Search results for: modern code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4030

Search results for: modern code

1990 Black-Brown and Yellow-Brown-Red Skin Pigmentation Elements are Shared in Common: Using Art and Science for Multicultural Education

Authors: Mary Kay Bacallao

Abstract:

New research on the human genome has revealed secrets to the variation in skin pigmentation found in all human populations. Application of this research to multicultural education has a profound effect on students from all backgrounds. This paper identifies the four locations in the human genome that code for variation in skin pigmentation worldwide. The research makes this new knowledge accessible to students of all ages as they participate in an art project that brings these scientific multicultural concepts to life. Students participate in the application of breakthrough scientific principles through hands-on art activities where they simulate the work of the DNA coding to create their own skin tone using the colors expressed to varying degrees in every people group. As students create their own artwork handprint from the pallet of colors, they realize that each color on the pallet is essential to creating every tone of skin. This research project serves to bring people together and appreciate the variety and diversity in skin tones. As students explore the variations, they create pigmentation with the use of the eumelanins, which are the black-brown sources of pigmentation, and the pheomelanins, which are the yellow-reddish-brown sources of pigmentation. The research project dispels myths about skin tones that have divided people in the past. As a group project, this research leads to greater appreciation and understanding of the diverse family groups.

Keywords: diversity, multicultural, skin pigmentation, eumelanins, pheomelanins, handprint, artwork, science, genome, human

Procedia PDF Downloads 49
1989 Numerical Modeling of Determination of in situ Rock Mass Deformation Modulus Using the Plate Load Test

Authors: A. Khodabakhshi, A. Mortazavi

Abstract:

Accurate determination of rock mass deformation modulus, as an important design parameter, is one of the most controversial issues in most engineering projects. A 3D numerical model of standard plate load test (PLT) using the FLAC3D code was carried to investigate the mechanism governing the test process. Five objectives were the focus of this study. The first goal was to employ 3D modeling in the interpretation of PLT conducted at the Bazoft dam site, Iran. The second objective was to investigate the effect of displacements measuring depth from the loading plates on the calculated moduli. The magnitude of rock mass deformation modulus calculated from PLT depends on anchor depth, and in practice, this may be a cause of error in the selection of realistic deformation modulus for the rock mass. The third goal of the study was to investigate the effect of testing plate diameter on the calculated modulus. Moreover, a comparison of the calculated modulus from ISRM formula, numerical modeling and calculated modulus from the actual PLT carried out at right abutment of the Bazoft dam site was another objective of the study. Finally, the effect of plastic strains on the calculated moduli in each of the loading-unloading cycles for three loading plates was investigated. The geometry, material properties, and boundary conditions on the constructed 3D model were selected based on the in-situ conditions of PLT at Bazoft dam site. A good agreement was achieved between numerical model results and the field tests results.

Keywords: deformation modulus, numerical model, plate loading test, rock mass

Procedia PDF Downloads 149
1988 Analyzing the Quality of Cloud-Based E-Learning Systems on the Perception of the Learners and the Teachers

Authors: R. W. C. Devindi, S. M. Buddika Harshanath

Abstract:

E-learning is a widely used technology for learning in the modern world. With the pandemic situation the popularity of using e-learning has been increased in a larger capacity. The e-learning educational systems require software resources as well as hardware usually but it is hard for most of the education institutions to afford those resources. Also with the massive user load e-learning has to broaden the server side resources as well. Therefore, in the present cloud computing was implemented in order to make the e – learning systems more efficient. The researcher has analyzed the quality of the e-learning systems on the perception of the learners and the teachers with the aid of hypothesis and has given the analyzed results and the discussion in this report. Therefore, the future research will be able to get some steps to increase the quality of the online learning systems furthermore. In the case of e-learning, quality assurance and cost effectiveness are essential. A complex quality assurance system is used in the stated project. There are no well-defined standard evaluation measures in this field. As a result, accurately assessing the e-learning system's overall quality is challenging. The researcher has done the analysis with the aid of standard methods and software.

Keywords: LMS–learning management system, SPSS–statistical package for social sciences (software), eigen value, hypothesis

Procedia PDF Downloads 90
1987 Objective Evaluation on Medical Image Compression Using Wavelet Transformation

Authors: Amhimmid Mohammed Saffour, Mustafa Mohamed Abdullah

Abstract:

The use of computers for handling image data in the healthcare is growing. However, the amount of data produced by modern image generating techniques is vast. This data might be a problem from a storage point of view or when the data is sent over a network. This paper using wavelet transform technique for medical images compression. MATLAB program, are designed to evaluate medical images storage and transmission time problem at Sebha Medical Center Libya. In this paper, three different Computed Tomography images which are abdomen, brain and chest have been selected and compressed using wavelet transform. Objective evaluation has been performed to measure the quality of the compressed images. For this evaluation, the results show that the Peak Signal to Noise Ratio (PSNR) which indicates the quality of the compressed image is ranging from (25.89db to 34.35db for abdomen images, 23.26db to 33.3db for brain images and 25.5db to 36.11db for chest images. These values shows that the compression ratio is nearly to 30:1 is acceptable.

Keywords: medical image, Matlab, image compression, wavelet's, objective evaluation

Procedia PDF Downloads 270
1986 Produced Gas Conversion of Microwave Carbon Receptor Reforming

Authors: Young Nam Chun, Mun Sup Lim

Abstract:

Carbon dioxide and methane, the major components of biomass pyrolysis/gasification gas and biogas, top the list of substances that cause climate change, but they are also among the most important renewable energy sources in modern society. The purpose of this study is to convert carbon dioxide and methane into high-quality energy using char and commercial activated carbon obtained from biomass pyrolysis as a microwave receptor. The methane reforming process produces hydrogen and carbon. This carbon is deposited in the pores of the microwave receptor and lowers catalytic activity, thereby reducing the methane conversion rate. The deposited carbon was removed by carbon gasification due to the supply of carbon dioxide, which solved the problem of microwave receptor inactivity. In particular, the conversion rate remained stable at over 90% when the ratio of carbon dioxide to methane was 1:1. When the reforming results of carbon dioxide and methane were compared after fabricating nickel and iron catalysts using commercial activated carbon as a carrier, the conversion rate was higher in the iron catalyst than in the nickel catalyst and when no catalyst was used. 

Keywords: microwave, gas reforming, greenhouse gas, microwave receptor, catalyst

Procedia PDF Downloads 353
1985 Research on Knowledge Graph Inference Technology Based on Proximal Policy Optimization

Authors: Yihao Kuang, Bowen Ding

Abstract:

With the increasing scale and complexity of knowledge graph, modern knowledge graph contains more and more types of entity, relationship, and attribute information. Therefore, in recent years, it has been a trend for knowledge graph inference to use reinforcement learning to deal with large-scale, incomplete, and noisy knowledge graphs and improve the inference effect and interpretability. The Proximal Policy Optimization (PPO) algorithm utilizes a near-end strategy optimization approach. This allows for more extensive updates of policy parameters while constraining the update extent to maintain training stability. This characteristic enables PPOs to converge to improved strategies more rapidly, often demonstrating enhanced performance early in the training process. Furthermore, PPO has the advantage of offline learning, effectively utilizing historical experience data for training and enhancing sample utilization. This means that even with limited resources, PPOs can efficiently train for reinforcement learning tasks. Based on these characteristics, this paper aims to obtain a better and more efficient inference effect by introducing PPO into knowledge inference technology.

Keywords: reinforcement learning, PPO, knowledge inference

Procedia PDF Downloads 215
1984 Initiative Programme to Reform Education in Thailand

Authors: Piyapat Chitpirom, Teerakiat Jareonsettasin, Chintida Vichitsophaphan

Abstract:

The Foundation of Virtuous Youth was established and supported by the Crown Property Bureau, with the intention to instill goodness in Thai youth. The Centre for Educational Psychology is one of the three units under the foundation. We aim to develop programmes that can be used to improve the quality of education in schools. Translation of the King’s message in keeping with the modern research from various sources, our team create 6 programmes: (1) Teacher-Student Relationship (2) Growth Mindset (3) Socratic Teaching (4) Peer Tutoring (5) Parental Involvement (6) Inclusion. After nine months of implementing the programmes in the schools, we found that there were more cooperation between student-student, teacher-student, teacher-parent, and student-parent and the school regained trust from the community. Our ideas were accepted well by the government as our director was promoted to be the Vice Minister of Education in order to implement our programmes into national education system. We consider that the key of our success is that we do practical things. We are still continuing, improving, and learning from our work with hope that the quality of Thai education will improve in near future.

Keywords: education reform, educational psychology, effective teaching, teacher-student relationship

Procedia PDF Downloads 412
1983 Child Homicide Victimization and Community Context: A Research Note

Authors: Bohsiu Wu

Abstract:

Among serious crimes, child homicide is a rather rare event. However, the killing of children stirs up a special type of emotion in society that pales other criminal acts. This study examines the relevancy of three possible community-level explanations for child homicide: social deprivation, female empowerment, and social isolation. The social deprivation hypothesis posits that child homicide results from lack of resources in communities. The female empowerment hypothesis argues that a higher female status translates into a higher level of capability to prevent child homicide. Finally, the social isolation hypothesis regards child homicide as a result of lack of social connectivity. Child homicide data, aggregated by US postal ZIP codes in California from 1990 to 1999, were analyzed with a negative binomial regression. The results of the negative binomial analysis demonstrate that social deprivation is the most salient and consistent predictor among all other factors in explaining child homicide victimization at the ZIP-code level. Both social isolation and female labor force participation are weak predictors of child homicide victimization across communities. Further, results from the negative binomial regression show that it is the communities with a higher, not lower, degree of female labor force participation that are associated with a higher count of child homicide. It is possible that poor communities with a higher level of female employment have a lesser capacity to provide the necessary care and protection for the children. Policies aiming at reducing social deprivation and strengthening female empowerment possess the potential to reduce child homicide in the community.

Keywords: child homicide, deprivation, empowerment, isolation

Procedia PDF Downloads 177
1982 Holistic Approach for Natural Results in Facial Aesthetics

Authors: R. Denkova

Abstract:

Nowadays, aesthetic and psychological researches in some countries show that the aesthetic ideal for women is built by the same pattern of big volumes – lips, cheek, facial disproportions. They all look like made of a matrix. And they lose their unique and emotional aspects of beauty. How to escape this matrix and find the balance? The secret to being a unique injector is good assessment, creating a treatment plan and flawless injection strategy. The newest concepts in this new injection era which meet the requirements of a modern society and deliver balanced and natural looking results are based on the concept of injecting not the consequence, but the reason. Three case studies are presented with full face assessment, treatment plan and before/after pictures. Using different approaches and techniques of the MD codes concept, lights and shadows concept in order to preserve the emotional beauty and identity of the women. In conclusion, the cases demonstrate that beauty exists even beyond the matrix and it is the injector’s mission and responsibility is to preserve and highlight the natural beauty and unique identity of every different patient.

Keywords: beyond the matrix, emotional beauty, face assessment, injector, treatment plan

Procedia PDF Downloads 106
1981 Toughness of a Silt-Based Construction Material Reinforced with Fibers

Authors: Y. Shamas, S. Imanzadeh, A. Jarno, S. Taibi

Abstract:

Silt-based construction material is acknowledged since forever and lately received the researchers’ attention more than before as being an ecological and economical alternative for typical cement-based concrete. Silt-based material is known for its worldwide availability, cheapness, and various applications. Some rules should be defined to obtain a standardized method for the use of raw earth as a modern construction material; but first, its mechanical properties should be precisely studied to better understand its behavior in order to find new aspects in making it a better competitor for the cement concrete that is high energy-demanding in terms of gray energy. Some researches were performed on the raw earth material to enhance its characteristics as strength and ductility for their importance and their wide use for various materials. Yet, many other mechanical properties can be used to study the mechanical behavior of raw earth materials such as Young’smodulus and toughness. Studies concerning the toughness of material were rarely conducted previously except for metals despite its significant role associated to the energy absorbed by the material under loading before fracturing. The purpose of this paper is to restate different toughness definitions used in the literature and propose a new definition.

Keywords: silt-based material, raw earth concrete, stress-strain curve, energy, toughness

Procedia PDF Downloads 194
1980 Design and Implementation of a Hardened Cryptographic Coprocessor with 128-bit RISC-V Core

Authors: Yashas Bedre Raghavendra, Pim Vullers

Abstract:

This study presents the design and implementation of an abstract cryptographic coprocessor, leveraging AMBA(Advanced Microcontroller Bus Architecture) protocols - APB (Advanced Peripheral Bus) and AHB (Advanced High-performance Bus), to enable seamless integration with the main CPU(Central processing unit) and enhance the coprocessor’s algorithm flexibility. The primary objective is to create a versatile coprocessor that can execute various cryptographic algorithms, including ECC(Elliptic-curve cryptography), RSA(Rivest–Shamir–Adleman), and AES (Advanced Encryption Standard) while providing a robust and secure solution for modern secure embedded systems. To achieve this goal, the coprocessor is equipped with a tightly coupled memory (TCM) for rapid data access during cryptographic operations. The TCM is placed within the coprocessor, ensuring quick retrieval of critical data and optimizing overall performance. Additionally, the program memory is positioned outside the coprocessor, allowing for easy updates and reconfiguration, which enhances adaptability to future algorithm implementations. Direct links are employed instead of DMA(Direct memory access) for data transfer, ensuring faster communication and reducing complexity. The AMBA-based communication architecture facilitates seamless interaction between the coprocessor and the main CPU, streamlining data flow and ensuring efficient utilization of system resources. The abstract nature of the coprocessor allows for easy integration of new cryptographic algorithms in the future. As the security landscape continues to evolve, the coprocessor can adapt and incorporate emerging algorithms, making it a future-proof solution for cryptographic processing. Furthermore, this study explores the addition of custom instructions into RISC-V ISE (Instruction Set Extension) to enhance cryptographic operations. By incorporating custom instructions specifically tailored for cryptographic algorithms, the coprocessor achieves higher efficiency and reduced cycles per instruction (CPI) compared to traditional instruction sets. The adoption of RISC-V 128-bit architecture significantly reduces the total number of instructions required for complex cryptographic tasks, leading to faster execution times and improved overall performance. Comparisons are made with 32-bit and 64-bit architectures, highlighting the advantages of the 128-bit architecture in terms of reduced instruction count and CPI. In conclusion, the abstract cryptographic coprocessor presented in this study offers significant advantages in terms of algorithm flexibility, security, and integration with the main CPU. By leveraging AMBA protocols and employing direct links for data transfer, the coprocessor achieves high-performance cryptographic operations without compromising system efficiency. With its TCM and external program memory, the coprocessor is capable of securely executing a wide range of cryptographic algorithms. This versatility and adaptability, coupled with the benefits of custom instructions and the 128-bit architecture, make it an invaluable asset for secure embedded systems, meeting the demands of modern cryptographic applications.

Keywords: abstract cryptographic coprocessor, AMBA protocols, ECC, RSA, AES, tightly coupled memory, secure embedded systems, RISC-V ISE, custom instructions, instruction count, cycles per instruction

Procedia PDF Downloads 54
1979 Atmospheric Dispersion Modeling for a Hypothetical Accidental Release from the 3 MW TRIGA Research Reactor of Bangladesh

Authors: G. R. Khan, Sadia Mahjabin, A. S. Mollah, M. R. Mawla

Abstract:

Atmospheric dispersion modeling is significant for any nuclear facilities in the country to predict the impact of radiological doses on environment as well as human health. That is why to ensure safety of workers and population at plant site; Atmospheric dispersion modeling and radiation dose calculations were carried out for a hypothetical accidental release of airborne radionuclide from the 3 MW TRIGA research reactor of Savar, Bangladesh. It is designed with reactor core which consists of 100 fuel elements(1.82245 cm in diameter and 38.1 cm in length), arranged in an annular corefor steady-state and square wave power level of 3 MW (thermal) and for pulsing with maximum power level of 860MWth.The fuel is in the form of a uniform mixture of 20% uranium and 80% zirconium hydride. Total effective doses (TEDs) to the public at various downwind distances were evaluated with a health physics computer code “HotSpot” developed by Lawrence Livermore National Laboratory, USA. The doses were estimated at different Pasquill stability classes (categories A-F) with site-specific averaged meteorological conditions. The meteorological data, such as, average wind speed, frequency distribution of wind direction, etc. have also been analyzed based on the data collected near the reactor site. The results of effective doses obtained remain within the recommended maximum effective dose.

Keywords: accidental release, dispersion modeling, total effective dose, TRIGA

Procedia PDF Downloads 117
1978 Building Information Modelling: A Review to Indian Scenario

Authors: P. Agnivesh, P. V. Ponambala Moorthi

Abstract:

Evolution of information modelling leads to the visualisation of well-organized built environment. Building Information Modelling (BIM) is considered as evolution in the off-site construction which essentially enhances and controls the present scenario of on-site construction paradigms. Promptness, sustainability and security are considered as the important characteristics of the building information modelling. Projects that uses BIM are tied firmly by technology but distributed organizationally. This allows different team members in the project to associate and integrate the works and work flows. This will in turn improve the efficiency of work breakdown structure. Internationally BIM had been accepted as modern computer aided way of information sharing by construction industry for efficient way of manipulation in order to avoid the on-site misperceptions. Even though, in developing countries like India BIM is in the phase of start and requires lot of mandates and policies to be brought about by the government for its widespread implementations. This paper reviews the current scenario of BIM worldwide and in India and suggests for the improved implementation of building modelling for Indian policy condition.

Keywords: building information modelling, Indian polity, information modelling, information sharing, mandates and policies, sustainability.

Procedia PDF Downloads 356
1977 Iran’s Sexual and Reproductive Rights Roll-Back: An Overview of Iran’s New Population Policies

Authors: Raha Bahreini

Abstract:

This paper discusses the roll-back of women’s sexual and reproductive rights in the Islamic Republic of Iran, which has come in the wake of a striking shift in the country’s official population policies. Since the late 1980s, Iran has won worldwide praise for its sexual and reproductive health and services, which have contributed to a steady decline in the country’s fertility rate–from 7.0 births per women in 1980 to 5.5 in 1988, 2.8 in 1996 and 1.85 in 2014. This is owed to a significant increase in the voluntary use of modern contraception in both rural and urban areas. In 1976, only 37 per cent of women were using at least one method of contraception; by 2014 this figure had reportedly risen to a high of nearly 79 per cent for married girls and women living in urban areas and 73.78 per cent for those living in rural areas. Such progress may soon be halted. In July 2012, Iran’s Supreme Leader Ayatollah Sayed Ali Khamenei denounced Iran’s family planning policies as an imitation of Western lifestyle. He exhorted the authorities to increase Iran’s population to 150 to 200 million (from around 78.5 million), including by cutting subsidies for contraceptive methods and dismantling the state’s Family and Population Planning Programme. Shortly thereafter, Iran’s Minister of Health and Medical Education announced the scrapping of the budget for the state-funded Family and Population Planning Programme. Iran’s Parliament subsequently introduced two bills; the Comprehensive Population and Exaltation of Family Bill (Bill 315), and the Bill to Increase Fertility Rates and Prevent Population Decline (Bill 446). Bill 446 outlaws voluntary tubectomies, which are believed to be the second most common method of modern contraception in Iran, and blocks access to information about contraception, denying women the opportunity to make informed decisions about the number and spacing of their children. Coupled with the elimination of state funding for Iran’s Family and Population Programme, the move would undoubtedly result in greater numbers of unwanted pregnancies, forcing more women to seek illegal and unsafe abortions. Bill 315 proposes various discriminatory measures in the areas of employment, divorce, and protection from domestic violence in order to promote a culture wherein wifedom and child-bearing is seen as women’s primary duty. The Bill, for example, instructs private and public entities to prioritize, in sequence, men with children, married men without children and married women with children when hiring for certain jobs. It also bans the recruitment of single individuals as family law lawyers, public and private school teachers and members of the academic boards of universities and higher education institutes. The paper discusses the consequences of these initiatives which would, if continued, set the human rights of women and girls in Iran back by decades, leaving them with a future shaped by increased inequality, discrimination, poor health, limited choices and restricted freedoms, in breach of Iran’s international human rights obligations.

Keywords: family planning and reproductive health, gender equality and empowerment of women, human rights, population growth

Procedia PDF Downloads 285
1976 Ethnic Militias and Insecurity in Democratic Nigeria

Authors: Adeyemi Kamil Hamzah, Abayomi Nathaniel Oyesikun

Abstract:

Throughout modern history internal strife has burdened Africa most populous nation, Nigeria. The country encompassed more than four hundred ethnic and sub ethnic groups with the different background and identities. This group has not fussed themselves together to emerge as a nation what we have are mere ethnic and religious groups i.e. Hausa/Fulani Igbo Yoruba Ijaw, Ibibio, christian, and Muslim. The source of problematic Nigeria is linked to colonial policy of segmentation, discontent to religion, faith, and ethnicity. The wave of spiral killing among the major ethnic entities with different religious affiliation has brought the process of good governance in the country to its kneel. This paper will place insecurity in Nigeria in context by reviewing the root and rise of ethnic militia. In doing so it will evaluate how the West Africa power house arrive at the point where it is today with all unprecedented unrest from regions that formed Nigeria. Both primary and secondary sources were applied for the quality of this paper. The effects of ethnic militia in realizing and actualizing political stability are equally discussed, recommendations proffered and conclusion given.

Keywords: ethnic, militia, violence, insecurity, democracy

Procedia PDF Downloads 309
1975 Digital Twin Strategies and Technologies for Modern Supply Chains

Authors: Mayank Sharma, Anubhaw Kumar, Siddharth Desai, Ankit Tomar

Abstract:

With the advent of cost-effective hardware and communication technologies, the scope of digitalising operations within a supply chain has tremendously increased. This has provided the opportunity to create digital twins of entire supply chains through the use of Internet-of-Things (IoT) and communication technologies. Adverse events like the COVID-19 pandemic and unpredictable geo-political situations have further warranted the importance of digitalization and remote operability of day-to-day operations at critical nodes. Globalisation, rising consumerism & e-commerce has exponentially increased the complexities of existing supply chains. We discuss here a scalable, future-ready and inclusive framework for creating digital twins developed along with the industry leaders from Cisco, Bosch, Accenture, Intel, Deloitte & IBM. We have proposed field-tested key technologies and frameworks required for creating digital twins. We also present case studies of real-life stable deployments done by us in the supply chains of a few marquee industry leaders.

Keywords: internet-of-things, digital twins, smart factory, industry 4.0, smart manufacturing

Procedia PDF Downloads 71
1974 Security Analysis of Mod. S Transponder Technology and Attack Examples

Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski

Abstract:

All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.

Keywords: flight safety, hijack, mod S transponder, security analysis

Procedia PDF Downloads 277
1973 Efficient Reconstruction of DNA Distance Matrices Using an Inverse Problem Approach

Authors: Boris Melnikov, Ye Zhang, Dmitrii Chaikovskii

Abstract:

We continue to consider one of the cybernetic methods in computational biology related to the study of DNA chains. Namely, we are considering the problem of reconstructing the not fully filled distance matrix of DNA chains. When applied in a programming context, it is revealed that with a modern computer of average capabilities, creating even a small-sized distance matrix for mitochondrial DNA sequences is quite time-consuming with standard algorithms. As the size of the matrix grows larger, the computational effort required increases significantly, potentially spanning several weeks to months of non-stop computer processing. Hence, calculating the distance matrix on conventional computers is hardly feasible, and supercomputers are usually not available. Therefore, we started publishing our variants of the algorithms for calculating the distance between two DNA chains; then, we published algorithms for restoring partially filled matrices, i.e., the inverse problem of matrix processing. In this paper, we propose an algorithm for restoring the distance matrix for DNA chains, and the primary focus is on enhancing the algorithms that shape the greedy function within the branches and boundaries method framework.

Keywords: DNA chains, distance matrix, optimization problem, restoring algorithm, greedy algorithm, heuristics

Procedia PDF Downloads 103
1972 Main Factor That Causes the Instabilities of the Earth’s Rotation

Authors: Jin-Sim, Kwan-U Kim, Ryong-Jin Jang, Sung-Duk Kim

Abstract:

Earth rotation is one of astronomical phenomena without which it is impossible to think of human life. That is why the investigation of the Earth's rotation is very important, and it has a long history of study. The invention of quartz clocks in the 1930s, atomic time in the 1950s, and the introduction of modern technology into astronomic observation in recent years resulted in rapid development of the study of Earth’s rotation. The theory of the Earth's rotation, however, has not been up to the high level of astronomic observation due to the limitation of time. As a typical example, we can take the problems that cover the instabilities of the Earth’s rotation, proved completely by the astronomic observations as well as polar motion, the precession and nutation of the Earth's rotation axis, which have not been described in a single equation in a quantificational way from the unique law of Earth rotation. In particular, at present the problem of what is the main factor causing the instabilities of the Earth rotation has not been solved clearly in quantificational ways yet. Therefore, this paper gives quantificational proof that the main factor that causes the instabilities of the Earth's rotation is the moment of external force other than variations in the relative atmospheric angular momentum due to the time limitation and under some assumptions or the moment of inertia of the Earth’s body.

Keywords: atmospheric angular momentum, instabilities of the earth’s rotation, law of the earth’s rotation change, moment of inertia of the earth

Procedia PDF Downloads 43
1971 Rethinking News Aggregation to Achieve Depolarization

Authors: Kushagra Khandelwal, Chinmay Anand, Sharmistha Banerjee

Abstract:

This paper presents an approach to news aggregation that is aimed at solving the issues centered on depolarization and manipulation of news information and stories. Largest democracies across the globe face numerous issues related to news democratization. With the advancements in technology and increasing outreach, web has become an important information source which is inclusive of news. Research was focused on the current millennial population consisting of modern day internet users. The study involved literature review, an online survey, an expert interview with a journalist and a focus group discussion with the user groups. The study was aimed at investigating problems associated with the current news system from both the consumer as well as distributor point of view. The research findings helped in producing five key potential opportunity areas which were explored for design intervention. Upon ideation, we identified five design features which include opinion aggregation. Categorized opinions, news tracking, online discussion and ability to take actions that support news democratization.

Keywords: citizen journalism, democratization, depolarized news, napsterization, news aggregation, opinions

Procedia PDF Downloads 192
1970 A Study of Shigeru Ban's Environmentally-Sensitive Design Approach

Authors: Duygu Merve Bulut, Fehime Yesim Gurani

Abstract:

The Japanese architect Shigeru Ban has succeeded in bringing a different understanding to the modern architectural design approach with both the material selection and the techniques he used while combining the material with the design. Ban, who reflects his respect to people and nature with his designs, has encouraged that design should be done with economic materials, easily accessible and understandable for everyone. Because of this, Ban has attracted attention and appreciated in the architectural world with his environmentally-sensitive design ideology and humanitarian projects. In order to understand Ban’s environmentally-sensitive design approach, with this article, Ban’s projects which have used natural materials; the projects of Ban’s Japenese Pavilion in Germany, Papertainer Museum in South Korea, Centre Pompidou-Metz in France and Cardboard Cathedral in New Zealand were examined and analyzed. In the following parts, 'paper tube' technology that creates awareness in architectural area, which developed and applied by Ban; has been examined in terms of building material and structure of sustainable space design. As a result of this review, Ban’s approach is evaluated in terms of its contribution to the understanding of sustainable design.

Keywords: ecological design, environmentally-sensitive design, paper tube, Shigeru Ban, sustainability

Procedia PDF Downloads 469
1969 Wheat Cluster Farming Approach: Challenges and Prospects for Smallholder Farmers in Ethiopia

Authors: Hanna Mamo Ergando

Abstract:

Climate change is already having a severe influence on agriculture, affecting crop yields, the nutritional content of main grains, and livestock productivity. Significant adaptation investments will be necessary to sustain existing yields and enhance production and food quality to fulfill demand. Climate-smart agriculture (CSA) provides numerous potentials in this regard, combining a focus on enhancing agricultural output and incomes while also strengthening resilience and responding to climate change. To improve agriculture production and productivity, the Ethiopian government has adopted and implemented a series of strategies, including the recent agricultural cluster farming that is practiced as an effort to change, improve, and transform subsistence farming to modern, productive, market-oriented, and climate-smart approach through farmers production cluster. Besides, greater attention and focus have been given to wheat production and productivity by the government, and wheat is the major crop grown in cluster farming. Therefore, the objective of this assessment was to examine various opportunities and challenges farmers face in a cluster farming system. A qualitative research approach was used to generate primary and secondary data. Respondents were chosen using the purposeful sampling technique. Accordingly, experts from the Federal Ministry of Agriculture, the Ethiopian Agricultural Transformation Institute, the Ethiopian Agricultural Research Institute, and the Ethiopian Environment Protection Authority were interviewed. The assessment result revealed that farming in clusters is an economically viable technique for sustaining small, resource-limited, and socially disadvantaged farmers' agricultural businesses. The method assists farmers in consolidating their products and delivering them in bulk to save on transportation costs while increasing income. Smallholders' negotiating power has improved as a result of cluster membership, as has knowledge and information spillover. The key challenges, on the other hand, were identified as a lack of timely provision of modern inputs, insufficient access to credit services, conflict of interest in crop selection, and a lack of output market for agro-processing firms. Furthermore, farmers in the cluster farming approach grow wheat year after year without crop rotation or diversification techniques. Mono-cropping has disadvantages because it raises the likelihood of disease and insect outbreaks. This practice may result in long-term consequences, including soil degradation, reduced biodiversity, and economic risk for farmers. Therefore, the government must devote more resources to addressing the issue of environmental sustainability. Farmers' access to complementary services that promote production and marketing efficiencies through infrastructure and institutional services has to be improved. In general, the assessment begins with some hint that leads to a deeper study into the efficiency of the strategy implementation, upholding existing policy, and scaling up good practices in a sustainable and environmentally viable manner.

Keywords: cluster farming, smallholder farmers, wheat, challenges, opportunities

Procedia PDF Downloads 165
1968 Simplifying the Migration of Architectures in Embedded Applications Introducing a Pattern Language to Support the Workforce

Authors: Farha Lakhani, Michael J. Pont

Abstract:

There are two main architectures used to develop software for modern embedded systems: these can be labelled as “event-triggered” (ET) and “time-triggered” (TT). The research presented in this paper is concerned with the issues involved in migration between these two architectures. Although TT architectures are widely used in safety-critical applications they are less familiar to developers of mainstream embedded systems. The research presented in this paper began from the premise that–for a broad class of systems that have been implemented using an ET architecture–migration to a TT architecture would improve reliability. It may be tempting to assume that conversion between ET and TT designs will simply involve converting all event-handling software routines into periodic activities. However, the required changes to the software architecture are, in many cases rather more profound. The main contribution of the work presented in this paper is to identify ways in which the significant effort involved in migrating between existing ET architectures and “equivalent” (and effective) TT architectures could be reduced. The research described in this paper has taken an innovative step in this regard by introducing the use of ‘Design patterns’ for this purpose for the first time.

Keywords: embedded applications, software architectures, reliability, pattern

Procedia PDF Downloads 308
1967 Evaluation of Immune Checkpoint Inhibitors in Cancer Therapy

Authors: Mir Mohammad Reza Hosseini

Abstract:

In new years immune checkpoint inhibitors have gathered care as being one of the greatest talented kinds of immunotherapy on the prospect. There has been a specific emphasis on the immune checkpoint molecules, cytotoxic T-lymphocyte antigen-4 (CTLA-4) and programmed cell death protein 1 (PD-1). In 2011, ipilimumab, the primary antibody obstructive an immune checkpoint (CTLA4) was authorized. It is now documented that recognized tumors have many devices of overpowering the antitumor immune response, counting manufacture of repressive cytokines, staffing of immunosuppressive immune cells, and upregulation of coinhibitory receptors recognized as immune checkpoints. This was fast followed by the growth of monoclonal antibodies directing PD1 (pembrolizumab and nivolumab) and PDL1 (atezolizumab and durvalumab). Anti-PD1/PDL1 antibodies have developed some of the greatest extensively set anticancer therapies. We also compare and difference their present place in cancer therapy and designs of immune-related toxicities and deliberate the role of dual immune checkpoint inhibition and plans for the organization of immune-related opposing proceedings. In this review, the employed code and present growth of numerous immune checkpoint inhibitors are abridged, while the communicating device and new development of Immune checkpoint inhibitors in cancer therapy-based synergistic therapies with additional immunotherapy, chemotherapy, phototherapy, and radiotherapy in important and clinical educations in the historical 5 years are portrayed and tinted. Lastly, we disapprovingly measure these methods and effort to find their fortes and faintness based on pre-clinical and clinical information.

Keywords: checkpoint, cancer therapy, PD-1, PDL-1, CTLA4, immunosuppressive

Procedia PDF Downloads 146
1966 Performance Degradation for the GLR Test-Statistics for Spatial Signal Detection

Authors: Olesya Bolkhovskaya, Alexander Maltsev

Abstract:

Antenna arrays are widely used in modern radio systems in sonar and communications. The solving of the detection problems of a useful signal on the background of noise is based on the GLRT method. There is a large number of problem which depends on the known a priori information. In this work, in contrast to the majority of already solved problems, it is used only difference spatial properties of the signal and noise for detection. We are analyzing the influence of the degree of non-coherence of signal and noise unhomogeneity on the performance characteristics of different GLRT statistics. The description of the signal and noise is carried out by means of the spatial covariance matrices C in the cases of different number of known information. The partially coherent signal is simulated as a plane wave with a random angle of incidence of the wave concerning a normal. Background noise is simulated as random process with uniform distribution function in each element. The results of investigation of degradation of performance characteristics for different cases are represented in this work.

Keywords: GLRT, Neumann-Pearson’s criterion, Test-statistics, degradation, spatial processing, multielement antenna array

Procedia PDF Downloads 371
1965 Online Escape Room for Intergenerational Play

Authors: David Kaufman

Abstract:

Despite the ‘silver Tsunami’ that is occurring worldwide, ageism is still a problem in modern society. As well, families are becoming increasingly separated geographically. This paper will discuss these issues and one potential solution - an online escape room game that is played by two players over the internet while talking to each other. The payers can be two seniors or one senior and one youth, e.g., a grandchild. Each player sees a different view of the game environment and players must collaborate in order to solve the puzzles presented and escape from the three rooms, all connected by a maze. The game was developed by Masters students at the Centre for Digital Media in Vancouver, BC in collaboration with a team of post-doctoral scholar, graduate students and faculty member, as well as 10 seniors who assisted. This paper will describe the game, development process and results of our pilot studies. The research study conducted comprises several stages: 1. several formative evaluation sessions with seniors to obtain feedback to assist further design, and 2. field testing of the game. Preliminary results have been extremely positive and results of our field tests will be presented in this paper.

Keywords: digital game, online escape room, intergenerational play, seniors

Procedia PDF Downloads 340
1964 Research Design for Developing and Validating Ice-Hockey Team Diagnostics Scale

Authors: Gergely Geczi

Abstract:

In the modern world, ice hockey (and, in a broader sense, team sports) is becoming an increasingly popular field of entertainment. Although the main element is most likely perceived as the show itself, winning is an inevitable part of the successful operation of any sports team. In this paper, the author creates a research design allowing him to develop and validate an ice-hockey team-focused diagnostics scale, which enables researchers and practitioners to identify the problems associated with underperforming teams. The construction of the scale starts with personal interviews with experts of the field, carefully chosen from the sector of Hungarian ice hockey. Based on the interviews, the author is shown to be in the position to create the categories and the relevant items for the scale. When constructed, the next step is the validation process on a Hungarian sample. Data for validation are acquired through reaching the licensed database of the Hungarian Ice-Hockey Federation involving Hungarian ice-hockey coaches and players. The Ice-Hockey Team Diagnostics Scale is to be created to orient practitioners in understanding both effective and underperforming teamwork.

Keywords: diagnostics scale, effective versus underperforming team work, ice-hockey, research design

Procedia PDF Downloads 114
1963 The Place of Instructional Materials in Quality Education at Primary School Level in Katsina State, Nigeria

Authors: Murtala Sale

Abstract:

The use of instructional materials is an indispensable tool that enhances qualitative teaching and learning especially at the primary level. Instructional materials are used to facilitate comprehension of ideas in the learners as well as ensure long term retention of ideas and topics taught to pupils. This study examined the relevance of using instructional materials in primary schools in Katsina State, Nigeria. It employed survey design using cluster sampling technique. The questionnaire was used to gather data for analysis, and statistical and frequency tables were used to analyze the data gathered. The results show that teachers and students alike have realized the effectiveness of modern instructional materials in teaching and learning for the attainment of set objectives in the basic primary education policy. It also discovered that reluctance in the use of instructional materials will hamper the achievement of qualitative primary education. The study therefore suggests that there should be the provision of adequate and up-to-date instructional materials to all primary schools in Katsina State for effective teaching and learning process.

Keywords: instructional materials, effective teaching, learning quality, indispensable aspect

Procedia PDF Downloads 234
1962 Thermo-Mechanical Behavior of Steel-Wood Connections of Wooden Structures Under the Effect of a Fire

Authors: Ahmed Alagha, Belkacem Lamri, Abdelhak Kada.

Abstract:

Steel-wood assemblies often have complex geometric configurations whose overall behavior under the effect of a fire is conditioned by the thermal response, by combining the two materials steel and wood, whose thermal characteristics are greatly influenced by high temperatures. The objective of this work is to study the thermal behavior of a steel-wood connection, with or without insulating material, subjected to an ISO834 standard fire model. The analysis is developed by the analytical approach using the Eurocode, and numerically, by the finite element method, through the ANSYS calculation code. The design of the connections is evaluated at room temperature taking the cases of single shear and double shear. The thermal behavior of the connections is simulated in transient state while taking into account the modes of heat transfer by convection and by radiation. The variation of temperature as a function of time is evaluated in different positions of the connections while talking about the heat produced and the formation of the carbon layer. The results relate to the temperature distributions in the connection elements as a function of the duration of the fire. The results of the thermal analysis show that the temperature increases rapidly and reaches more than 260 °C in the steel material for an hour of exposure to fire. The temperature development in wood material is different from that in steel because of its thermal properties. Wood heats up on the outside and burns, its surface can reach very high temperatures in points on the surface.

Keywords: Eurocode 5, finite elements, ISO834, simple shear, thermal behaviour, wood-steel connection

Procedia PDF Downloads 64
1961 Optimization of the Mechanical Performance of Fused Filament Fabrication Parts

Authors: Iván Rivet, Narges Dialami, Miguel Cervera, Michele Chiumenti

Abstract:

Process parameters in Additive Manufacturing (AM) play a critical role in the mechanical performance of the final component. In order to find the input configuration that guarantees the optimal performance of the printed part, the process-performance relationship must be found. Fused Filament Fabrication (FFF) is the selected demonstrative AM technology due to its great popularity in the industrial manufacturing world. A material model that considers the different printing patterns present in a FFF part is used. A voxelized mesh is built from the manufacturing toolpaths described in the G-Code file. An Adaptive Mesh Refinement (AMR) based on the octree strategy is used in order to reduce the complexity of the mesh while maintaining its accuracy. High-fidelity and cost-efficient Finite Element (FE) simulations are performed and the influence of key process parameters in the mechanical performance of the component is analyzed. A robust optimization process based on appropriate failure criteria is developed to find the printing direction that leads to the optimal mechanical performance of the component. The Tsai-Wu failure criterion is implemented due to the orthotropy and heterogeneity constitutive nature of FFF components and because of the differences between the strengths in tension and compression. The optimization loop implements a modified version of an Anomaly Detection (AD) algorithm and uses the computed metrics to obtain the optimal printing direction. The developed methodology is verified with a case study on an industrial demonstrator.

Keywords: additive manufacturing, optimization, printing direction, mechanical performance, voxelization

Procedia PDF Downloads 41