national conditions, and its application varies from country to country. Electricity regulation of natural monopolies is a challenging task. Regulators face the problem of providing appropriate incentives for improvement of efficiency. Incentive regulation is often considered as an efficient regulatory tool to handle the problem, and it is widely applied in several countries. However, the exact regulation methodologies differ from one country to another. Network quantitative reliability evaluation is an essential factor with regard to the quality of supply. The main factors used to judge the reliability of supply is measured by the number and duration of interruptions experienced by customers. Several indicators are used to evaluate reliability in distribution networks. This paper addresses the impact of incentive regulation and performance benchmarking in the field of electricity distribution in Jordan. The theory of efficiency measurement and the most common models; NCSQS and DEA models are presented.Keywords: incentive regulations, reliability, restructuring, Tarrif
Procedia PDF Downloads 1211115 The Martingale Options Price Valuation for European Puts Using Stochastic Differential Equation Models
Authors: H. C. Chinwenyi, H. D. Ibrahim, F. A. Ahmed
Abstract:
In modern financial mathematics, valuing derivatives such as options is often a tedious task. This is simply because their fair and correct prices in the future are often probabilistic. This paper examines three different Stochastic Differential Equation (SDE) models in finance; the Constant Elasticity of Variance (CEV) model, the Balck-Karasinski model, and the Heston model. The various Martingales option price valuation formulas for these three models were obtained using the replicating portfolio method. Also, the numerical solution of the derived Martingales options price valuation equations for the SDEs models was carried out using the Monte Carlo method which was implemented using MATLAB. Furthermore, results from the numerical examples using published data from the Nigeria Stock Exchange (NSE), all share index data show the effect of increase in the underlying asset value (stock price) on the value of the European Put Option for these models. From the results obtained, we see that an increase in the stock price yields a decrease in the value of the European put option price. Hence, this guides the option holder in making a quality decision by not exercising his right on the option.Keywords: equivalent martingale measure, European put option, girsanov theorem, martingales, monte carlo method, option price valuation formula
Procedia PDF Downloads 1311114 Risk Management Approach for Lean, Agile, Resilient and Green Supply Chain
Authors: Benmoussa Rachid, Deguio Roland, Dubois Sebastien, Rasovska Ivana
Abstract:
Implementation of LARG (Lean, Agile, Resilient, Green) practices in the supply chain management is a complex task mainly because ecological, economical and operational goals are usually in conflict. To implement these LARG practices successfully, companies’ need relevant decision making tools allowing processes performance control and improvement strategies visibility. To contribute to this issue, this work tries to answer the following research question: How to master performance and anticipate problems in supply chain LARG practices implementation? To answer this question, a risk management approach (RMA) is adopted. Indeed, the proposed RMA aims basically to assess the ability of a supply chain, guided by “Lean, Green and Achievement” performance goals, to face “agility and resilience risk” factors. To proof its relevance, a logistics academic case study based on simulation is used to illustrate all its stages. It shows particularly how to build the “LARG risk map” which is the main output of this approach.Keywords: agile supply chain, lean supply chain, green supply chain, resilient supply chain, risk approach
Procedia PDF Downloads 3091113 English Theticity and Focus Expression in Spanish Heritage Speakers
Authors: Sebastian Leal-Arenas
Abstract:
English uses in-situ Nuclear Stress (NS) to express the meanings of theticity and focus. The NS is phonetically represented by an increase in duration, intensity, and pitch range. On the other hand, Spanish conveys the same meanings by aligning the constituent that carries the NS to the end of the sentence via word-order movement. However, little is known about heritage speakers’ production of theticity and focus in English or Spanish. The present study investigates heritage speakers’ production of thetic and subject focus statements. Participants (n = 11) were heritage speakers of Spanish with varying proficiency enrolled in a writing course at a university in the United States. In the production task, participants observed contextualized images and uttered a sentence to answer a provided question. Duration, intensity, and F0 peak were the correlates to stress considered in this investigation. Results indicated that participants tended to present an intonation closer to what is expected in English monolinguals in subject-focus statements than in thetic sentences. However, participants with lower Spanish proficiency used in-situ NS placement in thetic statements more often than those with higher proficiency. Results are discussed in terms of the production patterns observed in heritage speakers with emphasis on the role of language dominance.Keywords: focus, heritage speakers, prosody, theticity
Procedia PDF Downloads 701112 Heuristic Search Algorithm (HSA) for Enhancing the Lifetime of Wireless Sensor Networks
Authors: Tripatjot S. Panag, J. S. Dhillon
Abstract:
The lifetime of a wireless sensor network can be effectively increased by using scheduling operations. Once the sensors are randomly deployed, the task at hand is to find the largest number of disjoint sets of sensors such that every sensor set provides complete coverage of the target area. At any instant, only one of these disjoint sets is switched on, while all other are switched off. This paper proposes a heuristic search method to find the maximum number of disjoint sets that completely cover the region. A population of randomly initialized members is made to explore the solution space. A set of heuristics has been applied to guide the members to a possible solution in their neighborhood. The heuristics escalate the convergence of the algorithm. The best solution explored by the population is recorded and is continuously updated. The proposed algorithm has been tested for applications which require sensing of multiple target points, referred to as point coverage applications. Results show that the proposed algorithm outclasses the existing algorithms. It always finds the optimum solution, and that too by making fewer number of fitness function evaluations than the existing approaches.Keywords: coverage, disjoint sets, heuristic, lifetime, scheduling, Wireless sensor networks, WSN
Procedia PDF Downloads 4521111 Mediation of the Middle Eastern Crises and Economic Growth: An Application of Times Series Analysis
Authors: Gokhan Erkal, Gulsen Aydin, Muge Yuce, Lokman Sahin
Abstract:
This study aims to analyze the impacts of involving in mediation of conflicts in the Middle East from the perspective of the economic growth of the mediators. The Middle East is a highly volatile region of the world with rampant crises whose affects spill beyond its borders. Therefore, management and resolution of the conflicts in the region are of great significance. Mediation is an instrument used for abating violence and settling dispute. The recourse to mediation has grown to an important degree in recent years. However, for mediators, it is a daunting task to involve in the mediation of the deadlocks in the Middle East. This study tries to shed light on the positive correlation between economic growth of the mediator and the successful outcome of the mediation process to provide motivation for mediators. To this end, first, it briefly introduces the conflicts ongoing in the region and their negative impacts. Second, the methodology, time series analysis, and the data to be used, International Crisis Behavior Project Data, are presented. Third, the empirical test is carried out and the findings are evaluated. The conclusion highlights the benefits of successful mediation for the economic growth of the mediators of Middle Eastern crises.Keywords: international crises, mediation, Middle East, times series analysis
Procedia PDF Downloads 1741110 A General Framework for Knowledge Discovery Using High Performance Machine Learning Algorithms
Authors: S. Nandagopalan, N. Pradeep
Abstract:
The aim of this paper is to propose a general framework for storing, analyzing, and extracting knowledge from two-dimensional echocardiographic images, color Doppler images, non-medical images, and general data sets. A number of high performance data mining algorithms have been used to carry out this task. Our framework encompasses four layers namely physical storage, object identification, knowledge discovery, user level. Techniques such as active contour model to identify the cardiac chambers, pixel classification to segment the color Doppler echo image, universal model for image retrieval, Bayesian method for classification, parallel algorithms for image segmentation, etc., were employed. Using the feature vector database that have been efficiently constructed, one can perform various data mining tasks like clustering, classification, etc. with efficient algorithms along with image mining given a query image. All these facilities are included in the framework that is supported by state-of-the-art user interface (UI). The algorithms were tested with actual patient data and Coral image database and the results show that their performance is better than the results reported already.Keywords: active contour, bayesian, echocardiographic image, feature vector
Procedia PDF Downloads 4171109 Synthesis and Characterization of Renewable Resource Based Green Epoxy Coating
Authors: Sukanya Pradhan, Smita Mohanty, S. K Nayak
Abstract:
Plant oils are a great renewable source for being a reliable starting material to access new products with a wide spectrum of structural and functional variations. Even though petroleum products might also render the same, but it would also impose a high risk factor of environmental and health hazard. Since epoxidized vegetable oils are easily available, eco-compatible, non-toxic and renewable, hence these have drawn much of the attentions in the polymer industrial sector especially for the development of eco-friendly coating materials. In this study a waterborne epoxy coating was prepared from epoxidized soyabean oil by using triethanolamine. Because of its hydrophobic nature, it was a tough and tedius task to make it hydrophilic. The hydrophobic biobased epoxy was modified into waterborne epoxy by the help of a plant based anhydride as curing agent. Physico-mechanical, chemical resistance tests and thermal analysis of the green coating material were carried out which showed good physic-mechanical, chemical resistance properties as well as environment friendly. The complete characterization of the final material was done in terms of scratch hardness, gloss test, impact resistance, adhesion and bend test.Keywords: epoxidized soybean oil, waterborne, curing agent, green coating
Procedia PDF Downloads 5401108 Analog Input Output Buffer Information Specification Modelling Techniques for Single Ended Inter-Integrated Circuit and Differential Low Voltage Differential Signaling I/O Interfaces
Authors: Monika Rawat, Rahul Kumar
Abstract:
Input output Buffer Information Specification (IBIS) models are used for describing the analog behavior of the Input Output (I/O) buffers of a digital device. They are widely used to perform signal integrity analysis. Advantages of using IBIS models include simple structure, IP protection and fast simulation time with reasonable accuracy. As design complexity of driver and receiver increases, capturing exact behavior from transistor level model into IBIS model becomes an essential task to achieve better accuracy. In this paper, an improvement in existing methodology of generating IBIS model for complex I/O interfaces such as Inter-Integrated Circuit (I2C) and Low Voltage Differential Signaling (LVDS) is proposed. Furthermore, the accuracy and computational performance of standard method and proposed approach with respect to SPICE are presented. The investigations will be useful to further improve the accuracy of IBIS models and to enhance their wider acceptance.Keywords: IBIS, signal integrity, open-drain buffer, low voltage differential signaling, behavior modelling, transient simulation
Procedia PDF Downloads 1951107 Automatic Verification Technology of Virtual Machine Software Patch on IaaS Cloud
Authors: Yoji Yamato
Abstract:
In this paper, we propose an automatic verification technology of software patches for user virtual environments on IaaS Cloud to decrease verification costs of patches. In these days, IaaS services have been spread and many users can customize virtual machines on IaaS Cloud like their own private servers. Regarding to software patches of OS or middleware installed on virtual machines, users need to adopt and verify these patches by themselves. This task increases operation costs of users. Our proposed method replicates user virtual environments, extracts verification test cases for user virtual environments from test case DB, distributes patches to virtual machines on replicated environments and conducts those test cases automatically on replicated environments. We have implemented the proposed method on OpenStack using Jenkins and confirmed the feasibility. Using the implementation, we confirmed the effectiveness of test case creation efforts by our proposed idea of 2-tier abstraction of software functions and test cases. We also evaluated the automatic verification performance of environment replications, test cases extractions and test cases conductions.Keywords: OpenStack, cloud computing, automatic verification, jenkins
Procedia PDF Downloads 4851106 User-Friendly Task Creation Using a CAD Integrated Robotic System on a Real Workcell
Authors: Alireza Changizi, Arash Rezaei, Jamal Muhammad, Jyrki Latokartano, Minna Lanz
Abstract:
Offline programming (OLP) is a new method in robot programming which is used widely in the industry nowadays which is a simulation base method that can produce the robot codes for motion according to virtual world in the simulation software. In this project Delmia v5 is used as simulation software. First the work cell component was modelled by Catia v5 and all of them was imported to a process file in Delmia and placed roughly to form the virtual work cell. Then robot was added to the work cell from the Delmia library. Work cell was calibrated corresponding to real world work cell to have accurate code. Tool calibration is the first step of calibration scheme and then work cell equipment can be calibrated using 6 point calibration method. Finally generated code needs to be reformed to match related controller code instruction. At the last stage IO were set to accomplish robots cooperation and make their motion synchronized. The pros and cons also will be discussed to clarify the presented results show the feasibility of the method and its effect on production line efficiency. Finally the positive and negative points of the implementation will be discussed.Keywords: robotic, automated, production, offline programming, CAD
Procedia PDF Downloads 3851105 Prime Mover Sizing for Base-Loaded Combined Heating and Power Systems
Authors: Djalal Boualili
Abstract:
This article considers the problem of sizing prime movers for combined heating and power (CHP) systems operating at full load to satisfy a fraction of a facility's electric load, i.e. a base load. Prime mover sizing is examined using three criteria: operational cost, carbon dioxide emissions (CDE), and primary energy consumption (PEC). The sizing process leads to consider ratios of conversion factors applied to imported electricity to conversion factors applied to fuel consumed. These ratios are labelled RCost, R CDE, R PEC depending on whether the conversion factors are associated with operational cost, CDE, or PEC, respectively. Analytical results show that in order to achieve savings in operational cost, CDE, or PEC, the ratios must be larger than a unique constant R Min that only depends on the CHP components efficiencies. Savings in operational cost, CDE, or PEC due to CHP operation are explicitly formulated using simple equations. This facilitates the process of comparing the tradeoffs of optimizing the savings of one criterion over the other two – a task that has traditionally been accomplished through computer simulations. A hospital building, located in Chlef, Algeria, was used as an example to apply the methodology presented in this article.Keywords: sizing, heating and power, ratios, energy consumption, carbon dioxide emissions
Procedia PDF Downloads 2271104 One-Shot Text Classification with Multilingual-BERT
Authors: Hsin-Yang Wang, K. M. A. Salam, Ying-Jia Lin, Daniel Tan, Tzu-Hsuan Chou, Hung-Yu Kao
Abstract:
Detecting user intent from natural language expression has a wide variety of use cases in different natural language processing applications. Recently few-shot training has a spike of usage on commercial domains. Due to the lack of significant sample features, the downstream task performance has been limited or leads to an unstable result across different domains. As a state-of-the-art method, the pre-trained BERT model gathering the sentence-level information from a large text corpus shows improvement on several NLP benchmarks. In this research, we are proposing a method to change multi-class classification tasks into binary classification tasks, then use the confidence score to rank the results. As a language model, BERT performs well on sequence data. In our experiment, we change the objective from predicting labels into finding the relations between words in sequence data. Our proposed method achieved 71.0% accuracy in the internal intent detection dataset and 63.9% accuracy in the HuffPost dataset. Acknowledgment: This work was supported by NCKU-B109-K003, which is the collaboration between National Cheng Kung University, Taiwan, and SoftBank Corp., Tokyo.Keywords: OSML, BERT, text classification, one shot
Procedia PDF Downloads 991103 The Challenges Faced in Learning English as a Second Language in Sri Lanka: A Case Study of Ordinary Level Students in Kurunegala District
Authors: H. L. M. Fawzan
Abstract:
Undoubtedly, learning English as a second language (ESL) is considered a challenging task. It is more difficult for students in far-away districts when compared with the students in the capital cities, where learning resources are easily available and where the environment is conducive to learning. Thus, this study is an analysis of the challenges faced by learners in learning English as the second language within kurunegala district in Sri Lanka. Even though various efforts have been taken by the Sri Lankan Educationalists for improving the situation of English language teaching for the past few decades, a disappointing situation still exist in the achievements of English learning among Sri Lankan students. So, it is necessary to explore real reasons behind the poor achievements of the students in the English Language. It is also an attempt to highlight what can be done to improve the situation significantly. Kurunegala is far away from the capital city of Sri Lanka and is a densely populated district. In the year 2020, state university admission was 45.87% from the Kurunegala district (Department of Examinations). The researcher strived to examine some of the likely challenges faced when teaching English in secondary schools in Kurunegala. The data was collected using a questionnaire from 35 students from schools within the Kurunegala education division. The result of the study reveals that students were highly motivated to learn English for their prospects and expectations such as local and international communication, academic advancement, and employment prospects.Keywords: english, teaching, Kurunegala, Sri Lanka, challenges
Procedia PDF Downloads 1501102 Uncertainty and Optimization Analysis Using PETREL RE
Authors: Ankur Sachan
Abstract:
The ability to make quick yet intelligent and value-added decisions to develop new fields has always been of great significance. In situations where the capital expenses and subsurface risk are high, carefully analyzing the inherent uncertainties in the reservoir and how they impact the predicted hydrocarbon accumulation and production becomes a daunting task. The problem is compounded in offshore environments, especially in the presence of heavy oils and disconnected sands where the margin for error is small. Uncertainty refers to the degree to which the data set may be in error or stray from the predicted values. To understand and quantify the uncertainties in reservoir model is important when estimating the reserves. Uncertainty parameters can be geophysical, geological, petrophysical etc. Identification of these parameters is necessary to carry out the uncertainty analysis. With so many uncertainties working at different scales, it becomes essential to have a consistent and efficient way of incorporating them into our analysis. Ranking the uncertainties based on their impact on reserves helps to prioritize/ guide future data gathering and uncertainty reduction efforts. Assigning probabilistic ranges to key uncertainties also enables the computation of probabilistic reserves. With this in mind, this paper, with the help the uncertainty and optimization process in petrel RE shows how the most influential uncertainties can be determined efficiently and how much impact so they have on the reservoir model thus helping in determining a cost effective and accurate model of the reservoir.Keywords: uncertainty, reservoir model, parameters, optimization analysis
Procedia PDF Downloads 648