Search results for: convolution code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1503

Search results for: convolution code

1293 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 299
1292 Used MATLAB Code to Study the Vehicle Bridge Coupling Vibration Based On the Method of Newmark-β

Authors: Saidi Abdelkrim, Hamouine Abdelmadjid, Abdellatif Megnounif

Abstract:

The study of interaction between vehicles and bridge structures has become extremely important. Large deflections and vibration induced by heavy and high-speed vehicles affect significantly the safety and efficiency of bridge. The vibration of a bridge caused by passage of vehicles is one of the most imperative considerations in the design of a bridge as a common sort of transportation structure. A major goal of this study is to create a simplified model of a vehicle bridge system in MATLAB. The model will then be used to study the influence of parameters to vehicle-bridge vibrations.

Keywords: vehicle-bridge interaction, Newmark-β, MATLAB code

Procedia PDF Downloads 616
1291 Modification of the Athena Vortex Lattice Code for the Multivariate Design Synthesis Optimisation of the Blended Wing Body Aircraft

Authors: Paul Okonkwo, Howard Smith

Abstract:

This paper describes a methodology to integrate the Athena Vortex Lattice Aerodynamic Software for automated operation in a multivariate optimisation of the Blended Wing Body Aircraft. The Athena Vortex Lattice code developed at the Massachusetts Institute of Technology by Mark Drela allows for the aerodynamic analysis of aircraft using the vortex lattice method. Ordinarily, the Athena Vortex Lattice operation requires a text file containing the aircraft geometry to be loaded into the AVL solver in order to determine the aerodynamic forces and moments. However, automated operation will be required to enable integration into a multidisciplinary optimisation framework. Automated AVL operation within the JAVA design environment will nonetheless require a modification and recompilation of AVL source code into an executable file capable of running on windows and other platforms without the –X11 libraries. This paper describes the procedure for the integrating the FORTRAN written AVL software for automated operation within the multivariate design synthesis optimisation framework for the conceptual design of the BWB aircraft.

Keywords: aerodynamics, automation, optimisation, AVL

Procedia PDF Downloads 656
1290 Transmission of ASCII Code Messages Using a High Power (50mW) Underwater Laser Communication Prototype in Two Controlled Scenarios

Authors: Lessly Borja, Anthony Gualli, Kelly Baño, Fabricio Santacruz

Abstract:

In this article, a prototype of underwater communication using a long-range laser (50mW) has been carried out in two aquatic scenarios (fish tank and swimming pool) with the aim of recreating Aqua-Fi technology (the future of underwater communications) using a Bluetooth connection to the transmitter to send data in ASCII code by means of light. Initially, the transmitter and receiver circuits were programmed in Arduino so that the data would travel by light pulses in the aforementioned code. To obtain the results of the underwater communication, two scenarios were chosen (fish tank and swimming pool), where the power value of the received signal was calculated from its peak-to-peak voltage using the Oscilloscope equipment (ESPOCH). Finally, it was concluded that the maximum communication range of this prototype is 12m underwater, and it was observed that the power decreases as the distance increases. However, this prototype still needs to improve communication so that the information is not distorted or lost when there is movement and dispersion of the water. It is hoped that it will form the basis for future research.

Keywords: prototype, underwater, communication, power, voltage, distance

Procedia PDF Downloads 91
1289 Cooperative CDD scheme Based on Adaptive Modulation in Wireless Communiation System

Authors: Seung-Jun Yu, Hwan-Jun Choi, Hyoung-Kyu Song

Abstract:

Among spatial diversity scheme, orthogonal space-time block code (OSTBC) and cyclic delay diversity (CDD) have been widely studied for the cooperative wireless relaying system. However, conventional OSTBC and CDD cannot cope with change in the number of relays owing to low throughput or error performance. In this paper, we propose a cooperative cyclic delay diversity (CDD) scheme that use hierarchical modulation at the source and adaptive modulation based on cyclic redundancy check (CRC) code at the relays.

Keywords: adaptive modulation, cooperative communication, CDD, OSTBC

Procedia PDF Downloads 431
1288 Linear Codes Afforded by the Permutation Representations of Finite Simple Groups and Their Support Designs

Authors: Amin Saeidi

Abstract:

Using a representation-theoretic approach and considering G to be a finite primitive permutation group of degree n, our aim is to determine linear codes of length n that admit G as a permutation automorphism group. We can show that in some cases, every binary linear code admitting G as a permutation automorphism group is a submodule of a permutation module defined by a primitive action of G. As an illustration of the method, we consider the sporadic simple group M₁₁ and the unitary group U(3,3). We also construct some point- and block-primitive 1-designs from the supports of some codewords of the codes in the discussion.

Keywords: linear code, permutation representation, support design, simple group

Procedia PDF Downloads 77
1287 Code-Switching as a Bilingual Phenomenon among Students in Prishtina International Schools

Authors: Festa Shabani

Abstract:

This paper aims at investigating bilingual speech in the International Schools of Prishtina. More particularly, it seeks to analyze bilingual phenomena among adolescent students highly exposed to English with the latter as the language of instruction at school in naturally-occurring conversations within school environment. Adolescence was deliberately chosen since it is regarded as an age when peer influence on language choice is the greatest. Driven by daily unsystematic observation and prior research already undertaken, the hypothesis stated is that Albanian continues to be the dominant language among Prishtina international schools’ students with a lot of code-switched items from the English. Furthermore, they will also use lexical borrowings - words already adapted in the receiving language, from the language they have been in contact with, in their speech often in the lack of existing equivalents in Albanian or for other reasons. This is done owing to the fact that the language of instruction at school is English, and any topic related to the language they have been exposed to will trigger them to use English. Therefore, this needs special attention in an attempt to identify patterns of their speech; in this way, linguistic and socio-pragmatic factors will be considered when analyzing the motivations behind their language choice. Methodology for collecting data include participant systematic observation and tape-recording. While observing them in their natural conversations, the fieldworker also took notes, which helped transcribe details better. The paper starts by raising the question of whether code-switching is occurring among Prishtina International Schools’ students highly exposed to English. The data gathered from students in informal settings suggests that there are well-founded grounds for an affirmative answer. The participants in this study are observed to be code-switching, although showing differences in degree. However, a generalization cannot be made on the basis of the findings except in so far it appears that English has, in turn, became a language to which they turn when identifying with the group when discussing about particular school topics. Particularly, participants seemed to use intra-sentential CS in cases when they seem to find an English expression rather easier than an Albanian one when repeating or emphasizing a point when urged to talk about educational issues with English being their language of instruction, and inter-sentential code-switching, particularly when quoting others. Concerning the grammatical aspect of code-switching, the intrasentential CS is used more than the intersentetial one. Speaking of gender, the results show that there were really no significant differences in regards quantity between male and female participants. However, the slight tendency for men to code switch intrasententially more than women was manifested. Similarly, a slight tendency again for a difference to emerge is on intersentential switching, which contributes 21% to the total number of switches for women, but 11% to the total number of switches for men.

Keywords: Albanian, code-switching contact linguistics, bilingual phenomena, lexical borrowing, English

Procedia PDF Downloads 127
1286 Corporate Governance Disclosures by South African Auditing Firms

Authors: Rozanne Janet Smith

Abstract:

This article examined the corporate governance disclosures of the large and medium-sized auditing firms in South Africa. It is important that auditing firms disclose their practice of good corporate governance to the public, as they serve the public interest. The auditing profession has been criticized due to many corporate scandals in recent years. This has undermined the reputation of the profession, with experts and the public questioning whether auditing firms have corporate governance structures in place, and whether they are taking public interest into consideration. In South Africa there is no corporate governance code specifically for audit firms. Auditing firms are encouraged by IRBA to issue a transparency report in which they disclose corporate governance structures and application, but this is not compulsory in South Africa. Moreover, the information issued in these transparency reports is limited and often only focuses on audit quality, and not governance. Through a literature review it was found that the UK is one of only a few countries who has a corporate governance code for audit firms. As South Africa initially used the UK Cadbury report to develop the King IV Code, it was fitting to use the UK Audit Firm Governance Code as a benchmark to determine if audit firms in South Africa are disclosing relevant corporate governance information in their transparency reports and/or integrated reports. This study contributes to the existing body of knowledge by pursuing the following objective: To determine the improvement in the corporate governance disclosures of large and medium-sized auditing firms in South Africa through comparative research. Available data from 2019 will be used and compared to the disclosures in the 2023/2024 transparency and or integrated reports of the large and medium-sized auditing firms in South Africa. To achieve this objective a constructivist research paradigm was applied. Qualitative secondary information was gathered for the analysis. A content analysis was selected to collect the qualitative data by analyzing the integrated reports and/or transparency reports of large and medium-sized auditing firms with 20 or more partners and to determine what is disclosed on their corporate governance practices. These transparency reports and integrated reports were then read and analyzed in depth and compared to the principles stated in the UK Code. Since there are only nine medium-sized and large auditing firms in South Africa, the researcher was able to conduct the content analysis by reading each report in depth. The following six principles which are found in the UK Code were assessed for disclosure. (1) Leadership, (2) Values, (3) INED, (4) Operations, (5) Reporting, and (6) Dialogue. The results reveal that the auditing firms are not disclosing the corporate governance principles and practices to the necessary extent. Although there has been some improvement, the disclosure is not to the extent which it should be. There is still a need for a South African audit firm governance code.

Keywords: auditing firms, corporate governance, South Africa, disclosure

Procedia PDF Downloads 23
1285 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 315
1284 Method of False Alarm Rate Control for Cyclic Redundancy Check-Aided List Decoding of Polar Codes

Authors: Dmitry Dikarev, Ajit Nimbalker, Alexei Davydov

Abstract:

Polar coding is a novel example of error correcting codes, which can achieve Shannon limit at block length N→∞ with log-linear complexity. Active research is being carried to adopt this theoretical concept for using in practical applications such as 5th generation wireless communication systems. Cyclic redundancy check (CRC) error detection code is broadly used in conjunction with successive cancellation list (SCL) decoding algorithm to improve finite-length polar code performance. However, there are two issues: increase of code block payload overhead by CRC bits and decrease of CRC error-detection capability. This paper proposes a method to control CRC overhead and false alarm rate of polar decoding. As shown in the computer simulations results, the proposed method provides the ability to use any set of CRC polynomials with any list size while maintaining the desired level of false alarm rate. This level of flexibility allows using polar codes in 5G New Radio standard.

Keywords: 5G New Radio, channel coding, cyclic redundancy check, list decoding, polar codes

Procedia PDF Downloads 238
1283 Distinctive Features of Legal Relations in the Area of Subsoil Use, Renewal and Protection in Ukraine

Authors: N. Maksimentseva

Abstract:

The issue of public administration in subsoil use, renewal and protection is of high importance for Ukraine since it is strongly linked to energy security of the state as well as it shall facilitate the people of Ukraine to efficiently implement its propitiatory rights towards natural resources and redistribution of national wealth. As it is stipulated in the Article 11 of the Subsoil Code of Ukraine (the Code) the authorities that administer the industry are limited to central executive bodies and local governments. In particular, it is stipulated in the Code that the Ukraine’s Cabinet of Ministers carries out public administration in geological exploration, production and protection of subsoil. Other state bodies of public administration include central public authority responsible for state environmental protection policies; central public authority in charge of implementation of state geological exploration and efficient subsoil use policies; central authority in charge of state health and safety control policies. There are also public authorities in the Autonomous Republic of Crimea; local executive bodies and other state authorities and local self-government authorities in compliance with laws of Ukraine. This article is devoted to the analysis of the legal relations in the area of public administration of subsoil use, renewal and protection in Ukraine. The main approaches to study the essence of legal relations in the named area as well as its tasks, functions and methods are analyzed. It is concluded in this article that legal relationship in the field of public administration of subsoil use, renewal and protection is characterized by specifics of its task (development of natural resources).

Keywords: legal relations, public administration, subsoil code of Ukraine, subsoil use, renewal and protection

Procedia PDF Downloads 355
1282 Embarrassment as a Trigger Factor of Code Switching From Arabic to English in Egypt: A Case Study in Sociolinguistic

Authors: Samar Mohamed Magdy Abdelrahim

Abstract:

This study is an attempt to investigate the phenomenon of code-switching that takes place between Arabic and English in social discourse among high, well-educated, and young people in Egypt. The study aims at digging deeper to extract the trigger factors of such occurrences, namely when people encounter embarrassing situations in their daily conversations. Nowadays, most young Egyptians tend to use English words in certain situations that might make them feel embarrassed. To disguise their feelings and soften the impact of these words in the context, they code-switch (CS) from Arabic into English. To obtain accurate results, the study utilized a quantitative analysis approach that combines personal observations and a questionnaire to examine the phenomenon appropriately. The questionnaire was designed to categorize different types of embarrassing topics to be evaluated by participants. These topics include certain parts of the human body, types of clothes, taboo words, and specific medical conditions. Many studies have examined the use of CS as a prestigious way of communicating and expressing solidarity between Arabic and English. Other studies have dealt with switches that take place in classrooms. However, not many studies have paid attention to this angle of CS, especially in Egypt. The results conclude that gender and the circumstances that surround the conversation are essential factors of CS since females tend to switch codes more than males in embarrassing situations. According to the study, CS serves the socio-pragmatic function in terms of helping young, well-educated bilinguals express themselves in a second language that would be distressing in the first.

Keywords: code-switching, embarrassment, Arabic, English

Procedia PDF Downloads 97
1281 Comparative Study of the Distribution of Seismic Loads of Buildings with Asymmetries Plan

Authors: Ahmed Hamza Yache

Abstract:

The main purpose of this study is to estimate the distribution of shear forces in building structures with asymmetries in the plan submitted to seismic forces can cause, in this case, simultaneous deformations of translation and torsion. To this end, the distribution of shear forces is obtained by seismic forces calculated from the equivalent static method of the Algerian earthquake code RPA 99 (2003 version) and spectral modal analysis for an irregular building plan without kinks. Comparison of the results obtained by these two methods used to highlight the difference in terms of distributions of shear forces in such structures.

Keywords: structure, irregular, code, seismic, method, force, period

Procedia PDF Downloads 585
1280 Auditor with the Javanese Characters: Revealing the Relationship towards Its Client

Authors: Krisna Damayanti

Abstract:

Negative issue about the relationship between auditors and clients often heard. It arises in view of the rise of a variety of phenomena resulting from the audit practice of greed and do not appreciate the independence of the audit profession and professional code of ethics. It is a logical consequence of the practice of capitalism in accounting. The purpose of this paper would like to uncover the existing auditing practices in Indonesia, especially Java, which is associated with a strong influence of Javanese culture with reluctant/"shy", politely, "legowo", "ngemong" friendly, "not mentholo", "tepo seliro", "ngajeni", "acquiescent". The method used by interpretive approach that emphasizes the role of language, interpret and understand and see social reality as something other than a label, name or concept. Auditing practices in each country has a culture that will affect the standard set by those regulatory standards although there has been an adaptation of IAS. In Indonesia the majority of parties dominated by Javanesse racial regulators, so Java culture is embedded in every audit practices thus conditions in Java requires auditors to behave like that, sometimes interfere with standard Java code of conduct that must be executed by an auditor. Auditors who live in Java have the characters of Javanese culture that is hard to avoid in the audit practice. However, in practice, the auditor still are relevant in their profession.

Keywords: auditors, java, character, profession, code of ethics, client

Procedia PDF Downloads 441
1279 The Current Importance of the Rules of Civil Procedure in the Portuguese Legal Order: Between Legalism and Adequation

Authors: Guilherme Gomes, Jose Lebre de Freitas

Abstract:

The rules of Civil Procedure that are defined in the Portuguese Civil Procedure Code of 2013 particularly their articles 552 to 626- represent the model that the legislator thought that would be more suitable for national civil litigation, from the moment the action is brought by the plaintiff to the moment when the sentence is issued. However, procedural legalism is no longer a reality in the Portuguese Civil Procedural Law. According to the article 547 of the code of 2013, the civil judge has a duty to adopt the procedure that better suits the circumstances of the case, whether or not it is the one defined by law. The main goal of our paper is to answer the question whether the formal adequation imposed by this article diminishes the importance of the Portuguese rules of Civil Procedure and their daily application by national civil judges. We will start by explaining the appearance of the abovementioned rules in the Civil Procedure Code of 2013. Then we will analyse, using specific examples that were obtained by the books we read, how the legal procedure defined in the abovementioned code does not suit the circumstances of some specific cases and is totally inefficient in some situations. After that, we will, by using the data obtained in the practical research that we are conducting in the Portuguese civil courts within the scope of our Ph.D. thesis (until now, we have been able to consult 150 civil lawsuits), verify whether and how judges and parties make the procedure more efficient and effective in the case sub judice. In the scope of our research, we have already reached some preliminary findings: 1) despite the fact that the legal procedure does not suit the circumstances of some civil lawsuits, there are only two situations of frequent use of formal adequation (the judge allowing the plaintiff to respond to the procedural exceptions deduced in the written defense and the exemption from prior hearing for the judges who never summon it), 2) the other aspects of procedural adequation (anticipation of the production of expert evidence, waiving of oral argument at the final hearing, written allegations, dismissal of the dispatch on the controversial facts and the examination of witnesses at the domicile of one of the lawyers) are still little used and 3) formal adequation tends to happen by initiative of the judge, as plaintiffs and defendants are afraid of celebrating procedural agreements in most situations. In short, we can say that, in the Portuguese legal order of the 21st century, the flexibility of the legal procedure, as it is defined in the law and applied by procedural subjects, does not affect the importance of the rules of Civil Procedure of the code of 2013.

Keywords: casuistic adequation, civil procedure code of 2013, procedural subjects, rules of civil procedure

Procedia PDF Downloads 129
1278 SQL Generator Based on MVC Pattern

Authors: Chanchai Supaartagorn

Abstract:

Structured Query Language (SQL) is the standard de facto language to access and manipulate data in a relational database. Although SQL is a language that is simple and powerful, most novice users will have trouble with SQL syntax. Thus, we are presenting SQL generator tool which is capable of translating actions and displaying SQL commands and data sets simultaneously. The tool was developed based on Model-View-Controller (MVC) pattern. The MVC pattern is a widely used software design pattern that enforces the separation between the input, processing, and output of an application. Developers take full advantage of it to reduce the complexity in architectural design and to increase flexibility and reuse of code. In addition, we use White-Box testing for the code verification in the Model module.

Keywords: MVC, relational database, SQL, White-Box testing

Procedia PDF Downloads 422
1277 The Terminology of Mandatory Mediation on Commercial Disputes in Türkiye and the Differences from England and Wales’s Approaches

Authors: Sevgi Karaca

Abstract:

Since December 6, 2018, mediation has become mandatory for commercial disputes under the Turkish Commercial Code. Mandatory mediation became one of the “causes of action”, and being compulsory means starting the mediation process before going to court. As it contemplates looking at “the causes of the action”, the terminology may lead to misinterpretation of the core of the phrases. However, the terms pertain to a prerequisite for starting the lawsuit. The court will examine failure to comply with such requirements, and the case will be dismissed without further action. Türkiye’s use of obligatory mediation is highly unusual. It is neither judge-led nor judge-assisted mediation but rather a mediation conducted outside of court with the participation of a third party (mediators). What distinguishes it is the incorporation of obligatory mediation into the causes of actions listed in the Code of Civil Procedure. Being one of the causes of action in a legal case implies that the absence of any of them may result in the procedural dismissal of the case without any further action. The case must be presented to the mediator first, and if the parties are unable to reach an agreement, they must deliver the results of the mediation session. Other than submitting the minutes, parties are ineligible to file a lawsuit. However, despite a lengthy history of use in England and Wales, there are considerable reservations about making mediation mandatory. The Civil Procedure Code does not explicitly mention making mediation mandatory. For the time being, there is no Mediation Code, and case law limits the growth of obligatory mediation. Some renowned judges voiced their desire to re-evaluate the notion of required mediation, prompting the Civil Justice Council to release a study in 2021 on the significance of amending case law and the high value of mandatory mediation. By contrasting the approaches to mandatory mediation in England and Wales, the study will investigate the method of controlled mandatory mediation and its effects on the success of mediation in Türkiye.

Keywords: alternative dispute resolution, case law, cause of action, litigation process, mandatory mediation

Procedia PDF Downloads 78
1276 Effects of ECCS on the Cold-Leg Fluid Temperature during SGTR Accidents

Authors: Tadashi Watanabe

Abstract:

The LSTF experiment simulating the SGTR accident at the Mihama Unit-2 reactor is analyzed using the RELAP5/MOD3.3 code. In the accident and thus in the experiment, the ECC water was injected not only into the cold legs but into the upper plenum. Overall transients during the experiment such as pressures and fluid temperatures are simulated well by the code. The cold-leg fluid temperatures are shown to decrease if the upper plenum injection system is connected to the cold leg. It is found that the cold-leg fluid temperatures also decrease if the upper-plenum injection is not used and the cold-leg injection alone is actuated.

Keywords: SGTR, LSTF, RELAP5, ECCS

Procedia PDF Downloads 666
1275 Hull Detection from Handwritten Digit Image

Authors: Sriraman Kothuri, Komal Teja Mattupalli

Abstract:

In this paper we proposed a novel algorithm for recognizing hulls in a hand written digits. This is an extension to the work on “Digit Recognition Using Freeman Chain code”. In order to find out the hulls in a user given digit it is necessary to follow three steps. Those are pre-processing, Boundary Extraction and at last apply the Hull Detection system in a way to attain the better results. The detection of Hull Regions is mainly intended to increase the machine learning capability in detection of characters or digits. This can also extend this in order to get the hull regions and their intensities in Black Holes in Space Exploration.

Keywords: chain code, machine learning, hull regions, hull recognition system, SASK algorithm

Procedia PDF Downloads 400
1274 Comparing the Embodied Carbon Impacts of a Passive House with the BC Energy Step Code Using Life Cycle Assessment

Authors: Lorena Polovina, Maddy Kennedy-Parrott, Mohammad Fakoor

Abstract:

The construction industry accounts for approximately 40% of total GHG emissions worldwide. In order to limit global warming to 1.5 degrees Celsius, ambitious reductions in the carbon intensity of our buildings are crucial. Passive House presents an opportunity to reduce operational carbon by as much as 90% compared to a traditional building through improving thermal insulation, limiting thermal bridging, increasing airtightness and heat recovery. Up until recently, Passive House design was mainly concerned with meeting the energy demands without considering embodied carbon. As buildings become more energy-efficient, embodied carbon becomes more significant. The main objective of this research is to calculate the embodied carbon impact of a Passive House and compare it with the BC Energy Step Code (ESC). British Columbia is committed to increasing the energy efficiency of buildings through the ESC, which is targeting net-zero energy-ready buildings by 2032. However, there is a knowledge gap in the embodied carbon impacts of more energy-efficient buildings, in particular Part 3 construction. In this case study, life cycle assessments (LCA) are performed on Part 3, a multi-unit residential building in Victoria, BC. The actual building is not constructed to the Passive House standard; however, the building envelope and mechanical systems are designed to comply with the Passive house criteria, as well as Steps 1 and 4 of the BC Energy Step Code (ESC) for comparison. OneClick LCA is used to perform the LCA of the case studies. Several strategies are also proposed to minimize the total carbon emissions of the building. The assumption is that there will not be significant differences in embodied carbon between a Passive House and a Step 4 building due to the building envelope.

Keywords: embodied carbon, energy modeling, energy step code, life cycle assessment

Procedia PDF Downloads 148
1273 A Convolution Neural Network PM-10 Prediction System Based on a Dense Measurement Sensor Network in Poland

Authors: Piotr A. Kowalski, Kasper Sapala, Wiktor Warchalowski

Abstract:

PM10 is a suspended dust that primarily has a negative effect on the respiratory system. PM10 is responsible for attacks of coughing and wheezing, asthma or acute, violent bronchitis. Indirectly, PM10 also negatively affects the rest of the body, including increasing the risk of heart attack and stroke. Unfortunately, Poland is a country that cannot boast of good air quality, in particular, due to large PM concentration levels. Therefore, based on the dense network of Airly sensors, it was decided to deal with the problem of prediction of suspended particulate matter concentration. Due to the very complicated nature of this issue, the Machine Learning approach was used. For this purpose, Convolution Neural Network (CNN) neural networks have been adopted, these currently being the leading information processing methods in the field of computational intelligence. The aim of this research is to show the influence of particular CNN network parameters on the quality of the obtained forecast. The forecast itself is made on the basis of parameters measured by Airly sensors and is carried out for the subsequent day, hour after hour. The evaluation of learning process for the investigated models was mostly based upon the mean square error criterion; however, during the model validation, a number of other methods of quantitative evaluation were taken into account. The presented model of pollution prediction has been verified by way of real weather and air pollution data taken from the Airly sensor network. The dense and distributed network of Airly measurement devices enables access to current and archival data on air pollution, temperature, suspended particulate matter PM1.0, PM2.5, and PM10, CAQI levels, as well as atmospheric pressure and air humidity. In this investigation, PM2.5, and PM10, temperature and wind information, as well as external forecasts of temperature and wind for next 24h served as inputted data. Due to the specificity of the CNN type network, this data is transformed into tensors and then processed. This network consists of an input layer, an output layer, and many hidden layers. In the hidden layers, convolutional and pooling operations are performed. The output of this system is a vector containing 24 elements that contain prediction of PM10 concentration for the upcoming 24 hour period. Over 1000 models based on CNN methodology were tested during the study. During the research, several were selected out that give the best results, and then a comparison was made with the other models based on linear regression. The numerical tests carried out fully confirmed the positive properties of the presented method. These were carried out using real ‘big’ data. Models based on the CNN technique allow prediction of PM10 dust concentration with a much smaller mean square error than currently used methods based on linear regression. What's more, the use of neural networks increased Pearson's correlation coefficient (R²) by about 5 percent compared to the linear model. During the simulation, the R² coefficient was 0.92, 0.76, 0.75, 0.73, and 0.73 for 1st, 6th, 12th, 18th, and 24th hour of prediction respectively.

Keywords: air pollution prediction (forecasting), machine learning, regression task, convolution neural networks

Procedia PDF Downloads 149
1272 User-Friendly Task Creation Using a CAD Integrated Robotic System on a Real Workcell

Authors: Alireza Changizi, Arash Rezaei, Jamal Muhammad, Jyrki Latokartano, Minna Lanz

Abstract:

Offline programming (OLP) is a new method in robot programming which is used widely in the industry nowadays which is a simulation base method that can produce the robot codes for motion according to virtual world in the simulation software. In this project Delmia v5 is used as simulation software. First the work cell component was modelled by Catia v5 and all of them was imported to a process file in Delmia and placed roughly to form the virtual work cell. Then robot was added to the work cell from the Delmia library. Work cell was calibrated corresponding to real world work cell to have accurate code. Tool calibration is the first step of calibration scheme and then work cell equipment can be calibrated using 6 point calibration method. Finally generated code needs to be reformed to match related controller code instruction. At the last stage IO were set to accomplish robots cooperation and make their motion synchronized. The pros and cons also will be discussed to clarify the presented results show the feasibility of the method and its effect on production line efficiency. Finally the positive and negative points of the implementation will be discussed.

Keywords: robotic, automated, production, offline programming, CAD

Procedia PDF Downloads 387
1271 Antigen Stasis can Predispose Primary Ciliary Dyskinesia (PCD) Patients to Asthma

Authors: Nadzeya Marozkina, Joe Zein, Benjamin Gaston

Abstract:

Introduction: We have observed that many patients with Primary Ciliary Dyskinesia (PCD) benefit from asthma medications. In healthy airways, the ciliary function is normal. Antigens and irritants are rapidly cleared, and NO enters the gas phase normally to be exhaled. In the PCD airways, however, antigens, such as Dermatophagoides, are not as well cleared. This defect leads to oxidative stress, marked by increased DUOX1 expression and decreased superoxide dismutase [SOD] activity (manuscript under revision). H₂O₂, in high concentrations in the PCD airway, injures the airway. NO is oxidized rather than being exhaled, forming cytotoxic peroxynitrous acid. Thus, antigen stasis on PCD airway epithelium leads to airway injury and may predispose PCD patients to asthma. Indeed, recent population genetics suggest that PCD genes may be associated with asthma. We therefore hypothesized that PCD patients would be predisposed to having asthma. Methods. We analyzed our database of 18 million individual electronic medical records (EMRs) in the Indiana Network for Patient Care research database (INPCR). There is not an ICD10 code for PCD itself; code Q34.8 is most commonly used clinically. To validate analysis of this code, we queried patients who had an ICD10 code for both bronchiectasis and situs inversus totalis in INPCR. We also studied a validation cohort using the IBM Explorys® database (over 80 million individuals). Analyses were adjusted for age, sex and race using a 1 PCD: 3 controls matching method in INPCR and multivariable logistic regression in the IBM Explorys® database. Results. The prevalence of asthma ICD10 codes in subjects with a code Q34.8 was 67% vs 19% in controls (P < 0.0001) (Regenstrief Institute). Similarly, in IBM*Explorys, the OR [95% CI] for having asthma if a patient also had ICD10 code 34.8, relative to controls, was =4.04 [3.99; 4.09]. For situs inversus alone the OR [95% CI] was 4.42 [4.14; 4.71]; and bronchiectasis alone the OR [95% CI] =10.68 (10.56; 10.79). For both bronchiectasis and situs inversus together, the OR [95% CI] =28.80 (23.17; 35.81). Conclusions: PCD causes antigen stasis in the human airway (under review), likely predisposing to asthma in addition to oxidative and nitrosative stress and to airway injury. Here, we show that, by several different population-based metrics, and using two large databases, patients with PCD appear to have between a three- and 28-fold increased risk of having asthma. These data suggest that additional studies should be undertaken to understand the role of ciliary dysfunction in the pathogenesis and genetics of asthma. Decreased antigen clearance caused by ciliary dysfunction may be a risk factor for asthma development.

Keywords: antigen, PCD, asthma, nitric oxide

Procedia PDF Downloads 106
1270 Forensic Analysis of Signal Messenger on Android

Authors: Ward Bakker, Shadi Alhakimi

Abstract:

The amount of people moving towards more privacy focused instant messaging applications has grown significantly. Signal is one of these instant messaging applications, which makes Signal interesting for digital investigators. In this research, we evaluate the artifacts that are generated by the Signal messenger for Android. This evaluation was done by using the features that Signal provides to create artifacts, whereafter, we made an image of the internal storage and the process memory. This image was analysed manually. The manual analysis revealed the content that Signal stores in different locations during its operation. From our research, we were able to identify the artifacts and interpret how they were used. We also examined the source code of Signal. Using our obtain knowledge from the source code, we developed a tool that decrypts some of the artifacts using the key stored in the Android Keystore. In general, we found that most artifacts are encrypted and encoded, even after decrypting some of the artifacts. During data visualization, some artifacts were found, such as that Signal does not use relationships between the data. In this research, two interesting groups of artifacts were identified, those related to the database and those stored in the process memory dump. In the database, we found plaintext private- and group chats, and in the memory dump, we were able to retrieve the plaintext access code to the application. Nevertheless, we conclude that Signal contains a wealth of artifacts that could be very valuable to a digital forensic investigation.

Keywords: forensic, signal, Android, digital

Procedia PDF Downloads 82
1269 Improvement of Model for SIMMER Code for SFR Corium Relocation Studies

Authors: A. Bachrata, N. Marie, F. Bertrand, J. B. Droin

Abstract:

The in-depth understanding of severe accident propagation in Generation IV of nuclear reactors is important so that appropriate risk management can be undertaken early in their design process. This paper is focused on model improvements in the SIMMER code in order to perform studies of severe accident mitigation of Sodium Fast Reactor. During the design process of the mitigation devices dedicated to extraction of molten fuel from the core region, the molten fuel propagation from the core up to the core catcher has to be studied. In this aim, analytical as well as the complex thermo-hydraulic simulations with SIMMER-III code are performed. The studies presented in this paper focus on physical phenomena and associated physical models that influence the corium relocation. Firstly, the molten pool heat exchange with surrounding structures is analysed since it influences directly the instant of rupture of the dedicated tubes favouring the corium relocation for mitigation purpose. After the corium penetration into mitigation tubes, the fuel-coolant interactions result in formation of debris bed. Analyses of debris bed fluidization as well as sinking into a fluid are presented in this paper.

Keywords: corium, mitigation tubes, SIMMER-III, sodium fast reactor

Procedia PDF Downloads 387
1268 Tracing the History of Indian Legal System Vis-A-Vis the Code of Hammurabi

Authors: Vandana Kumari

Abstract:

One of the most ancient and detailed legal codes proclaimed the Babylonian King Hammurabi during his reign in the erstwhile Mesopotamian society, provides a fascinating account of the social and justice system of Babylon. The 282 laws intricately carved on eight feet black stone stela serve as an important source of contemporary commercial, family and criminals laws. This paper attempts an inquiry into the contemporary relevance of this legal code to our current legal system. An exhaustive study of one of ancient legal system based on a series of practical experiences rather than being founded on mere theoretical ideologies can be assumed pertinent to the promulgation of practically viable laws in our country. The first chapter of the paper focuses on law seven which established the rules of commerce and the role of government in overseeing justice and honesty regarding the law of property. The second chapter deals with the laws of family, marriages, divorce and adoption prevailing in the Babylonian era. The third chapter traces the earliest known history of criminal jurisprudence which impregnated the principle of an eye for an eye. The paper is not merely a theoretical account of the Mesopotamian way of living but a novice attempt to discover the roots of Indian laws in the ruins of the courtrooms of the Hammurabi Empire.

Keywords: Babylonian legal system, Contemporary relevance, criminal jurisprudence, Hammurabi Code

Procedia PDF Downloads 306
1267 Effect of Bored Pile Diameter in Sand on Friction Resistance

Authors: Ashraf Mohammed M. Eid, Hossam El Badry

Abstract:

The bored pile friction resistance may be affected by many factors such as the method of construction, pile length and diameter, the soil properties, as well as the depth below ground level. These factors can be represented analytically to study the influence of diameter on the unit skin friction. In this research, the Egyptian Code of soil mechanics is used to assess the skin friction capacity for either the ordinary pile diameter as well as for the large pile diameter. The later is presented in the code and through the work of some researchers based on the results of investigations adopted for a sufficient number of field tests. The comparative results of these researchers with respect to the Egyptian Code are used to check the adequacy of both methods. Based on the results of this study, the traditional static formula adopted for piles of diameter less than 60 cm may be continually used for larger piles by correlating the analyzed formulae. Accordingly, the corresponding modified angle of internal friction is concluded demonstrating a reduction of shear strength due to soil disturbance along the pile shaft. Based on this research the difference between driven piles and bored piles constructed in same soil can be assessed and a better understanding can be evaluated for the effect of different factors on pile skin friction capacity.

Keywords: large piles, static formula, friction piles, sandy soils

Procedia PDF Downloads 500
1266 Attribute Analysis of Quick Response Code Payment Users Using Discriminant Non-negative Matrix Factorization

Authors: Hironori Karachi, Haruka Yamashita

Abstract:

Recently, the system of quick response (QR) code is getting popular. Many companies introduce new QR code payment services and the services are competing with each other to increase the number of users. For increasing the number of users, we should grasp the difference of feature of the demographic information, usage information, and value of users between services. In this study, we conduct an analysis of real-world data provided by Nomura Research Institute including the demographic data of users and information of users’ usages of two services; LINE Pay, and PayPay. For analyzing such data and interpret the feature of them, Nonnegative Matrix Factorization (NMF) is widely used; however, in case of the target data, there is a problem of the missing data. EM-algorithm NMF (EMNMF) to complete unknown values for understanding the feature of the given data presented by matrix shape. Moreover, for comparing the result of the NMF analysis of two matrices, there is Discriminant NMF (DNMF) shows the difference of users features between two matrices. In this study, we combine EMNMF and DNMF and also analyze the target data. As the interpretation, we show the difference of the features of users between LINE Pay and Paypay.

Keywords: data science, non-negative matrix factorization, missing data, quality of services

Procedia PDF Downloads 131
1265 Learners’ Perceptions of Tertiary Level Teachers’ Code Switching: A Vietnamese Perspective

Authors: Hoa Pham

Abstract:

The literature on language teaching and second language acquisition has been largely driven by monolingual ideology with a common assumption that a second language (L2) is best taught and learned in the L2 only. The current study challenges this assumption by reporting learners' positive perceptions of tertiary level teachers' code switching practices in Vietnam. The findings of this study contribute to our understanding of code switching practices in language classrooms from a learners' perspective. Data were collected from student participants who were working towards a Bachelor degree in English within the English for Business Communication stream through the use of focus group interviews. The literature has documented that this method of interviewing has a number of distinct advantages over individual student interviews. For instance, group interactions generated by focus groups create a more natural environment than that of an individual interview because they include a range of communicative processes in which each individual may influence or be influenced by others - as they are in their real life. The process of interaction provides the opportunity to obtain the meanings and answers to a problem that are "socially constructed rather than individually created" leading to the capture of real-life data. The distinct feature of group interaction offered by this technique makes it a powerful means of obtaining deeper and richer data than those from individual interviews. The data generated through this study were analysed using a constant comparative approach. Overall, the students expressed positive views of this practice indicating that it is a useful teaching strategy. Teacher code switching was seen as a learning resource and a source supporting language output. This practice was perceived to promote student comprehension and to aid the learning of content and target language knowledge. This practice was also believed to scaffold the students' language production in different contexts. However, the students indicated their preference for teacher code switching to be constrained, as extensive use was believed to negatively impact on their L2 learning and trigger cognitive reliance on the L1 for L2 learning. The students also perceived that when the L1 was used to a great extent, their ability to develop as autonomous learners was negatively impacted. This study found that teacher code switching was supported in certain contexts by learners, thus suggesting that there is a need for the widespread assumption about the monolingual teaching approach to be re-considered.

Keywords: codeswitching, L1 use, L2 teaching, learners’ perception

Procedia PDF Downloads 324
1264 Analytical Modeling of Globular Protein-Ferritin in α-Helical Conformation: A White Noise Functional Approach

Authors: Vernie C. Convicto, Henry P. Aringa, Wilson I. Barredo

Abstract:

This study presents a conformational model of the helical structures of globular protein particularly ferritin in the framework of white noise path integral formulation by using Associated Legendre functions, Bessel and convolution of Bessel and trigonometric functions as modulating functions. The model incorporates chirality features of proteins and their helix-turn-helix sequence structural motif.

Keywords: globular protein, modulating function, white noise, winding probability

Procedia PDF Downloads 477