Search results for: call blocking
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 756

Search results for: call blocking

576 Three Visions of a Conflict: The Case of La Araucania, Chile

Authors: Maria Barriga

Abstract:

The article focuses on the analysis of three images of the last five years that represent different visions of social groups in the context of the so call “Conflicto Mapuche” in la Araucanía, Chile. Using a multimodal social semiotic approach, we analyze the meaning making of these images and the social groups strategies to achieve visibility and recognition in political contexts. We explore the making and appropriation of symbols and concepts and analyze the different strategies that groups use to built hegemonic views. Among these strategies, we compare the use of digital technologies in design these images and the influence of Chilean Estate's vision on the Mapuche political conflict. Finally, we propose visual strategies to improve basic conditions for dialogue and recognition among these groups.

Keywords: visual culture, power, conflict, indigenous people

Procedia PDF Downloads 285
575 Regulation of SHP-2 Activity by Small Molecules for the Treatment of T Cell-Mediated Diseases

Authors: Qiang Xu, Xingxin Wu, Wenjie Guo, Xingqi Wang, Yang Sun, Renxiang Tan

Abstract:

The phosphatase SHP-2 is known to exert regulatory activities on cytokine receptor signaling and the dysregulation of SHP-2 has been implicated in the pathogenesis of a variety of diseases. Here we report several small molecule regulators of SHP-2 for the treatment of T cell-mediated diseases. The new cyclodepsipeptide trichomides A, isolated from the fermentation products of Trichothecium roseum, increased the phosphorylation of SHP-2 in activated T cells, and ameliorated contact dermatitis in mice. The trichomides A’s effects were significantly reversed by using the SHP-2-specific inhibitor PHPS1 or T cell-conditional SHP-2 knockout mice. Another compound is a cerebroside Fusaruside isolated from the endophytic fungus Fusarium sp. IFB-121. Fusaruside also triggered the tyrosine phosphorylation of SHP-2, which provided a possible mean of selectively targeting STAT1 for the treatment of Th1 cell-mediated inflammation and led to the discovery of the non-phosphatase-like function of SHP-2. Namely, the Fusaruside-activated pY-SHP-2 selectively sequestrated the cytosolic STAT1 to prevent its recruitment to IFN-R, which contributed to the improvement of experimental colitis in mice. Blocking the pY-SHP-2-STAT1 interaction, with SHP-2 inhibitor NSC-87877 or using T cells from conditional SHP-2 knockout mice, reversed the effects of fusaruside. Furthermore, the fusaruside’s effect is independent of the phosphatase activity of SHP-2, demonstrating a novel role for SHP-2 in regulating STAT1 signaling and Th1-type immune responses.

Keywords: SHP-2, small molecules, T cell, T cell-mediated diseases

Procedia PDF Downloads 313
574 A New Spell-Out Mechanism

Authors: Yusra Yahya

Abstract:

In this paper, a new spell-out mechanism is developed and defended. This mechanism builds on the role of phase heads as both the loci of spell-out features and the transfer triggers via either Phase Impenetrability Condition 1 (PIC1) and/or Phase Impenetrability Condition 2 (PIC2). The assumption here is that phase heads, mainly v*, can regulate the spell-out process by deciding both the type of spell-out applying and the timing of spell-out relevant. This paper also proposes a new form of the constraint Wrap call it Wrap-XP’ and it is assumed to apply to IP as a functional maximal projection. This extension is shown to fall as a natural result once we assume the new theory of phases and multiple spell-out. Moreover, it is proposed in this work that some forms of XP movement are not motivated by an EPP feature of a strong phase head mainly v*, but they are rather motivated by a last resort strategy to accomplish the spell-out instruction of this phase head.

Keywords: linguistics, syntax, phonology, phase theory, optimality theory

Procedia PDF Downloads 514
573 Human Resource Utilization Models for Graceful Ageing

Authors: Chuang-Chun Chiou

Abstract:

In this study, a systematic framework of graceful ageing has been used to explore the possible human resource utilization models for graceful ageing purpose. This framework is based on the Chinese culture. We call ‘Nine-old’ target. They are ageing gracefully with feeding, accomplishment, usefulness, learning, entertainment, care, protection, dignity, and termination. This study is focused on two areas: accomplishment and usefulness. We exam the current practices of initiatives and laws of promoting labor participation. That is to focus on how to increase Labor Force Participation Rate of the middle aged as well as the elderly and try to promote the elderly to achieve graceful ageing. Then we present the possible models that support graceful ageing.

Keywords: human resource utilization model, labor participation, graceful ageing, employment

Procedia PDF Downloads 390
572 Mobile Health Approaches in the Management of Breast Cancer: A Qualitative Content Analysis

Authors: Hyekyung Woo, Gwihyun Kim

Abstract:

mHealth, which encompasses mobile health technologies and interventions, is rapidly evolving in various medical specialties, and its impact is evident in oncology. This review describes current trends in research addressing the integration of mHealth into the management of breast cancer by examining evaluations of mHealth and its contributions across the cancer care continuum. Mobile technologies are perceived as effective in prevention and as feasible for managing breast cancer, but the diagnostic accuracy of these tools remains in doubt. Not all phases of breast cancer treatment involve mHealth, and not all have been addressed by research. These drawbacks in the application of mHealth to breast cancer management call for intensified research to strengthen its role in breast cancer care.

Keywords: mobile application, breast cancer, content analysis, mHealth

Procedia PDF Downloads 312
571 A Review on Disaster Risk Reduction and Sustainable Development in Nigeria

Authors: Kudu Dangana

Abstract:

The occurrences of disaster often call for the support of both government and non-government organization. Consequently, disaster relief remains extremely important in disaster management. However, this approach alone does not proactively address the need to adduce the human and environment impacts of future disasters. Recent thinking in the area of disaster management is indicative of the need for a new paradigm that focuses on reducing the risk of disasters with the involvement and participation of communities. This paper reviews the need for communities to place more emphasis on a holistic approach to disaster risk reduction. This approach involves risk assessment, risk reduction, early warning and disaster preparedness in order to effectively address the reduction of social, economic, and environmental costs of disasters nationally and at the global level.

Keywords: disaster, early, management, warning, relief, risk vulnerability

Procedia PDF Downloads 647
570 A Description Logics Based Approach for Building Multi-Viewpoints Ontologies

Authors: M. Hemam, M. Djezzar, T. Djouad

Abstract:

We are interested in the problem of building an ontology in a heterogeneous organization, by taking into account different viewpoints and different terminologies of communities in the organization. Such ontology, that we call multi-viewpoint ontology, confers to the same universe of discourse, several partial descriptions, where each one is relative to a particular viewpoint. In addition, these partial descriptions share at global level, ontological elements constituent a consensus between the various viewpoints. In order to provide response elements to this problem we define a multi-viewpoints knowledge model based on viewpoint and ontology notions. The multi-viewpoints knowledge model is used to formalize the multi-viewpoints ontology in description logics language.

Keywords: description logic, knowledge engineering, ontology, viewpoint

Procedia PDF Downloads 313
569 Simulation of Remove the Fouling on the in vivo By Using MHD

Authors: Farhad Aalizadeh, Ali Moosavi

Abstract:

When a blood vessel is injured, the cells of your blood bond together to form a blood clot. The blood clot helps you stop bleeding. Blood clots are made of a combination of blood cells, platelets(small sticky cells that speed up the clot-making process), and fibrin (protein that forms a thread-like mesh to trap cells). Doctors call this kind of blood clot a “thrombus.”We study the effects of different parameters on the deposition of Nanoparticles on the surface of a bump in the blood vessels by the magnetic field. The Maxwell and the flow equations are solved for this purpose. It is assumed that the blood is non-Newtonian and the number of particles has been considered enough to rely on the results statistically. Using MHD and its property it is possible to control the flow velocity, remove the fouling on the walls and return the system to its original form.

Keywords: MHD, fouling, in-vivo, blood clots, simulation

Procedia PDF Downloads 469
568 Multi-Scale Control Model for Network Group Behavior

Authors: Fuyuan Ma, Ying Wang, Xin Wang

Abstract:

Social networks have become breeding grounds for the rapid spread of rumors and malicious information, posing threats to societal stability and causing significant public harm. Existing research focuses on simulating the spread of information and its impact on users through propagation dynamics and applies methods such as greedy approximation strategies to approximate the optimal control solution at the global scale. However, the greedy strategy at the global scale may fall into locally optimal solutions, and the approximate simulation of information spread may accumulate more errors. Therefore, we propose a multi-scale control model for network group behavior, introducing individual and group scales on top of the greedy strategy’s global scale. At the individual scale, we calculate the propagation influence of nodes based on their structural attributes to alleviate the issue of local optimality. At the group scale, we conduct precise propagation simulations to avoid introducing cumulative errors from approximate calculations without increasing computational costs. Experimental results on three real-world datasets demonstrate the effectiveness of our proposed multi-scale model in controlling network group behavior.

Keywords: influence blocking maximization, competitive linear threshold model, social networks, network group behavior

Procedia PDF Downloads 21
567 Corporate Life Cycle and Corporate Social Responsibility Performance: Empirical Evidence from Pharmaceutical Industry in China

Authors: Jing (Claire) LI

Abstract:

The topic of corporate social responsibility (CSR) is significant for pharmaceutical companies in China at this current stage. This is because, as a rapid growth industry in China in recent years, the pharmaceutical industry in China has been undergone continuous and terrible incidents relating to CSR. However, there is limited research and practice of CSR in Chinese pharmaceutical companies. Also, there is an urgent call for more research in an international context to understand the implications of corporate life cycle on CSR performance. To respond to the research need and research call, this study examines the relationship between corporate life cycle and CSR performance of Chinese listed companies in pharmaceutical industry. This research studies Chinese listed companies in pharmaceutical industry for the period of 2010-2017, where the data is available in database. Following the literature, this study divides CSR performance with regards to CSR dimensions, including shareholders, creditors, employees, customers, suppliers, the government, and the society. This study uses CSR scores of HEXUN database and financial measures of these CSR dimensions to measure the CSR performance. This study performed regression analysis to examine the relationship between corporate life cycle stages and CSR performance with regards to CSR dimensions for pharmaceutical listed companies in China. Using cash flow pattern as proxy of corporate life cycle to classify corporate life cycle stages, this study found that most (least) pharmaceutical companies in China are in maturity (decline) stage. This study found that CSR performance for most dimensions are highest (lowest) in maturity (decline) stage as well. Among these CSR dimensions, performing responsibilities for shareholder is the most important among all CSR responsibilities for pharmaceutical companies. This study is the first to provide important empirical evidence from Chinese pharmaceutical industry on the association between life cycle and CSR performance, supporting that corporate life cycle is a key factor in CSR performance. The study expands corporate life cycle and CSR literatures and has both empirical and theoretical contributions to the literature. From perspective of empirical contributions, the findings contribute to the argument that whether there is a relationship between CSR performance and various corporate life cycle stages in the literature. This study also provides empirical evidence that companies in different corporate life cycles have difference in CSR performance. From perspective of theoretical contributions, this study relates CSR and stakeholders to corporate life cycle stages and complements the corporate life cycle and CSR literature. This study has important implications for managers and policy makers. First, the results will be helpful for managers to have an understanding in the essence of CSR, and their company’s current and future CSR focus over corporate life cycle. This study provides a reference for their actions and may help them make more wise resources allocation decisions of CSR investment. Second, policy makers (in the government, stock exchanges, and securities commission) may consider corporate life cycle as an important factor in formulating future regulations for companies. Future research can explore the "process-based" differences in CSR performance and more industries.

Keywords: China, corporate life cycle, corporate social responsibility, pharmaceutical industry

Procedia PDF Downloads 105
566 Cationic Surfactants Influence on the Fouling Phenomenon Control in Ultrafiltration of Latex Contaminated Water and Wastewater

Authors: Amira Abdelrasoul, Huu Doan, Ali Lohi

Abstract:

The goal of the present study was to minimize the ultrafiltration fouling of latex effluent using Cetyltrimethyl ammonium bromide (CTAB) as a cationic surfactant. Hydrophilic Polysulfone and Ultrafilic flat heterogeneous membranes, with MWCO of 60,000 and 100,000, respectively, as well as hydrophobic Polyvinylidene Difluoride with MWCO of 100,000, were used under a constant flow rate and cross-flow mode in ultrafiltration of latex solution. In addition, a Polycarbonate flat membrane with uniform pore size of 0.05 µm was also used. The effect of CTAB on the latex particle size distribution was investigated at different concentrations, various treatment times, and diverse agitation duration. The effects of CTAB on the zeta potential of latex particles and membrane surfaces were also investigated. The results obtained indicated that the particle size distribution of treated latex effluent showed noticeable shifts in the peaks toward a larger size range due to the aggregation of particles. As a consequence, the mass of fouling contributing to pore blocking and the irreversible fouling were significantly reduced. The optimum results occurred with the addition of CTAB at the critical micelle concentration of 0.36 g/L for 10 minutes with minimal agitation. Higher stirring rate had a negative effect on membrane fouling minimization.

Keywords: cationic surfactant, latex particles, membrane fouling, ultrafiltration, zeta potential

Procedia PDF Downloads 528
565 Getting to Know the Enemy: Utilization of Phone Record Analysis Simulations to Uncover a Target’s Personal Life Attributes

Authors: David S. Byrne

Abstract:

The purpose of this paper is to understand how phone record analysis can enable identification of subjects in communication with a target of a terrorist plot. This study also sought to understand the advantages of the implementation of simulations to develop the skills of future intelligence analysts to enhance national security. Through the examination of phone reports which in essence consist of the call traffic of incoming and outgoing numbers (and not by listening to calls or reading the content of text messages), patterns can be uncovered that point toward members of a criminal group and activities planned. Through temporal and frequency analysis, conclusions were drawn to offer insights into the identity of participants and the potential scheme being undertaken. The challenge lies in the accurate identification of the users of the phones in contact with the target. Often investigators rely on proprietary databases and open sources to accomplish this task, however it is difficult to ascertain the accuracy of the information found. Thus, this paper poses two research questions: how effective are freely available web sources of information at determining the actual identification of callers? Secondly, does the identity of the callers enable an understanding of the lifestyle and habits of the target? The methodology for this research consisted of the analysis of the call detail records of the author’s personal phone activity spanning the period of a year combined with a hypothetical theory that the owner of said phone was a leader of terrorist cell. The goal was to reveal the identity of his accomplices and understand how his personal attributes can further paint a picture of the target’s intentions. The results of the study were interesting, nearly 80% of the calls were identified with over a 75% accuracy rating via datamining of open sources. The suspected terrorist’s inner circle was recognized including relatives and potential collaborators as well as financial institutions [money laundering], restaurants [meetings], a sporting goods store [purchase of supplies], and airline and hotels [travel itinerary]. The outcome of this research showed the benefits of cellphone analysis without more intrusive and time-consuming methodologies though it may be instrumental for potential surveillance, interviews, and developing probable cause for wiretaps. Furthermore, this research highlights the importance of building upon the skills of future intelligence analysts through phone record analysis via simulations; that hands-on learning in this case study emphasizes the development of the competencies necessary to improve investigations overall.

Keywords: hands-on learning, intelligence analysis, intelligence education, phone record analysis, simulations

Procedia PDF Downloads 14
564 Research on Fuzzy Test Framework Based on Concolic Execution

Authors: Xiong Xie, Yuhang Chen

Abstract:

Vulnerability discovery technology is a significant field of the current. In this paper, a fuzzy framework based on concolic execution has been proposed. Fuzzy test and symbolic execution are widely used in the field of vulnerability discovery technology. But each of them has its own advantages and disadvantages. During the path generation stage, path traversal algorithm based on generation is used to get more accurate path. During the constraint solving stage, dynamic concolic execution is used to avoid the path explosion. If there is external call, the concolic based on function summary is used. Experiments show that the framework can effectively improve the ability of triggering vulnerabilities and code coverage.

Keywords: concolic execution, constraint solving, fuzzy test, vulnerability discovery

Procedia PDF Downloads 228
563 The Evloution of LGBTQ Right in the U. S.: The Vaugries of Presidential Leadership and Followership

Authors: Michael A. Genovese

Abstract:

The struggle for LGBTQ rights in the United States began in Greenwich Village, New York, in 1967, when police tried to break up a gathering of mostly gay men who were partying at the Stonewall Bar in NYC. As unlikely as it may sound, this “riot” proved to be consequential in raising the political consciousness of gay men in America. From that point on, gays engaged in a political battle to achieve the rights to which they were entitled. This essay examines changes in popular opinion regarding LGBTQ rights from the late 1960s through the Trump administration, and examines the role public pressure played on presidential politics. For most of this period, presidents “followed” public opinion. This was true even during the administration of Barack Obama when gay Americans finally achieved some clearly spelled out rights (e.g. same-sex marriage). The findings of this paper call into question certain assumptions about presidential leadership, and underline the power of public opinion in shaping policy.

Keywords: presidential leadership, gay rights, LGBTQ, popular opinion

Procedia PDF Downloads 87
562 Production of Natural Gas Hydrate by Using Air and Carbon Dioxide

Authors: Yun-Ho Ahn, Hyery Kang, Dong-Yeun Koh, Huen Lee

Abstract:

In this study, we demonstrate the production of natural gas hydrates from permeable marine sediments with simultaneous mechanisms for methane recovery and methane-air or methane-air/carbon dioxide replacement. The simultaneous melting happens until the chemical potentials become equal in both phases as natural gas hydrate depletion continues and self-regulated methane-air replacement occurs over an arbitrary point. We observed certain point between dissociation and replacement mechanisms in the natural gas hydrate reservoir, and we call this boundary as critical methane concentration. By the way, when carbon dioxide was added, the process of chemical exchange of methane by air/carbon dioxide was observed in the natural gas hydrate. The suggested process will operate well for most global natural gas hydrate reservoirs, regardless of the operating conditions or geometrical constraints.

Keywords: air injection, carbon dioxide sequestration, hydrate production, natural gas hydrate

Procedia PDF Downloads 459
561 Lexicon-Based Sentiment Analysis for Stock Movement Prediction

Authors: Zane Turner, Kevin Labille, Susan Gauch

Abstract:

Sentiment analysis is a broad and expanding field that aims to extract and classify opinions from textual data. Lexicon-based approaches are based on the use of a sentiment lexicon, i.e., a list of words each mapped to a sentiment score, to rate the sentiment of a text chunk. Our work focuses on predicting stock price change using a sentiment lexicon built from financial conference call logs. We present a method to generate a sentiment lexicon based upon an existing probabilistic approach. By using a domain-specific lexicon, we outperform traditional techniques and demonstrate that domain-specific sentiment lexicons provide higher accuracy than generic sentiment lexicons when predicting stock price change.

Keywords: computational finance, sentiment analysis, sentiment lexicon, stock movement prediction

Procedia PDF Downloads 127
560 Lexicon-Based Sentiment Analysis for Stock Movement Prediction

Authors: Zane Turner, Kevin Labille, Susan Gauch

Abstract:

Sentiment analysis is a broad and expanding field that aims to extract and classify opinions from textual data. Lexicon-based approaches are based on the use of a sentiment lexicon, i.e., a list of words each mapped to a sentiment score, to rate the sentiment of a text chunk. Our work focuses on predicting stock price change using a sentiment lexicon built from financial conference call logs. We introduce a method to generate a sentiment lexicon based upon an existing probabilistic approach. By using a domain-specific lexicon, we outperform traditional techniques and demonstrate that domain-specific sentiment lexicons provide higher accuracy than generic sentiment lexicons when predicting stock price change.

Keywords: computational finance, sentiment analysis, sentiment lexicon, stock movement prediction

Procedia PDF Downloads 170
559 A New Verification Based Congestion Control Scheme in Mobile Networks

Authors: P. K. Guha Thakurta, Shouvik Roy, Bhawana Raj

Abstract:

A congestion control scheme in mobile networks is proposed in this paper through a verification based model. The model proposed in this work is represented through performance metric like buffer Occupancy, latency and packet loss rate. Based on pre-defined values, each of the metric is introduced in terms of three different states. A Markov chain based model for the proposed work is introduced to monitor the occurrence of the corresponding state transitions. Thus, the estimation of the network status is obtained in terms of performance metric. In addition, the improved performance of our proposed model over existing works is shown with experimental results.

Keywords: congestion, mobile networks, buffer, delay, call drop, markov chain

Procedia PDF Downloads 441
558 Immunomodulation by Interleukin-10 Therapy in Mouse Airway Transplantation

Authors: Mohammaad Afzal Khan, Ghazi Abdulmalik Ashoor , Fatimah Alanazi, Talal Shamma, Abdullah Altuhami, Hala Abdalrahman Ahmed, Abdullah Mohammed Assiri, Dieter Clemens Broering

Abstract:

Microvascular injuries during inflammation are key causes of transplant malfunctioning and permanent failure, which play a major role in the development of chronic rejection of the transplanted organ. Inflammation-induced microvascular loss is a promising area to investigate the decisive roles of regulatory and effector responses. The present study was designed to investigate the impact of IL-10 on immunotolerance, in particular, the microenvironment of the allograft during rejection. Here, we investigated the effects of IL-10 blockade/ reconstitution and serially monitored regulatory T cells (Tregs), graft microvasculature, and airway epithelium in rejecting airway transplants. We demonstrated that the blocking/reconstitution of IL-10 significantly modulates CD4+FOXP3+ Tregs, microvasculature, and airway epithelium during rejection. Our findings further highlighted that blockade of IL-10 upregulated proinflammatory cytokines, IL-2, IL-1β, IFN-γ, IL-15, and IL-23, but suppressed IL-5 secretion during rejection; however, reconstitution of IL-10 significantly upregulated CD4+FOXP3+ Tregs, tissue oxygenation/blood flow and airway repair. Collectively, these findings demonstrate a potential reparative modulation of IL-10 during microvascular and epithelial repair, which could provide a vital therapeutic window to rejecting transplants in clinical practice.

Keywords: interleukin -10, regulatory T cells, allograft rejection, immunotolerance

Procedia PDF Downloads 175
557 Nondestructive Natural Gas Hydrate Production by Using Air and Carbon Dioxide

Authors: Ahn Yun-Ho, Hyery Kang, Koh Dong-Yeun, Huen Lee

Abstract:

In this study, we demonstrate the production of natural gas hydrates from permeable marine sediments with simultaneous mechanisms for methane recovery and methane-air or methane-air/carbon dioxide replacement. The simultaneous melting happens until the chemical potentials become equal in both phases as natural gas hydrate depletion continues and self-regulated methane-air replacement occurs over an arbitrary point. We observed certain point between dissociation and replacement mechanisms in the natural gas hydrate reservoir, and we call this boundary as critical methane concentration. By the way, when carbon dioxide was added, the process of chemical exchange of methane by air/carbon dioxide was observed in the natural gas hydrate. The suggested process will operate well for most global natural gas hydrate reservoirs, regardless of the operating conditions or geometrical constraints.

Keywords: air injection, carbon dioxide sequestration, hydrate production, natural gas hydrate

Procedia PDF Downloads 573
556 Differences and Similarities between Concepts of Good, Great, and Leading Teacher

Authors: Vilma Zydziunaite, Vaida Jurgile, Roman Balandiuk

Abstract:

Good, great, and leading teachers are experienced and respected role models, who are innovative, organized, collaborative, trustworthy, and confident facilitators of learning. They model integrity, have strong interpersonal and communication skills, display the highest level of professionalism, a commitment to students, and expertise, and demonstrate a passion for student learning while taking the initiative as influential change agents. Usually, we call them teacher(s) leaders by integrating three notions such as good, great, and leading in a one-teacher leader. Here are described essences of three concepts: ‘good teacher,’ ‘great teacher,’ and teacher leader’ as they are inseparable in teaching practices, teacher’s professional life, and educational interactions with students, fellow teachers, school administration, students’ families and school communities.

Keywords: great teacher, good teacher, leading teacher, school, student

Procedia PDF Downloads 147
555 Several Spectrally Non-Arbitrary Ray Patterns of Order 4

Authors: Ling Zhang, Feng Liu

Abstract:

A matrix is called a ray pattern matrix if its entries are either 0 or a ray in complex plane which originates from 0. A ray pattern A of order n is called spectrally arbitrary if the complex matrices in the ray pattern class of A give rise to all possible nth degree complex polynomial. Otherwise, it is said to be spectrally non-arbitrary ray pattern. We call that a spectrally arbitrary ray pattern A of order n is minimally spectrally arbitrary if any nonzero entry of A is replaced, then A is not spectrally arbitrary. In this paper, we find that is not spectrally arbitrary when n equals to 4 for any θ which is greater than or equal to 0 and less than or equal to n. In this article, we give several ray patterns A(θ) of order n that are not spectrally arbitrary for some θ which is greater than or equal to 0 and less than or equal to n. by using the nilpotent-Jacobi method. One example is given in our paper.

Keywords: spectrally arbitrary, nilpotent matrix , ray patterns, sign patterns

Procedia PDF Downloads 184
554 Analysis of Casting Call Process in Thai Film Industry

Authors: Panprae Bunyapukkna

Abstract:

The purpose of this research is to analyze the process that most of the Thai film industries commonly use in order to find the right cast to play the role. The result proved that most of the low-budget film productions find the cast by asking from the crew’s friends or friend of friend. Therefore, finding the cast in low-budget film productions normally has only few people shown up for the auditions and sometimes either none of them has acting knowledge or their appearances do not match the character. However, since most of the low-budget film productions do not have much ability to find members of the cast, thus some of them still will be selected. On the other hand, most of the high-budget film productions use modeling companies to find the cast for them. However, most of modeling agencies in Thailand seek and select their cast members from the cast’s appearances or talents rather than the knowledge of acting.

Keywords: casting for film, modeling business, acting, film, performing arts, film business

Procedia PDF Downloads 424
553 Efficient Subgoal Discovery for Hierarchical Reinforcement Learning Using Local Computations

Authors: Adrian Millea

Abstract:

In hierarchical reinforcement learning, one of the main issues encountered is the discovery of subgoal states or options (which are policies reaching subgoal states) by partitioning the environment in a meaningful way. This partitioning usually requires an expensive global clustering operation or eigendecomposition of the Laplacian of the states graph. We propose a local solution to this issue, much more efficient than algorithms using global information, which successfully discovers subgoal states by computing a simple function, which we call heterogeneity for each state as a function of its neighbors. Moreover, we construct a value function using the difference in heterogeneity from one step to the next, as reward, such that we are able to explore the state space much more efficiently than say epsilon-greedy. The same principle can then be applied to higher level of the hierarchy, where now states are subgoals discovered at the level below.

Keywords: exploration, hierarchical reinforcement learning, locality, options, value functions

Procedia PDF Downloads 171
552 Medi-Conf: Conference Management System

Authors: Dishant Kothari, Pankaj Gaur, Priyanshu Sharma, Ratnesh Litoriya, Sachin Solanki, Shimpy Goyal

Abstract:

Web based Conference Management System comprises of all the processes needed for round table conference, research paper publication includes the phases-call for paper, paper submission, paper review, acknowledgement to the author, paper acceptance and payment for publication. It will also help colleges and universities to conduct conferences for research, thus spreading awareness and will contribute to the overall development of students. Web based Conference Management System will streamline the procedure for paper publication by reducing the time and efforts needed in physical (offline mode) submission. A conference can be organized from anywhere and anytime. Authors can easily trace the status of the paper, and the program committee can review them anywhere and provide necessary comments to it.

Keywords: peer review, paper publication, author, chair, reviewer, virtualization, new normal

Procedia PDF Downloads 130
551 Blunt Abdominal Trauma Management in Adult Patients: An Investigation on Safety of Discharging Patients with Normal Initial Findings

Authors: Rahimi-Movaghar Vafa, Mansouri Pejman, Chardoli Mojtaba, Rezvani Samina

Abstract:

Introduction: Blunt abdominal trauma is one of the leading causes of morbidity and mortality in all age groups, but diagnosis of serious intra-abdominal pathology is difficult and most of the damages are obscure in the initial investigation. There is still controversy about which patients should undergo abdomen/pelvis CT, which patients needs more observation and which patients can be discharged safely The aim of this study was to determine that is it safe to discharge patients with blunt abdominal trauma with normal initial findings. Methods: This non-randomized cross-sectional study was conducted from September 2013 to September 2014 at two levels I trauma centers, Sina hospital and Rasoul-e-Akram hospital (Tehran, Iran). Our inclusion criteria were all patients were admitted for suspicious BAT and our exclusion criteria were patients that have serious head and neck, chest, spine and limb injuries which need surgical intervention, those who have unstable vital signs, pregnant women with a gestational age over 3 months and homeless or without exact home address. 390 patients with blunt trauma abdomen examined and the necessary data, including demographic data, the abdominal examination, FAST result, patients’ lab test results (hematocrit, base deficit, urine analysis) on admission and at 6 and 12 hours after admission were recorded. Patients with normal physical examination, laboratory tests and FAST were discharged from the ED during 12 hours with the explanation of the alarm signs and were followed up after 24 hours and 1 week by a telephone call. Patients with abnormal findings in physical examination, laboratory tests, and FAST underwent abdomino-pelvic CT scan. Results: The study included 390 patients with blunt abdominal trauma between 12 and 80 years of age (mean age, 37.0 ± 13.7 years) and the mean duration of hospitalization in patients was 7.4 ± 4.1 hours. 88.6% of the patients were discharged from hospital before 12 hours. Odds ratio (OR) for having any symptoms for discharge after 6 hours was 0.160 and after 12 hours was 0.117 hours, which is statistically significant. Among the variables age, systolic and diastolic blood pressure, heart rate, respiratory rate, hematocrit and base deficit at admission, 6 hours and 12 hours after admission showed no significant statistical relationship with discharge time. From our 390 patients, 190 patients have normal initial physical examination, lab data and FAST findings that didn’t show any signs or symptoms in their next assessment and in their follow up by the phone call. Conclusion: It is recommended that patients with no symptoms at admission (completely normal physical examination, ultrasound, normal hematocrit and normal base deficit and lack of microscopic hematuria) and good family and social status can be safely discharged from the emergency department.

Keywords: blunt abdominal trauma, patient discharge, emergency department, FAST

Procedia PDF Downloads 366
550 SLAPP Suits: An Encroachment On Human Rights Of A Global Proportion And What Can Be Done About It

Authors: Laura Lee Prather

Abstract:

A functioning democracy is defined by various characteristics, including freedom of speech, equality, human rights, rule of law and many more. Lawsuits brought to intimidate speakers, drain the resources of community members, and silence journalists and others who speak out in support of matters of public concern are an abuse of the legal system and an encroachment of human rights. The impact can have a broad chilling effect, deterring others from speaking out against abuse. This article aims to suggest ways to address this form of judicial harassment. In 1988, University of Denver professors George Pring and Penelope Canan coined the term “SLAPP” when they brought to light a troubling trend of people getting sued for speaking out about matters of public concern. Their research demonstrated that thousands of people engaging in public debate and citizen involvement in government have been and will be the targets of multi-million-dollar lawsuits for the purpose of silencing them and dissuading others from speaking out in the future. SLAPP actions chill information and harm the public at large. Professors Pring and Canan catalogued a tsunami of SLAPP suits filed by public officials, real estate developers and businessmen against environmentalists, consumers, women’s rights advocates and more. SLAPPs are now seen in every region of the world as a means to intimidate people into silence and are viewed as a global affront to human rights. Anti-SLAPP laws are the antidote to SLAPP suits and while commonplace in the United States are only recently being considered in the EU and the UK. This researcher studied more than thirty years of Anti-SLAPP legislative policy in the U.S., the call for evidence and resultant EU Commission’s Anti-SLAPP Directive and Member States Recommendations, the call for evidence by the UK Ministry of Justice, response and Model Anti-SLAPP law presented to UK Parliament, as well as, conducted dozens of interviews with NGO’s throughout the EU, UK, and US to identify varying approaches to SLAPP lawsuits, public policy, and support for SLAPP victims. This paper identifies best practices taken from the US, EU and UK that can be implemented globally to help combat SLAPPs by: (1) raising awareness about SLAPPs, how to identify them, and recognizing habitual abusers of the court system; (2) engaging governments in the policy discussion in combatting SLAPPs and supporting SLAPP victims; (3) educating judges in recognizing SLAPPs an general training on encroachment of human rights; (4) and holding lawyers accountable for ravaging the rule of law.

Keywords: Anti-SLAPP Laws and Policy, Comparative media law and policy, EU Anti-SLAPP Directive and Member Recommendations, International Human Rights of Freedom of Expression

Procedia PDF Downloads 68
549 How To Get Students’ Attentions?: Little Tricks From 15 English Teachers In Labuan

Authors: Suriani Oxley

Abstract:

All teachers aim to conduct a successful and an effective teaching. Teacher will use a variety of teaching techniques and methods to ensure that students achieve the learning objectives but often the teaching and learning processes are interrupted by a number of things such as noisy students, students not paying attention, the students play and so on. Such disturbances must be addressed to ensure that students can concentrate on their learning activities. This qualitative study observed and captured a video of numerous tricks that teachers in Labuan have implemented in helping the students to pay attentions in the classroom. The tricks are such as Name Calling, Non-Verbal Clues, Body Language, Ask Question, Offer Assistance, Echo Clapping, Call and Response & Cues and Clues. All of these tricks are simple but yet interesting language learning strategies that helped students to focus on their learning activities.

Keywords: paying attention, observation, tricks, learning strategies, classroom

Procedia PDF Downloads 566
548 Polyethylenimine-Ethoxylated Dual Interfacial Layers for High-Efficient Quantum Dot Light-Emitting Diodes

Authors: Woosuk Lee

Abstract:

We controlled the electron injection rate in inverted quantum dot light-emitting diode (QLED) by inserting PEIE layer between ZnO electron transport layer(ETL) and quantum dots(QDs) layer and successfully demonstrated high efficiency of QLEDs. The inverted QLED has the layer structure of ITO(cathode)/ ZnO NPs/PEIE/QDs/PEIE/P-TPD/MoO3/Al(anode). The PEIE between poly-TPD hole transport layer (HTL) and quantum dot emitting layer protects QD EML during HTL coating process and improves the surface morphology. In addition, the hole injection barrier is reduced by upshifting the valence band maximum (VBM) of QDs. An additional layer of PEIE was introduced between ZnO and QD to balance charge within QD emissive layer in device, which serves as an effective electron blocking layer without changing device operating condition such as turn-on voltage and emissive spectra. As a result, the optimized QLED with 5nm PEIE shows a ~36% improved current efficiency and external quantum efficiency (EQE) compared to the QLED without PEIE.(maximum current efficiency, and EQE are achieved 70cd/A and 17.3%, respectively). In particular, the maximum brightness of the optimized QLED dramatically improved by a factor of 2.3 relative to the QLED without PEIE. The main reasons for these QLED performance improvement are due to the suppressing the leakage current across the device and well confined exciton by inserting PEIE layers.

Keywords: quantum dot light-emitting diodes, interfacial layer, charge-injection balance, suppressing QD charging

Procedia PDF Downloads 183
547 Hyaluronic Acid Binding to Link Domain of Stabilin-2 Receptor

Authors: Aleksandra Twarda, Dobrosława Krzemień, Grzegorz Dubin, Tad A. Holak

Abstract:

Stabilin-2 belongs to the group of scavenger receptors and plays a crucial role in clearance of more than 10 ligands from the bloodstream, including hyaluronic acid, products of degradation of extracellular matrix and metabolic products. The Link domain, a defining feature of stabilin-2, has a sequence similar to Link domains in other hyaluronic acid receptors, such as CD44 or TSG-6, and is responsible for most of ligands binding. Present knowledge of signal transduction by stabilin-2, as well as ligands’ recognition and binding mechanism, is limited. Until now, no experimental structures have been solved for any segments of stabilin-2. It has recently been demonstrated that the stabilin-2 knock-out or blocking of the receptor by an antibody effectively opposes cancer metastasis by elevating the level of circulating hyaluronic acid. Moreover, loss of expression of stabilin-2 in a peri-tumourous liver correlates with increased survival. Solving of the crystal structure of stabilin-2 and elucidation of the binding mechanism of hyaluronic acid could enable the precise characterization of the interactions in the binding site. These results may allow for designing specific small-molecule inhibitors of stabilin-2 that could be used in cancer therapy. To carry out screening for crystallization of stabilin-2, we cloned constructs of the Link domain of various lengths with or without surrounding domains. The folding properties of the constructs were checked by nuclear magnetic resonance (NMR). It is planned to show the binding of hyaluronic acid to the Link domain using several biochemical methods, i.a. NMR, isothermal titration calorimetry and fluorescence polarization assay.

Keywords: stabilin-2, Link domain, X-ray crystallography, NMR, hyaluronic acid, cancer

Procedia PDF Downloads 403