Search results for: six party talk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 767

Search results for: six party talk

527 Learning Grammars for Detection of Disaster-Related Micro Events

Authors: Josef Steinberger, Vanni Zavarella, Hristo Tanev

Abstract:

Natural disasters cause tens of thousands of victims and massive material damages. We refer to all those events caused by natural disasters, such as damage on people, infrastructure, vehicles, services and resource supply, as micro events. This paper addresses the problem of micro - event detection in online media sources. We present a natural language grammar learning algorithm and apply it to online news. The algorithm in question is based on distributional clustering and detection of word collocations. We also explore the extraction of micro-events from social media and describe a Twitter mining robot, who uses combinations of keywords to detect tweets which talk about effects of disasters.

Keywords: online news, natural language processing, machine learning, event extraction, crisis computing, disaster effects, Twitter

Procedia PDF Downloads 478
526 Implant Guided Surgery and Immediate Loading

Authors: Omid Tavakol, Mahnaz Gholami

Abstract:

Introduction : In this oral presentation the main goal is discussing immediate loading in dental implants , from treatment planning and surgical guide designing to delivery , follow up and occlusal consideration . Methods and materials : first of all systematic reviews about immediate loading will be considered . besides , a comparison will be made between immediate loading and conventional loading in terms of success rate and complications . After that different methods , prosthetic options and materials best used in immediate loading will be explained. Particularly multi unit abutments and their mechanism of function will be explained .Digital impressions and designing the temporaries is the next topic we are to explicate .Next issue is the differences between single unit , multiple unit and full arch implantation in immediate loading .Following we are going to describe methods for tissue engineering and papilla formation after extraction . Last slides are about a full mouth rehabilitation via immediate loading technique from surgical designing to follow up .At the end we would talk about potential complications , how to prevent from occurrence and what to do if we face up with .

Keywords: guided surgery, digital implantology, immediate loading, digital dentistry

Procedia PDF Downloads 44
525 Hyper Presidentialism and First Year of the Turkish Type of Presidentialism

Authors: Ahmet Ekinci

Abstract:

The new government system of Turkey can be described as hyper-presidentialism, this is because the president then becomes the arbiter of all powers. In another word, the power to enact decrees, appoint bureaucrats and judicial officials into offices, and the power to dissolve a parliament belongs solely to the president. As a strong presidency fuse with a disciplined party system as well as concurrent elections and 10 percent electoral threshold, the president possibly poses a great danger to the separation of powers. Additionally, with regards to the presidential term, the president constitutionally holds the power to be elected only for two terms in Turkey. However, Erdoğan and his supporters believe that the 2017 constitutional amendments that changed the system of government have reset the agenda. Thus, the 2017 amendments offered Erdoğan a secret opportunity to join the presidential election race for a third and even a fourth term.

Keywords: hyper-presidentialism, Turkish presidentialism, presidential decree, concurrent election, Erdogan’s term limit, Turkish government system

Procedia PDF Downloads 139
524 [Keynote Talk]: Formal Specification and Description Language and Message Sequence Chart to Model and Validate Session Initiation Protocol Services

Authors: Sa’ed Abed, Mohammad H. Al Shayeji, Ovais Ahmed, Sahel Alouneh

Abstract:

Session Initiation Protocol (SIP) is a signaling layer protocol for building, adjusting and ending sessions among participants including Internet conferences, telephone calls and multimedia distribution. SIP facilitates user movement by proxying and forwarding requests to the present location of the user. In this paper, we provide a formal Specification and Description Language (SDL) and Message Sequence Chart (MSC) to model and define the Internet Engineering Task Force (IETF) SIP protocol and its sample services resulted from informal SIP specification. We create an “Abstract User Interface” using case analysis so that can be applied to identify SIP services more explicitly. The issued sample SIP features are then used as case scenarios; they are revised in MSCs format and validated to their corresponding SDL models.

Keywords: modeling, MSC, SDL, SIP, validating

Procedia PDF Downloads 210
523 Leveraging Reasoning through Discourse: A Case Study in Secondary Mathematics Classrooms

Authors: Cory A. Bennett

Abstract:

Teaching and learning through the use of discourse support students’ conceptual understanding by attending to key concepts and relationships. One discourse structure used in primary classrooms is number talks wherein students mentally calculate, discuss, and reason about the appropriateness and efficiency of their strategies. In the secondary mathematics classroom, the mathematics understudy does not often lend itself to mental calculations yet learning to reason, and articulate reasoning, is central to learning mathematics. This qualitative case study discusses how one secondary school in the Middle East adapted the number talk protocol for secondary mathematics classrooms. Several challenges in implementing ‘reasoning talks’ became apparent including shifting current discourse protocols and practices to a more student-centric model, accurately recording and probing student thinking, and specifically attending to reasoning rather than computations.

Keywords: discourse, reasoning, secondary mathematics, teacher development

Procedia PDF Downloads 187
522 Time Travel Testing: A Mechanism for Improving Renewal Experience

Authors: Aritra Majumdar

Abstract:

While organizations strive to expand their new customer base, retaining existing relationships is a key aspect of improving overall profitability and also showcasing how successful an organization is in holding on to its customers. It is an experimentally proven fact that the lion’s share of profit always comes from existing customers. Hence seamless management of renewal journeys across different channels goes a long way in improving trust in the brand. From a quality assurance standpoint, time travel testing provides an approach to both business and technology teams to enhance the customer experience when they look to extend their partnership with the organization for a defined phase of time. This whitepaper will focus on key pillars of time travel testing: time travel planning, time travel data preparation, and enterprise automation. Along with that, it will call out some of the best practices and common accelerator implementation ideas which are generic across verticals like healthcare, insurance, etc. In this abstract document, a high-level snapshot of these pillars will be provided. Time Travel Planning: The first step of setting up a time travel testing roadmap is appropriate planning. Planning will include identifying the impacted systems that need to be time traveled backward or forward depending on the business requirement, aligning time travel with other releases, frequency of time travel testing, preparedness for handling renewal issues in production after time travel testing is done and most importantly planning for test automation testing during time travel testing. Time Travel Data Preparation: One of the most complex areas in time travel testing is test data coverage. Aligning test data to cover required customer segments and narrowing it down to multiple offer sequencing based on defined parameters are keys for successful time travel testing. Another aspect is the availability of sufficient data for similar combinations to support activities like defect retesting, regression testing, post-production testing (if required), etc. This section will talk about the necessary steps for suitable data coverage and sufficient data availability from a time travel testing perspective. Enterprise Automation: Time travel testing is never restricted to a single application. The workflow needs to be validated in the downstream applications to ensure consistency across the board. Along with that, the correctness of offers across different digital channels needs to be checked in order to ensure a smooth customer experience. This section will talk about the focus areas of enterprise automation and how automation testing can be leveraged to improve the overall quality without compromising on the project schedule. Along with the above-mentioned items, the white paper will elaborate on the best practices that need to be followed during time travel testing and some ideas pertaining to accelerator implementation. To sum it up, this paper will be written based on the real-time experience author had on time travel testing. While actual customer names and program-related details will not be disclosed, the paper will highlight the key learnings which will help other teams to implement time travel testing successfully.

Keywords: time travel planning, time travel data preparation, enterprise automation, best practices, accelerator implementation ideas

Procedia PDF Downloads 159
521 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 325
520 Forecasting for Financial Stock Returns Using a Quantile Function Model

Authors: Yuzhi Cai

Abstract:

In this paper, we introduce a newly developed quantile function model that can be used for estimating conditional distributions of financial returns and for obtaining multi-step ahead out-of-sample predictive distributions of financial returns. Since we forecast the whole conditional distributions, any predictive quantity of interest about the future financial returns can be obtained simply as a by-product of the method. We also show an application of the model to the daily closing prices of Dow Jones Industrial Average (DJIA) series over the period from 2 January 2004 - 8 October 2010. We obtained the predictive distributions up to 15 days ahead for the DJIA returns, which were further compared with the actually observed returns and those predicted from an AR-GARCH model. The results show that the new model can capture the main features of financial returns and provide a better fitted model together with improved mean forecasts compared with conventional methods. We hope this talk will help audience to see that this new model has the potential to be very useful in practice.

Keywords: DJIA, financial returns, predictive distribution, quantile function model

Procedia PDF Downloads 367
519 The Competitive Newsvendor Game with Overestimated Demand

Authors: Chengli Liu, C. K. M. Lee

Abstract:

The tradition competitive newsvendor game assumes decision makers are rational. However, there are behavioral biases when people make decisions, such as loss aversion, mental accounting and overconfidence. Overestimation of a subject’s own performance is one type of overconfidence. The objective of this research is to analyze the impact of the overestimated demand in the newsvendor competitive game with two players. This study builds a competitive newsvendor game model where newsvendors have private information of their demands, which is overestimated. At the same time, demands of each newsvendor forecasted by a third party institution are available. This research shows that the overestimation leads to demand steal effect, which reduces the competitor’s order quantity. However, the overall supply of the product increases due to overestimation. This study illustrates the boundary condition for the overestimated newsvendor to have the equilibrium order drop due to the demand steal effect from the other newsvendor. A newsvendor who has higher critical fractile will see its equilibrium order decrease with the drop of estimation level from the other newsvendor.

Keywords: bias, competing newsvendor, Nash equilibrium, overestimation

Procedia PDF Downloads 261
518 Highly Linear and Low Noise AMR Sensor Using Closed Loop and Signal-Chopped Architecture

Authors: N. Hadjigeorgiou, A. C. Tsalikidou, E. Hristoforou, P. P. Sotiriadis

Abstract:

During the last few decades, the continuously increasing demand for accurate and reliable magnetic measurements has paved the way for the development of different types of magnetic sensing systems as well as different measurement techniques. Sensor sensitivity and linearity, signal-to-noise ratio, measurement range, cross-talk between sensors in multi-sensor applications are only some of the aspects that have been examined in the past. In this paper, a fully analog closed loop system in order to optimize the performance of AMR sensors has been developed. The operation of the proposed system has been tested using a Helmholtz coil calibration setup in order to control both the amplitude and direction of magnetic field in the vicinity of the AMR sensor. Experimental testing indicated that improved linearity of sensor response, as well as low noise levels can be achieved, when the system is employed.

Keywords: AMR sensor, closed loop, memory effects, chopper, linearity improvement, sensitivity improvement, magnetic noise, electronic noise

Procedia PDF Downloads 362
517 Contribution of Culture on Divorce Prevention in Indonesia on "New Normal" Era: Study at Batak, Malay and Minangkabau Tribes

Authors: Ikhwanuddin Harahap

Abstract:

This paper investigates the contribution of culture to divorce prevention in Indonesia in the "new normal" era, especially in Batak, Malay and Minangkabau tribes. This research is qualitative with an anthropological approach. Data were collected by interview and observation techniques. Checking the validity of the data is done by triangulation technique, and the data is analyzed by content analysis. The results of the research showed that culture has a strategic role in preventing divorce. In Batak, Malay and Minangkabau-as, major ethnic groups in Indonesian cultures, have a set of norms and dogmas conveyed at the wedding party, namely “marriage must be eternal and if divorced by death.” In addition, cultural figures actively become arbiters in resolving family conflicts, such as Harajaon in Batak, Datuk in Malay and Mamak in Minangkabau. Cultural dogmas and cultural figures play a very important role in preventing divorce.

Keywords: culture, divorce, prevention, contribution, new normal, era

Procedia PDF Downloads 168
516 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 96
515 [Keynote Talk]: Determination of the Quality of the Machined Surface Using Fuzzy Logic

Authors: Dejan Tanikić, Jelena Đoković, Saša Kalinović, Miodrag Manić, Saša Ranđelović

Abstract:

This paper deals with measuring and modelling of the quality of the machined surface of the metal machining process. The average surface roughness (Ra) which represents the quality of the machined part was measured during the dry turning of the AISI 4140 steel. A large number of factors with the unknown relations among them influences this parameter, and that is why mathematical modelling is extremely complicated. Different values of cutting speed, feed rate, depth of cut (cutting regime) and workpiece hardness causes different surface roughness values. Modelling with soft computing techniques may be very useful in such cases. This paper presents the usage of the fuzzy logic-based system for determining metal machining process parameter in order to find the proper values of cutting regimes.

Keywords: fuzzy logic, metal machining, process modeling, surface roughness

Procedia PDF Downloads 159
514 Evaluation and Selection of SaaS Product Based on User Preferences

Authors: Boussoualim Nacira, Aklouf Youcef

Abstract:

Software as a Service (SaaS) is a software delivery paradigm in which the product is not installed on-premise, but it is available on Internet and Web. The customers do not pay to possess the software itself but rather to use it. This concept of pay per use is very attractive. Hence, we see increasing number of organizations adopting SaaS. However, each customer is unique, which leads to a very large variation in the requirements off the software. As several suppliers propose SaaS products, the choice of this latter becomes a major issue. When multiple criteria are involved in decision making, we talk about a problem of «Multi-Criteria Decision-Making» (MCDM). Therefore, this paper presents a method to help customers to choose a better SaaS product satisfying most of their conditions and alternatives. Also, we know that a good method of adaptive selection should be based on the correct definition of the different parameters of choice. This is why we started by extraction and analysis the various parameters involved in the process of the selection of a SaaS application.

Keywords: cloud computing, business operation, Multi-Criteria Decision-Making (MCDM), Software as a Service (SaaS)

Procedia PDF Downloads 483
513 Optimization of Roster Construction In Sports

Authors: Elijah Cavan

Abstract:

In Major League Sports (MLB, NBA, NHL, NFL), it is the Front Office Staff (FOS) who make decisions about who plays for their respective team. The FOS bear the brunt of the responsibility for acquiring players through drafting, trading and signing players in free agency while typically contesting with maximum roster salary constraints. The players themselves are volatile assets of these teams- their value fluctuates with age and performance. A simple comparison can be made when viewing players as assets. The problem here is similar to that of optimizing your investment portfolio. The The goal is ultimately to maximize your periodic returns while tolerating a fixed risk (degree of uncertainty/ potential loss). Each franchise may value assets differently, and some may only tolerate lower risk levels- these are examples of factors that introduce additional constraints into the model. In this talk, we will detail the mathematical formulation of this problem as a constrained optimization problem- which can be solved with classical machine learning methods but is also well posed as a problem to be solved on quantum computers

Keywords: optimization, financial mathematics, sports analytics, simulated annealing

Procedia PDF Downloads 122
512 Early Stage Suicide Ideation Detection Using Supervised Machine Learning and Neural Network Classifier

Authors: Devendra Kr Tayal, Vrinda Gupta, Aastha Bansal, Khushi Singh, Sristi Sharma, Hunny Gaur

Abstract:

In today's world, suicide is a serious problem. In order to save lives, early suicide attempt detection and prevention should be addressed. A good number of at-risk people utilize social media platforms to talk about their issues or find knowledge on related chores. Twitter and Reddit are two of the most common platforms that are used for expressing oneself. Extensive research has already been done in this field. Through supervised classification techniques like Nave Bayes, Bernoulli Nave Bayes, and Multiple Layer Perceptron on a Reddit dataset, we demonstrate the early recognition of suicidal ideation. We also performed comparative analysis on these approaches and used accuracy, recall score, F1 score, and precision score for analysis.

Keywords: machine learning, suicide ideation detection, supervised classification, natural language processing

Procedia PDF Downloads 90
511 Transformative Economic Policies in India: A Political Economy Analysis of IMF Influence, Sectoral Shifts, and Political Transitions

Authors: Vrajesh Rawal

Abstract:

India's economic landscape has witnessed significant transformations over the past decades, characterized by shifts from agrarian to service-oriented economies. Recently, there has been a growing emphasis on transitioning towards a manufacturing-led growth model driven by factors such as demographic changes, technological advancements, and evolving global trade dynamics. These changes reflect broader efforts to enhance industrialization, boost employment opportunities, and diversify the economic base beyond traditional sectors. Within this context, this research focuses on understanding the specific drivers and dynamics behind India's shift from a predominantly service-based economy to one centered on manufacturing. It seeks to explore how political ideologies influence economic policies and shape sectoral priorities, with a particular focus on contrasting approaches between the Indian National Congress (INC) and the Bharatiya Janata Party (BJP). Additionally, the study evaluates the alignment of IMF policy recommendations with India's economic goals and priorities within the theoretical frameworks of neoliberalism and political economy theory. Despite the extensive literature on India's economic reforms and political economy, there remains a gap in understanding how political ideology influences sectoral shifts and economic policy outcomes, particularly in the context of IMF recommendations. Existing studies often focus narrowly on either political ideologies or economic reforms without fully integrating both perspectives. This research aims to bridge this gap by providing a comprehensive analysis that integrates political economy theories with empirical evidence from political speeches, government documents, and IMF reports. Through qualitative content analysis of speeches by political leaders, document analysis of key governmental documents, and scrutiny of party manifestos, this research demonstrates how political ideologies translate into distinct economic strategies and developmental agendas. It highlights the extent to which IMF policy prescriptions align with India's economic objectives and how these interactions shape broader socio-economic outcomes. The theoretical framework of neoliberalism and political economy theory provides a lens to interpret these findings, offering insights into the complex interplay between economic policies, political ideologies, and institutional frameworks in India. The findings of this study are expected to provide valuable insights for policymakers, researchers, and practitioners involved in economic governance and development planning in India. By understanding the factors driving sectoral shifts and the influence of political ideologies on economic policies, policymakers can make informed decisions to foster sustainable economic growth and development. Implementation of these insights could contribute to refining policy frameworks, enhancing alignment with national development priorities, and optimizing engagement with international financial institutions like the IMF to better meet India's socio-economic challenges and opportunities in the evolving global context.

Keywords: political economy, international politics, social science, policy analysis

Procedia PDF Downloads 32
510 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network

Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad

Abstract:

Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.

Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway

Procedia PDF Downloads 484
509 The Museum of Museums: A Mobile Augmented Reality Application

Authors: Qian Jin

Abstract:

Museums have been using interactive technology to spark visitor interest and improve understanding. These technologies can play a crucial role in helping visitors understand more about an exhibition site by using multimedia to provide information. Google Arts and Culture and Smartify are two very successful digital heritage products. They used mobile augmented reality to visualise the museum's 3D models and heritage images but did not include 3D models of the collection and audio information. In this research, service-oriented mobile augmented reality application was developed for users to access collections from multiple museums(including V and A, the British Museum, and British Library). The third-party API (Application Programming Interface) is requested to collect metadata (including images, 3D models, videos, and text) of three museums' collections. The acquired content is then visualized in AR environments. This product will help users who cannot visit the museum offline due to various reasons (inconvenience of transportation, physical disability, time schedule).

Keywords: digital heritage, argument reality, museum, flutter, ARcore

Procedia PDF Downloads 78
508 Sensor Data Analysis for a Large Mining Major

Authors: Sudipto Shanker Dasgupta

Abstract:

One of the largest mining companies wanted to look at health analytics for their driverless trucks. These trucks were the key to their supply chain logistics. The automated trucks had multi-level sub-assemblies which would send out sensor information. The use case that was worked on was to capture the sensor signal from the truck subcomponents and analyze the health of the trucks from repair and replacement purview. Open source software was used to stream the data into a clustered Hadoop setup in Amazon Web Services cloud and Apache Spark SQL was used to analyze the data. All of this was achieved through a 10 node amazon 32 core, 64 GB RAM setup real-time analytics was achieved on ‘300 million records’. To check the scalability of the system, the cluster was increased to 100 node setup. This talk will highlight how Open Source software was used to achieve the above use case and the insights on the high data throughput on a cloud set up.

Keywords: streaming analytics, data science, big data, Hadoop, high throughput, sensor data

Procedia PDF Downloads 404
507 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 684
506 [Keynote Talk]: Thermal Performance of Common Building Insulation Materials: Operating Temperature and Moisture Effect

Authors: Maatouk Khoukhi

Abstract:

An accurate prediction of the heat transfer through the envelope components of building is required to achieve an accurate cooling/heating load calculation which leads to precise sizing of the hvac equipment. This also depends on the accuracy of the thermal conductivity of the building insulation material. The proper use of thermal insulation in buildings (k-value) contribute significantly to reducing the HVAC size and consequently the annual energy cost. The first part of this paper presents an overview of building thermal insulation and their applications. The second part presents some results related to the change of the polystyrene insulation thermal conductivity with the change of the operating temperature and the moisture. Best-fit linear relationship of the k-value in term of the operating temperatures and different percentage of moisture content by weight has been established. The thermal conductivity of the polystyrene insulation material increases with the increase of both operating temperature and humidity content.

Keywords: building insulation material, moisture content, operating temperature, thermal conductivity

Procedia PDF Downloads 322
505 A Comparative Evaluation of Finite Difference Methods for the Extended Boussinesq Equations and Application to Tsunamis Modelling

Authors: Aurore Cauquis, Philippe Heinrich, Mario Ricchiuto, Audrey Gailler

Abstract:

In this talk, we look for an accurate time scheme to model the propagation of waves. Several numerical schemes have been developed to solve the extended weakly nonlinear weakly dispersive Boussinesq Equations. The temporal schemes used are two Lax-Wendroff schemes, second or third order accurate, two Runge-Kutta schemes of second and third order and a simplified third order accurate Lax-Wendroff scheme. Spatial derivatives are evaluated with fourth order accuracy. The numerical model is applied to two monodimensional benchmarks on a flat bottom. It is also applied to the simulation of the Algerian tsunami generated by a Mw=6 seism on the 18th March 2021. The tsunami propagation was highly dispersive and propagated across the Mediterranean Sea. We study here the effects of the order of temporal discretization on the accuracy of the results and on the time of computation.

Keywords: numerical analysis, tsunami propagation, water wave, boussinesq equations

Procedia PDF Downloads 242
504 Fighting for Equality in Early Buddhism

Authors: Kenneth Lee

Abstract:

During Buddha’s time in the 5th century BCE, the Indian society was organized by a social stratification system called “the caste system” (Skt. varna), which still exists today. The origination of the caste system can be traced back to 1500 BCE within the ancient Vedic texts of the Aryans, the Indo-European nomadic people who migrated and settled in the Indus Valley region. However, the four-tiered hierarchical nature of the caste system created inequality, privilege, and discrimination based on hereditary transmission. After renouncing his royal status as a prince, Siddhartha Gautama spent six years in the forest, practiced austerities, mastered meditation, and eventually realized enlightenment. Thereupon, now referred to as “Shakyamuni Buddha” or “sage from the tribe of Shakya who has become awake,” the Buddha founded the Sangha, a community of monks, nuns, and lay followers, where everyone was equal and treated equally. After providing a brief overview of Buddha’s time, this talk will examine Buddha’s Dharma or teachings on equality and his creation of the Sangha as “society within a society, which had a dissolving effect on society.

Keywords: equality, women, buddhism, discrimination

Procedia PDF Downloads 112
503 Islam-Oriented Movements' Recruiting Strategies in Morocco

Authors: Driss Bouyahya

Abstract:

During the late 1960s, Islam-oriented social movements have encroached to reach the Moroccan public spheres and mobilize huge waves of people from different walks of life under the banners of a rhetoric that resonates with the Muslim way of life away from Modernity and globalization tenets. In this respect, the present study investigates and explores some of the ways utilized by the Movement for Unity and Reform in Morocco as an Islam-oriented movement to recruit students massively at universities. The significance of this study lies in demystifying the recruitment strategies and mechanisms, considered essential for the Islam-oriented social movements to mobilize. This research paper uses a quantitative method to collect and analyze data through two different structured questionnaires. One of the major findings is that this Islam-oriented movement uses different techniques to recruit students, namely social networks, its websites and You-tube as three main modern and sophisticated means of communication. In a nutshell, this paper´s findings fill some of the gaps in the literature in regard to Islam-oriented movements ‘mobilization strategies.

Keywords: changing, ideology, Islam, party

Procedia PDF Downloads 220
502 Flexible and Integrated Transport System in India

Authors: Aayushi Patidar, Nishant Parihar

Abstract:

One of the principal causes of failure in existing vehicle brokerage solutions is that they require the introduction of a single trusted third party to whom transport offers and requirements are sent, and which solves the scheduling problem. Advances in planning and scheduling could be utilized to address the scalability issues inherent here, but such refinements do not address the key need to decentralize decision-making. This is not to say that matchmaking of potential transport suppliers to consumers is not essential, but information from such a service should inform rather than determining the transport options for customers. The approach that is proposed, is the use of intelligent commuters that act within the system and to identify options open to users, weighing the evidence for desirability of each option given a model of the user’s priorities, and to drive dialogue among commuters in aiding users to solve their individual (or collective) transport goals. Existing research in commuter support for transport resource management has typically been focused on the provider. Our vision is to explore both the efficient use of limited transport resources and also to support the passengers in the transportation flexibility & integration among various modes in India.

Keywords: flexibility, integration, service design, technology

Procedia PDF Downloads 352
501 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources

Authors: Leandro Moura da Silva

Abstract:

The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.

Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA

Procedia PDF Downloads 501
500 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 126
499 Internal Capital Market Efficiency Study Based on Improved Cash Flow Sensitivity Coefficient - Take Tomorrow Group as an Example

Authors: Peng Lu, Liu Ting

Abstract:

Because of the difficulty of financing from the external capital market, the reorganization and merger of private enterprises have formed a family group, seeking the help of the internal capital market to alleviate the capital demand. However, the inefficiency of the internal capital market can damage the effect it should have played, and even hinder the development of enterprises. This paper takes the "Tomorrow Group" as the research object to carry on the case analysis. After using the improved cash flow sensitivity coefficient to measure the efficiency of the internal capital market of Tomorrow Group, the inefficiency phenomenon is found. Then the analysis reveals that the reasons for its inefficiency include that the pyramidal equity structure is conducive to control, the separation of cash flow rights and control rights, the concentration of equity leads to poor balance, the abandonment of real industries and information asymmetry.

Keywords: tomorrow group, internal capital market, related-party transactions, Baotou tomorrow technology Co., LTD

Procedia PDF Downloads 136
498 A Qualitative Study of the Efficacy of Teaching for Conceptual Understanding to Enhance Confidence and Engagement in Early Mathematics

Authors: Nigel P. Coutts, Stellina Z. Sim

Abstract:

Research suggests that the pedagogy we utilize when teaching mathematics contributes to a negative attitude towards the discipline. Worried by this, we have explored teaching mathematics for understanding, fluency, and confidence. We investigated strategies to engage students with the beauty of mathematics, moving them beyond mimicry and memorization. The result is an integrated pedagogy and curriculum arrangement which combines concept-based mathematics with Number Talks, Visible Thinking Routines, and Teaching for Understanding. Our qualitative research shows that students self-report greater self-confidence and heightened engagement with mathematical thinking. Teacher reflections on student learning echo this finding. As a result of this, we advocate for teacher training in the implementation of a concept-based curriculum supplemented with Number Talk strategies.

Keywords: mathematical thinking, teaching for understanding, student confidence, concept-based learning, engagement

Procedia PDF Downloads 154