Search results for: clarification request
158 Mobile Cloud Application in Design Build Bridge Construction
Abstract:
In the past decades, design-build has become a more popular project delivery system especially for the large scaled infrastructure project in North America. It provides a one-stop shopping system for the client therefore improves the efficiency of construction, and reduces the risks and overall cost for the clients. Compared to the project with traditional delivery method, design-build project requires contractor and designer to work together efficiently to deliver the best-value solutions through the construction process. How to facilitate a solid integration and efficient interaction between contractor and designer often affects the schedule, budget and quality of the construction therefore becomes a key factor to the success of a design-build project. This paper presents a concept of using modern mobile cloud technology to provide an integrated solution during the design-build construction. It uses mobile cloud architecture to provide a platform for real-time field progress, change request approval, job progress log, and project time entry with devices integration for field information and communications. The paper uses a real filed change notice as an example to demonstrate how mobile cloud technology applies in a design-build project and how it can improve the project efficiency.Keywords: cloud, design-build, field change notice, mobile application
Procedia PDF Downloads 248157 Accounting for Cryptocurrency: Urgent Need for an Accounting Standard
Authors: Fatima Ali Abbass, Hassan Ibrahim Rkein
Abstract:
The number of entities worldwide that currently accept digital currency as payment is increasing; however, digital currency still is not widely accepted as a medium of exchange, nor they represent legal tender. At the same time, this makes accounting for cryptocurrency, as cash (Currency) is not possible under IAS 7 and IAS 32, Cryptocurrency also cannot be accounted for as Financial Assets at fair value through profit or loss under IFRS 9. Therefore, this paper studies the possible means to account for Cryptocurrency, since, as of today, there is not yet an accounting standard that deals with cryptocurrency. The request to have a specific accounting standard is increasing from top accounting firms and from professional accounting bodies. This study uses a mixture of qualitative and quantitative analysis in its quest to explore the best possible way to account for cryptocurrency. Interviews and surveys were conducted targeting accounting professionals. This study highlighted the deficiencies in the current way of accounting for Cryptocurrency as intangible Assets with an indefinite life. The deficiency becomes well highlighted, as the asset will then be subject to impairment, where under GAAP, only depreciation in the value of the intangible asset is recognized. On the other hand, appreciation in the value of the asset is ignored, and this prohibits the reporting entity from showing the true value of the cryptocurrency asset. This research highlights the gap that arises due to using accounting standards that are not specific for Cryptocurrency and this study confirmed that there is an urgent need to call upon the accounting standards setters (IASB and FASB) to issue accounting standards specifically for Cryptocurrency.Keywords: cryptocurrency, accounting, IFRS, GAAP, classification, measurement
Procedia PDF Downloads 96156 Exploring the Association between Race and Attitudes toward Physician-Assisted Death; An Analysis of the Gss Dataset
Authors: Seini G. Kaufusi
Abstract:
Background. Physician-assisted death (PAD) has and continues to be a controversial issue in the U.S. Dying with dignity statutes exists in 9 U.S. jurisdictions that permit competent adults diagnosed with a terminal illness and given a prognosis of 6 month or less to live to request medication to hasten death. Robust advocacy for and against PAD influences policy, and opinions vary. Aim. This study aims to explore the association between race and the attitudes toward physician-assisted death in the U.S. Methods. Data for this study derives from the General Social Survey (GSS) dataset, a national survey conducted by the National Opinion Research Center (NORC) that focuses on the opinions and values of American’s. A cross-sectional design and probability sample from the 2018 data set was used to randomly select respondents. Results. The results indicated that race is significantly associated with attitudes towards physician-assisted death. The level of significance suggests a strong positive association, and the direction indicated that Black and Other racial groups have higher rates of positive decision about PAD. Conclusion. Although attitudes towards PAD varied, Black and other racial groups had favorable decisions for PAD. Further research is crucial in the continuous debate on PAD and understanding the influences of predictors for or against PAD.Keywords: attitudes, euthanasia, physician-assisted death, race
Procedia PDF Downloads 162155 Internet Optimization by Negotiating Traffic Times
Authors: Carlos Gonzalez
Abstract:
This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.Keywords: internet optimization, video download, future demands, secure storage
Procedia PDF Downloads 136154 Parents' Attitude toward Compulsory Pre-School Education in Slovakia
Authors: Sona Lorencova, Beata Hornickova
Abstract:
Compulsory pre-school education in Slovakia will be established by the Education Act for all five-year-old children from September 2021. The implementation of this law will change pre-school education in our country from optional to compulsory, and children will be able to complete this education either in institutional form school facilities or in the form of individual education at the request of the parent. The primary purpose of this change is that all children achieve pre-school education before entering primary school, thus eliminating differences between children before entering primary school. The benefits of introducing compulsory pre-school education are obvious to the professional public. However, as this fundamental change in children's education is perceived by parents who have a prime position in the upbringing and education of their children, research pays minimal attention. The aim of the study is to interpret the findings of quantitatively oriented research, which was focused on finding out the attitudes of parents to the planned introduction of compulsory preschool education in Slovakia. The data were obtained through questionnaires primarily intended for parents of preschool children. In the distributed questionnaire, the degree of agreement or disagreement with individual items could be expressed on a 5-point Likert scale. The results of the research present how perceived compulsory pre-school education is perceived by the parental public in Slovakia and what perspectives and limitations parents anticipate after its introduction.Keywords: compulsory pre-school education, education act, childs' learning and development, kindergarten, parents' perspectives
Procedia PDF Downloads 160153 Performance Evaluation of Hierarchical Location-Based Services Coupled to the Greedy Perimeter Stateless Routing Protocol for Wireless Sensor Networks
Authors: Rania Khadim, Mohammed Erritali, Abdelhakim Maaden
Abstract:
Nowadays Wireless Sensor Networks have attracted worldwide research and industrial interest, because they can be applied in various areas. Geographic routing protocols are very suitable to those networks because they use location information when they need to route packets. Obviously, location information is maintained by Location-Based Services provided by network nodes in a distributed way. In this paper we choose to evaluate the performance of two hierarchical rendezvous location based-services, GLS (Grid Location Service) and HLS (Hierarchical Location Service) coupled to the GPSR routing protocol (Greedy Perimeter Stateless Routing) for Wireless Sensor Network. The simulations were performed using NS2 simulator to evaluate the performance and power of the two services in term of location overhead, the request travel time (RTT) and the query Success ratio (QSR). This work presents also a new scalability performance study of both GLS and HLS, specifically, what happens if the number of nodes N increases. The study will focus on three qualitative metrics: The location maintenance cost, the location query cost and the storage cost.Keywords: location based-services, routing protocols, scalability, wireless sensor networks
Procedia PDF Downloads 372152 Teacher-Scaffolding vs. Peer-Scaffolding in Task-Based ILP Instruction: Effects on EFL Learners’ Metapragmatic Awareness
Authors: Amir Zand-Moghadam, Mahnaz Alizadeh
Abstract:
The aim of the present study was to investigate the effect of teacher-scaffolding versus peer-scaffolding on EFL learners’ metapragmatic awareness in the paradigm of task-based language teaching (TBLT). To this end, a number of dialogic information-gap tasks requiring two-way interactant relationship were designed for the five speech acts of request, refusal, apology, suggestion, and compliment following Ellis’s (2003) model. Then, 48 intermediate EFL learners were randomly selected, homogenized, and assigned to two groups: 26 participants in the teacher-scaffolding group (Group One) and 22 in the peer-scaffolding group (Group Two). While going through the three phases of pre-task, while-task, and post-task, the participants in the first group completed the designed tasks by the teacher’s interaction, scaffolding, and feedback. On the other hand, the participants in the second group were required to complete the tasks in expert-novice pairs through peer scaffolding in all the three phases of a task-based syllabus. The findings revealed that the participants in the teacher-scaffolding group developed their L2 metapragmatic awareness more than the peer-scaffolding group. Thus, it can be concluded that teacher-scaffolding is more effective than peer scaffolding in developing metapragmatic awareness among EFL learners. It can also be claimed that the use of tasks can be more influential when they are accompanied by teacher-scaffolding. The findings of the present study have implications for language teachers and researchers.Keywords: ILP, metapragmatic awareness, scaffolding, task-based instruction
Procedia PDF Downloads 584151 Data Security and Privacy Challenges in Cloud Computing
Authors: Amir Rashid
Abstract:
Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud
Procedia PDF Downloads 299150 Identity Management in Virtual Worlds Based on Biometrics Watermarking
Authors: S. Bader, N. Essoukri Ben Amara
Abstract:
With the technological development and rise of virtual worlds, these spaces are becoming more and more attractive for cybercriminals, hidden behind avatars and fictitious identities. Since access to these spaces is not restricted or controlled, some impostors take advantage of gaining unauthorized access and practicing cyber criminality. This paper proposes an identity management approach for securing access to virtual worlds. The major purpose of the suggested solution is to install a strong security mechanism to protect virtual identities represented by avatars. Thus, only legitimate users, through their corresponding avatars, are allowed to access the platform resources. Access is controlled by integrating an authentication process based on biometrics. In the request process for registration, a user fingerprint is enrolled and then encrypted into a watermark utilizing a cancelable and non-invertible algorithm for its protection. After a user personalizes their representative character, the biometric mark is embedded into the avatar through a watermarking procedure. The authenticity of the avatar identity is verified when it requests authorization for access. We have evaluated the proposed approach on a dataset of avatars from various virtual worlds, and we have registered promising performance results in terms of authentication accuracy, acceptation and rejection rates.Keywords: identity management, security, biometrics authentication and authorization, avatar, virtual world
Procedia PDF Downloads 265149 Emile Meyerson's Philosophy of Science in Lacan's Early Theories
Authors: Hugo T. Jorge, Richard T. Simanke
Abstract:
Lacan’s work addresses overarching issues concerning the scientific intelligibility of the subject in its philosophical sense. Even though his reflection is not, strictly speaking, philosophy of science, it contains many traits that are typical of this branch of philosophy. However, the relation between Lacan’s early thought and the philosophy of science of the time is often disregarded or only incompletely accounted for in Lacanian scholarship. French philosopher of science Emile Meyerson was often implicitly or explicitly referred to in Lacan’s works, yet few publications can be found on their relationship. The objective of this paper is to contribute to the analysis of this relationship, indicating some of its possible implications. For this, the convergence between Meyerson’s doctrine of science and Lacan’s works between 1936 and 1953 is discussed, as well as the conditions under which Lacan’s reception of Meyerson’s ideas take place. In conclusion, it is argued that this convergence allows for the clarification of important issues in Lacan’s early work, such as the concept of imago, his views on the nature of truth, and his thesis of the anthropomorphism of natural sciences. Meyerson’s argument for the permanence of common sense within science makes Lacan’s claims on the anthropomorphism of natural sciences more understandable. Similarly, Meyerson’s views on the epistemological shortfall of the Principle of Identity sheds some light on Lacan’s 1936 critique of associationistic concepts of engram and truth and may be at the origins of his antirealist and anti-idealist stances. Meyerson’s Principle of Identity is also related to some aspects of Lacan’s concept of imago. The imago understood as the unconscious condition for the identity in time of family figures in childhood, would be an excellent expression of the Principle of Identity. In this sense, the Principle of Identity may be linked to the concept of imaginary as developed by Lacan in the 1950s. However, Lacan considerably distorts Meyerson’s views in his 1936 critique of Freud’s concept of libido. Finally, a possible relationship between Lacan’s late concept of the real and Meyerson’s concept of the irrational is suggested.Keywords: imaginary, Lacan, Meyerson, philosophy of science, real
Procedia PDF Downloads 172148 Agricultural Biotechnology Crop Improvement
Authors: Mohsen Rezaei Aghdam
Abstract:
Recombinant DNA technology has meaningfully augmented the conventional crop improvement and has a great possibility to contribution plant breeders to encounter the augmented food request foretold for the 21st century. Predictable changes in weather and its erraticism, chiefly extreme fevers and vicissitudes in rainfall are expected to brand crop upgrading even more vital for food manufacture. Tissue attitude has been downtrodden to create genetic erraticism from which harvest plants can be better, to improve the state of health of the recognized physical and to upsurge the number of wanted germplasms obtainable to the plant breeder. This appraisal delivers an impression of the chances obtainable by the integration of vegetable biotechnology into plant development efforts and increases some of the social subjects that need to be considered in their application. Public-private companies offer chances to catalyze new approaches and investment while accelerating integrated research and development and commercial supply chain-based solutions. Novel varieties derivative by encouraged mutatgenesis are used commonly: rice in Thailand. These paper combinations obtainable data about the influence of change breeding-derived crop changes around the world, traveler magnetism the possibility of mutation upbringing as a flexible and feasible approach appropriate to any crop if that suitable objectives and selection approaches are used.Keywords: crop, improve, genetic, agricultural
Procedia PDF Downloads 167147 The Effect of Global Warming on Water Resources
Authors: Ehsan Soltanzadeh, Hassan Zare
Abstract:
This paper introduces examples of the influences of global warming on water resources and means of adaptation. The contributing causes of shortage in water resources are sophisticated and have interactions with each other. The world-scale phenomena like global warming have led to an increase in air and ocean’s mean temperature, and this has already caused adverse effects on water resources. Other factors that exacerbated this situation such as population increase, changes in farming habits, rise in city dwellers, unbalanced request for energy and aquatic resources, improved living standards, new eating habits, increasing economic growth and consequently flourishing industrial activities, and different types of pollution such as air, water, etc., are compelling more pressure on our limited water resources. The report will briefly discuss climate change and its detrimental impacts on the water resources and finally will introduce two effective solutions to mitigate the consequences or even reverse them in the near to mid-term future: utilization of molten salt technology for storing huge amounts of generated electricity in solar power plants to accommodate power grid demands, and implementing fuel cell CHPs to reduce carbon emission, and consequently, mitigate the global warming phenomenon as the major root cause of threatening water resources.Keywords: climate change, global warming, water resources, GHG emissions, fuel cell-CHP, solar power plant, molten salt storage
Procedia PDF Downloads 112146 Formal Specification of Web Services Applications for Digital Reference Services of Library Information System
Authors: Magaji Zainab Musa, Nordin M. A. Rahman, Julaily Aida Jusoh
Abstract:
This paper discusses the formal specification of web services applications for digital reference services (WSDRS). Digital reference service involves a user requesting for help from a reference librarian and a reference librarian responding to the request of a user all by electronic means. In most cases users do not get satisfied while using digital reference service due to delay of response of the librarians. Another may be due to no response or due to librarian giving an irrelevant solution to the problem submitted by the user. WDSRS is an informal model that claims to reduce the problems of digital reference services in libraries. It uses web services technology to provide efficient way of satisfying users’ need in the reference section of libraries. But informal model is in natural language which is inconsistent and ambiguous that may cause difficulties to the developers of the system. In order to solve this problem we decided to convert the informal specifications into formal specifications. This is supposed to reduce the overall development time and cost. Formal specification can be used to provide an unambiguous and precise supplement to natural language descriptions. It can be rigorously validated and verified leading to the early detection of specification errors. We use Z language to develop the formal model and verify it with Z/EVES theorem prover tool.Keywords: formal, specifications, web services, digital reference services
Procedia PDF Downloads 376145 Correlation between Knowledge Level and Public Perception of Autopsy on Criminal Offence Victim in Pulau Punjung
Authors: Osalina Toemapa, Rika Susanti, Husna Yetti
Abstract:
In criminal offense case, such as homicide, investigators may request for an autopsy to the victim without family approval in Indonesia. Generally, there has been decreasing in autopsy rate in the world over past years. Family’s refusal is one of the most common problems. The purpose of this study is to find the correlation between knowledge level and public perception of autopsy on criminal offense victim. This cross-sectional study was done from April to May 2017 in subdistrict Pulau Punjung. Participants were asked to fill the questionnaire. There are 15 questions to asses knowledge level, perception, and factors influencing autopsy refusal. The chi-square test was used for the statistical analysis. Out of the total of 436 respondents, 54,5% were found to have poor knowledge level, and 56,7% were found to have poor perception. There was a significant correlation between knowledge level and public perception (p<0,001). There are 153 respondents who decline autopsy on criminal offense victim with the most factors influencing autopsy refusal is delays in victim’s funeral (92,2%). Conclusion, knowledge level is correlated with public perception in subdistrict of Pulau Punjung, district of Dharmasraya, West Sumatra, Indonesia. Most influencing factor in autopsy refusal is delays in victim’s funeral.Keywords: knowledge level, public perception, autopsy on criminal offense victim, autopsy refusal
Procedia PDF Downloads 303144 Identification of the Key Enzyme of Roseoflavin Biosynthesis
Authors: V. Konjik, J. Schwartz, R. Sandhoff, M. Mack
Abstract:
The rising number of multi-resistant pathogens demands the development of new antibiotics in order to reduce the lethal risk of infections. Here, we investigate roseoflavin, a vitamin B2 analogue which is produced by Streptomyces davawensis and Streptomyces cinnabarinus. We consider roseoflavin to be a 'Trojan horse' compound. Its chemical structure is very similar to riboflavin but in fact it is a toxin. Furthermore, it is a clever strategy with regard to the delivery of an antibiotic to its site of action but also with regard to the production of this chemical: The producer cell has only to convert a vitamin (which is already present in the cytoplasm) into a vitamin analog. Roseoflavin inhibits the activity of Flavin depending proteins, which makes up to 3.5 % of predicted proteins in organisms sequenced so far. We sequentially knocked out gene clusters and later on single genes in order to find the ones which are involved in the roseoflavin biosynthesis. Consequently, we identified the gene rosB, coding for the protein carrying out the first step of roseoflavin biosynthesis, starting form Flavin mononucleotide. Here we show, that the protein RosB has so far unknown features. It is per se an oxidoreductase, a decarboxylase and an aminotransferase, all rolled into one enzyme. A screen of cofactors revealed needs of oxygen, NAD+, thiamine and glutamic acid to carry out its function. Surprisingly, thiamine is not only needed for the decaboxylation step, but also for the oxidation of 8-demethyl-8-formyl Flavin mononucleotide. We had managed to isolate three different Flavin intermediates with different oxidation states, which gave us a mechanistic insight of RosB functionality. Our work points to a so far new function of thiamine in Streptomyces davawensis. Additionally, RosB could be extremely useful for chemical synthesis. Careful engineering of RosB may allow the site-specific replacement of methyl groups by amino groups in polyaromatic compounds of commercial interest. Finally, the complete clarification of the roseoflavin biosynthesis opens the possibility of engineering cost-effective roseoflavin producing strains.Keywords: antibiotic, flavin analogue, roseoflavin biosynthesis, vitamin B2
Procedia PDF Downloads 243143 Identifying the Strength of Cyclones and Earthquakes Requiring Military Disaster Response
Authors: Chad A. Long
Abstract:
The United States military is now commonly responding to complex humanitarian emergencies and natural disasters around the world. From catastrophic earthquakes in Haiti to typhoons devastating the Philippines, U.S. military assistance is requested when the event exceeds the local government's ability to assist the population. This study assesses the characteristics of catastrophes that surpass a nation’s individual ability to respond and recover from the event. The paper begins with a historical summary of military aid and then analyzes over 40 years of the United States military humanitarian response. Over 300 military operations were reviewed and coded based on the nature of the disaster. This in-depth study reviewed the U.S. military’s deployment events for cyclones and earthquakes to determine the strength of the natural disaster requiring external assistance. The climatological data for cyclone landfall and magnitude data for earthquake epicenters were identified, grouped into regions and analyzed for time-based trends. The results showed that foreign countries will likely request the U.S. military for cyclones with speeds greater or equal to 125 miles an hour and earthquakes at the magnitude of 7.4 or higher. These results of this study will assist the geographic combatant commands in determining future military response requirements.Keywords: military, natural disasters, earthquakes, cyclone
Procedia PDF Downloads 120142 Identification and Origins of Multiple Personality: A Criterion from Wiggins
Authors: Brittany L. Kang
Abstract:
One familiar theory of the origin of multiple personalities focuses on how symptoms of trauma or abuse are central causes, as seen in paradigmatic examples of the condition. The theory states that multiple personalities constitute a congenital condition, as babies all exhibit multiplicity, and that generally alters only remain separated due to trauma. In more typical cases, the alters converge and become a single identity; only in cases of trauma, according to this account, do the alters remain separated. This theory is misleading in many aspects, the most prominent being that not all multiple personality patients are victims of child abuse or trauma, nor are all cases of multiple personality observed in early childhood. The use of this criterion also causes clinical problems, including an inability to identify multiple personalities through the variety of symptoms and traits seen across observed cases. These issues present a need for revision in the currently applied criterion in order to separate the notion of child abuse and to be able to better understand the origins of multiple personalities itself. Identifying multiplicity through the application of identity theories will improve the current criterion, offering a bridge between identifying existing cases and understanding their origins. We begin by applying arguments from Wiggins, who held that each personality within a multiple was not a whole individual, but rather characters who switch off. Wiggins’ theory is supported by observational evidence of how such characters are differentiated. Alters of older ages are seen to require different prescription lens, in addition to having different handwriting. The alters may also display drastically varying styles of clothing, preferences in food, their gender, sexuality, religious beliefs and more. The definitions of terms such as 'personality' or 'persons' also become more distinguished, leading to greater understanding of who is exactly able to be classified as a patient of multiple personalities. While a more common meaning of personality is a designation of specific characteristics which account for the entirety of a person, this paper argues from Wiggins’ theory that each 'personality' is in fact only partial. Clarification of the concept in question will allow for more successful future clinical applications.Keywords: identification, multiple personalities, origin, Wiggins' theory
Procedia PDF Downloads 242141 Free, Fair, and Credible Election and Democratic Governance in Bangladesh
Authors: Md. Awal Hossain Mollah
Abstract:
The aim of this study was to evaluate the relation between the free, fair and credible election in ensuring democratic governance in Bangladesh. The paper is a case (Bangladesh) study and qualitative in nature and based on secondary sources of materials. For doing this study, conceptual clarification has been done first and identified few elements of free, fair and credible elections. Then, how far these elements have been ensured in Bangladeshi elections has been evaluated by analyzing all the national elections held since independence. Apart from these, major factors and challenges of holding a free, fair and credible election in Bangladesh have been examined through using the following research questions: 1. Does role of election commission matter for free, fair and credible elections to form a democratic government? 2. Does role of political parties matter for democratic governance? 3. Do role of government matter for conducting the free, fair and credible election in ensuring democratic governance? 4. Does non-party caretaker government matter for conducting a free, fair and credible election? 5. Does democratic governance depend on multi-dimensional factors and actors? Major findings of this study are: Since the independence of Bangladesh, 10 national elections held in various regimes. 4 out of 10 national elections have been found free, fair and credible which have been conducted by the non-party caretaker government. Rests of the elections are not out of controversy and full of manipulation held under elected government. However, the caretaker government has already been abolished by the AL government through 15th amendment of the constitution. The present AL government is elected by the 10th parliamentary election under incumbent (AL) government, but a major opposition allies (20 parties) lead by BNP boycotted this election and 154 of the total 300 seats being uncontested. As a result, AL again came to the power without a competitive election and most of the national and International election observers including media world consider this election as unfair and the government is suffering from lack of legitimacy. Therefore, the governance of present Bangladesh is not democratic at all and it is to be considered as one party (14 parties’ allies lead by AL) authoritarian governance in the shade of parliamentary governance. Both the position and opposition of the parliament is belonging in 14 parties’ alliances lead by AL.Keywords: democracy, governance, free, fair and credible elections, Bangladesh
Procedia PDF Downloads 326140 Data Recording for Remote Monitoring of Autonomous Vehicles
Authors: Rong-Terng Juang
Abstract:
Autonomous vehicles offer the possibility of significant benefits to social welfare. However, fully automated cars might not be going to happen in the near further. To speed the adoption of the self-driving technologies, many governments worldwide are passing laws requiring data recorders for the testing of autonomous vehicles. Currently, the self-driving vehicle, (e.g., shuttle bus) has to be monitored from a remote control center. When an autonomous vehicle encounters an unexpected driving environment, such as road construction or an obstruction, it should request assistance from a remote operator. Nevertheless, large amounts of data, including images, radar and lidar data, etc., have to be transmitted from the vehicle to the remote center. Therefore, this paper proposes a data compression method of in-vehicle networks for remote monitoring of autonomous vehicles. Firstly, the time-series data are rearranged into a multi-dimensional signal space. Upon the arrival, for controller area networks (CAN), the new data are mapped onto a time-data two-dimensional space associated with the specific CAN identity. Secondly, the data are sampled based on differential sampling. Finally, the whole set of data are encoded using existing algorithms such as Huffman, arithmetic and codebook encoding methods. To evaluate system performance, the proposed method was deployed on an in-house built autonomous vehicle. The testing results show that the amount of data can be reduced as much as 1/7 compared to the raw data.Keywords: autonomous vehicle, data compression, remote monitoring, controller area networks (CAN), Lidar
Procedia PDF Downloads 163139 Coupling Static Multiple Light Scattering Technique With the Hansen Approach to Optimize Dispersibility and Stability of Particle Dispersions
Authors: Guillaume Lemahieu, Matthias Sentis, Giovanni Brambilla, Gérard Meunier
Abstract:
Static Multiple Light Scattering (SMLS) has been shown to be a straightforward technique for the characterization of colloidal dispersions without dilution, as multiply scattered light in backscattered and transmitted mode is directly related to the concentration and size of scatterers present in the sample. In this view, the use of SMLS for stability measurement of various dispersion types has already been widely described in the literature. Indeed, starting from a homogeneous dispersion, the variation of backscattered or transmitted light can be attributed to destabilization phenomena, such as migration (sedimentation, creaming) or particle size variation (flocculation, aggregation). In a view to investigating more on the dispersibility of colloidal suspensions, an experimental set-up for “at the line” SMLS experiment has been developed to understand the impact of the formulation parameters on particle size and dispersibility. The SMLS experiment is performed with a high acquisition rate (up to 10 measurements per second), without dilution, and under direct agitation. Using such experimental device, SMLS detection can be combined with the Hansen approach to optimize the dispersing and stabilizing properties of TiO₂ particles. It appears that the dispersibility and the stability spheres generated are clearly separated, arguing that lower stability is not necessarily a consequence of poor dispersibility. Beyond this clarification, this combined SMLS-Hansen approach is a major step toward the optimization of dispersibility and stability of colloidal formulations by finding solvents having the best compromise between dispersing and stabilizing properties. Such study can be intended to find better dispersion media, greener and cheaper solvents to optimize particles suspensions, reduce the content of costly stabilizing additives or satisfy product regulatory requirements evolution in various industrial fields using suspensions (paints & inks, coatings, cosmetics, energy).Keywords: dispersibility, stability, Hansen parameters, particles, solvents
Procedia PDF Downloads 110138 The Influence of Housing Choice Vouchers on the Private Rental Market
Authors: Randy D. Colon
Abstract:
Through a freedom of information request, data pertaining to Housing Choice Voucher (HCV) households has been obtained from the Chicago Housing Authority, including rent price and number of bedrooms per HCV household, community area, and zip code from 2013 to the first quarter of 2018. Similar data pertaining to the private rental market will be obtained through public records found through the United States Department of Housing and Urban Development. The datasets will be analyzed through statistical and mapping software to investigate the potential link between HCV households and distorted rent prices. Quantitative data will be supplemented by qualitative data to investigate the lived experience of Chicago residents. Qualitative data will be collected at community meetings in the Chicago Englewood neighborhood through participation in neighborhood meetings and informal interviews with residents and community leaders. The qualitative data will be used to gain insight on the lived experience of community leaders and residents of the Englewood neighborhood in relation to housing, the rental market, and HCV. While there is an abundance of quantitative data on this subject, this qualitative data is necessary to capture the lived experience of local residents effected by a changing rental market. This topic reflects concerns voiced by members of the Englewood community, and this study aims to keep the community relevant in its findings.Keywords: Chicago, housing, housing choice voucher program, housing subsidies, rental market
Procedia PDF Downloads 118137 Teacher Education in a Bilingual Perspective: Brazilian Sign Language and Portuguese
Authors: Neuma Chaveiro, Juliana Guimarães Faria
Abstract:
Introduction: The thematic that guides this study is teacher training for the teaching of sign language in a perspective of bilingual education – specifically aimed at Brazilian public schools that offer inclusive education, and that have, among its students, deaf children who use Brazilian Sign Language as a means of communication and expression. In the Teacher Training Course for Letters/Libras at the Universidade Federal de Goiás/UFG, we developed a bilingual education project for the deaf, linked to PIBID (Institutional Scholarship for Teaching Initiation Program), funded by the Brazilian Federal Government through CAPES (Coordination for the Improvement of Higher Education Personnel). Goals: to provide the education of higher education teachers to work in public schools in basic education and to insert students from the UFG’s Letters/Libras course in the school’s daily life, giving them the opportunity for the creation and participation in methodological experiences and of teaching practices in order to overcome the problems identified in the teaching-learning process of deaf students, in a bilingual perspective, associating Libras (Brazilian Sign Language) and Portuguese. Methodology: qualitative approach and research-action, prioritizing action – reflection – action of the people involved. The Letters-Libras PIBID of the College of Letters/UFG, in this qualitative context, is guided by the assumptions of investigation-action to contribute to the education of the Libras teacher. Results: production of studies and researches in the area of education, professionalization and teaching practice for the degree holder in Letters: Libras; b) studies, research and training in bilingual education; c) clarification and discussion of the myths that permeate the reality of users of sign languages; d) involving students in the development of didactic materials for bilingual education. Conclusion: the PIBID Project Letters/Libras allows, both to the basic education school and to the teachers in training for the teaching of Libras, an integrated and collective work partnership, with discussions and changes in relation to bilingual education for the deaf and the teaching of Libras.Keywords: deaf, sign language, teacher training, educacion
Procedia PDF Downloads 296136 MLProxy: SLA-Aware Reverse Proxy for Machine Learning Inference Serving on Serverless Computing Platforms
Authors: Nima Mahmoudi, Hamzeh Khazaei
Abstract:
Serving machine learning inference workloads on the cloud is still a challenging task at the production level. The optimal configuration of the inference workload to meet SLA requirements while optimizing the infrastructure costs is highly complicated due to the complex interaction between batch configuration, resource configurations, and variable arrival process. Serverless computing has emerged in recent years to automate most infrastructure management tasks. Workload batching has revealed the potential to improve the response time and cost-effectiveness of machine learning serving workloads. However, it has not yet been supported out of the box by serverless computing platforms. Our experiments have shown that for various machine learning workloads, batching can hugely improve the system’s efficiency by reducing the processing overhead per request. In this work, we present MLProxy, an adaptive reverse proxy to support efficient machine learning serving workloads on serverless computing systems. MLProxy supports adaptive batching to ensure SLA compliance while optimizing serverless costs. We performed rigorous experiments on Knative to demonstrate the effectiveness of MLProxy. We showed that MLProxy could reduce the cost of serverless deployment by up to 92% while reducing SLA violations by up to 99% that can be generalized across state-of-the-art model serving frameworks.Keywords: serverless computing, machine learning, inference serving, Knative, google cloud run, optimization
Procedia PDF Downloads 179135 Supply Chain Resource Optimization Model for E-Commerce Pure Players
Authors: Zair Firdaous, Fourka Mohamed, Elfelsoufi Zoubir
Abstract:
The arrival of e-commerce has changed the supply chain management on the operational level as well as on the organization and strategic and even tactical decisions of the companies. The optimization of resources is an issue that is needed on the tactical and operational strategic plan. This work considers the allocation of resources in the case of pure players that have launched online sales. The aim is to improve the level of customer satisfaction and maintaining the benefits of e-retailer and of its cooperators and reducing costs and risks. We first modeled the B2C chain with all operations that integrates and possible scenarios since online retailers offer a wide selection of personalized service. The personalized services that online shopping companies offer to the clients can be embodied in many aspects, such as the customizations of payment, the distribution methods, and after-sales service choices. Every aspect of customized service has several modes. At that time, we analyzed the optimization problems of supply chain resource in customized online shopping service mode. Then, we realized an optimization model and algorithm for the development based on the analysis of the of the B2C supply chain resources. It is a multi-objective optimization that considers the collaboration of resources in operations, time and costs but also the risks and the quality of services as well as dynamic and uncertain characters related to the request.Keywords: supply chain resource, e-commerce, pure-players, optimization
Procedia PDF Downloads 248134 Sexual Health and Sexual Risk Behavior of the Youth with HIV Positive in Northeastern Part, Thailand
Authors: Orathai Srithongtham, Ubonsri Thabuddha
Abstract:
The youth with HIV positive is not difference from the general youth in term of sexual needs. Sexual health is crucial the most to support the youth with HIV positive to be sexual well-being. This study aims to elucidate the sexual health on protection from STDs (Sexual Transmitted Diseases) and HIV transmission and to explain sexual risk behavior of the youth with HIV positive. The target group was the youth with HIV positive about 23 cases from two provinces in northeastern part of Thailand. Qualitative method was applied for collecting data by in-depth interview. Content analysis was use for data analysis. The youth with HIV positive was protection from STDs and HIV transmission by using the condom during sexual activity. The reason to deny the condom use were ashamed, condom is not a part of life, no have fit size, and the youth fear to stigmatized as a mental disorder and fear to stigmatized as going to fuck someone. The youth who trust with nurse in clinic was dare to request the condom by face. Sexual activity without condom use is sexual risk behavior. The major causes were couple trust and the sexual enjoyment first and sexual active competition with friend without condom use. The concern on HIV was the boyfriend or girlfriend not accepts the HIV positive people, worry about the HIV transmutation, and finally not compliance to ARV drug. The youth with HIV positive was lacking of the knowledge on sexual health on the issues of access to condom and the concern to keep on relationship with the boyfriend or girlfriend. This concern issues was led to the non-adherence of ARV drug and HIV distribution. To provide the sexual health service is more essential to the youth with HIV positive.Keywords: sexual health, sexual risk behavior, youth, HIV
Procedia PDF Downloads 477133 Optimisation of B2C Supply Chain Resource Allocation
Authors: Firdaous Zair, Zoubir Elfelsoufi, Mohammed Fourka
Abstract:
The allocation of resources is an issue that is needed on the tactical and operational strategic plan. This work considers the allocation of resources in the case of pure players, manufacturers and Click & Mortars that have launched online sales. The aim is to improve the level of customer satisfaction and maintaining the benefits of e-retailer and of its cooperators and reducing costs and risks. Our contribution is a decision support system and tool for improving the allocation of resources in logistics chains e-commerce B2C context. We first modeled the B2C chain with all operations that integrates and possible scenarios since online retailers offer a wide selection of personalized service. The personalized services that online shopping companies offer to the clients can be embodied in many aspects, such as the customizations of payment, the distribution methods, and after-sales service choices. In addition, every aspect of customized service has several modes. At that time, we analyzed the optimization problems of supply chain resource allocation in customized online shopping service mode, which is different from the supply chain resource allocation under traditional manufacturing or service circumstances. Then we realized an optimization model and algorithm for the development based on the analysis of the allocation of the B2C supply chain resources. It is a multi-objective optimization that considers the collaboration of resources in operations, time and costs but also the risks and the quality of services as well as dynamic and uncertain characters related to the request.Keywords: e-commerce, supply chain, B2C, optimisation, resource allocation
Procedia PDF Downloads 272132 Community Interpreting in the Process of Asylum Seeking in Brazil
Authors: Fernanda Garcia
Abstract:
With the recent growth of refugees in the world, there has been an exponential increase in requests for asylum seeking in Brazil. When asylum seekers arrive in the country, the government initiates a process to evaluate the case, which will serve as grounds to determine the refugee status of the asylum seekers. During this process, an interview where the migrant has the chance to tell their story takes place. The aim of this article is to analyse how community interpreting is conducted in Brazil with regard to asylum seeking, as well as to analyse the role of the interpreter in the context of these official interviews to request refuge in Brazil. We investigate how the presence of an interpreter influences this interview, but more specifically, we study some of the linguistic techniques used by the interpreter in order to make the interaction more effective, as well as the challenges and difficulties they encounter during the interview. To do so, surveys with the interpreters took place, in addition to on-site observations. The interpreters involved in this research are volunteers as part of an extra-curricular extension programme from the University of Brasilia, in Brazil. Community Interpreting is a somewhat new field in Brazil, still facing several obstacles, such as the lack of professional community interpreters. This research illustrates some of these issues and, thus, has the potential to foster Brazilian literature in the matter as well as help understand the role of the interpreter in the interview to seek asylum in Brazil. The refugees’ situation in the world is certainly a pressing matter, and the language barrier is an issue of great importance. Hence, translation and interpretation studies have a fundamental role in this area, when it comes to contributing to a more inclusive world to those in need.Keywords: asylum seeking, community interpreting, interviews, refugees
Procedia PDF Downloads 137131 Geospatial Land Suitability Modeling for Biofuel Crop Using AHP
Authors: Naruemon Phongaksorn
Abstract:
The biofuel consumption has increased significantly over the decade resulting in the increasing request on agricultural land for biofuel feedstocks. However, the biofuel feedstocks are already stressed of having low productivity owing to inappropriate agricultural practices without considering suitability of crop land. This research evaluates the land suitability using GIS-integrated Analytic Hierarchy Processing (AHP) of biofuel crops: cassava, at Chachoengsao province, in Thailand. AHP method that has been widely accepted for land use planning. The objective of this study is compared between AHP method and the most limiting group of land characteristics method (classical approach). The reliable results of the land evaluation were tested against the crop performance assessed by the field investigation in 2015. In addition to the socio-economic land suitability, the expected availability of raw materials for biofuel production to meet the local biofuel demand, are also estimated. The results showed that the AHP could classify and map the physical land suitability with 10% higher overall accuracy than the classical approach. The Chachoengsao province showed high and moderate socio-economic land suitability for cassava. Conditions in the Chachoengsao province were also favorable for cassava plantation, as the expected raw material needed to support ethanol production matched that of ethanol plant capacity of this province. The GIS integrated AHP for biofuel crops land suitability evaluation appears to be a practical way of sustainably meeting biofuel production demand.Keywords: Analytic Hierarchy Processing (AHP), Cassava, Geographic Information Systems, Land suitability
Procedia PDF Downloads 201130 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 252129 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls
Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu
Abstract:
Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.Keywords: android, API Calls, machine learning, permissions combination
Procedia PDF Downloads 329