Search results for: maneuvering target
2604 Cultural Aspect Representation: An Analysis of EFL Textbook Grade 10 Years 2017 in Indonesia
Authors: Soni Ariawan
Abstract:
The discourse of language and culture relation is an interesting issue to be researched. The debate is not about what comes first, language or culture, but it strongly argues that learning foreign language also means learning the culture of the language. The more interesting issue found once constructing an EFL textbook dealing with proportional representation among source culture, target culture and international culture. This study investigates cultural content representation in EFL textbook grade 10 year 2017 in Indonesia. Cortazzi and Jin’s theoretical framework is employed to analyse the reading texts, conversations, and images. The finding shows that national character as the main agenda of Indonesian government is revealed in this textbook since the textbook more frequently highlights the source culture (Indonesian culture) compared to target and international culture. This is aligned with the aim of Indonesian government to strengthen the national identity and promoting local culture awareness through education. To conclude, the study is expected to be significant in providing the idea for government to consider cultural balances representation in constructing textbook. Furthermore, teachers and students should be aware of cultural content revealed in the EFL textbook and be able to enhance intercultural communication not only in the classroom but also in a wider society.Keywords: EFL textbook, intercultural communication, local culture, target culture, international culture
Procedia PDF Downloads 2202603 Electronic Stability Control for a 7 DOF Vehicle Model Using Flex Ray and Neuro Fuzzy Techniques
Authors: Praveen Battula
Abstract:
Any high performance car has the tendency to over steer and Understeer under slippery conditions, An Electronic Stability Control System is needed under these conditions to regulate the steering of the car. It uses Anti-Lock Braking System (ABS) and Traction Control and Wheel Speed Sensor, Steering Angle Sensor, Rotational Speed Sensors to correct the problems. The focus of this paper is to improve the driving dynamics and safety by controlling the forces applied on each wheel. ESC Control the Yaw Stability, traction controls the Roll Stability, where actually the vehicle slip rate and lateral acceleration is controlled. ESC uses differential braking on all four brakes independently to control the vehicle’s motion. A mathematical model is developed in Simulink for the FlexRay based Electronic Stability Control. Vehicle steering is developed using Neuro Fuzzy Logic Controller. 7 Degrees of Freedom Vehicle Model is used as a Plant Model using dSpace autobox. The Performance of the system is assessed using two different road Scenarios, Vehicle Control under standard maneuvering conditions. The entire system is set using Dspace Control Desk. Results are provided by comparison of how a Vehicle with and without Electronic Stability Control which shows an improved performance in control.Keywords: ESC, flexray, chassis control, steering, neuro fuzzy, vehicle dynamics
Procedia PDF Downloads 4482602 Methodology to Achieve Non-Cooperative Target Identification Using High Resolution Range Profiles
Authors: Olga Hernán-Vega, Patricia López-Rodríguez, David Escot-Bocanegra, Raúl Fernández-Recio, Ignacio Bravo
Abstract:
Non-Cooperative Target Identification has become a key research domain in the Defense industry since it provides the ability to recognize targets at long distance and under any weather condition. High Resolution Range Profiles, one-dimensional radar images where the reflectivity of a target is projected onto the radar line of sight, are widely used for identification of flying targets. According to that, to face this problem, an approach to Non-Cooperative Target Identification based on the exploitation of Singular Value Decomposition to a matrix of range profiles is presented. Target Identification based on one-dimensional radar images compares a collection of profiles of a given target, namely test set, with the profiles included in a pre-loaded database, namely training set. The classification is improved by using Singular Value Decomposition since it allows to model each aircraft as a subspace and to accomplish recognition in a transformed domain where the main features are easier to extract hence, reducing unwanted information such as noise. Singular Value Decomposition permits to define a signal subspace which contain the highest percentage of the energy, and a noise subspace which will be discarded. This way, only the valuable information of each target is used in the recognition process. The identification algorithm is based on finding the target that minimizes the angle between subspaces and takes place in a transformed domain. Two metrics, F1 and F2, based on Singular Value Decomposition are accomplished in the identification process. In the case of F2, the angle is weighted, since the top vectors set the importance in the contribution to the formation of a target signal, on the contrary F1 simply shows the evolution of the unweighted angle. In order to have a wide database or radar signatures and evaluate the performance, range profiles are obtained through numerical simulation of seven civil aircraft at defined trajectories taken from an actual measurement. Taking into account the nature of the datasets, the main drawback of using simulated profiles instead of actual measured profiles is that the former implies an ideal identification scenario, since measured profiles suffer from noise, clutter and other unwanted information and simulated profiles don't. In this case, the test and training samples have similar nature and usually a similar high signal-to-noise ratio, so as to assess the feasibility of the approach, the addition of noise has been considered before the creation of the test set. The identification results applying the unweighted and weighted metrics are analysed for demonstrating which algorithm provides the best robustness against noise in an actual possible scenario. So as to confirm the validity of the methodology, identification experiments of profiles coming from electromagnetic simulations are conducted, revealing promising results. Considering the dissimilarities between the test and training sets when noise is added, the recognition performance has been improved when weighting is applied. Future experiments with larger sets are expected to be conducted with the aim of finally using actual profiles as test sets in a real hostile situation.Keywords: HRRP, NCTI, simulated/synthetic database, SVD
Procedia PDF Downloads 3542601 Angle of Arrival Estimation Using Maximum Likelihood Method
Authors: Olomon Wu, Hung Lu, Nick Wilkins, Daniel Kerr, Zekeriya Aliyazicioglu, H. K. Hwang
Abstract:
Multiple Input Multiple Output (MIMO) radar has received increasing attention in recent years. MIMO radar has many advantages over conventional phased array radar such as target detection, resolution enhancement, and interference suppression. In this paper, the results are presented from a simulation study of MIMO Uniformly-Spaced Linear Array (ULA) antennas. The performance is investigated under varied parameters, including varied array size, Pseudo Random (PN) sequence length, number of snapshots, and Signal to Noise Ratio (SNR). The results of MIMO are compared to a traditional array antenna.Keywords: MIMO radar, phased array antenna, target detection, radar signal processing
Procedia PDF Downloads 5412600 A Research Analysis on the Source Technology and Convergence Types
Authors: Kwounghee Choi
Abstract:
Technological convergence between the various sectors is expected to have a very large impact on future industrial and economy. This study attempts to do empirical approach between specific technologies’ classification. For technological convergence classification, it is necessary to set the target technology to be analyzed. This study selected target technology from national research and development plan. At first we found a source technology for analysis. Depending on the weight of source technology, NT-based, BT-based, IT-based, ET-based, CS-based convergence types were classified. This study aims to empirically show the concept of convergence technology and convergence types. If we use the source technology to classify convergence type, it will be useful to make practical strategies of convergence technology.Keywords: technology convergence, source technology, convergence type, R&D strategy, technology classification
Procedia PDF Downloads 4852599 In-Vivo Association of Multivalent 11 Zinc Fingers Transcriptional Factors CTCF and Boris to YB-1 in Multiforme Glioma-RGBM Cell Line
Authors: Daruliza Kernain, Shaharum Shamsuddin, See Too Wei Cun
Abstract:
CTCF is a unique, highly conserved and ubiquitously expressed 11 zinc finger (ZF) transcriptional factor with multiple target sites. It is able to bind to various target sequences to perform different regulatory roles including promoter activation or repression, creating hormone-responsive gene silencing element, and functional block of enhancer-promoter interactions. The binding of CTCF to the essential binding site is through the combination of different ZF domain. On the other hand, BORIS for brother of the regulator of imprinted sites, which expressed only in the testis and certain cancer cell line is homology to CTCF 11 ZF domains. Since both transcriptional factors share the same ZF domains hence there is a possibility for both to bind to the same target sequences. In this study, the interaction of these two proteins to multi-functional Y-box DNA/RNA-binding factor, YB-1 was determined. The protein-protein interaction between CTCF/YB-1 and BORIS/YB-1 were discovered by Co-immuno-precipitation (CO-IP) technique through reciprocal experiment from RGBM total cell lysate. The results showed that both CTCF and BORIS were able to interact with YB-1 in Glioma RGBM cell line. To the best of our knowledge, this is the first findings demonstrating the ability of BORIS and YB-1 to form a complex in vivo.Keywords: immunoprecipitation, CTCF/BORIS/YB-1, transcription factor, molecular medicine
Procedia PDF Downloads 2662598 Estimation of Optimum Parameters of Non-Linear Muskingum Model of Routing Using Imperialist Competition Algorithm (ICA)
Authors: Davood Rajabi, Mojgan Yazdani
Abstract:
Non-linear Muskingum model is an efficient method for flood routing, however, the efficiency of this method is influenced by three applied parameters. Therefore, efficiency assessment of Imperialist Competition Algorithm (ICA) to evaluate optimum parameters of non-linear Muskingum model was addressed through this study. In addition to ICA, Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) were also used aiming at an available criterion to verdict ICA. In this regard, ICA was applied for Wilson flood routing; then, routing of two flood events of DoAab Samsami River was investigated. In case of Wilson flood that the target function was considered as the sum of squared deviation (SSQ) of observed and calculated discharges. Routing two other floods, in addition to SSQ, another target function was also considered as the sum of absolute deviations of observed and calculated discharge. For the first floodwater based on SSQ, GA indicated the best performance, however, ICA was on first place, based on SAD. For the second floodwater, based on both target functions, ICA indicated a better operation. According to the obtained results, it can be said that ICA could be used as an appropriate method to evaluate the parameters of Muskingum non-linear model.Keywords: Doab Samsami river, genetic algorithm, imperialist competition algorithm, meta-exploratory algorithms, particle swarm optimization, Wilson flood
Procedia PDF Downloads 5042597 A Study of Surface of Titanium Targets for Neutron Generators
Authors: Alexey Yu. Postnikov, Nikolay T. Kazakovskiy, Valery V. Mokrushin, Irina A. Tsareva, Andrey A. Potekhin, Valentina N. Golubeva, Yuliya V. Potekhina, Maxim V. Tsarev
Abstract:
The development of tritium and deuterium targets for neutron tubes and generators is a part of the activities in All-Russia Research Institute of Experimental Physics (RFNC-VNIIEF). These items contain a metal substrate (for example, copper) with a titanium film with a few microns thickness deposited on it. Then these metal films are saturated with tritium, deuterium or their mixtures. The significant problem in neutron tubes and neutron generators is the characterization of substrate surface before a deposition of titanium film on it, and analysis of the deposited titanium film’s surface before hydrogenation and after a saturation of the film with hydrogen isotopes. The performance effectiveness of neutron tube and generator also depends on upon the quality parameters of the surface of the initial substrate, deposited metal film and hydrogenated target. The objective of our work is to study the target prototype samples, that have differ by various approaches to the preliminary chemical processing of a copper substrate, and to analyze the integrity of titanium film after its saturation with deuterium. The research results of copper substrate and the surface of deposited titanium film with the use of electron microscopy, X-ray spectral microanalysis and laser-spark methods of analyses are presented. The causes of surface defects appearance have been identified. The distribution of deuterium and some impurities (oxygen and nitrogen) along the surface and across the height of the hydrogenated film in the target has been established. This allows us to evaluate the composition homogeneity of the samples and consequently to estimate the quality of hydrogenated samples. As the result of this work the propositions on the advancement of production technology and characterization of target’s surface have been presented.Keywords: tritium and deuterium targets, titanium film, laser-spark methods, electron microscopy
Procedia PDF Downloads 4422596 Comparison Study of Capital Protection Risk Management Strategies: Constant Proportion Portfolio Insurance versus Volatility Target Based Investment Strategy with a Guarantee
Authors: Olga Biedova, Victoria Steblovskaya, Kai Wallbaum
Abstract:
In the current capital market environment, investors constantly face the challenge of finding a successful and stable investment mechanism. Highly volatile equity markets and extremely low bond returns bring about the demand for sophisticated yet reliable risk management strategies. Investors are looking for risk management solutions to efficiently protect their investments. This study compares a classic Constant Proportion Portfolio Insurance (CPPI) strategy to a Volatility Target portfolio insurance (VTPI). VTPI is an extension of the well-known Option Based Portfolio Insurance (OBPI) to the case where an embedded option is linked not to a pure risky asset such as e.g., S&P 500, but to a Volatility Target (VolTarget) portfolio. VolTarget strategy is a recently emerged rule-based dynamic asset allocation mechanism where the portfolio’s volatility is kept under control. As a result, a typical VTPI strategy allows higher participation rates in the market due to reduced embedded option prices. In addition, controlled volatility levels eliminate the volatility spread in option pricing, one of the frequently cited reasons for OBPI strategy fall behind CPPI. The strategies are compared within the framework of the stochastic dominance theory based on numerical simulations, rather than on the restrictive assumption of the Black-Scholes type dynamics of the underlying asset. An extended comparative quantitative analysis of performances of the above investment strategies in various market scenarios and within a range of input parameter values is presented.Keywords: CPPI, portfolio insurance, stochastic dominance, volatility target
Procedia PDF Downloads 1672595 Using “Debate” in Enhancing Advanced Chinese Language Classrooms and Learning
Authors: ShuPei Wang, Yina Patterson
Abstract:
This article outlines strategies for improving oral expression to advance proficiency in speaking and listening skills through structured argumentation. The objective is to empower students to effectively use the target language to express opinions and construct compelling arguments. This empowerment is achieved by honing learners' debating and questioning skills, which involves increasing their familiarity with vocabulary and phrases relevant to debates and deepening their understanding of the cultural context surrounding pertinent issues. Through this approach, students can enhance their ability to articulate complex concepts and discern critical points, surpassing superficial comprehension and enabling them to engage in the target language actively and competently.Keywords: debate, teaching and materials design, spoken expression, listening proficiency, critical thinking
Procedia PDF Downloads 692594 Screening of Phytochemicals Compounds from Chasmanthera dependens and Carissa edulis as Potential Inhibitors of Carbonic Anhydrases CA II (3HS4) Receptor using a Target-Based Drug Design
Authors: Owonikoko Abayomi Dele
Abstract:
Epilepsy is an unresolved disease that needs urgent attention. It is a brain disorder that affects over sixty-five (65) million people around the globe. Despite the availability of commercial anti-epileptic drugs, the war against this unmet condition is yet to be resolved. Most epilepsy patients are resistant to available anti-epileptic medications thus the need for affordable novel therapy against epilepsy is a necessity. Numerous phytochemicals have been reported for their potency, efficacy and safety as therapeutic agents against many diseases. This study investigated 99 isolated phytochemicals from Chasmanthera dependens and Carissa edulis against carbonic anhydrase (ii) drug target. The absorption, distribution, metabolism, excretion and toxicity (ADMET) of the isolated compounds were examined using admet SAR-2 web server while Swiss ADME was used to analyze the oral bioavailability, drug-likeness and lead-likeness properties of the selected leads. PASS web server was used to predict the biological activities of selected leads while other important physicochemical properties and interactions of the selected leads with the active site of the target after successful molecular docking simulation with the pyrx virtual screening tool were also examined. The results of these study identified seven lead compounds; C49- alpha-carissanol (-7.6 kcal/mol), C13- Catechin (-7.4 kcal/mol), C45- Salicin (-7.4 kcal/mol), C6- Bisnorargemonine (-7.3 kcal/mol), C36- Pallidine (-7.1 kcal/mol), S4- Lacosamide (-7.1 kcal/mol), and S7- Acetazolamide (-6.4 kcal/mol) for CA II (3HS4 receptor). These leads compounds are probable inhibitors of this drug target due to the observed good binding affinities and favourable interactions with the active site of the drug target, excellent ADMET profiles, PASS Properties, drug-likeness, lead-likeness and oral bioavailability properties. The identified leads have better binding energies as compared to the binding energies of the two standards. Thus, seven identified lead compounds can be developed further towards the development of new anti-epileptic medications.Keywords: drug-likeness, phytochemicals, carbonic anhydrases, metalloeazymes, active site, ADMET
Procedia PDF Downloads 562593 Difference Between Planning Target Volume (PTV) Based Slow-Ct and Internal Target Volume (ITV) Based 4DCT Imaging Techniques in Stereotactic Body Radiotherapy for Lung Cancer: A Comparative Study
Authors: Madhumita Sahu, S. S. Tiwary
Abstract:
The Radiotherapy of Carcinoma Lung has always been difficult and a matter of great concern. The significant movement due to fractional motion caused due to non-rhythmic respiratory motion poses a great challenge for the treatment of Lung cancer using Ionizing Radiation. The present study compares the accuracy in the measurement of Target Volume using Slow-CT and 4DCT Imaging in SBRT for Lung Tumor. The experimental samples were extracted from patients with Lung Cancer who underwent SBRT. Slow-CT and 4DCT images were acquired under free breathing for each patient. PTV were delineated on Slow CT images. Similarly, ITV was also delineated on each of the 4DCT volumes. Volumetric and Statistical analysis were performed for each patient by measuring corresponding PTV and ITV volumes. The study showed (1) The Maximum Deviation observed between Slow-CT-based PTV and 4DCT imaging-based ITV is 248.58 cc. (2) The Minimum Deviation observed between Slow-CT-based PTV and 4DCT imaging-based ITV is 5.22 cc. (3) The Mean Deviation observed between Slow-CT-based PTV and 4DCT imaging-based ITV is 63.21 cc. The present study concludes that irradiated volume ITV with 4DCT is less as compared to the PTV with Slow-CT. A better and more precise treatment could be given more accurately with 4DCT Imaging by sparing 63.21 CC of mean body volume.Keywords: CT imaging, 4DCT imaging, lung cancer, statistical analysis
Procedia PDF Downloads 242592 Comparison between Pushover Analysis Techniques and Validation of the Simplified Modal Pushover Analysis
Authors: N. F. Hanna, A. M. Haridy
Abstract:
One of the main drawbacks of the Modal Pushover Analysis (MPA) is the need to perform nonlinear time-history analysis, which complicates the analysis method and time. A simplified version of the MPA has been proposed based on the concept of the inelastic deformation ratio. Furthermore, the effect of the higher modes of vibration is considered by assuming linearly-elastic responses, which enables the use of standard elastic response spectrum analysis. In this thesis, the simplified MPA (SMPA) method is applied to determine the target global drift and the inter-story drifts of steel frame building. The effect of the higher vibration modes is considered within the framework of the SMPA. A comprehensive survey about the inelastic deformation ratio is presented. After that, a suitable expression from literature is selected for the inelastic deformation ratio and then implemented in the SMPA. The estimated seismic demands using the SMPA, such as target drift, base shear, and the inter-story drifts, are compared with the seismic responses determined by applying the standard MPA. The accuracy of the estimated seismic demands is validated by comparing with the results obtained by the nonlinear time-history analysis using real earthquake records.Keywords: modal analysis, pushover analysis, seismic performance, target displacement
Procedia PDF Downloads 3612591 Statistical Modeling of Mandarin Tone Sandhi: Neutralization of Underlying Pitch Targets
Authors: Si Chen, Caroline Wiltshire, Bin Li
Abstract:
This study statistically models the surface f0 contour and the underlying pitch target of a well-studied third sandhi tone of Mandarin Chinese. Although the growth curve analysis on the surface f0 contours indicates non-neutralization of this sandhi tone (T3) and the base T2, their underlying pitch targets do show neutralization. These results in Mandarin are also consistent with the perception of native speakers, where they cannot distinguish the third T3 from the base T2, compensating contextual variation. It is possible to use the proposed statistical procedure of testing underlying pitch targets to verify tone sandhi processes in other tonal languages.Keywords: growth curve analysis, Mandarin Chinese, tone sandhi, underlying pitch target
Procedia PDF Downloads 3362590 An Investigation of the Mystic Term on 'The Conference of the Birds' of Attar on the Basis of Van Doorslaer's Map
Authors: Saber Noie
Abstract:
This research follows some objectives to consider the mystic terms as one of the main issues in translation of poems. Firstly, it is an attempt to find out what strategies have been used to find equivalents for source text mystic. Second, it is hoped that this study of the translations of the mystic terms in Attar’s poems will further address and explore the problems in translating mystic texts, proposed by other Persian poets and suggest instructional points from Davis work for translation education. In order to deal with such a breadth of work, a new conceptual tool was developed, as explained by Van Doorslaer (2007). This study shows that according to Van Doorslaer’s map, the mystic terms can be transferred to the target language (TL) with their exact content of the source language (SL) if the translator has a good choice for any term.Keywords: metaphor, mystic, mysticism, source language (SL), target language (TL)
Procedia PDF Downloads 2572589 Functionalized Nanoparticles for Drug Delivery Applications
Authors: Temesgen Geremew
Abstract:
Functionalized nanoparticles have emerged as a revolutionary platform for drug delivery, offering significant advantages over traditional methods. By strategically modifying their surface properties, these nanoparticles can be designed to target specific tissues and cells, significantly reducing off-target effects and enhancing therapeutic efficacy. This targeted approach allows for lower drug doses, minimizing systemic exposure and potential side effects. Additionally, functionalization enables controlled release of the encapsulated drug, improving drug stability and reducing the frequency of administration, leading to improved patient compliance. This work explores the immense potential of functionalized nanoparticles in revolutionizing drug delivery, addressing limitations associated with conventional therapies and paving the way for personalized medicine with precise and targeted treatment strategies.Keywords: nanoparticles, drug, nanomaterials, applications
Procedia PDF Downloads 672588 A Study on the Establishment of a 4-Joint Based Motion Capture System and Data Acquisition
Authors: Kyeong-Ri Ko, Seong Bong Bae, Jang Sik Choi, Sung Bum Pan
Abstract:
A simple method for testing the posture imbalance of the human body is to check for differences in the bilateral shoulder and pelvic height of the target. In this paper, to check for spinal disorders the authors have studied ways to establish a motion capture system to obtain and express motions of 4-joints, and to acquire data based on this system. The 4 sensors are attached to the both shoulders and pelvis. To verify the established system, the normal and abnormal postures of the targets listening to a lecture were obtained using the established 4-joint based motion capture system. From the results, it was confirmed that the motions taken by the target was identical to the 3-dimensional simulation.Keywords: inertial sensor, motion capture, motion data acquisition, posture imbalance
Procedia PDF Downloads 5152587 In-silico Target Identification and Molecular Docking of Withaferin A and Withanolide D to Understand their Anticancer Therapeutic Potential
Authors: Devinder Kaur Sugga, Ekamdeep Kaur, Jaspreet Kaur, C. Rajesh, Preeti Rajesh, Harsimran Kaur
Abstract:
Withanolides are steroidal lactones and are highly oxygenated phytoconstituents that can be developed as potential anti-carcinogenic agents. The two main withanolides, namely Withaferin A and Withanolides D, have been extensively studied for their pharmacological activities. Both these withanolides are present in the Withania somnifera (WS) leaves belonging to the family Solanaceae, also known as “Indian ginseng .”In this study effects of WS leaf extract on the MCF7 breast cancer cell line were investigated by performing a 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyl tetrazolium bromide (MTT) assay to evaluate the cytotoxic effects and in vitro wound-healing assay to study the effect on cancer cell migration. Our data suggest WS extracts have cytotoxic effects and are effective anti-migrating agents and thus can be a source of potential candidates for the development of potential agents against metastasis. Thus, it can be a source of potential candidates for the development of potential agents against metastasis. Insight into these results, the in-silico approach to identify the possible protein targets interacting with withanolides was taken. Protein kinase C alpha (PKCα) was among the selected 5 top-ranked target proteins identified by the Swiss Target Prediction tool. PKCα is known to promote the growth and invasion of cancer cells and is being evaluated as a prognostic biomarker and therapeutic target in clinically aggressive tumors. Molecular docking of Withaferin A and Withanolides D was performed using AutoDock Vina. Both the bioactive compounds interacted with PKCα. The targets predicted using this approach will serve as leads for the possible therapeutic potential of withanolides, the bioactive ingredients of WS extracts, as anti-cancer drugs.Keywords: withania somnifera, withaferin A, withanolides D, PKCα
Procedia PDF Downloads 1462586 A Two-Stage Adaptation towards Automatic Speech Recognition System for Malay-Speaking Children
Authors: Mumtaz Begum Mustafa, Siti Salwah Salim, Feizal Dani Rahman
Abstract:
Recently, Automatic Speech Recognition (ASR) systems were used to assist children in language acquisition as it has the ability to detect human speech signal. Despite the benefits offered by the ASR system, there is a lack of ASR systems for Malay-speaking children. One of the contributing factors for this is the lack of continuous speech database for the target users. Though cross-lingual adaptation is a common solution for developing ASR systems for under-resourced language, it is not viable for children as there are very limited speech databases as a source model. In this research, we propose a two-stage adaptation for the development of ASR system for Malay-speaking children using a very limited database. The two stage adaptation comprises the cross-lingual adaptation (first stage) and cross-age adaptation. For the first stage, a well-known speech database that is phonetically rich and balanced, is adapted to the medium-sized Malay adults using supervised MLLR. The second stage adaptation uses the speech acoustic model generated from the first adaptation, and the target database is a small-sized database of the target users. We have measured the performance of the proposed technique using word error rate, and then compare them with the conventional benchmark adaptation. The two stage adaptation proposed in this research has better recognition accuracy as compared to the benchmark adaptation in recognizing children’s speech.Keywords: Automatic Speech Recognition System, children speech, adaptation, Malay
Procedia PDF Downloads 3972585 Accurate Calculation of the Penetration Depth of a Bullet Using ANSYS
Authors: Eunsu Jang, Kang Park
Abstract:
In developing an armored ground combat vehicle (AGCV), it is a very important step to analyze the vulnerability (or the survivability) of the AGCV against enemy’s attack. In the vulnerability analysis, the penetration equations are usually used to get the penetration depth and check whether a bullet can penetrate the armor of the AGCV, which causes the damage of internal components or crews. The penetration equations are derived from penetration experiments which require long time and great efforts. However, they usually hold only for the specific material of the target and the specific type of the bullet used in experiments. Thus, penetration simulation using ANSYS can be another option to calculate penetration depth. However, it is very important to model the targets and select the input parameters in order to get an accurate penetration depth. This paper performed a sensitivity analysis of input parameters of ANSYS on the accuracy of the calculated penetration depth. Two conflicting objectives need to be achieved in adopting ANSYS in penetration analysis: maximizing the accuracy of calculation and minimizing the calculation time. To maximize the calculation accuracy, the sensitivity analysis of the input parameters for ANSYS was performed and calculated the RMS error with the experimental data. The input parameters include mesh size, boundary condition, material properties, target diameter are tested and selected to minimize the error between the calculated result from simulation and the experiment data from the papers on the penetration equation. To minimize the calculation time, the parameter values obtained from accuracy analysis are adjusted to get optimized overall performance. As result of analysis, the followings were found: 1) As the mesh size gradually decreases from 0.9 mm to 0.5 mm, both the penetration depth and calculation time increase. 2) As diameters of the target decrease from 250mm to 60 mm, both the penetration depth and calculation time decrease. 3) As the yield stress which is one of the material property of the target decreases, the penetration depth increases. 4) The boundary condition with the fixed side surface of the target gives more penetration depth than that with the fixed side and rear surfaces. By using above finding, the input parameters can be tuned to minimize the error between simulation and experiments. By using simulation tool, ANSYS, with delicately tuned input parameters, penetration analysis can be done on computer without actual experiments. The data of penetration experiments are usually hard to get because of security reasons and only published papers provide them in the limited target material. The next step of this research is to generalize this approach to anticipate the penetration depth by interpolating the known penetration experiments. This result may not be accurate enough to be used to replace the penetration experiments, but those simulations can be used in the early stage of the design process of AGCV in modelling and simulation stage.Keywords: ANSYS, input parameters, penetration depth, sensitivity analysis
Procedia PDF Downloads 4012584 Risk, Capital Buffers, and Bank Lending: The Adjustment of Euro Area Banks
Authors: Laurent Maurin, Mervi Toivanen
Abstract:
This paper estimates euro area banks’ internal target capital ratios and investigates whether banks’ adjustment to the targets have an impact on credit supply and holding of securities during the financial crisis in 2005-2011. Using data on listed banks and country-specific macro-variables a partial adjustment model is estimated in a panel context. The results indicate, firstly, that an increase in the riskiness of banks’ balance sheets influences positively on the target capital ratios. Secondly, the adjustment towards higher equilibrium capital ratios has a significant impact on banks’ assets. The impact is found to be more size-able on security holdings than on loans, thereby suggesting a pecking order.Keywords: Euro area, capital ratios, credit supply, partial adjustment model
Procedia PDF Downloads 4482583 How Influencers Influence: The Effects of Social Media Influencers Influence on Purchase Intention and the Differences among Generation X and Millennials
Authors: Samatha Ss Sutton, Kaouther Kooli
Abstract:
In recent years social media influences (SMI) have become integrated into many companies marketing strategies to create buzz, target new and younger markets and further expand social media coverage in business (Lim et al 2017). SMI’s can be defined as online personalities with a substantial number of followers, across one or more social media platforms, with influence on their followers (Lou and Yuan 2018). Recently expenditure on influencer marketing has increased exponentially becoming an important area for marketing opportunities and strategies in the future (Lou and Yuan 2018). In order to market products and brands effectively through SMI’s it is important for business to understand the attributes of SMI that effect purchase intention (Lim et al 2017) of their followers and whether or not these attributes vary across generations so to market effectively to their specific segment or target market. The present study involves quantitative research to understand the attributes by which influence differs across generations namely Generation X and Millennials and its effects on purchase intentions of these generational groups. A survey will be conducted using an online questionnaire. Structural Equation Modelling and Multi group analysis will be applied. The study provides insight to marketers/decision makers on how to use influencers accordingly with their target consumer.Keywords: social media marketing, social media influencers, attitude towards social media influencers, intention to purchase
Procedia PDF Downloads 1362582 Machine Learning for Targeting of Conditional Cash Transfers: Improving the Effectiveness of Proxy Means Tests to Identify Future School Dropouts and the Poor
Authors: Cristian Crespo
Abstract:
Conditional cash transfers (CCTs) have been targeted towards the poor. Thus, their targeting assessments check whether these schemes have been allocated to low-income households or individuals. However, CCTs have more than one goal and target group. An additional goal of CCTs is to increase school enrolment. Hence, students at risk of dropping out of school also are a target group. This paper analyses whether one of the most common targeting mechanisms of CCTs, a proxy means test (PMT), is suitable to identify the poor and future school dropouts. The PMT is compared with alternative approaches that use the outputs of a predictive model of school dropout. This model was built using machine learning algorithms and rich administrative datasets from Chile. The paper shows that using machine learning outputs in conjunction with the PMT increases targeting effectiveness by identifying more students who are either poor or future dropouts. This joint targeting approach increases effectiveness in different scenarios except when the social valuation of the two target groups largely differs. In these cases, the most likely optimal approach is to solely adopt the targeting mechanism designed to find the highly valued group.Keywords: conditional cash transfers, machine learning, poverty, proxy means tests, school dropout prediction, targeting
Procedia PDF Downloads 2042581 Conceptual Design of Unmanned Aerial Targets
Authors: M. Adamski, J. Cwiklak
Abstract:
The contemporary battlefield creates a demand for more costly and highly advanced munitions. Training personnel responsible for operations, as well as an immediate execution of combat tasks, which engage real assets, is unrealistic and economically not feasible. Owing to a wide array of exploited simulators and various types of imitators, it is possible to reduce the costs. One of the effective elements of training, which can be applied in the training of all service branches, are imitators of aerial targets. This research serves as an introduction to the commencement of design analysis over a real aerial target imitator. Within the project, the basic aerodynamic calculations were made, which enabled to determine its geometry, design layout, performance, as well as the mass balance of individual components. The conducted calculations of the parameters of flight characteristics come closer to the real performance of such unmanned aerial vehicles.Keywords: aerial target, aerodynamics, imitator, performance
Procedia PDF Downloads 3972580 Contribution for Rural Development Trough Training in Organic Farming
Authors: Raquel P. F. Guiné, Daniela V. T. A. Costa, Paula M. R. Correia, Moisés Castro, Luis T. Guerra, Cristina A. Costa
Abstract:
The aim of this work was to characterize a potential target group of people interested in participating into a training program in organic farming in the context of mobile-learning. The information sought addressed in particular, but not exclusively, possible contents, formats and forms of evaluation that will contribute to define the course objectives and curriculum, as well as to ensure that the course meets the needs of the learners and their preferences. The sample was selected among different European countries. The questionnaires were delivered electronically for answering online and in the end 135 consented valid questionnaires were obtained. The results allowed characterizing the target group and identifying their training needs and preferences towards m-learning formats, giving valuable tools to design the training offer.Keywords: mobile-learning, organic farming, rural development, survey
Procedia PDF Downloads 5022579 End to End Monitoring in Oracle Fusion Middleware for Data Verification
Authors: Syed Kashif Ali, Usman Javaid, Abdullah Chohan
Abstract:
In large enterprises multiple departments use different sort of information systems and databases according to their needs. These systems are independent and heterogeneous in nature and sharing information/data between these systems is not an easy task. The usage of middleware technologies have made data sharing between systems very easy. However, monitoring the exchange of data/information for verification purposes between target and source systems is often complex or impossible for maintenance department due to security/access privileges on target and source systems. In this paper, we are intended to present our experience of an end to end data monitoring approach at middle ware level implemented in Oracle BPEL for data verification without any help of monitoring tool.Keywords: service level agreement, SOA, BPEL, oracle fusion middleware, web service monitoring
Procedia PDF Downloads 4802578 The Using of Hybrid Superparamagnetic Magnetite Nanoparticles (Fe₃O₄)- Graphene Oxide Functionalized Surface with Collagen, to Target the Cancer Stem Cell
Authors: Ahmed Khalaf Reyad Raslan
Abstract:
Cancer stem cells (CSCs) describe a class of pluripotent cancer cells that behave analogously to normal stem cells in their ability to differentiate into the spectrum of cell types observed in tumors. The de-differentiation processes, such as an epithelial-mesenchymal transition (EMT), are known to enhance cellular plasticity. Here, we demonstrate a new hypothesis to use hybrid superparamagnetic magnetite nanoparticles (Fe₃O₄)- graphene oxide functionalized surface with Collagen to target the cancer stem cell as an early detection tool for cancer. We think that with the use of magnetic resonance imaging (MRI) and the new hybrid system would be possible to track the cancer stem cells.Keywords: hydrogel, alginate, reduced graphene oxide, collagen
Procedia PDF Downloads 1452577 Target and Equalizer Design for Perpendicular Heat-Assisted Magnetic Recording
Authors: P. Tueku, P. Supnithi, R. Wongsathan
Abstract:
Heat-Assisted Magnetic Recording (HAMR) is one of the leading technologies identified to enable areal density beyond 1 Tb/in2 of magnetic recording systems. A key challenge to HAMR designing is accuracy of positioning, timing of the firing laser, power of the laser, thermo-magnetic head, head-disk interface and cooling system. We study the effect of HAMR parameters on transition center and transition width. The HAMR is model using Thermal Williams-Comstock (TWC) and microtrack model. The target and equalizer are designed by the minimum mean square error (MMSE). The result shows that the unit energy constraint outperforms other constraints.Keywords: heat-assisted magnetic recording, thermal Williams-Comstock equation, microtrack model, equalizer
Procedia PDF Downloads 3512576 Innovation of Teaching Methods in Vocational Education with Popularity Development Process
Authors: Hong Zeng
Abstract:
In the process of popularization of higher education, it is necessary to innovate teaching methods in order to make the students cultivated suitable for the needs of social development. This paper discusses the limitations and shortcomings of the traditional teaching method of teaching approach to a person's aptitude, personality, and interest and introduces the new teaching method of teaching approach to a person's personality. The teaching approach to a person's personality is a target teaching method that aims to develop students' potential and cultivate professional talents. Therefore, teachers should be professional and can adopt modern teaching methods from the Internet so that students can clearly understand the course and the knowledge structure. Finally, the students using new teaching methods can enhance their motivation to study and quickly acquire professional skills.Keywords: higher education, personality, target education, student-centered
Procedia PDF Downloads 1192575 Modeling of Timing in a Cyber Conflict to Inform Critical Infrastructure Defense
Authors: Brian Connett, Bryan O'Halloran
Abstract:
Systems assets within critical infrastructures were seemingly safe from the exploitation or attack by nefarious cyberspace actors. Now, critical infrastructure is a target and the resources to exploit the cyber physical systems exist. These resources are characterized in terms of patience, stealth, replication-ability and extraordinary robustness. System owners are obligated to maintain a high level of protection measures. The difficulty lies in knowing when to fortify a critical infrastructure against an impending attack. Models currently exist that demonstrate the value of knowing the attacker’s capabilities in the cyber realm and the strength of the target. The shortcomings of these models are that they are not designed to respond to the inherent fast timing of an attack, an impetus that can be derived based on open-source reporting, common knowledge of exploits of and the physical architecture of the infrastructure. A useful model will inform systems owners how to align infrastructure architecture in a manner that is responsive to the capability, willingness and timing of the attacker. This research group has used an existing theoretical model for estimating parameters, and through analysis, to develop a decision tool for would-be target owners. The continuation of the research develops further this model by estimating the variable parameters. Understanding these parameter estimations will uniquely position the decision maker to posture having revealed the vulnerabilities of an attacker’s, persistence and stealth. This research explores different approaches to improve on current attacker-defender models that focus on cyber threats. An existing foundational model takes the point of view of an attacker who must decide what cyber resource to use and when to use it to exploit a system vulnerability. It is valuable for estimating parameters for the model, and through analysis, develop a decision tool for would-be target owners.Keywords: critical infrastructure, cyber physical systems, modeling, exploitation
Procedia PDF Downloads 192