Search results for: CSLBP features
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3741

Search results for: CSLBP features

1971 Between Riots and Protests: A Structural Approach to Urban Environmental Uprisings in China

Authors: Zi Zhu

Abstract:

The last decade has witnessed increasing urban environmental uprisings in China, as thousands of citizens swarmed into streets to express their deep concerns about the environmental threat and public health through various collective actions. The prevalent western approaches to collective actions, which usually treat urban riots and social movements as distinct phenomenon, have plagued an adequate analysis of the urban environmental uprisings in China. The increasing urban environmental contention can neither be categorized into riots nor social movements, as they carry the features of both: at first sight, they are spontaneous, disorganized and disruptive with an absence of observable mobilization process; however, unlike riots in the west, these collective actions conveyed explicit demand in a mostly non-destructive way rather than a pure expression of frustration. This article proposes a different approach to urban environmental uprisings in China which concerns the diminishing boundaries between riots and social movements and points to the underlying structural causes to the unique forms of urban environmental contention. Taking the urban anti-PX protests as examples, this article analyzes the societal and political structural environment faced by the Chinese environmental protesters and its influence on the origin and development of their contention.

Keywords: urban environmental uprisings, China, anti-PX protests, opportunity structure

Procedia PDF Downloads 268
1970 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 296
1969 Fast Prediction Unit Partition Decision and Accelerating the Algorithm Using Cudafor Intra and Inter Prediction of HEVC

Authors: Qiang Zhang, Chun Yuan

Abstract:

Since the PU (Prediction Unit) decision process is the most time consuming part of the emerging HEVC (High Efficient Video Coding) standardin intra and inter frame coding, this paper proposes the fast PU decision algorithm and speed up the algorithm using CUDA (Compute Unified Device Architecture). In intra frame coding, the fast PU decision algorithm uses the texture features to skip intra-frame prediction or terminal the intra-frame prediction for smaller PU size. In inter frame coding of HEVC, the fast PU decision algorithm takes use of the similarity of its own two Nx2N size PU's motion vectors and the hierarchical structure of CU (Coding Unit) partition to skip some modes of PU partition, so as to reduce the motion estimation times. The accelerate algorithm using CUDA is based on the fast PU decision algorithm which uses the GPU to make the motion search and the gradient computation could be parallel computed. The proposed algorithm achieves up to 57% time saving compared to the HM 10.0 with little rate-distortion losses (0.043dB drop and 1.82% bitrate increase on average).

Keywords: HEVC, PU decision, inter prediction, intra prediction, CUDA, parallel

Procedia PDF Downloads 380
1968 “A Built-In, Shockproof, Shit Detector”: Major Challenges and Peculiarities of Translating Ernest Hemingway’s Short Stories Into Georgian

Authors: Natia Kvachakidze

Abstract:

Translating fiction is a complicated and multidimensional issue. However, studying and analyzing literary translations is not less challenging. This becomes even more complex due to the existence of several alternative translations of one and the same literary work. However, this also makes the research process more interesting at the same time. The aim of the given work is to distinguish major obstacles and challenges translators come across while working on Ernest Hemingway’s short fiction, as well as to analyze certain peculiarities and characteristic features of some existing Georgian translations of the writer’s work (especially in the context of various alternative versions of some well-known short stories). Consequently, the focus is on studying how close these translations come to the form and the context of the original text in order to see if the linguistic and stylistic characteristics of the original author are preserved. Moreover, it is interesting not only to study the relevance of each translation to the original text but also to present a comparative analysis of some major peculiarities of the given translations, which are naturally characterized by certain strengths and weaknesses. The latter is at times inevitable, but in certain cases, there is room for improvement. The given work also attempts to humbly suggest certain ways of possible improvements of some translation inadequacies, as this can provide even more opportunities for deeper and detailed studies in the future.

Keywords: Hemingway, short fiction, translation, Georgian

Procedia PDF Downloads 65
1967 Cretinism Muscular Hypertrophy: An Unorthodox Reflection

Authors: Harim Mohsin, Afshan Channa, Beena Saad

Abstract:

The Kocher Debre Semelaigne Syndrome (KDSS) is known as cretinism muscular hypertrophy. It is an unusual presentation in intellectually deficit children, commonly associated with congenital or iatrogenic hypothyroidism. The creatinine phosphokinase (CPK) is usually elevated and it’s commonly found in males, consanguineous marriage and ages 18 months to 10 years. It might be misdiagnosed without the classical features of hypothyroidism at first presentation. We present a case of 15 year old intellectually deficit female with epilepsy managed on phenytoin. She had rigidity, myxedema, calf muscle hypertrophy and agitation. The patient was managed as Neuroleptic Malignant Syndrome due to raised CPK of 40,680 IU/L and mixed presentation. Nevertheless, no improvement was noticed and thyroid profile was done to exclude alternative resources. Thyroid stimulating hormone (TSH) was 74.5 IU, Free T3 1.22 ng/dl, and Free T4 0.43 ng/dl. Thyroxine was started along with change in antiepileptic leading to recovery. This case report highlights the inconsistent finding of KDSS. The female gender, non-consanguineous marriage, delayed onset with primarily neuromuscular symptoms, and raised CPK is a rare demonstration in KDSS. Additionally, thyroid profile is not routinely done, which can lead to misdiagnosis and mismanagement.

Keywords: cretinism, hypothyroidism, intellectual deficit, KDSS

Procedia PDF Downloads 355
1966 Enhancing Spatial Interpolation: A Multi-Layer Inverse Distance Weighting Model for Complex Regression and Classification Tasks in Spatial Data Analysis

Authors: Yakin Hajlaoui, Richard Labib, Jean-François Plante, Michel Gamache

Abstract:

This study introduces the Multi-Layer Inverse Distance Weighting Model (ML-IDW), inspired by the mathematical formulation of both multi-layer neural networks (ML-NNs) and Inverse Distance Weighting model (IDW). ML-IDW leverages ML-NNs' processing capabilities, characterized by compositions of learnable non-linear functions applied to input features, and incorporates IDW's ability to learn anisotropic spatial dependencies, presenting a promising solution for nonlinear spatial interpolation and learning from complex spatial data. it employ gradient descent and backpropagation to train ML-IDW, comparing its performance against conventional spatial interpolation models such as Kriging and standard IDW on regression and classification tasks using simulated spatial datasets of varying complexity. the results highlight the efficacy of ML-IDW, particularly in handling complex spatial datasets, exhibiting lower mean square error in regression and higher F1 score in classification.

Keywords: deep learning, multi-layer neural networks, gradient descent, spatial interpolation, inverse distance weighting

Procedia PDF Downloads 21
1965 A Numerical Study of the Tidal Currents in the Persian Gulf and Oman Sea

Authors: Fatemeh Sadat Sharifi, A. A. Bidokhti, M. Ezam, F. Ahmadi Givi

Abstract:

This study focuses on the tidal oscillation and its speed to create a general pattern in seas. The purpose of the analysis is to find out the amplitude and phase for several important tidal components. Therefore, Regional Ocean Models (ROMS) was rendered to consider the correlation and accuracy of this pattern. Finding tidal harmonic components allows us to predict tide at this region. Better prediction of these tides, making standard platform, making suitable wave breakers, helping coastal building, navigation, fisheries, port management and tsunami research. Result shows a fair accuracy in the SSH. It reveals tidal currents are highest in Hormuz Strait and the narrow and shallow region between Kish Island. To investigate flow patterns of the region, the results of limited size model of FVCOM were utilized. Many features of the present day view of ocean circulation have some precedent in tidal and long- wave studies. Tidal waves are categorized to be among the long waves. So that tidal currents studies have indeed effects in subsequent studies of sea and ocean circulations.

Keywords: barotropic tide, FVCOM, numerical model, OTPS, ROMS

Procedia PDF Downloads 210
1964 Integration of a Load Switch with DC/DC Buck Converter for Power Distribution in Low Cost Educational Nanosatellite

Authors: Bentoutou Houari, Boutte Aissa, Belaidi El Yazid, Limam Lakhdar

Abstract:

The integration of a load switch with a DC/DC buck converter using LM2596 for power distribution in low-cost educational nanosatellites is a technique that aims to efficiently manage the power distribution system in these small spacecraft. The converter is based on the LM2596 regulator and designed to step down the input voltage of +16.8V to +12V, +5V, and +3.3V output, which are suitable for the nanosatellite's various subsystems. The load switch is based on MOSFET and is used to turn on or off the power supply to a particular load and protect the nanosatellite from power surges. A prototype of a +12V DC/DC buck converter with a high side load switch has been realized and tested, which meets our requirements and shows a good efficiency of 89%. In addition, the prototype features a capacitor between the source and gate of the MOSFET, which has effectively reduced the inrush current, demonstrating the effectiveness of this approach in reducing surges of current when the load is connected. The output current and voltage were measured at 0.7A and 11.89V, respectively, making this design suitable for use in low-cost educational nanosatellites.

Keywords: DC/DC buck converter, load switch, LM2596, electrical power subsystems, nanosatellite, inrush current

Procedia PDF Downloads 77
1963 Identification and Quantification of Acid Sites of M(X)X Zeolites (M= Cu2+ and/or Zn2+,X = Level of Exchange): An In situ FTIR Study Using Pyridine Adsorption/Desorption

Authors: H. Hammoudi, S. Bendenia, I. Batonneau-Gener, J. Comparot, K. Marouf-Khelifa, A. Khelifa

Abstract:

X zeolites were prepared by ion-exchange with Cu2+ and/or Zn2+ cations, at different concentrations of the exchange solution, and characterised by thermal analysis and nitrogen adsorption. The acidity of the samples was investigated by pyridine adsorption–desorption followed by in situ Fourier transform infrared (FTIR) spectroscopy. Desorption was carried out at 150, 250 and 350 °C. The objective is to estimate the nature and concentration of acid sites. A comparison between the binary (Cu(x)X, Zn(x)X) and ternary (CuZn(x)X) exchanges was also established (x = level of exchange) through the Cu(43)X, Zn(48)X and CuZn(50)X samples. Lewis acidity decreases overall with desorption temperature and the level of exchange. As the latter increases, there is a conversion of some Lewis sites into those of Brønsted during thermal treatment. In return, the concentration of Brønsted sites increases with the degree of exchange. The Brønsted acidity of CuZn(50)X at 350 °C is more important than the sum of those of Cu(43)X and Zn(48)X. The found values were 73, 32 and 15 μmol g-1, respectively. Besides, the concentration of Brønsted sites for CuZn(50)X increases with desorption temperature. These features indicate the presence of a synergistic effect amplifying the strength of these sites when Cu2+ and Zn2+ cations compete for the occupancy of sites distributed inside zeolitic cavities.

Keywords: acidity, adsorption, pyridine, zeolites

Procedia PDF Downloads 206
1962 Human Action Recognition Using Wavelets of Derived Beta Distributions

Authors: Neziha Jaouedi, Noureddine Boujnah, Mohamed Salim Bouhlel

Abstract:

In the framework of human machine interaction systems enhancement, we focus throw this paper on human behavior analysis and action recognition. Human behavior is characterized by actions and reactions duality (movements, psychological modification, verbal and emotional expression). It’s worth noting that many information is hidden behind gesture, sudden motion points trajectories and speeds, many research works reconstructed an information retrieval issues. In our work we will focus on motion extraction, tracking and action recognition using wavelet network approaches. Our contribution uses an analysis of human subtraction by Gaussian Mixture Model (GMM) and body movement through trajectory models of motion constructed from kalman filter. These models allow to remove the noise using the extraction of the main motion features and constitute a stable base to identify the evolutions of human activity. Each modality is used to recognize a human action using wavelets of derived beta distributions approach. The proposed approach has been validated successfully on a subset of KTH and UCF sports database.

Keywords: feautures extraction, human action classifier, wavelet neural network, beta wavelet

Procedia PDF Downloads 389
1961 Accidents Involving Pedestrians Walking along with/against Traffic: An Evaluation of Crash Characteristics and Injuries

Authors: Chih-Wei Pai, Rong-Chang Jou

Abstract:

Using A1 A2 police-reported accident data for years 2003–2010 in Taiwan, the paper examines anatomic injuries and crash characteristics specific to pedestrians in “facing traffic” and “back to traffic” crashes. There were 2768 and 7558 accidents involving pedestrians walking along with/against traffic respectively. Injuries sustained by pedestrians and crash characteristics in these two crash types were compared with those in other crash types (nearside crash, nearside dart-out crash, offside crash, offside dart-out crash). Main findings include that “back to traffic” crashes resulted in more severe injuries, and pedestrians in “back to traffic” crashes had increased head, neck, and spine injuries than those in other crash types; and there was an elevated risk of head injuries in unlit darkness and NBU (non-built-up) roadways. Several crash features (e.g. unlit darkness, overtaking maneuvers, phone use by pedestrians and drivers, intoxicated drivers) appear to be over-involved in “back to traffic” crashes. The implications of the research findings regarding pedestrian/driver education, enforcement, and remedial engineering design are discussed.

Keywords: pedestrian accident, crash characteristics, injury, facing traffic, back to traffic

Procedia PDF Downloads 355
1960 Modeling User Departure Time Choice for Trips in Urban Streets

Authors: Saeed Sayyad Hagh Shomar

Abstract:

Modeling users’ decisions on departure time choice is the main motivation for this research. In particular, it examines the impact of social-demographic features, household, job characteristics and trip qualities on individuals’ departure time choice. Departure time alternatives are presented as adjacent discrete time periods. The choice between these alternatives is done using a discrete choice model. Since a great deal of early morning trips and traffic congestion at that time of the day comprise work trips, the focus of this study is on the work trip over the entire day. Therefore, this study by using questionnaire of stated preference models users’ departure time choice affected by congestion pricing plan in downtown Tehran. Experimental results demonstrate efficient social-demographic impact on work trips’ departure time. These findings have substantial outcomes for the analysis of transportation planning. Particularly, the analysis shows that ignoring the effects of these variables could result in erroneous information and consequently decisions in the field of transportation planning and air quality would fail and cause financial resources loss.

Keywords: modeling, departure time, travel timing, time of the day, congestion pricing, transportation planning

Procedia PDF Downloads 413
1959 MSIpred: A Python 2 Package for the Classification of Tumor Microsatellite Instability from Tumor Mutation Annotation Data Using a Support Vector Machine

Authors: Chen Wang, Chun Liang

Abstract:

Microsatellite instability (MSI) is characterized by high degree of polymorphism in microsatellite (MS) length due to a deficiency in mismatch repair (MMR) system. MSI is associated with several tumor types and its status can be considered as an important indicator for tumor prognostic. Conventional clinical diagnosis of MSI examines PCR products of a panel of MS markers using electrophoresis (MSI-PCR) which is laborious, time consuming, and less reliable. MSIpred, a python 2 package for automatic classification of MSI was released by this study. It computes important somatic mutation features from files in mutation annotation format (MAF) generated from paired tumor-normal exome sequencing data, subsequently using these to predict tumor MSI status with a support vector machine (SVM) classifier trained by MAF files of 1074 tumors belonging to four types. Evaluation of MSIpred on an independent 358-tumor test set achieved overall accuracy of over 98% and area under receiver operating characteristic (ROC) curve of 0.967. These results indicated that MSIpred is a robust pan-cancer MSI classification tool and can serve as a complementary diagnostic to MSI-PCR in MSI diagnosis.

Keywords: microsatellite instability, pan-cancer classification, somatic mutation, support vector machine

Procedia PDF Downloads 153
1958 Advancing in Cricket Analytics: Novel Approaches for Pitch and Ball Detection Employing OpenCV and YOLOV8

Authors: Pratham Madnur, Prathamkumar Shetty, Sneha Varur, Gouri Parashetti

Abstract:

In order to overcome conventional obstacles, this research paper investigates novel approaches for cricket pitch and ball detection that make use of cutting-edge technologies. The research integrates OpenCV for pitch inspection and modifies the YOLOv8 model for cricket ball detection in order to overcome the shortcomings of manual pitch assessment and traditional ball detection techniques. To ensure flexibility in a range of pitch environments, the pitch detection method leverages OpenCV’s color space transformation, contour extraction, and accurate color range defining features. Regarding ball detection, the YOLOv8 model emphasizes the preservation of minor object details to improve accuracy and is specifically trained to the unique properties of cricket balls. The methods are more reliable because of the careful preparation of the datasets, which include novel ball and pitch information. These cutting-edge methods not only improve cricket analytics but also set the stage for flexible methods in more general sports technology applications.

Keywords: OpenCV, YOLOv8, cricket, custom dataset, computer vision, sports

Procedia PDF Downloads 43
1957 Subjective Time as a Marker of the Present Consciousness

Authors: Anastasiya Paltarzhitskaya

Abstract:

Subjective time plays an important role in consciousness processes and self-awareness at the moment. The concept of intrinsic neural timescales (INT) explains the difference in perceiving various time intervals. The capacity to experience the present builds on the fundamental properties of temporal cognition. The challenge that both philosophy and neuroscience try to answer is how the brain differentiates the present from the past and future. In our work, we analyze papers which describe mechanisms involved in the perception of ‘present’ and ‘non-present’, i.e., future and past moments. Taking into account that we perceive time intervals even during rest or relaxation, we suppose that the default-mode network activity can code time features, including the present moment. We can compare some results of time perceptual studies, where brain activity was shown in states with different flows of time, including resting states and during “mental time travel”. According to the concept of mental traveling, we employ a range of scenarios which demand episodic memory. However, some papers show that the hippocampal region does not activate during time traveling. It is a controversial result that is further complicated by the phenomenological aspect that includes a holistic set of information about the individual’s past and future.

Keywords: temporal consciousness, time perception, memory, present

Procedia PDF Downloads 50
1956 English as a Lingua Franca Elicited in ASEAN Accents

Authors: Choedchoo Kwanhathai

Abstract:

This study explores attitudes towards ASEAN plus ONE (namely ASEAN plus China) accents of English as a Lingua Franca. The study draws attention to features of ASEAN’s diversity of English and specifically examines the extent of which the English accent in ASEAN countries of three of the ten members plus one were perceived in terms of correctness, acceptability, pleasantness, and familiarity. Three accents were used for this study; Chinese, Philippine and Thai. The participants were ninety eight Thai students enrolled in a foundation course of Suan Dusit Rajabhat University, Bangkok Thailand. The students were asked in questionnaires to rank how they perceived each specifically ASEAN plus One English accent after listening to audio recordings of three stories spoken by the three different ASEAN plus ONE English speakers. SPSS was used to analyze the data. The findings of attitudes towards varieties of English accent from the 98 respondents regarding correctness, acceptability, pleasantness, and familiarity of Thai English accents found that Thai accent was overall at level 3 (X = 2.757, SD= o.33), %Then Philippines accents was at level 2 (X = 2.326, SD = 16.12), and Chinese accents w2as at level 3 (X 3.198, SD = 0.18). Finally, the present study proposes pedagogical implications for teaching regarding awareness of ‘Englishes’ of ASEAN and their respective accents and their lingua cultural background of instructors.

Keywords: English as a lingua franca, English accents, English as an international language, ASEAN plus one, ASEAN English varieties

Procedia PDF Downloads 404
1955 Meta-Learning for Hierarchical Classification and Applications in Bioinformatics

Authors: Fabio Fabris, Alex A. Freitas

Abstract:

Hierarchical classification is a special type of classification task where the class labels are organised into a hierarchy, with more generic class labels being ancestors of more specific ones. Meta-learning for classification-algorithm recommendation consists of recommending to the user a classification algorithm, from a pool of candidate algorithms, for a dataset, based on the past performance of the candidate algorithms in other datasets. Meta-learning is normally used in conventional, non-hierarchical classification. By contrast, this paper proposes a meta-learning approach for more challenging task of hierarchical classification, and evaluates it in a large number of bioinformatics datasets. Hierarchical classification is especially relevant for bioinformatics problems, as protein and gene functions tend to be organised into a hierarchy of class labels. This work proposes meta-learning approach for recommending the best hierarchical classification algorithm to a hierarchical classification dataset. This work’s contributions are: 1) proposing an algorithm for splitting hierarchical datasets into new datasets to increase the number of meta-instances, 2) proposing meta-features for hierarchical classification, and 3) interpreting decision-tree meta-models for hierarchical classification algorithm recommendation.

Keywords: algorithm recommendation, meta-learning, bioinformatics, hierarchical classification

Procedia PDF Downloads 291
1954 Design and Construction of a Maize Dehusking Machine for Small and Medium-Scale Farmers

Authors: Francis Ojo Ologunagba, Monday Olatunbosun Ale, Lewis A. Olutayo

Abstract:

The economic successes of commercial development of agricultural product processing depend upon the adaptability of each processing stage to mechanization. In maize processing, one of its post-harvest operations that is still facing a major challenge is dehusking. Therefore, a maize dehusking machine that could replace the prevalent traditional method of dehusking maize in developing countries, especially Nigeria was designed, constructed and tested at the Department of Agricultural and Bio-Environmental Engineering Technology, Rufus Giwa Polytechnic, Owo. The basic features of the machine are feeding unit (hopper), housing frame, dehusking unit, drive mechanism and discharge outlets. The machine was tested with maize of 50mm average diameter at 13% moisture content and 2.5mm machine roller clearance. Test results showed appreciable performance with the dehusking efficiency of 92% and throughput capacity of 200 Kg/hr at a machine speed of 400rpm. The estimated production cost of the machine at the time of construction is forty-five thousand, one hundred and eighty nairas (₦45,180) excluding the cost of the electric motor. It is therefore recommended for small and medium-scale maize farmers and processors in Nigeria.

Keywords: construction, dehusking, design, efficiency, maize

Procedia PDF Downloads 292
1953 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 173
1952 Ambidentate Ligands as Platforms for Efficient Synthesis of Pd-based Metallosupramolecular Cages

Authors: Wojcieh Drożdż, Artur R. Stefankiewicz

Abstract:

Ambidentate ligands can be described as organic structures possessing two different types of coordination units within a single molecule. These features enable the coordination of two different metal ions, which can directly affect the properties of obtained complexes as well as further application. In the current research, we focused on a β-diketone ligand containing terminally located pyridine units in order to assemble cage-like architectures. This will be possible due to the peculiar geometry of the proposed ligands, called "banana-shape", widely used in the synthesis of sophisticated metallosupramolecular architectures. Each of the coordination units plays an important role in cage assembly. Pyridine units enable the coordination of square-planar metal ions (Pd²⁺, Pt²⁺), forming a positively charged cage. On the other hand, the β-diketone group provides the possibility of post-modification, including the introduction of additional functional groups with specific properties (sensing, catalytic, etc.). Such obtained cages are of great interest due to their application potential, including storage or transport of guest molecules, selective detection/separation of analytes as well as efficient catalytic processes.

Keywords: metalloligands, coordination cages, nanoreactors, β-diketonate complexes

Procedia PDF Downloads 51
1951 Non-Monogamy as Rebellion against Tradition in Jhumpa Lahiri’s The Namesake

Authors: Jingya Huang

Abstract:

This paper argues that Moushumi Mazoomdar has non-monogamous relationships with different men before and after her marriage as a form of rebellion against the traditional Indian culture deeply ingrained in her. Written by Jhumpa Lahiri, The Namesake (2004) features an Indian couple migrating to America who gives birth to two children, including the main character Gogol. Moushumi, like Gogol, is also a second-generation Indian American. Because of the influence of American culture, Moushumi prefers to marry for love, disdaining any thought of an arranged marriage. This paper is divided into two parts: before and after marriage which can also be seen in the light of polyamory and infidelity. First, according to Anapol (2010), polyamory is a newly created word from Greek and Latin which means “loving more than one person at a time when it comes to romantic or erotic love.” The discussion of polyamory mainly focuses on the most basic heterosexual relationship without mentioning of homosexual and bisexual love relationships. By adopting Anapol’s concept of polyamory, this paper examines the nature of the relationships between Moushumi and other men before her marriage. Afterwards, the concept of infidelity is discussed to analyze the interaction between Moushumi and Dimitri. How Moushumi rebels against tradition is shown through these two main discussions.

Keywords: Indian American, non-monogamous relationship, rebellion, polyamory, infidelity

Procedia PDF Downloads 317
1950 An Analysis of the Contemporary Western Academic Works in the Genre of Quranic Studies: a Case Study of Encyclopaedia of the Quran

Authors: Iffat Batool

Abstract:

An extensive body of literature produced by the contemporary Western academia is an indication of their grave interest in the field of Qur’ānic studies. What increases its significance is the writings of the western scholars that underscore the element of objectivity and impartiality in the recent western academic works on the Qur’ān. Moreover, the participation of some Muslim scholars in the western academia is also highlighted by western thinkers to ensure the objectivity of western Qur’ānic scholarship. More specifically, with the publication of ‘Encyclopaedia of the Qur’ān by Brill’ the western academia seems to assign these elements to this work vigorously. Being the foremost work of its nature, ‘Encyclopaedia of the Qur’ān’ has attracted the academicians from across the world yet, with multiple receptions. The present study aims at locating the status of this work in the recent Western scholarship and its contribution towards the subject of Qur’ānic Studies. Through a critical analysis of articles, various features of this work are highlighted. This work concludes that although Encyclopaedia of the Qur’ān presents wide-ranging and extensive study, yet, it lacks a perfect, rigorous and thorough scholarship of the Qur’ān. Besides, this work argues that because of the marginal contribution of Muslim researchers, the majority conclusions of this anthology are in contrast to the traditional Muslim standpoint

Keywords: academic, encyclopeadia, objectivity, quran

Procedia PDF Downloads 176
1949 Pseudo Modal Operating Deflection Shape Based Estimation Technique of Mode Shape Using Time History Modal Assurance Criterion

Authors: Doyoung Kim, Hyo Seon Park

Abstract:

Studies of System Identification(SI) based on Structural Health Monitoring(SHM) have actively conducted for structural safety. Recently SI techniques have been rapidly developed with output-only SI paradigm for estimating modal parameters. The features of these output-only SI methods consist of Frequency Domain Decomposition(FDD) and Stochastic Subspace Identification(SSI) are using the algorithms based on orthogonal decomposition such as singular value decomposition(SVD). But the SVD leads to high level of computational complexity to estimate modal parameters. This paper proposes the technique to estimate mode shape with lower computational cost. This technique shows pseudo modal Operating Deflections Shape(ODS) through bandpass filter and suggests time history Modal Assurance Criterion(MAC). Finally, mode shape could be estimated from pseudo modal ODS and time history MAC. Analytical simulations of vibration measurement were performed and the results with mode shape and computation time between representative SI method and proposed method were compared.

Keywords: modal assurance criterion, mode shape, operating deflection shape, system identification

Procedia PDF Downloads 390
1948 The Internal View of the Mu'min: Natural Law Theories in Islam

Authors: Gianni Izzo

Abstract:

The relation of Islam to its legal precepts, reflected in the various jurisprudential 'schools of thought' (madhahib), is one expressed in a version of 'positivism' (fiqh) providing the primary theory for deducing Qurʾan rulings and those from the narrations (hadith) of the Prophet Muhammad. Scholars of Islam, including Patricia Crone (2004) and others chronicled by Anver Emon (2005), deny the influence of natural law theories as extra-scriptural indices of revelation’s content. This paper seeks to dispute these claims by reference to historical and canonical examples within Shiʿa legal thought that emphasize the salient roles of ‘aql (reason), fitrah (primordial human nature), and lutf (divine grace). These three holistic features, congenital to every human, and theophanically reflected in nature make up a mode of moral intelligibility antecedent to prophetic revelation. The debate between the 'traditionalist' Akhbaris and 'rationalist' Usulis over the nature of deriving legal edicts in Islam is well-covered academic ground. Instead, an attempt is made to define and detail the built-in assumptions of natural law revealed in the jurisprudential summa of Imami Shiʿism, whether of either dominant school, that undergird its legal prescriptions and methods of deduction.

Keywords: Islam, fiqh, natural law, legal positivism, aql

Procedia PDF Downloads 113
1947 Design and Implementation of Remote Application Virtualization in Cloud Environments

Authors: Shuen-Tai Wang, Ying-Chuan Chen, Hsi-Ya Chang

Abstract:

Cloud computing is a paradigm of computing that shifts the way computing has been done in the past. The users can use cloud resources such as application software or storage space from the cloud without needing to own them. This paper is focused on solutions that are anticipated to introduce IaaS idea to build cloud base services and enable the individual remote user's applications in cloud environments, which appear as if they are running on the end user's local computer. The available features of application delivery solution have been developed based on our previous research on the virtualization technology to offer applications independent of location so that the users can work online, offline, anywhere, with appropriate device and at any time. This proposed effort has the potential to positively provide an efficient, resilience and elastic environment for cloud service. Users no longer need to burden the system managers and drastically reduces the overall cost of hardware and software licenses. Moreover, this flexible remote application virtualization service represents the next significant step to the mobile workplace, and it lets users access their applications remotely through cloud services anywhere. This is also made possible by the low administrative costs as well as relatively inexpensive end-user terminals and reduced energy expenses.

Keywords: cloud computing, IaaS, virtualization, application delivery

Procedia PDF Downloads 257
1946 Synthetic Aperture Radar Remote Sensing Classification Using the Bag of Visual Words Model to Land Cover Studies

Authors: Reza Mohammadi, Mahmod R. Sahebi, Mehrnoosh Omati, Milad Vahidi

Abstract:

Classification of high resolution polarimetric Synthetic Aperture Radar (PolSAR) images plays an important role in land cover and land use management. Recently, classification algorithms based on Bag of Visual Words (BOVW) model have attracted significant interest among scholars and researchers in and out of the field of remote sensing. In this paper, BOVW model with pixel based low-level features has been implemented to classify a subset of San Francisco bay PolSAR image, acquired by RADARSAR 2 in C-band. We have used segment-based decision-making strategy and compared the result with the result of traditional Support Vector Machine (SVM) classifier. 90.95% overall accuracy of the classification with the proposed algorithm has shown that the proposed algorithm is comparable with the state-of-the-art methods. In addition to increase in the classification accuracy, the proposed method has decreased undesirable speckle effect of SAR images.

Keywords: Bag of Visual Words (BOVW), classification, feature extraction, land cover management, Polarimetric Synthetic Aperture Radar (PolSAR)

Procedia PDF Downloads 184
1945 Design and Fabrication of Optical Nanobiosensors for Detection of MicroRNAs Involved in Neurodegenerative Diseases

Authors: Mahdi Rahaie

Abstract:

MicroRNAs are a novel class of small RNAs which regulate gene expression by translational repression or degradation of messenger RNAs. To produce sensitive, simple and cost-effective assays for microRNAs, detection is in urgent demand due to important role of these biomolecules in progression of human disease such as Alzheimer’s, Multiple sclerosis, and some other neurodegenerative diseases. Herein, we report several novel, sensitive and specific microRNA nanobiosensors which were designed based on colorimetric and fluorescence detection of nanoparticles and hybridization chain reaction amplification as an enzyme-free amplification. These new strategies eliminate the need for enzymatic reactions, chemical changes, separation processes and sophisticated equipment whereas less limit of detection with most specify are acceptable. The important features of these methods are high sensitivity and specificity to differentiate between perfectly matched, mismatched and non-complementary target microRNAs and also decent response in the real sample analysis with blood plasma. These nanobiosensors can clinically be used not only for the early detection of neuro diseases but also for every sickness related to miRNAs by direct detection of the plasma microRNAs in real clinical samples, without a need for sample preparation, RNA extraction and/or amplification.

Keywords: hybridization chain reaction, microRNA, nanobiosensor, neurodegenerative diseases

Procedia PDF Downloads 135
1944 The Effect Study of Meditation Music in the Elderly

Authors: Metee Pigultong

Abstract:

The research aims at 1) composition of meditation music, 2) study of the meditation time reliability. The population is the older adults who meditated practitioners in the Thepnimitra Temple, Don Mueang District, Bangkok. The sample group was the older persons who meditated practitioners from the age of 60 with five volunteers. The research methodology was time-series to conduct the research progression. The research instruments included: 1) meditation music, 2) brain wave recording form. The research results found that 1) the music combines the binaural beats suitable for the meditation of the older persons, consisting of the following features: a) The tempo rate of the meditation music is no more than 60 beats per minute. b) The musical instruments for the meditation music arrangement include only 4-5 pieces. c) The meditation music arrangement needs to consider the nature of the right instrument. d) Digital music instruments are suitable for composition. e) The pure-tone sound combined in music must generate a brain frequency at the level of 10 Hz. 2) After the researcher conducted a 3-weeks brain training procedure, the researcher performed three tests for the reliability level using Cronbach's Alpha method. The result showed that the meditation reliability had the level = .475 as a moderate concentration.

Keywords: binaural beats, music therapy, meditation, older person, the Buddhist meditated practitioners

Procedia PDF Downloads 168
1943 Ensemble of Deep CNN Architecture for Classifying the Source and Quality of Teff Cereal

Authors: Belayneh Matebie, Michael Melese

Abstract:

The study focuses on addressing the challenges in classifying and ensuring the quality of Eragrostis Teff, a small and round grain that is the smallest cereal grain. Employing a traditional classification method is challenging because of its small size and the similarity of its environmental characteristics. To overcome this, this study employs a machine learning approach to develop a source and quality classification system for Teff cereal. Data is collected from various production areas in the Amhara regions, considering two types of cereal (high and low quality) across eight classes. A total of 5,920 images are collected, with 740 images for each class. Image enhancement techniques, including scaling, data augmentation, histogram equalization, and noise removal, are applied to preprocess the data. Convolutional Neural Network (CNN) is then used to extract relevant features and reduce dimensionality. The dataset is split into 80% for training and 20% for testing. Different classifiers, including FVGG16, FINCV3, QSCTC, EMQSCTC, SVM, and RF, are employed for classification, achieving accuracy rates ranging from 86.91% to 97.72%. The ensemble of FVGG16, FINCV3, and QSCTC using the Max-Voting approach outperforms individual algorithms.

Keywords: Teff, ensemble learning, max-voting, CNN, SVM, RF

Procedia PDF Downloads 27
1942 Deep Learning and Accurate Performance Measure Processes for Cyber Attack Detection among Web Logs

Authors: Noureddine Mohtaram, Jeremy Patrix, Jerome Verny

Abstract:

As an enormous number of online services have been developed into web applications, security problems based on web applications are becoming more serious now. Most intrusion detection systems rely on each request to find the cyber-attack rather than on user behavior, and these systems can only protect web applications against known vulnerabilities rather than certain zero-day attacks. In order to detect new attacks, we analyze the HTTP protocols of web servers to divide them into two categories: normal attacks and malicious attacks. On the other hand, the quality of the results obtained by deep learning (DL) in various areas of big data has given an important motivation to apply it to cybersecurity. Deep learning for attack detection in cybersecurity has the potential to be a robust tool from small transformations to new attacks due to its capability to extract more high-level features. This research aims to take a new approach, deep learning to cybersecurity, to classify these two categories to eliminate attacks and protect web servers of the defense sector which encounters different web traffic compared to other sectors (such as e-commerce, web app, etc.). The result shows that by using a machine learning method, a higher accuracy rate, and a lower false alarm detection rate can be achieved.

Keywords: anomaly detection, HTTP protocol, logs, cyber attack, deep learning

Procedia PDF Downloads 188