Search results for: modern code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4030

Search results for: modern code

2080 Mobile Microscope for the Detection of Pathogenic Cells Using Image Processing

Authors: P. S. Surya Meghana, K. Lingeshwaran, C. Kannan, V. Raghavendran, C. Priya

Abstract:

One of the most basic and powerful tools in all of science and medicine is the light microscope, the fundamental device for laboratory as well as research purposes. With the improving technology, the need for portable, economic and user-friendly instruments is in high demand. The conventional microscope fails to live up to the emerging trend. Also, adequate access to healthcare is not widely available, especially in developing countries. The most basic step towards the curing of a malady is the diagnosis of the disease itself. The main aim of this paper is to diagnose Malaria with the most common device, cell phones, which prove to be the immediate solution for most of the modern day needs with the development of wireless infrastructure allowing to compute and communicate on the move. This opened up the opportunity to develop novel imaging, sensing, and diagnostics platforms using mobile phones as an underlying platform to address the global demand for accurate, sensitive, cost-effective, and field-portable measurement devices for use in remote and resource-limited settings around the world.

Keywords: cellular, hand-held, health care, image processing, malarial parasites, microscope

Procedia PDF Downloads 248
2079 Coding and Decoding versus Space Diversity for ‎Rayleigh Fading Radio Frequency Channels ‎

Authors: Ahmed Mahmoud Ahmed Abouelmagd

Abstract:

The diversity is the usual remedy of the transmitted signal level variations (Fading phenomena) in radio frequency channels. Diversity techniques utilize two or more copies of a signal and combine those signals to combat fading. The basic concept of diversity is to transmit the signal via several independent diversity branches to get independent signal replicas via time – frequency - space - and polarization diversity domains. Coding and decoding processes can be an alternative remedy for fading phenomena, it cannot increase the channel capacity, but it can improve the error performance. In this paper we propose the use of replication decoding with BCH code class, and Viterbi decoding algorithm with convolution coding; as examples of coding and decoding processes. The results are compared to those obtained from two optimized selection space diversity techniques. The performance of Rayleigh fading channel, as the model considered for radio frequency channels, is evaluated for each case. The evaluation results show that the coding and decoding approaches, especially the BCH coding approach with replication decoding scheme, give better performance compared to that of selection space diversity optimization approaches. Also, an approach for combining the coding and decoding diversity as well as the space diversity is considered, the main disadvantage of this approach is its complexity but it yields good performance results.

Keywords: Rayleigh fading, diversity, BCH codes, Replication decoding, ‎convolution coding, viterbi decoding, space diversity

Procedia PDF Downloads 418
2078 Model-Based Process Development for the Comparison of a Radial Riveting and Roller Burnishing Process in Mechanical Joining Technology

Authors: Tobias Beyer, Christoph Friedrich

Abstract:

Modern simulation methodology using finite element models is nowadays a recognized tool for product design/optimization. Likewise, manufacturing process design is increasingly becoming the focus of simulation methodology in order to enable sustainable results based on reduced real-life tests here as well. In this article, two process simulations -radial riveting and roller burnishing- used for mechanical joining of components are explained. In the first step, the required boundary conditions are developed and implemented in the respective simulation models. This is followed by process space validation. With the help of the validated models, the interdependencies of the input parameters are investigated and evaluated by means of sensitivity analyses. Limit case investigations are carried out and evaluated with the aid of the process simulations. Likewise, a comparison of the two joining methods to each other becomes possible.

Keywords: FEM, model-based process development, process simulation, radial riveting, roller burnishing, sensitivity analysis

Procedia PDF Downloads 91
2077 Object Oriented Software Engineering Approach to Industrial Information System Design and Implementation

Authors: Issa Hussein Manita

Abstract:

This paper presents an example of industrial information system design and implementation (IIDC), the most common software engineering design steps that are applied to the different design stages. We are going through the life cycle of software system development. We start by a study of system requirement and end with testing and delivering system, going by system design and coding, program integration and system integration step. The most modern software design tools available used in the design this includes, but not limited to, Unified Modeling Language (UML), system modeling, SQL server side application, uses case analysis, design and testing as applied to information processing systems. The system is designed to perform tasks specified by the client with real data. By the end of the implementation of the system, default or user defined acceptance policy to provide an overall score as an indication of the system performance is used. To test the reliability of he designed system, it is tested in different environment and different work burden such as multi-user environment.

Keywords: software engineering, design, system requirement, integration, unified modeling language

Procedia PDF Downloads 555
2076 Approximation of Convex Set by Compactly Semidefinite Representable Set

Authors: Anusuya Ghosh, Vishnu Narayanan

Abstract:

The approximation of convex set by semidefinite representable set plays an important role in semidefinite programming, especially in modern convex optimization. To optimize a linear function over a convex set is a hard problem. But optimizing the linear function over the semidefinite representable set which approximates the convex set is easy to solve as there exists numerous efficient algorithms to solve semidefinite programming problems. So, our approximation technique is significant in optimization. We develop a technique to approximate any closed convex set, say K by compactly semidefinite representable set. Further we prove that there exists a sequence of compactly semidefinite representable sets which give tighter approximation of the closed convex set, K gradually. We discuss about the convergence of the sequence of compactly semidefinite representable sets to closed convex set K. The recession cone of K and the recession cone of the compactly semidefinite representable set are equal. So, we say that the sequence of compactly semidefinite representable sets converge strongly to the closed convex set. Thus, this approximation technique is very useful development in semidefinite programming.

Keywords: semidefinite programming, semidefinite representable set, compactly semidefinite representable set, approximation

Procedia PDF Downloads 364
2075 Are Some Languages Harder to Learn and Teach Than Others?

Authors: David S. Rosenstein

Abstract:

The author believes that modern spoken languages should be equally difficult (or easy) to learn, since all normal children learning their native languages do so at approximately the same rate and with the same competence, progressing from easy to more complex grammar and syntax in the same way. Why then, do some languages seem more difficult than others? Perhaps people are referring to the written language, where it may be true that mastering Chinese requires more time than French, which in turn requires more time than Spanish. But this may be marginal, since Chinese and French children quickly catch up to their Spanish peers in reading comprehension. Rather, the real differences in difficulty derive from two sources: hardened L1 language habits trying to cope with contrasting L2 habits; and unfamiliarity with unique L2 characteristics causing faulty expectations. It would seem that effective L2 teaching and learning must take these two sources of difficulty into consideration. The author feels that the latter (faulty expectations) causes the greatest difficulty, making effective teaching and learning somewhat different for each given foreign language. Examples from Chinese and other languages are presented.

Keywords: learning different languages, language learning difficulties, faulty language expectations

Procedia PDF Downloads 515
2074 Modeling and Behavior of Structural Walls

Authors: Salima Djehaichia, Rachid Lassoued

Abstract:

Reinforced concrete structural walls are very efficient elements for protecting buildings against excessive early damage and against collapse under earthquake actions. It is therefore of interest to develop a numerical model which simulates the typical behavior of these units, this paper presents and describes different modeling techniques that have been used by researchers and their advantages and limitations mentioned. The earthquake of Boumerdes in 2003 has demonstrated the fragility of structures and total neglect of sismique design rules in the realization of old buildings. Significant damage and destruction of buildings caused by this earthquake are not due to the choice of type of material, but the design and the study does not congruent with seismic code requirements and bad quality of materials. For idealizing the failure of rules, a parametric study focuses on: low rate of reinforcements, type of reinforcement, resistance moderate of concrete. As an application the modeling strategy based on finite elements combined with a discretization of wall more solicited by successive thin layers. The estimated performance level achieved during a seismic action is obtained from capacity curves under incrementally increasing loads. Using a pushover analysis, a characteristic non linear force-displacement relationship can be determined. The results of numeric model are confronted with those of Algerian Para seismic Rules (RPA) in force have allowed the determination of profits in terms of displacement, shearing action, ductility.

Keywords: modeling, old building, pushover analysis, structural walls

Procedia PDF Downloads 226
2073 The Role of Hausa Oral Praise Singer in Conflict Management and Social Mobilization in Nigeria

Authors: Ladan Surajo

Abstract:

Nigeria as a third world country is full of people who cannot read and write, thereby constituting a stumbling block to the modern way of communication. It is a well known fact that Nigeria is a heterogeneous country with an estimated 450 or more ethnic groups communicating in divergent languages. Despite this scenario, English, Hausa, Igbo and Yoruba languages are predominantly used in the country. Apart from English language, Hausa has a wider coverage of usage among the indigenous languages in Nigeria, thereby using it in the area of social mobilization and conflict management cannot be overemphasized. Hausa Oral Singers are depicting their artistic and God endowed talents through singing to mobilize and sensitize the local communities about government programmes and the ills of other social problems of the society. It is the belief of this researcher that if used properly, the Hausa Oral Singers will assist immensely in reducing to the barest minimum some social ills of the society in Nigeria. More so that music is the food of the heart and has a resounding impact in changing the behaviour of individuals and groups.

Keywords: oral, singers, praise, social mobilization, conflict management

Procedia PDF Downloads 441
2072 Investigating Cultural Identities in Contemporary Greek Art: the Case of Greek Artists in Paris in 1980s

Authors: Sapfo Mortaki

Abstract:

Over the years, Greeks were leaving their homeland looking for better luck, including artists - painters and sculptors. Until mid-1940's, few were the ones who lived, worked, studied and were distinguished abroad. After the end of the Second World War, the group exit towards the cultural centers of the West commences. Since the mid-1970s, and especially in the early 1980s, Modern Greek Diaspora has undergone a new period. The creation of the European Community affects both the character of the immigration of artists as well as the creation of their identity within cultural pluralism. Since 1980 the situation in Greece changed significantly, and the contacts of artists with their homeland became greatly enhanced. Based on the above, this paper examines the cultural identity of the Greek artists in Paris during the 1980s, in comparison to the creation of the identity of the artists of the previous migratory movements, since this decade constitutes a critical point. Their cultural presence in Paris, as reflected in French and Greek daily press and journals of the period, is also investigated. At the same time, their connection with Greece and their contribution to the development and evolution of Contemporary Greek Art is discussed.

Keywords: artistic migration in Paris, cultural identity, cultural interaction, greek artists, greek contemporary art

Procedia PDF Downloads 308
2071 Tracing Economic Policies to Ancient Indian Economic Thought

Authors: Satish Y. Deodhar

Abstract:

Science without history is like a man without memory. The colossal history of India stores many ideas on economic ethics and public policy, which have been forgotten in the course of time. This paper is an attempt to bring to the fore contributions from ancient Indian treatises. In this context, the paper briefly summarizes alternative economic ideas such as communism, capitalism, and the holistic approach of ancient Indian writings. Thereafter, the idea of a welfare brick for an individual consisting of three dimensions -Purusharthas, Ashramas, and Varnas is discussed. Given the contours of the welfare brick, the concept of the state, its economic policies, markets, prices, interest rates, and credit are covered next. This is followed by delving into the treatment of land, property rights, guilds, and labour relations. The penultimate section summarises the economic advice offered to the head of a household in the treatise Shukranitisara. Finally, in concluding comments, the relevance of ancient Indian writings for modern times is discussed -both for pedagogy and economic policies.

Keywords: ancient Indian treatises, history of economic thought, science of political economy, Sanskrit

Procedia PDF Downloads 62
2070 Semantic Features of Turkish and Spanish Phraseological Units with a Somatic Component ‘Hand’

Authors: Narmina Mammadova

Abstract:

In modern linguistics, the comparative study of languages is becoming increasingly popular, the typology and comparison of languages that have different structures is expanding and deepening. Of particular interest is the study of phraseological units, which makes it possible to identify the specific features of the compared languages in all their national identity. This paper gives a brief analysis of the comparative study of somatic phraseological units (SFU) of the Spanish and Turkish languages with the component "hand" in the semantic aspect; identification of equivalents, analogs and non-equivalent units, as well as a description of methods of translation of non-equivalent somatic phraseological units. Comparative study of the phraseology of unrelated languages is of particular relevance since it allows us to identify both general, universal features and differential and specific features characteristic of a particular language. Based on the results of the generalization of the study, it can be assumed that phraseological units containing a somatic component have a high interlingual phraseological activity, which contributes to an increase in the degree of interlingual equivalence.

Keywords: Linguoculturology, Turkish, Spanish, language picture of the world, phraseological units, semantic microfield

Procedia PDF Downloads 177
2069 Developed CNN Model with Various Input Scale Data Evaluation for Bearing Faults Prognostics

Authors: Anas H. Aljemely, Jianping Xuan

Abstract:

Rolling bearing fault diagnosis plays a pivotal issue in the rotating machinery of modern manufacturing. In this research, a raw vibration signal and improved deep learning method for bearing fault diagnosis are proposed. The multi-dimensional scales of raw vibration signals are selected for evaluation condition monitoring system, and the deep learning process has shown its effectiveness in fault diagnosis. In the proposed method, employing an Exponential linear unit (ELU) layer in a convolutional neural network (CNN) that conducts the identical function on positive data, an exponential nonlinearity on negative inputs, and a particular convolutional operation to extract valuable features. The identification results show the improved method has achieved the highest accuracy with a 100-dimensional scale and increase the training and testing speed.

Keywords: bearing fault prognostics, developed CNN model, multiple-scale evaluation, deep learning features

Procedia PDF Downloads 182
2068 Evaluations of 3D Concrete Printing Produced in the Environment of United Arab Emirates

Authors: Adil K. Tamimi, Tarig Ali, Rawan Anoohi, Ahmed Rajput, Kaltham Alkamali

Abstract:

3D concrete printing is one of the most innovative and modern techniques in the field of construction that achieved several milestones in that field for the following advantages: saving project’s time, ability to execute complicated shapes, reduce waste and low cost. However, the concept of 3D printing in UAE is relatively new where construction teams, including clients, consultants, and contractors, do not have the required knowledge and experience in the field. This is the most significant obstacle for the construction parties, which make them refrained from using 3D concrete printing compared to conventional concreting methods. This study shows the historical development of the 3D concrete printing, its advantages, and the challenges facing this innovation. Concrete mixes and materials have been proposed and evaluated to select the best combination for successful 3D concrete printing. The main characteristics of the 3D concrete printing in the fresh and hardened states are considered, such as slump test, flow table, compressive strength, tensile, and flexural strengths. There is need to assess the structural stability of the 3D concrete by testing the bond between interlayers of the concrete.  

Keywords: 3D printing, workability, compressive strength, robots, dimensions

Procedia PDF Downloads 127
2067 Performance Comparison of ADTree and Naive Bayes Algorithms for Spam Filtering

Authors: Thanh Nguyen, Andrei Doncescu, Pierre Siegel

Abstract:

Classification is an important data mining technique and could be used as data filtering in artificial intelligence. The broad application of classification for all kind of data leads to be used in nearly every field of our modern life. Classification helps us to put together different items according to the feature items decided as interesting and useful. In this paper, we compare two classification methods Naïve Bayes and ADTree use to detect spam e-mail. This choice is motivated by the fact that Naive Bayes algorithm is based on probability calculus while ADTree algorithm is based on decision tree. The parameter settings of the above classifiers use the maximization of true positive rate and minimization of false positive rate. The experiment results present classification accuracy and cost analysis in view of optimal classifier choice for Spam Detection. It is point out the number of attributes to obtain a tradeoff between number of them and the classification accuracy.

Keywords: classification, data mining, spam filtering, naive bayes, decision tree

Procedia PDF Downloads 394
2066 Energy Efficiency as a Mean to Increase Energy Access in Sub-Saharan Africa

Authors: Joseph Levodo, Ndimbarafine Young Tobin, E. Messina

Abstract:

Energy efficiency can contribute significantly towards increasing clean energy access to modern energy services. Many developing countries have largely focused on expanding energy access by increasing supply. This is due to the fact the links between energy efficiency and clean energy access are often unnoticed. Energy efficiency measures offer the promise of reducing energy use and saving money on electricity bills, as well as reducing negative environmental externalities associated with the production of electricity. This paper seeks to address the economic and effectiveness of reducing energy consumption by integrating energy efficiency as a priority to meet energy access examines the barriers to energy efficient in sub-Saharan African countries. The findings from this study reveal that an appropriate policy can promote the development of more energy-efficient buildings, products and strengthen incentives for consumers, businesses, and industrial customers to pursue cost-effective; energy-efficiency measures and to make investments that will provide future energy-efficiency improvements.

Keywords: barriers, Sub-Saharan Africa, cost effective, energy savings, clean energy

Procedia PDF Downloads 16
2065 Modern Technologies and Equipment for Modular-Aggregate Installation of Shipborne Equipment

Authors: A. O. Mikhailov, N. I. Gerasimov, K. N. Morozov, I. V. Grachev

Abstract:

The most advanced method of onboard equipment installation on the world shipbuilding practice is modular method, or modularization. The main idea of this is assembly of equipment, pipelines and hull structures in so called assembly units yet at the shopfloor. Those assembly units are thereafter loaded and installed inside the ship's hull. This allows to reduce labour intensiveness and significantly improve assembly quality, due to the fact that a good part of installation work is performed in the shops, instead of restricted onboard premises. Also, this method allows performing equipment installation at very early stages of hull erection. This practice is widely spread in naval submarines building. However, in merchant shipbuilding, equipment is installed mostly individually. To implement modular principles of equipment installation in designing and construction of civil ships and marine rigs, some new technologies are being developed in the following areas. The paper contains main principles and already achieved results in the above mentioned areas.

Keywords: assembly and installation technology, onboard equipment installation, large-scale assembly units, modular method

Procedia PDF Downloads 641
2064 An Industrial Scada System Remote Control Using Mobile Phones

Authors: Ahmidah Elgali

Abstract:

SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.

Keywords: control, industrial, mobile, network, remote, SCADA

Procedia PDF Downloads 56
2063 The Non-Stationary BINARMA(1,1) Process with Poisson Innovations: An Application on Accident Data

Authors: Y. Sunecher, N. Mamode Khan, V. Jowaheer

Abstract:

This paper considers the modelling of a non-stationary bivariate integer-valued autoregressive moving average of order one (BINARMA(1,1)) with correlated Poisson innovations. The BINARMA(1,1) model is specified using the binomial thinning operator and by assuming that the cross-correlation between the two series is induced by the innovation terms only. Based on these assumptions, the non-stationary marginal and joint moments of the BINARMA(1,1) are derived iteratively by using some initial stationary moments. As regards to the estimation of parameters of the proposed model, the conditional maximum likelihood (CML) estimation method is derived based on thinning and convolution properties. The forecasting equations of the BINARMA(1,1) model are also derived. A simulation study is also proposed where BINARMA(1,1) count data are generated using a multivariate Poisson R code for the innovation terms. The performance of the BINARMA(1,1) model is then assessed through a simulation experiment and the mean estimates of the model parameters obtained are all efficient, based on their standard errors. The proposed model is then used to analyse a real-life accident data on the motorway in Mauritius, based on some covariates: policemen, daily patrol, speed cameras, traffic lights and roundabouts. The BINARMA(1,1) model is applied on the accident data and the CML estimates clearly indicate a significant impact of the covariates on the number of accidents on the motorway in Mauritius. The forecasting equations also provide reliable one-step ahead forecasts.

Keywords: non-stationary, BINARMA(1, 1) model, Poisson innovations, conditional maximum likelihood, CML

Procedia PDF Downloads 111
2062 Test Suite Optimization Using an Effective Meta-Heuristic BAT Algorithm

Authors: Anuradha Chug, Sunali Gandhi

Abstract:

Regression Testing is a very expensive and time-consuming process carried out to ensure the validity of modified software. Due to the availability of insufficient resources to re-execute all the test cases in time constrained environment, efforts are going on to generate test data automatically without human efforts. Many search based techniques have been proposed to generate efficient, effective as well as optimized test data, so that the overall cost of the software testing can be minimized. The generated test data should be able to uncover all potential lapses that exist in the software or product. Inspired from the natural behavior of bat for searching her food sources, current study employed a meta-heuristic, search-based bat algorithm for optimizing the test data on the basis certain parameters without compromising their effectiveness. Mathematical functions are also applied that can effectively filter out the redundant test data. As many as 50 Java programs are used to check the effectiveness of proposed test data generation and it has been found that 86% saving in testing efforts can be achieved using bat algorithm while covering 100% of the software code for testing. Bat algorithm was found to be more efficient in terms of simplicity and flexibility when the results were compared with another nature inspired algorithms such as Firefly Algorithm (FA), Hill Climbing Algorithm (HC) and Ant Colony Optimization (ACO). The output of this study would be useful to testers as they can achieve 100% path coverage for testing with minimum number of test cases.

Keywords: regression testing, test case selection, test case prioritization, genetic algorithm, bat algorithm

Procedia PDF Downloads 352
2061 Text as Reader Device Improving Subjectivity on the Role of Attestation between Interpretative Semiotics and Discursive Linguistics

Authors: Marco Castagna

Abstract:

Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.Proposed paper is aimed to inquire about the relation between text and reader, focusing on the concept of ‘attestation’. Indeed, despite being widely accepted in semiotic research, even today the concept of text remains uncertainly defined. So, it seems to be undeniable that what is called ‘text’ offers an image of internal cohesion and coherence, that makes it possible to analyze it as an object. Nevertheless, this same object remains problematic when it is pragmatically activated by the act of reading. In fact, as for the T.A.R:D.I.S., that is the unique space-temporal vehicle used by the well-known BBC character Doctor Who in his adventures, every text appears to its own readers not only “bigger inside than outside”, but also offering spaces that change according to the different traveller standing in it. In a few words, as everyone knows, this singular condition raises the questions about the gnosiological relation between text and reader. How can a text be considered the ‘same’, even if it can be read in different ways by different subjects? How can readers can be previously provided with knowledge required for ‘understanding’ a text, but at the same time learning something more from it? In order to explain this singular condition it seems useful to start thinking about text as a device more than an object. In other words, this unique status is more clearly understandable when ‘text’ ceases to be considered as a box designed to move meaning from a sender to a recipient (marking the semiotic priority of the “code”) and it starts to be recognized as performative meaning hypothesis, that is discursively configured by one or more forms and empirically perceivable by means of one or more substances. Thus, a text appears as a “semantic hanger”, potentially offered to the “unending deferral of interpretant", and from time to time fixed as “instance of Discourse”. In this perspective, every reading can be considered as an answer to the continuous request for confirming or denying the meaning configuration (the meaning hypothesis) expressed by text. Finally, ‘attestation’ is exactly what regulates this dynamic of request and answer, through which the reader is able to confirm his previous hypothesis on reality or maybe acquire some new ones.

Keywords: attestation, meaning, reader, text

Procedia PDF Downloads 225
2060 Impact of Improved Beehive on Income of Rural Households: Evidence from Bugina District of Northern Ethiopia

Authors: Wondmnew Derebe

Abstract:

Increased adoption of modern beehives improves the livelihood of smallholder farmers whose income largely depends on mixed crop-livestock farming. Improved beehives have been disseminated to farmers in many parts of Ethiopia. However, its impact on income is less investigated. Thus, this study estimates how adopting improved beehives impacts rural households' income. Survey data were collected from 350 randomly selected households' and analyzed using an endogenous switching regression model. The result revealed that the adoption of improved beehives is associated with a higher annual income. On average, improved beehive adopters earned about 6,077 (ETB) more money than their counterparts. However, the impact of adoption would have been larger for actual non-adopters, as reflected in the negative transitional heterogeneity effect of 1792 (ETB). The result also indicated that the decision to adopt or not to adopt improved beehives was subjected to individual self-selection. Improved beehive adoption can increase farmers' income and can be used as an alternative poverty reduction strategy.

Keywords: impact, adoption, endogenous switching regression, income, improved

Procedia PDF Downloads 50
2059 Large-Scale Electroencephalogram Biometrics through Contrastive Learning

Authors: Mostafa ‘Neo’ Mohsenvand, Mohammad Rasool Izadi, Pattie Maes

Abstract:

EEG-based biometrics (user identification) has been explored on small datasets of no more than 157 subjects. Here we show that the accuracy of modern supervised methods falls rapidly as the number of users increases to a few thousand. Moreover, supervised methods require a large amount of labeled data for training which limits their applications in real-world scenarios where acquiring data for training should not take more than a few minutes. We show that using contrastive learning for pre-training, it is possible to maintain high accuracy on a dataset of 2130 subjects while only using a fraction of labels. We compare 5 different self-supervised tasks for pre-training of the encoder where our proposed method achieves the accuracy of 96.4%, improving the baseline supervised models by 22.75% and the competing self-supervised model by 3.93%. We also study the effects of the length of the signal and the number of channels on the accuracy of the user-identification models. Our results reveal that signals from temporal and frontal channels contain more identifying features compared to other channels.

Keywords: brainprint, contrastive learning, electroencephalo-gram, self-supervised learning, user identification

Procedia PDF Downloads 140
2058 Performance Comparison of Resource Allocation without Feedback in Wireless Body Area Networks by Various Pseudo Orthogonal Sequences

Authors: Ojin Kwon, Yong-Jin Yoon, Liu Xin, Zhang Hongbao

Abstract:

Wireless Body Area Network (WBAN) is a short-range wireless communication around human body for various applications such as wearable devices, entertainment, military, and especially medical devices. WBAN attracts the attention of continuous health monitoring system including diagnostic procedure, early detection of abnormal conditions, and prevention of emergency situations. Compared to cellular network, WBAN system is more difficult to control inter- and inner-cell interference due to the limited power, limited calculation capability, mobility of patient, and non-cooperation among WBANs. In this paper, we compare the performance of resource allocation scheme based on several Pseudo Orthogonal Codewords (POCs) to mitigate inter-WBAN interference. Previously, the POCs are widely exploited for a protocol sequence and optical orthogonal code. Each POCs have different properties of auto- and cross-correlation and spectral efficiency according to its construction of POCs. To identify different WBANs, several different pseudo orthogonal patterns based on POCs exploits for resource allocation of WBANs. By simulating these pseudo orthogonal resource allocations of WBANs on MATLAB, we obtain the performance of WBANs according to different POCs and can analyze and evaluate the suitability of POCs for the resource allocation in the WBANs system.

Keywords: wireless body area network, body sensor network, resource allocation without feedback, interference mitigation, pseudo orthogonal pattern

Procedia PDF Downloads 334
2057 Issues and Challenges of Planning in Commercial Business Districts of Farukh Nagar in Gurugram, Harayana, India

Authors: Adedayo Jeremiah Adeyekun, Samuel Oluwagbemiga Ishola

Abstract:

This research paper focuses on the study of the master plan of rural Farrukhnagar, a town in Gurugram with an aim to proffer solutions to the problems associated with the planning of the town. The commercial zone has been selected for the case study. The findings from the case studies will reveal problems that will require a proposed design of a new ultra-modern market to position traders selling along the road in well-deserved stalls, waste disposal/incinerator system for proper management of waste and cleanliness within the market square, design of stormwater drainage to avoid flood during the rainy season and the design of car/auto – tricycle parks to create more space in the existing market cycle and thereby avoiding congestion. The research proposes urban and architectural solutions to improve the rural commercial service settings in Farrukhnagar which is a study area in Gurugram, Haryana, India.

Keywords: management, commercial, service, planning, congestion

Procedia PDF Downloads 210
2056 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 104
2055 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 640
2054 Re-shaping Ancient Historical Courtyards in a Sustainable Design

Authors: Andreea Anamaria Anghel, Flaviu Mihai Frigura-Lliasa, Attila Simo

Abstract:

In recent years, there has been a renewed interest in revitalizing the historical area of Timisoara, a city located in western Romania, with a focus on preserving its architectural heritage while also promoting sustainable urban development. This has led to several initiatives aimed at improving public spaces, promoting sustainable transport, and encouraging the use of green infrastructure, such as green interior courtyards, to enhance the livability and sustainability of the area. A preliminary study regarding history, characteristics and current condition was carried out by the authors regarding these interior courtyards in the historical areas of Timisoara, the European Capital of Culture, in 2023, highlighting their potential to contribute to the sustainable development of the city. Modern interventions in interior historical courtyards should aim to preserve the historic character of these spaces while also promoting their sustainable and functional use in the 21st century. By doing so, these courtyards can continue to serve as vital urban oases and cultural landmarks for generations to come.

Keywords: architectural heritage, green interior courtyards, public spaces, sustainable development

Procedia PDF Downloads 58
2053 Disputed Heritage: Modernism as Resistance

Authors: Marcos Fabris

Abstract:

The flaccidity of the contemporary art production, its banality and incapacity of raising social and political relevant issues, and its ubiquitous connection to an ever prospering art market have become a trite, prosaic mantra, a thought-terminating cliché repeated by many, at least in the academic circles, who constantly lament the absence of pressing issues, artistically articulated from a Marxist perspective. This ‘resignation’ or crystalized insistence to consider Contemporary Art as a monolithic block – insufficiently critical – seems to be part of a pattern in Art History, not excluding its leftist wings: the idea that Modernism was, too, a homogeneous movement, one that despite its attempts to establish meaningful connections between art and society are now part of a museological past. This post-mortem attributed to a ‘flat’ modernism disregards it’s highly contradictory character and diverging tendencies, in permanent conflict between themselves and part of a larger movement that questioned Capitalism – as a system. The aim of this presentation is to shed light on some of the most radical modern tendencies, how they articulated ways to figure the uneven and combined development, and how this ‘Alternative Modernism’ may inform, inspire, and make us advance critically in our struggles against the returns of Capitalism.

Keywords: art criticism, art history, contemporary art, modernism

Procedia PDF Downloads 235
2052 Mastopexy With The "Dermoglandular Autоaugmentation" Method. Increased Stability Of The Result. Personalized Technique

Authors: Maksim Barsakov

Abstract:

Introduction. In modern plastic surgery, there are a large number of breast lift techniques.Due to the spreading information about the "side effects" of silicone implants, interest in implant-free mastopexy is increasing year after year. However, despite the variety of techniques, patients sometimes do not get full satisfaction from the results of mastopexy because of the unexpressed filling of the upper pole, extended anchoring postoperative scars and sometimes because of obtaining an aesthetically unattractive breast shape. The stability of the result after mastopexy depends on many factors, including postoperative rehabilitation. Stability of weight and hormonal background, stretchability of tissues. The high recurrence rate of ptosis and short-term aesthetic effect of mastopexy indicate the urgency of improving surgical techniques and increasing the stabilization of breast tissue. Purpose of the study. To develop and introduce into practice a technique of mastopexy based on the use of a modified Ribeiro flap, as well as elements of tissue movement and fixation designed to increase the stability of postoperative mastopexy. In addition, to give indications for the application of this surgical technique. Materials and Methods. it operated on 103 patients aged 18 to 53 years from 2019 to 2023 according to the reported method. These were patients with primary mastopexy, secondary mastopexy, and also patient with implant removal and one-stage mastopexy. The patients were followed up for 12 months to assess the stability of the result. Results and their discussion. Observing the patients, we noted greater stability of the breast shape and upper pole filling compared to the conventional classical methods. We did not have to resort to anchoring scars. In 90 percent of cases, a inverted T-shape scar was used. In 10 percent, the J-scar was used. The quantitative distribution of complications identified among the operated patients is as follows: worsened healing of the junction of vertical and horizontal sutures at the period of 1-1.5 months after surgery - 15 patients; at treatment with ointment method healing was observed in 7-30 days; permanent loss of NAC sensitivity - 0 patients; vascular disorders in the area of NAC/areola necrosis - 0 patients; marginal necrosis of the areola-2 patients. independent healing within 3-4 weeks without aesthetic defects. Aesthetically unacceptable mature scars-3 patients; partial liponecrosis of the autoflap unilaterally - 1 patient. recurrence of ptosis - 1 patient (after weight loss of 12 kg). In the late postoperative period, 2 patients became pregnant, gave birth, and no lactation problems were observed. Conclusion. Thus, in the world of plastic surgery methods of breast lift continue to improve, which is especially relevant in modern times, due to the increased attention to this operation. The author's proposed method of mastopexy with glandular autoflap allows obtaining in most cases a stable result, a fuller breast shape, avoiding the presence of extended anchoring scars, and also preserves the possibility of lactation. The author of this article has obtained a patent for invention for this method of mastopexy.

Keywords: mastopexy, mammoplasty, autoflap, personal technique

Procedia PDF Downloads 7
2051 Spectrum Assignment Algorithms in Optical Networks with Protection

Authors: Qusay Alghazali, Tibor Cinkler, Abdulhalim Fayad

Abstract:

In modern optical networks, the flex grid spectrum usage is most widespread, where higher bit rate streams get larger spectrum slices while lower bit rate traffic streams get smaller spectrum slices. To our practice, under the ITU-T recommendation, G.694.1, spectrum slices of 50, 75, and 100 GHz are being used with central frequency at 193.1 THz. However, when these spectrum slices are not sufficient, multiple spectrum slices can use either one next to another or anywhere in the optical wavelength. In this paper, we propose the analysis of the wavelength assignment problem. We compare different algorithms for this spectrum assignment with and without protection. As a reference for comparisons, we concluded that the Integer Linear Programming (ILP) provides the global optimum for all cases. The most scalable algorithm is the greedy one, which yields results in subsequent ranges even for more significant network instances. The algorithms’ benchmark implemented using the LEMON C++ optimization library and simulation runs based on a minimum number of spectrum slices assigned to lightpaths and their execution time.

Keywords: spectrum assignment, integer linear programming, greedy algorithm, international telecommunication union, library for efficient modeling and optimization in networks

Procedia PDF Downloads 154