Search results for: semantic capability description language (SCDL)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5973

Search results for: semantic capability description language (SCDL)

3393 Application of Fourier Series Based Learning Control on Mechatronic Systems

Authors: Sandra Baßler, Peter Dünow, Mathias Marquardt

Abstract:

A Fourier series based learning control (FSBLC) algorithm for tracking trajectories of mechanical systems with unknown nonlinearities is presented. Two processes are introduced to which the FSBLC with PD controller is applied. One is a simplified service robot capable of climbing stairs due to special wheels and the other is a propeller driven pendulum with nearly the same requirements on control. Additionally to the investigation of learning the feed forward for the desired trajectories some considerations on the implementation of such an algorithm on low cost microcontroller hardware are made. Simulations of the service robot as well as practical experiments on the pendulum show the capability of the used FSBLC algorithm to perform the task of improving control behavior for repetitive task of such mechanical systems.

Keywords: climbing stairs, FSBLC, ILC, service robot

Procedia PDF Downloads 300
3392 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: discrete logarithm, factoring, proxy signature, key agreement

Procedia PDF Downloads 294
3391 On Direct Matrix Factored Inversion via Broyden's Updates

Authors: Adel Mohsen

Abstract:

A direct method based on the good Broyden's updates for evaluating the inverse of a nonsingular square matrix of full rank and solving related system of linear algebraic equations is studied. For a matrix A of order n whose LU-decomposition is A = LU, the multiplication count is O (n3). This includes the evaluation of the LU-decompositions of the inverse, the lower triangular decomposition of A as well as a “reduced matrix inverse”. If an explicit value of the inverse is not needed the order reduces to O (n3/2) to compute to compute inv(U) and the reduced inverse. For a symmetric matrix only O (n3/3) operations are required to compute inv(L) and the reduced inverse. An example is presented to demonstrate the capability of using the reduced matrix inverse in treating ill-conditioned systems. Besides the simplicity of Broyden's update, the method provides a mean to exploit the possible sparsity in the matrix and to derive a suitable preconditioner.

Keywords: Broyden's updates, matrix inverse, inverse factorization, solution of linear algebraic equations, ill-conditioned matrices, preconditioning

Procedia PDF Downloads 471
3390 An Anatomic Approach to the Lingual Artery in the Carotid Triangle in South Indian Population

Authors: Ashwin Rai, Rajalakshmi Rai, Rajanigandha Vadgoankar

Abstract:

Lingual artery is the chief artery of the tongue and the neighboring structures pertaining to the oral cavity. At the carotid triangle, this artery arises from the external carotid artery opposite to the tip of greater cornua of hyoid bone, undergoes a tortuous course with its first part being crossed by the hypoglossal nerve and runs beneath the digastric muscle. Then it continues to supply the tongue as the deep lingual artery. The aim of this study is to draw surgeon's attention to the course of lingual artery in this area since it can be accidentally lesioned causing an extensive hemorrhage in certain surgical or dental procedures. The study was conducted on 44 formalin fixed head and neck specimens focusing on the anatomic relations of lingual artery. In this study, we found that the lingual artery is located inferior to the digastric muscle and the hypoglossal nerve contradictory to the classical description. This data would be useful during ligation of lingual artery to avoid injury to the hypoglossal nerve in surgeries related to the anterior triangle of neck.

Keywords: anterior triangle, digastric muscle, hypoglossal nerve, lingual artery

Procedia PDF Downloads 171
3389 The Audience’s Satisfaction through Radio Channel Broadcasting of Suan Sunandha Rajabhat University

Authors: Piyakarn Apichaikul, Thep Muanfoo

Abstract:

This research study aimed to survey the audience’s satisfaction of the radio channel broadcasting of Suan Sunandha Rajabhat University and to investigate the relationship between the satisfaction and the usage of the listeners to the news program. The study was a quantitative research using a survey research method and a cross-sectional description study to examine the satisfaction and the usage of the listeners. The instrument of the research was questionnaires which were delivered to 300 respondents by simple random sampling. For the analytical part, descriptive statistics and inferential statistic were used in this research. The result found that respondents agreed that they were satisfied with the news program (mean = 3.60). Moreover, respondents agreed that they used information from the news program in their daily life (mean = 3.47). However, the relationship between the satisfaction and the usage of the respondents were contrary.

Keywords: news program, radio channel broadcasting, Suan Sunandha Rajabhat University, audience satisfaction

Procedia PDF Downloads 239
3388 Reading Strategy Instruction in Secondary Schools in China

Authors: Leijun Zhang

Abstract:

Reading literacy has become a powerful tool for academic success and an essential goal of education. The ability to read is not only fundamental for pupils’ academic success but also a prerequisite for successful participation in today’s vastly expanding multi-literate textual environment. It is also important to recognize that, in many educational settings, students are expected to learn a foreign/second language for successful participation in the increasingly globalized world. Therefore, it is crucial to help learners become skilled foreign-language readers. Research indicates that students’ reading comprehension can be significantly improved through explicit instruction of multiple reading strategies. Despite the wealth of research on how to enhance learners’ reading comprehension achievement by identifying an enormous range of reading strategies and techniques for assisting students in comprehending specific texts, relatively scattered studies have centered on whether these reading comprehension strategies and techniques are used in classrooms, especially in Chinese academic settings. Given the central role of ‘the teacher’ in reading instruction, the study investigates the degree of importance that EFL teachers attach to reading comprehension strategies and their classroom employment of those strategies in secondary schools in China. It also explores the efficiency of reading strategy instruction on pupils’ reading comprehension performance. As a mix-method study, the analysis drew on data from a quantitative survey and interviews with seven teachers. The study revealed that the EFL teachers had positive attitudes toward the use of cognitive strategies despite their insufficient knowledge about and limited attention to the metacognitive strategies and supporting strategies. Regarding the selection of reading strategies for instruction, the mandated curriculum and high-stakes examinations, text features and demands, teaching preparation programs and their own EFL reading experiences were the major criteria in their responses, while few teachers took into account the learner needs in their choice of reading strategies. Although many teachers agreed upon the efficiency of reading strategy instruction in developing students’ reading comprehension competence, three challenges were identified in their implementation of the strategy instruction. The study provides some insights into reading strategy instruction in EFL contexts and proposes implications for curriculum innovation, teacher professional development, and reading instruction research.

Keywords: reading comprehension strategies, EFL reading instruction, language teacher cognition, teacher education

Procedia PDF Downloads 80
3387 A Fully-Automated Disturbance Analysis Vision for the Smart Grid Based on Smart Switch Data

Authors: Bernardo Cedano, Ahmed H. Eltom, Bob Hay, Jim Glass, Raga Ahmed

Abstract:

The deployment of smart grid devices such as smart meters and smart switches (SS) supported by a reliable and fast communications system makes automated distribution possible, and thus, provides great benefits to electric power consumers and providers alike. However, more research is needed before the full utility of smart switch data is realized. This paper presents new automated switching techniques using SS within the electric power grid. A concise background of the SS is provided, and operational examples are shown. Organization and presentation of data obtained from SS are shown in the context of the future goal of total automation of the distribution network. The description of application techniques, the examples of success with SS, and the vision outlined in this paper serve to motivate future research pertinent to disturbance analysis automation.

Keywords: disturbance automation, electric power grid, smart grid, smart switches

Procedia PDF Downloads 301
3386 Damage Assessment Based on Full-Polarimetric Decompositions in the 2017 Colombia Landslide

Authors: Hyeongju Jeon, Yonghyun Kim, Yongil Kim

Abstract:

Synthetic Aperture Radar (SAR) is an effective tool for damage assessment induced by disasters due to its all-weather and night/day acquisition capability. In this paper, the 2017 Colombia landslide was observed using full-polarimetric ALOS/PALSAR-2 data. Polarimetric decompositions, including the Freeman-Durden decomposition and the Cloude decomposition, are utilized to analyze the scattering mechanisms changes before and after-landslide. These analyses are used to detect the damaged areas induced by the landslide. Experimental results validate the efficiency of the full polarimetric SAR data since the damaged areas can be well discriminated. Thus, we can conclude the proposed method using full polarimetric data has great potential for damage assessment of landslides.

Keywords: Synthetic Aperture Radar (SAR), polarimetric decomposition, damage assessment, landslide

Procedia PDF Downloads 381
3385 The Design and Construction of the PV-Wind Autonomous System for Greenhouse Plantations in Central Thailand

Authors: Napat Watjanatepin, Wikorn Wong-Satiean

Abstract:

The objective of this research is to design and construct the PV-Wind hybrid autonomous system for the greenhouse plantation, and analyze the technical performance of the PV-Wind energy system. This design depends on the water consumption in the greenhouse by using 24 of the fogging mist each with the capability of 24 liter/min. The operating time is 4 times per day, each round for 15 min. The fogging system is being driven by water pump with AC motor rating 0.5 hp. The load energy consumed is around 1.125 kWh/d. The designing results of the PV-Wind hybrid energy system is that sufficient energy could be generated by this system. The results of this study can be applied as a technical data reference for other areas in the central part of Thailand.

Keywords: PV-Wind hybrid autonomous system, greenhouse plantation, fogging system, central part of Thailand

Procedia PDF Downloads 301
3384 The Mathematics of Fractal Art: Using a Derived Cubic Method and the Julia Programming Language to Make Fractal Zoom Videos

Authors: Darsh N. Patel, Eric Olson

Abstract:

Fractals can be found everywhere, whether it be the shape of a leaf or a system of blood vessels. Fractals are used to help study and understand different physical and mathematical processes; however, their artistic nature is also beautiful to simply explore. This project explores fractals generated by a cubically convergent extension to Newton's method. With this iteration as a starting point, a complex plane spanning from -2 to 2 is created with a color wheel mapped onto it. Next, the polynomial whose roots the fractal will generate from is established. From the Fundamental Theorem of Algebra, it is known that any polynomial has as many roots (counted by multiplicity) as its degree. When generating the fractals, each root will receive its own color. The complex plane can then be colored to indicate the basins of attraction that converge to each root. From a computational point of view, this project’s code identifies which points converge to which roots and then obtains fractal images. A zoom path into the fractal was implemented to easily visualize the self-similar structure. This path was obtained by selecting keyframes at different magnifications through which a path is then interpolated. Using parallel processing, many images were generated and condensed into a video. This project illustrates how practical techniques used for scientific visualization can also have an artistic side.

Keywords: fractals, cubic method, Julia programming language, basin of attraction

Procedia PDF Downloads 246
3383 The Implementation of Special Grammar Circle (Spegraci) as the Media Innovation for Blind People to Learn English Tenses

Authors: Aji Budi Rinekso, Revika Niza Artiyana, Lisa Widayanti

Abstract:

English is one of the international languages in the world. People use this language to communicate with each other in the international forums, international events or international organizations. As same as other languages, English has a rule which is called grammar. Grammar is the part of english which has a role as the language systems. In grammar, there are tenses which provide a time period system for past, present and future. Sometimes it is difficult for some English learner to remember all of the tenses completely. Especially for those with special needs or exceptional children with vision restrictiveness. The aims of this research are 1) To know the design of Special Grammar Circle (Spegraci) as the media for blind people to learn english grammar. 2) To know the work of Special Gramar Circle (Spegraci) as the media for blind people to learn english grammar. 3) To know the function of this device in increasing tenses ability for blind people. The method of this research is Research and Development which consists of several testing and revision of this device. The implementation of Special Grammar Circle (Spegraci) is to make blind people easily to learn the tenses. This device is easy to use. Users only roll this device and find out the tense formula and match to the name of the formula in braille. In addition, this device also enables to be used by normal people because normal written texts are also provided.

Keywords: blind people, media innovation, spegraci, tenses

Procedia PDF Downloads 286
3382 MONDO Neutron Tracker Characterisation by Means of Proton Therapeutical Beams and MonteCarlo Simulation Studies

Authors: G. Traini, V. Giacometti, R. Mirabelli, V. Patera, D. Pinci, A. Sarti, A. Sciubba, M. Marafini

Abstract:

The MONDO (MOnitor for Neutron Dose in hadrOntherapy) project aims a precise characterisation of the secondary fast and ultrafast neutrons produced in particle therapy treatments. The detector is composed of a matrix of scintillating fibres (250 um) readout by CMOS Digital-SPAD based sensors. Recoil protons from n-p elastic scattering are detected and used to track neutrons. A prototype was tested with proton beams (Trento Proton Therapy Centre): efficiency, light yield, and track-reconstruction capability were studied. The results of a MonteCarlo FLUKA simulation used to evaluated double scattering efficiency and expected backgrounds will be presented.

Keywords: secondary neutrons, particle therapy, tracking, elastic scattering

Procedia PDF Downloads 251
3381 A Mathematical Description of a Growing Cell Colony Based on the Mechanical Bidomain Model

Authors: Debabrata Auddya, Bradley J. Roth

Abstract:

The mechanical bidomain model is used to describe a colony of cells growing on a substrate. Analytical expressions are derived for the intracellular and extracellular displacements. Mechanotransduction events are driven by the difference between the displacements in the two spaces, corresponding to the force acting on integrins. The equation for the displacement consists of two terms: one proportional to the radius that is the same in the intracellular and extracellular spaces (the monodomain term) and one that is proportional to a modified Bessel function that is responsible for mechanotransduction (the bidomain term). The model predicts that mechanotransduction occurs within a few length constants of the colony’s edge, and an expression for the length constant contains the intracellular and extracellular shear moduli and the spring constant of the integrins coupling the two spaces. The model predictions are qualitatively consistent with experiments on human embryonic stem cell colonies, in which differentiation is localized near the edge.

Keywords: cell colony, integrin, mechanical bidomain model, stem cell, stress-strain, traction force

Procedia PDF Downloads 232
3380 An Event Relationship Extraction Method Incorporating Deep Feedback Recurrent Neural Network and Bidirectional Long Short-Term Memory

Authors: Yin Yuanling

Abstract:

A Deep Feedback Recurrent Neural Network (DFRNN) and Bidirectional Long Short-Term Memory (BiLSTM) are designed to address the problem of low accuracy of traditional relationship extraction models. This method combines a deep feedback-based recurrent neural network (DFRNN) with a bi-directional long short-term memory (BiLSTM) approach. The method combines DFRNN, which extracts local features of text based on deep feedback recurrent mechanism, BiLSTM, which better extracts global features of text, and Self-Attention, which extracts semantic information. Experiments show that the method achieves an F1 value of 76.69% on the CEC dataset, which is 0.0652 better than the BiLSTM+Self-ATT model, thus optimizing the performance of the deep learning method in the event relationship extraction task.

Keywords: event relations, deep learning, DFRNN models, bi-directional long and short-term memory networks

Procedia PDF Downloads 125
3379 High Performance Electrocardiogram Steganography Based on Fast Discrete Cosine Transform

Authors: Liang-Ta Cheng, Ching-Yu Yang

Abstract:

Based on fast discrete cosine transform (FDCT), the authors present a high capacity and high perceived quality method for electrocardiogram (ECG) signal. By using a simple adjusting policy to the 1-dimentional (1-D) DCT coefficients, a large volume of secret message can be effectively embedded in an ECG host signal and be successfully extracted at the intended receiver. Simulations confirmed that the resulting perceived quality is good, while the hiding capability of the proposed method significantly outperforms that of existing techniques. In addition, our proposed method has a certain degree of robustness. Since the computational complexity is low, it is feasible for our method being employed in real-time applications.

Keywords: data hiding, ECG steganography, fast discrete cosine transform, 1-D DCT bundle, real-time applications

Procedia PDF Downloads 183
3378 The Impact of Financial News and Press Freedom on Abnormal Returns around Earnings Announcements in Greater China

Authors: Yu-Chen Wei, Yang-Cheng Lu, I-Chi Lin

Abstract:

This study examines the impacts of news sentiment and press freedom on abnormal returns during the earnings announcement in greater China including the Shanghai, Shenzhen and Taiwan stock markets. The news sentiment ratio is calculated by using the content analysis of semantic orientation. The empirical results show that news released prior to the event date may decrease the cumulative abnormal returns prior to the earnings announcement regardless of whether it is released in China or Taiwan. By contrast, companies with optimistic financial news may increase the cumulative abnormal returns during the announcement date. Furthermore, the difference in terms of press freedom is considered in greater China to compare the impact of press freedom on abnormal returns. The findings show that, the freer the press is, the more negatively significant will be the impact of news on the abnormal returns, which means that the press freedom may decrease the ability of the news to impact the abnormal returns. The intuition is that investors may receive alternative news related to each company in the market with greater press freedom, which proves the efficiency of the market and reduces the possible excess returns.

Keywords: news, press freedom, Greater China, earnings announcement, abnormal returns

Procedia PDF Downloads 387
3377 Experiential Language Learning as a Tool for Effective Global Leadership

Authors: Christiane Dumont

Abstract:

This paper proposes to revisit foreign-language learning as a tool to increase motivation through advocacy and develop effective natural communication skills, which are critical leadership qualities. To this end, collaborative initiatives undertaken by advanced university students of French with local and international community partners will be reviewed. Close attention will be paid to the acquisition of intercultural skills, the reflective process, as well as the challenges and outcomes. Two international development projects conducted in Haiti will be highlighted, i.e., collaboration with a network of providers in the Haitian cultural heritage preservation and tourism sector (2014-15) and development of investigation and teacher training tools for a primary/secondary school in the Port-au-Prince area (current). The choice of community-service learning as a framework to teach French-as-a-second-language stemmed from the need to raise awareness against stereotypes and prejudice, which hinder the development of effective intercultural skills. This type of experiential education also proved very effective in identifying and preventing miscommunication caused by the lack of face-to-face interaction in our increasingly technology-mediated world. Learners experienced first-hand, the challenges and advantages of face-to-face communication, which, in turn, enhanced their motivation for developing effective intercultural skills. Vygotsky's and Kolb's theories, current research on service learning (Dwight, Eyler), action/project-based pedagogy (Beckett), and reflective learning (TSC Farrell), will provide useful background to analyze the benefits and challenges of community-service learning. The ultimate goal of this paper is to find out what makes experiential learning truly unique and transformative for both the learners and the community they wish to serve. It will demonstrate how enhanced motivation, community engagement, and clear, concise, and respectful communication impact and empower learners. The underlying hope is to help students in high-profile, and leading-edge industries become effective global leaders.

Keywords: experiential learning, intercultural communication, reflective learning, effective leadership, learner motivation

Procedia PDF Downloads 99
3376 Integration of Fuzzy Logic in the Representation of Knowledge: Application in the Building Domain

Authors: Hafida Bouarfa, Mohamed Abed

Abstract:

The main object of our work is the development and the validation of a system indicated Fuzzy Vulnerability. Fuzzy Vulnerability uses a fuzzy representation in order to tolerate the imprecision during the description of construction. At the the second phase, we evaluated the similarity between the vulnerability of a new construction and those of the whole of the historical cases. This similarity is evaluated on two levels: 1) individual similarity: bases on the fuzzy techniques of aggregation; 2) Global similarity: uses the increasing monotonous linguistic quantifiers (RIM) to combine the various individual similarities between two constructions. The third phase of the process of Fuzzy Vulnerability consists in using vulnerabilities of historical constructions narrowly similar to current construction to deduce its estimate vulnerability. We validated our system by using 50 cases. We evaluated the performances of Fuzzy Vulnerability on the basis of two basic criteria, the precision of the estimates and the tolerance of the imprecision along the process of estimation. The comparison was done with estimates made by tiresome and long models. The results are satisfactory.

Keywords: case based reasoning, fuzzy logic, fuzzy case based reasoning, seismic vulnerability

Procedia PDF Downloads 284
3375 Designing User Interfaces for Just in Time Enterprise Solution

Authors: Romi Dey

Abstract:

Introduction: One of the most important criteria for technology to sustain and grow is through it’s elaborate and intuitive design methodology and design thinking. Designing for enterprise applications that cater to Just in Time Technology is one of the most challenging and detailed processes any User Experience Designer would come across. Description: The basic principles of Design, when applied to tailor to these technologies, creates an immense challenge and that’s how a set of redefined and revised design principles that can be applied to designing any Just In Time manufacturing solution. Findings: The thorough process of understanding the end user, their existing pain points which they’ve faced in the real world, their responsibilities and expectations, the core needs and last but not the least the demands, creates havoc nurturing of the design methodologies for the Just in Time solutions. With respect to the business aspect, design and design principles play a strong role in any form of innovation. Conclusion: Innovation and knowledge about the latest technologies are the keywords in the manufacturing industry. It becomes crucial for the product development team to be precise in their understanding of the technology and being sure of end users expectation.

Keywords: design thinking, enterprise application, Just in Time, user experience design

Procedia PDF Downloads 158
3374 Phonetics and Phonological Investigation of Geminates and Gemination in Some Indic Languages

Authors: Hifzur Ansary

Abstract:

The aim and scope of the present research are to delve into the form of geminates and the process of gemination with special reference to Indic Languages. This work presents the results of a cross-linguistic investigation of word-medial geminate consonants. This study is a theoretical as well as experimental, that is, it is based not only on impressionistic data from Indic languages but also on an instrumental analysis of the data. The primary data have been collected from the native speakers. The secondary data have been collected from printed materials such as journals, grammar books and other published articles. The observations made in this study have been checked with a number of educated native speakers of Bangla and Telugu. The study focuses on geminates and gemination in Bangla (Indo-Aryan Language Family) and Telugu (Dravidian Language family) exhaustively. Thus this study also attempts to posit the valid geminates in Bangali and Telugu and provides an account of gemination in these languages. It also makes a comparison of singletons and geminated consonants. It describes the distribution of geminate phonemes and non-geminate phonemes of Bangla and Telugu. The present research would also investigate the vowel lengthening in Bangla with respect to gemination. The study also explains how gemination processes present in Indian Languages are transferred to Indian English.

Keywords: geminate consonant, singleton-geminate contrast, different types of assimilation, gemination derives from borrowed words

Procedia PDF Downloads 274
3373 Nonlinear Adaptive PID Control for a Semi-Batch Reactor Based on an RBF Network

Authors: Magdi. M. Nabi, Ding-Li Yu

Abstract:

Control of a semi-batch polymerization reactor using an adaptive radial basis function (RBF) neural network method is investigated in this paper. A neural network inverse model is used to estimate the valve position of the reactor; this method can identify the controlled system with the RBF neural network identifier. The weights of the adaptive PID controller are timely adjusted based on the identification of the plant and self-learning capability of RBFNN. A PID controller is used in the feedback control to regulate the actual temperature by compensating the neural network inverse model output. Simulation results show that the proposed control has strong adaptability, robustness and satisfactory control performance and the nonlinear system is achieved.

Keywords: Chylla-Haase polymerization reactor, RBF neural networks, feed-forward, feedback control

Procedia PDF Downloads 688
3372 ANN Modeling for Cadmium Biosorption from Potable Water Using a Packed-Bed Column Process

Authors: Dariush Jafari, Seyed Ali Jafari

Abstract:

The recommended limit for cadmium concentration in potable water is less than 0.005 mg/L. A continuous biosorption process using indigenous red seaweed, Gracilaria corticata, was performed to remove cadmium from the potable water. The process was conducted under fixed conditions and the breakthrough curves were achieved for three consecutive sorption-desorption cycles. A modeling based on Artificial Neural Network (ANN) was employed to fit the experimental breakthrough data. In addition, a simplified semi empirical model, Thomas, was employed for this purpose. It was found that ANN well described the experimental data (R2>0.99) while the Thomas prediction were a bit less successful with R2>0.97. The adjusted design parameters using the nonlinear form of Thomas model was in a good agreement with the experimentally obtained ones. The results approve the capability of ANN to predict the cadmium concentration in potable water.

Keywords: ANN, biosorption, cadmium, packed-bed, potable water

Procedia PDF Downloads 417
3371 Comprehensive Ultrasonography During Low-flow Bypass in Patients with Symptomatic Internal Carotid Artery (ICA) Occlusion

Authors: G. K. Guseynova, V. V. Krylov, L. T. Khamidova, N. A. Polunina, V. A. Lukyanchikov

Abstract:

The report presents complex ultrasound diagnostics in patients with symptomatic steno-occlusive lesions of extra- and intracranial branches of brachiocephalic arteries (BCA). The tasks and possibilities of ultrasound diagnostics at different stages of treatment of patients with symptomatic occlusion of internal carotid artery (ICA) are covered in detail; qualitative and quantitative characteristics of blood flow; parameters of the wall and lumen of the main arteries of the head; methods of ultrasound examination of indirect assessment of the functional status are presented. Special attention is paid to the description of indicators that are predictors of the consistency of formed extra-intracranial low-flow shunts, examples of functioning and failed anastomoses are analyzed.

Keywords: CBF, cerebral blood flow; CTA, external carotid artery; ICA, internal carotid artery; MCA, middle cerebral artery; MRA, magnetic resonance angiography; OEF, oxygen extraction fraction; TIA, transient ischaemic attack, ultrasound, low-flow bypass, anastomoses

Procedia PDF Downloads 24
3370 Literature Review: Adversarial Machine Learning Defense in Malware Detection

Authors: Leidy M. Aldana, Jorge E. Camargo

Abstract:

Adversarial Machine Learning has gained importance in recent years as Cybersecurity has gained too, especially malware, it has affected different entities and people in recent years. This paper shows a literature review about defense methods created to prevent adversarial machine learning attacks, firstable it shows an introduction about the context and the description of some terms, in the results section some of the attacks are described, focusing on detecting adversarial examples before coming to the machine learning algorithm and showing other categories that exist in defense. A method with five steps is proposed in the method section in order to define a way to make the literature review; in addition, this paper summarizes the contributions in this research field in the last seven years to identify research directions in this area. About the findings, the category with least quantity of challenges in defense is the Detection of adversarial examples being this one a viable research route with the adaptive approach in attack and defense.

Keywords: Malware, adversarial, machine learning, defense, attack

Procedia PDF Downloads 52
3369 Study of Frequency and Distribution of Skin Ionocytes in Caspian Sea Zander Larvae during Acclimation to Different Salinity

Authors: Mohaddeseh Ahmadnezhad, Shahrbano Oryan, Mahmoud Bahmani, Mohammadd Sayad Bourani

Abstract:

Changes in abundance and size of skin ionocytes were investigated in two larval stage of Caspian sea zander, Sander lucioperca, before and after yolk sac absorption, at 96h after transfer from fresh water (FW; <0.5‰) to 7‰ (estuary) and 12‰ (Caspian sea water=CW) salinity. Survival rate in the stage of after yolk sac absorption were more than larval pre-absorbed yolk sac in condition of salinity (p<0.05). Ionocyte abundance increased significantly in 7 and 12‰ salinity (p<0.05), but not about ionocyte size. The results of this study suggest that development of skin Ionocyte osmoregulatory function and osmoregulation capability of Caspian Sea zander larvae increased with growth of the larvae.

Keywords: Caspian Sea, larvae, Sander lucioperca, salinity, skin ionocyte

Procedia PDF Downloads 286
3368 Organization’s Ethics, Job Performance Satisfaction and Effects on Employees’ Engagement and Commitment

Authors: Anunya Thanasrisuebwong

Abstract:

This research paper aimed to find out how was the ethical climate in an organization and job performance satisfaction of employees affected employees’ engagement and commitment by using the case study of PTT Exploration and Production Public Company Limited, Thailand. The population of this research was 4,383 Thai employees of PTTEP, Thailand. From a total of 420 questionnaires sent out, 345 respondents replied. The statistics utilized was mean score and Multiple Regression Analysis. The findings revealed that the respondents had opinion towards ethical climate of their organization, job performance satisfaction and organization engagement and commitment at a high level. The test of hypothesis disclosed the determinant attributes of job performance satisfaction that affected the respondents’ overall level of organization engagement and commitment. The set of these determinant attributes consisted of employees’ responsibilities for duties, organization’s policies and practice, relationship with organization’s commanders, work security and stability, job description, career path and relationship with colleagues. These variables were able to predict the employees’ organization engagement and commitment at 50.6 percent.

Keywords: ethical climate in organization, job performance satisfaction, organization engagement, commitment

Procedia PDF Downloads 274
3367 Design of Personal Job Recommendation Framework on Smartphone Platform

Authors: Chayaporn Kaensar

Abstract:

Recently, Job Recommender Systems have gained much attention in industries since they solve the problem of information overload on the recruiting website. Therefore, we proposed Extended Personalized Job System that has the capability of providing the appropriate jobs for job seeker and recommending some suitable information for them using Data Mining Techniques and Dynamic User Profile. On the other hands, company can also interact to the system for publishing and updating job information. This system have emerged and supported various platforms such as web application and android mobile application. In this paper, User profiles, Implicit User Action, User Feedback, and Clustering Techniques in WEKA libraries have gained attention and implemented for this application. In additions, open source tools like Yii Web Application Framework, Bootstrap Front End Framework and Android Mobile Technology were also applied.

Keywords: recommendation, user profile, data mining, web and mobile technology

Procedia PDF Downloads 309
3366 Error Analysis in Academic Writing of EFL Learners: A Case Study for Undergraduate Students at Pathein University

Authors: Aye Pa Pa Myo

Abstract:

Writing in English is accounted as a complex process for English as a foreign language learners. Besides, committing errors in writing can be found as an inevitable part of language learners’ writing. Generally, academic writing is quite difficult for most of the students to manage for getting better scores. Students can commit common errors in their writings when they try to write academic writing. Error analysis deals with identifying and detecting the errors and also explains the reason for the occurrence of these errors. In this paper, the researcher has an attempt to examine the common errors of undergraduate students in their academic writings at Pathein University. The purpose of doing this research is to investigate the errors which students usually commit in academic writing and to find out the better ways for correcting these errors in EFL classrooms. In this research, fifty-third-year non-English specialization students attending Pathein University were selected as participants. This research took one month. It was conducted with a mixed methodology method. Two mini-tests were used as research tools. Data were collected with a quantitative research method. Findings from this research pointed that most of the students noticed their common errors after getting the necessary input, and they became more decreased committing these errors after taking mini-test; hence, all findings will be supportive for further researches related to error analysis in academic writing.

Keywords: academic writing, error analysis, EFL learners, mini-tests, mixed methodology

Procedia PDF Downloads 124
3365 Investigating Iraqi EFL Undergraduates' Performance in the Production of Number Forms in English

Authors: Adnan Z. Mkhelif

Abstract:

The production of number forms in English tends to be problematic for Iraqi learners of English as a foreign language (EFL), even at the undergraduate level. To help better understand and consequently address this problem, it is important to identify its sources. This study aims at: (1) statistically analysing Iraqi EFL undergraduates' performance in the production of number forms in English; (2) classifying learners' errors in terms of their possible major causes; and (3) outlining some pedagogical recommendations relevant to the teaching of number forms in English. It is hypothesized in this study that (1) Iraqi EFL undergraduates still face problems in the production of number forms in English and (2) errors pertaining to the context of learning are more numerous than those attributable to the other possible causes. After reviewing the literature available on the topic, a written test comprising 50 items has been constructed and administered to a randomly chosen sample of 50 second-year college students from the Department of English, College of Education, Wasit University. The findings of the study showed that Iraqi EFL undergraduates still face problems in the production of number forms in English and that the possible major sources of learners’ errors can be arranged hierarchically in terms of the percentages of errors to which they can be ascribed as follows: (1) context of learning (50%), (2) intralingual transfer (37%), and (3) interlingual transfer (13%). It is hoped that the implications of the study findings will be beneficial to researchers, syllabus designers, as well as teachers of English as a foreign/second language.

Keywords: L2 number forms, L2 vocabulary learning, productive knowledge, proficiency

Procedia PDF Downloads 131
3364 A New Authenticable Steganographic Method via the Use of Numeric Data on Public Websites

Authors: Che-Wei Lee, Bay-Erl Lai

Abstract:

A new steganographic method via the use of numeric data on public websites with self-authentication capability is proposed. The proposed technique transforms a secret message into partial shares by Shamir’s (k, n)-threshold secret sharing scheme with n = k + 1. The generated k+1 partial shares then are embedded into the selected numeric items in a website as if they are part of the website’s numeric content. Afterward, a receiver links to the website and extracts every k shares among the k+1 ones from the stego-numeric-content to compute k+1 copies of the secret, and the phenomenon of value consistency of the computed k+1 copies is taken as an evidence to determine whether the extracted message is authentic or not, attaining the goal of self-authentication of the extracted secret message. Experimental results and discussions are provided to show the feasibility and effectiveness of the proposed method.

Keywords: steganography, data hiding, secret authentication, secret sharing

Procedia PDF Downloads 231