Search results for: user satisfaction factor
6031 A Geometric Based Hybrid Approach for Facial Feature Localization
Authors: Priya Saha, Sourav Dey Roy Jr., Debotosh Bhattacharjee, Mita Nasipuri, Barin Kumar De, Mrinal Kanti Bhowmik
Abstract:
Biometric face recognition technology (FRT) has gained a lot of attention due to its extensive variety of applications in both security and non-security perspectives. It has come into view to provide a secure solution in identification and verification of person identity. Although other biometric based methods like fingerprint scans, iris scans are available, FRT is verified as an efficient technology for its user-friendliness and contact freeness. Accurate facial feature localization plays an important role for many facial analysis applications including biometrics and emotion recognition. But, there are certain factors, which make facial feature localization a challenging task. On human face, expressions can be seen from the subtle movements of facial muscles and influenced by internal emotional states. These non-rigid facial movements cause noticeable alterations in locations of facial landmarks, their usual shapes, which sometimes create occlusions in facial feature areas making face recognition as a difficult problem. The paper proposes a new hybrid based technique for automatic landmark detection in both neutral and expressive frontal and near frontal face images. The method uses the concept of thresholding, sequential searching and other image processing techniques for locating the landmark points on the face. Also, a Graphical User Interface (GUI) based software is designed that could automatically detect 16 landmark points around eyes, nose and mouth that are mostly affected by the changes in facial muscles. The proposed system has been tested on widely used JAFFE and Cohn Kanade database. Also, the system is tested on DeitY-TU face database which is created in the Biometrics Laboratory of Tripura University under the research project funded by Department of Electronics & Information Technology, Govt. of India. The performance of the proposed method has been done in terms of error measure and accuracy. The method has detection rate of 98.82% on JAFFE database, 91.27% on Cohn Kanade database and 93.05% on DeitY-TU database. Also, we have done comparative study of our proposed method with other techniques developed by other researchers. This paper will put into focus emotion-oriented systems through AU detection in future based on the located features.Keywords: biometrics, face recognition, facial landmarks, image processing
Procedia PDF Downloads 4126030 Hull Detection from Handwritten Digit Image
Authors: Sriraman Kothuri, Komal Teja Mattupalli
Abstract:
In this paper we proposed a novel algorithm for recognizing hulls in a hand written digits. This is an extension to the work on “Digit Recognition Using Freeman Chain code”. In order to find out the hulls in a user given digit it is necessary to follow three steps. Those are pre-processing, Boundary Extraction and at last apply the Hull Detection system in a way to attain the better results. The detection of Hull Regions is mainly intended to increase the machine learning capability in detection of characters or digits. This can also extend this in order to get the hull regions and their intensities in Black Holes in Space Exploration.Keywords: chain code, machine learning, hull regions, hull recognition system, SASK algorithm
Procedia PDF Downloads 4006029 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 4326028 China’s Hotel m-Bookers’ Perceptions of their Booking Experiences
Authors: Weiqi Xia
Abstract:
We assess the perceptions of China’s hotel m-bookers using the E-SERVQUAL model and technology affordance assessment metrics. The data analysis provides insight into Chinese hotel m-bookers’ perceptions of information quality items, system quality items, and functional quality items. Respondents’ perceived value of such items is greatly enhanced via mini-program support and self-service innovation, which are predicted to be of increasing importance in the future. The findings of this study help close the gap between hotel operators’ understanding and customers’ perceptions. Our findings may also provide valuable insights into the functioning of China’s hotel industry.Keywords: mobile hotel booking, hotel m-bookers, user perception, China’s WeChat mini program, hotel booking apps.
Procedia PDF Downloads 446027 Unconventional Calculus Spreadsheet Functions
Authors: Chahid K. Ghaddar
Abstract:
The spreadsheet engine is exploited via a non-conventional mechanism to enable novel worksheet solver functions for computational calculus. The solver functions bypass inherent restrictions on built-in math and user defined functions by taking variable formulas as a new type of argument while retaining purity and recursion properties. The enabling mechanism permits integration of numerical algorithms into worksheet functions for solving virtually any computational problem that can be modelled by formulas and variables. Several examples are presented for computing integrals, derivatives, and systems of deferential-algebraic equations. Incorporation of the worksheet solver functions with the ubiquitous spreadsheet extend the utility of the latter as a powerful tool for computational mathematics.Keywords: calculus, differential algebraic equations, solvers, spreadsheet
Procedia PDF Downloads 3606026 Improvement of Visual Acuity in Patient Undergoing Occlusion Therapy
Authors: Rajib Husain, Mezbah Uddin, Mohammad Shamsal Islam, Rabeya Siddiquee
Abstract:
Purpose: To determine the improvement of visual acuity in patients undergoing occlusion therapy. Methods: This was a prospective hospital-based study of newly diagnosed of amblyopia seen at the pediatric clinic of Chittagong Eye Infirmary & Training Complex. There were 32 refractive amblyopia subjects were examined & questionnaire was piloted. Included were all patients diagnosed with refractive amblyopia between 5 to 8 years, without previous amblyopia treatment, and whose parents were interested to participate in the study. Patients diagnosed with strabismic amblyopia were excluded. Patients were first corrected with the best correction for a month. When the VA in the amblyopic eye did not improve over a month, then occlusion treatment was started. Occlusion was done daily for 6-8 h together with vision therapy. The occlusion was carried out for three months. Results: Out of study 32 children, 31 of them have a good compliance of amblyopic treatment whereas one child has poor compliance. About 6% Children have amblyopia from Myopia, 7% Hyperopia, 32% from myopic astigmatism, 42% from hyperopic astigmatism and 13% have mixed astigmatism. The mean and Standard deviation of present average VA was 0.452±0.275 Log MAR and after an intervention of amblyopia therapy with vision therapy mean and Standard deviation VA was 0.155±0.157 Log MAR. Out of total respondent 21.85% have BCVA in range from (0-.2) log MAR, 37.5% have BCVA in range from (0.22-0.5) log MAR, 35.95% have in range from (0.52-0.8) log MAR, 4.7% have in range from (0.82-1) log MAR and after intervention of occlusion therapy with vision therapy 76.6% have VA in range from (0-.2) log MAR, 21.85% have VA in range from (0.22-0.5) log MAR, 1.5% have in range from (0.52-0.8) log MAR. Conclusion: Amblyopia is a most important factor in pediatric age group because it can lead to visual impairment. Thus, this study concludes that occlusion therapy with vision therapy is probably one of the best treatment methods for amblyopic patients (age 5-8 years), and compliance and age were the most critical factor predicting a successful outcome.Keywords: amblyopia, occlusion therapy, vision therapy, eccentric fixation, visuoscopy
Procedia PDF Downloads 5036025 A Study of Traffic Assignment Algorithms
Authors: Abdelfetah Laouzai, Rachid Ouafi
Abstract:
In a traffic network, users usually choose their way so that it reduces their travel time between pairs origin-destination. This behavior might seem selfish as it produces congestions in different parts of the network. The traffic assignment problem (TAP) models the interactions between congestion and user travel decisions to obtain vehicles flows over each axis of the traffic network. The resolution methods of TAP serve as a tool allows predicting users’ distribution, identifying congesting points and affecting the travelers’ behavior in the choice of their route in the network following dynamic data. In this article, we will present a review about specific resolution approach of TAP. A comparative analysis is carried out on those approaches so that it highlights the characteristics, advantages and disadvantages of each.Keywords: network traffic, travel decisions, approaches, traffic assignment, flows
Procedia PDF Downloads 4746024 Determination of Alkali Treatment Conditions Effects That Influence the Variability of Kenaf Fiber Mean Cross-Sectional Area
Authors: Mohd Yussni Hashim, Mohd Nazrul Roslan, Shahruddin Mahzan Mohd Zin, Saparudin Ariffin
Abstract:
Fiber cross-sectional area value is a crucial factor in determining the strength properties of natural fiber. Furthermore, unlike synthetic fiber, a diameter and cross-sectional area of natural fiber has a large variation along and between the fibers. This study aims to determine the main and interaction effects of alkali treatment conditions that influence kenaf bast fiber mean cross-sectional area. Three alkali treatment conditions at two different levels were selected. The conditions setting were alkali concentrations at two and ten w/v %; fiber immersed temperature at room temperature and 1000C; and fiber immersed duration for 30 and 480 minute. Untreated kenaf fiber was used as a control unit. Kenaf bast fiber bundle mounting tab was prepared according to ASTM C1557-03. The cross-sectional area was measured using a Leica video analyzer. The study result showed that kenaf fiber bundle mean cross-sectional area was reduced 6.77% to 29.88% after alkali treatment. From the analysis of variance, it shows that the interaction of alkali concentration and immersed time has a higher magnitude at 0.1619 compared to alkali concentration and immersed temperature interaction that was 0.0896. For the main effect, alkali concentration factor contributes to the higher magnitude at 0.1372 which indicated the decrease pattern of variability when the level changed from lower to the higher level. Then, it was followed by immersed temperature at 0.1261 and immersed time at 0.0696 magnitudes.Keywords: natural fiber, kenaf bast fiber bundles, alkali treatment, cross-sectional area
Procedia PDF Downloads 4276023 Reliability Based Analysis of Multi-Lane Reinforced Concrete Slab Bridges
Authors: Ali Mahmoud, Shadi Najjar, Mounir Mabsout, Kassim Tarhini
Abstract:
Empirical expressions for estimating the wheel load distribution and live-load bending moment are typically specified in highway bridge codes such as the AASHTO procedures. The purpose of this paper is to analyze the reliability levels that are inherent in reinforced concrete slab bridges that are designed based on the simplified empirical live load equations in the AASHTO LRFD procedures. To achieve this objective, bridges with multi-lanes (three and four lanes) and different spans are modeled using finite-element analysis (FEA) subjected to HS20 truck loading, tandem loading, and standard lane loading per AASHTO LRFD procedures. The FEA results are compared with the AASHTO LRFD moments in order to quantify the biases that might result from the simplifying assumptions adopted in AASHTO. A reliability analysis is conducted to quantify the reliability index for bridges designed using AASHTO procedures. To reach a consistent level of safety for three- and four-lane bridges, following a previous study restricted to one- and two-lane bridges, the live load factor in the design equation proposed by AASHTO LRFD will be assessed and revised if needed by alternating the live load factor for these lanes. The results will provide structural engineers with more consistent provisions to design concrete slab bridges or evaluate the load-carrying capacity of existing bridges.Keywords: reliability analysis of concrete bridges, finite element modeling, reliability analysis, reinforced concrete bridge design, load carrying capacity
Procedia PDF Downloads 3406022 Floorboards, Whitewalls and Butterflies: Ethnography of a Community Mental Health Cafe
Authors: J. N. Bardi, N. Wright, S. Timmons, P. Crawford
Abstract:
Introduction: In the United Kingdom (UK), the transfer of care from the asylums to the community has meant that some people with mental health problems (MHP) may not have access to suitable or adequate statutory community mental health services (CMHS). However, in addition to statutory CMHS, there are informal CMHS that provide spaces where people with MHP can attend such as faith communities, clubhouses, user-led organisations, day centres including drop-in-centres and community hubs and community mental health cafés (CMHCs). Aim: To qualitatively understand what happens in a community mental health café in relation to the place, people and processes, from the participant's perspective. Methodology: Ethnography Methods: Data collection will be field notes from observations written as thick description and interviews with participants. Data analysis will be thematic and narrative analysis. Relevance: The study seeks to observe what happens in a user-led community mental health café and explore if it provides the services that it claims to offer. Therefore, a literature review was conducted to examine the research evidence related to informal CMHS, focusing on similarities and differences. Results indicated that informal CMHS differ with regards to why, how, who set them up and who funds them, but they are similar because people with MHP who attend them report related psychological, vocational, and social interaction benefits. In addition to the differences listed above, CMHCs differ in their adoption of the commercial café model of social space and some CMHCs claim to address needs of social isolation and loneliness which they assert are not properly addressed by statutory CMHS and some informal CMHS. Therefore, CMHCs explicitly differentiate themselves from statutory CMHS and some informal CMHS such as day centres, hospitals and social services. However, CMHCs were found to be like drop-in-centres and community hubs which are also free for MHP to attend without the need for assessments, membership or appointments. To situate community mental health café within other informal CMHS and provide a rationale for the proposed study a scoping review was conducted to determine the scope of available research evidence on CMHCs. Findings from the scoping review reflected the literature review findings with regards to the benefits of attending informal CMHCs for people with MHP. Of the ten studies included in the scoping review, seven were on CMHCs for people living with dementia and two were on CMHCs for people with a broader range of MHP. The researcher hopes that findings from the proposed PhD study will build on the existing understanding of informal CMHS, extend the research evidence on CMHCs and address any gap in the literature.Keywords: cafe, community, ethnography, mental health
Procedia PDF Downloads 1986021 Effect of Soaking Period of Clay on Its California Bearing Ratio Value
Authors: Robert G. Nini
Abstract:
The quality of road pavement is affected mostly by the type of sub-grade which is acting as road foundation. The roads degradation is related to many factors especially the climatic conditions, the quality, and the thickness of the base materials. The thickness of this layer depends on its California Bearing Ratio (CBR) test value which by its turn is highly affected by the quantity of water infiltrated under the road after heavy rain. The capacity of the base material to drain out its water is predominant factor because any change in moisture content causes change in sub-grade strength. This paper studies the effect of the soaking period of soil especially clay on its CBR value. For this reason, we collected many clayey samples in order to study the effect of the soaking period on its CBR value. On each soil, two groups of experiments were performed: main tests consisting of Proctor and CBR test from one side and from other side identification tests consisting of other tests such as Atterberg limits tests. Each soil sample was first subjected to Proctor test in order to find its optimum moisture content which will be used to perform the CBR test. Four CBR tests were performed on each soil with different soaking period. The first CBR was done without soaking the soil sample; the second one with two days soaking, the third one with four days soaking period and the last one was done under eight days soaking. By comparing the results of CBR tests performed with different soaking time, a more detailed understanding was given to the role of the water in reducing the CBR of soil. In fact, by extending the soaking period, the CBR was found to be reduced quickly the first two days and slower after. A precise reduction factor of the CBR in relation with soaking period was found at the end of this paper.Keywords: California Bearing Ratio, clay, proctor test, soaking period, sub-grade
Procedia PDF Downloads 1326020 Industry Practitioners Involvement in Taiwan Vocational Education
Authors: Hsiao Tseng Lin, Szu Mei Hsiao, Mei Chun Yuan
Abstract:
Today's rapid development of industrial pulsation, how to reduce the gap between the academics and industry need become an important issue in vocational education. Beginning in 2015, a two-year program for teaching excellence, funded by the Ministry of Education Taiwan, is implemented by Meiho University, with a total project funding of $ 1.5 million USD. One of the innovated highlights of this program is to invite 188 industry practitioners to participate in collaborative teaching for 175 classes and 28 industry practitioners to be as mentors too. 56 industry practitioners are also invited to participate in curriculum planning and design. Students' overall satisfaction with the program was more than 4.5 (out of 5.0). This paper aims to evaluate the effectiveness and discusses the limit of the practitioners program. This study has revealed and provided some valuable perspectives how to best ensure the ongoing involvement of industry practitioners in vocational education. The findings of this study are valuable to those involved in designing collaborative teaching curriculum and delivering a course for vocational education.Keywords: collaborative teaching, industry practitioners, mentor, vocational education
Procedia PDF Downloads 4346019 Testicular Differential MicroRNA Expression Derived Occupational Risk Factor Assessment in Idiopathic Non-obstructive Azoospermia Cases
Authors: Nisha Sharma, Mili Kaur, Ashutosh Halder, Seema Kaushal, Manoj Kumar, Manish Jain
Abstract:
Purpose: To investigate microRNAs (miRNA) as an epigenomic etiological factor in idiopathic non-obstructive azoospermia (NOA). In order to achieve the same, an association was seen between occupational exposure to radiation, thermal, and chemical factors and idiopathic cases of non-obstructive azoospermia, and later, testicular differential miRNA expression profiling was done in exposure group NOA cases. Method: It is a prospective study in which 200 apparent idiopathic male factor infertility cases, who have been advised to undergo testicular fine needle aspiration (FNA) evaluation, are recruited. A detailed occupational history was taken to understand the possible type of exposure due to the nature and duration of work. A total of 26 patients were excluded upon XY-FISH and Yq microdeletion tests due to the presence of genetic causes of infertility, 6 hypospermatogeneis (HS), six Sertoli cell-only syndrome (SCOS), and six normospermatogeneis patients testicular FNA samples were used for RNA isolation followed by small RNA sequencing and nCounter miRNA expression analysis. Differential miRNA expression profile of HS and SCOS patients was done. A web-based tool, miRNet, was used to predict the interacting compounds or chemicals using the shortlisted miRNAs with high fold change. The major limitation encountered in this study was the insufficient quantity of testicular FNA sample used for total RNA isolation, which resulted in a low yield and RNA integrity number (RIN) value. Therefore, the number of RNA samples admissible for differential miRNA expression analysis was very small in comparison to the total number of patients recruited. Results: Differential expression analysis revealed 69 down-regulated and 40 up-regulated miRNAs in HS and 66 down-regulated and 33 up-regulated miRNAs in SCOS in comparison to normospermatogenesis controls. The miRNA interaction analysis using the miRNet tool showed that the differential expression profiles of HS and SCOS patients were associated with arsenic trioxide, bisphenol-A, calcium sulphate, lithium, and cadmium. These compounds are reproductive toxins and might be responsible for miRNA-mediated epigenetic deregulation leading to NOA. The association between occupational risk factor exposure and the non-exposure group of NOA patients was not statistically significant, with ꭓ2 (3, N= 178) = 6.70, p= 0.082. The association between individual exposure groups (radiation, thermal, and chemical) and various sub-types of NOA is also not significant, with ꭓ2 (9, N= 178) = 15.06, p= 0.089. Functional analysis of HS and SCOS patients' miRNA profiles revealed some important miR-family members in terms of male fertility. The miR-181 family plays a role in the differentiation of spermatogonia and spermatocytes, as well as the transcriptional regulation of haploid germ cells. The miR-34 family is expressed in spermatocytes and round spermatids and is involved in the regulation of SSCs differentiation. Conclusion: The reproductive toxins might adopt the miRNA-mediated mechanism of disease development in idiopathic cases of NOA. Chemical compound induced; miRNA-mediated epigenetic deregulation can give a future perspective on the etiopathogenesis of the disease.Keywords: microRNA, non-obstructive azoospermia (NOA), occupational exposure, hypospermatogenesis (HS), Sertoli cell only syndrome (SCOS)
Procedia PDF Downloads 876018 Evaluation of Rheological Properties, Anisotropic Shrinkage, and Heterogeneous Densification of Ceramic Materials during Liquid Phase Sintering by Numerical-Experimental Procedure
Authors: Hamed Yaghoubi, Esmaeil Salahi, Fateme Taati
Abstract:
The effective shear and bulk viscosity, as well as dynamic viscosity, describe the rheological properties of the ceramic body during the liquid phase sintering process. The rheological parameters depend on the physical and thermomechanical characteristics of the material such as relative density, temperature, grain size, and diffusion coefficient and activation energy. The main goal of this research is to acquire a comprehensive understanding of the response of an incompressible viscose ceramic material during liquid phase sintering process such as stress-strain relations, sintering and hydrostatic stress, the prediction of anisotropic shrinkage and heterogeneous densification as a function of sintering time by including the simultaneous influence of gravity field, and frictional force. After raw materials analysis, the standard hard porcelain mixture as a ceramic body was designed and prepared. Three different experimental configurations were designed including midpoint deflection, sinter bending, and free sintering samples. The numerical method for the ceramic specimens during the liquid phase sintering process are implemented in the CREEP user subroutine code in ABAQUS. The numerical-experimental procedure shows the anisotropic behavior, the complete difference in spatial displacement through three directions, the incompressibility for ceramic samples during the sintering process. The anisotropic shrinkage factor has been proposed to investigate the shrinkage anisotropy. It has been shown that the shrinkage along the normal axis of casting sample is about 1.5 times larger than that of casting direction, the gravitational force in pyroplastic deformation intensifies the shrinkage anisotropy more than the free sintering sample. The lowest and greatest equivalent creep strain occurs at the intermediate zone and around the central line of the midpoint distorted sample, respectively. In the sinter bending test sample, the equivalent creep strain approaches to the maximum near the contact area with refractory support. The inhomogeneity in Von-Misses, pressure, and principal stress intensifies the relative density non-uniformity in all samples, except in free sintering one. The symmetrical distribution of stress around the center of free sintering sample, cause to hinder the pyroplastic deformations. Densification results confirmed that the effective bulk viscosity was well-defined with relative density values. The stress analysis confirmed that the sintering stress is more than the hydrostatic stress from start to end of sintering time so, from both theoretically and experimentally point of view, the sintering process occurs completely.Keywords: anisotropic shrinkage, ceramic material, liquid phase sintering process, rheological properties, numerical-experimental procedure
Procedia PDF Downloads 3416017 Design and Synthesis of Some Oxadiazole Bearing Benzimidazole Derivatives as Potential Epidermal Growth Factor Receptor Inhibitors
Authors: Ismail Celik, Gulgun Ayhan Kilcigil, Berna Guven, Zumra Kara, Arzu Onay-Besikci
Abstract:
Epidermal Growth Factor Receptor is the cell-surface receptor of the ErbB (erythroblastic leukemia viral oncogene homologue receptors) family of tyrosine kinases. It plays a vital role in regulating the proliferation and differentiation of cells. However, a variety of mechanisms, such as EGFR expression, mutation, and ligand-dependent receptor dimerization, are associated with the development of various activated EGFR tumors. EGFR is highly expressed in most solid tumors, including breast, head and neck cancer, non-small cell lung cancer (NSCLC), renal, ovarian, and colon cancers. Thus, specific EGFR inhibition plays one of the key roles in cancer treatment. The compounds used in the treatment as tyrosine kinase inhibitors are known to contain the benzimidazole isosterium indole, pazopanib, and axitinibin indazole rings. In addition, benzimidazoles have been shown to exhibit protein kinase inhibitory activity in addition to their different biological activities.Based on these data, it was planned and synthesized of some oxadiazole bearing benzimidazole derivatives [N-cyclohexyl-5-((2-phenyl/substitutedphenyl-1H-benzo[d]imidazole-1-yl) methyl)-1,3,4-oxadiazole-2-amine]. EGFR kinase inhibitory efficiency of the synthesized compounds was determined by comparing them with a known kinase inhibitor erlotinib in vitro, and two of the compounds bearing phenyl (19a) and 3,4-dibenzyloxyphenyl (21a) ring exhibited significant activities.Keywords: benzimidazole, EGFR kinase inhibitory, oxadiazole, synthesis
Procedia PDF Downloads 1396016 A User-Directed Approach to Optimization via Metaprogramming
Authors: Eashan Hatti
Abstract:
In software development, programmers often must make a choice between high-level programming and high-performance programs. High-level programming encourages the use of complex, pervasive abstractions. However, the use of these abstractions degrades performance-high performance demands that programs be low-level. In a compiler, the optimizer attempts to let the user have both. The optimizer takes high-level, abstract code as an input and produces low-level, performant code as an output. However, there is a problem with having the optimizer be a built-in part of the compiler. Domain-specific abstractions implemented as libraries are common in high-level languages. As a language’s library ecosystem grows, so does the number of abstractions that programmers will use. If these abstractions are to be performant, the optimizer must be extended with new optimizations to target them, or these abstractions must rely on existing general-purpose optimizations. The latter is often not as effective as needed. The former presents too significant of an effort for the compiler developers, as they are the only ones who can extend the language with new optimizations. Thus, the language becomes more high-level, yet the optimizer – and, in turn, program performance – falls behind. Programmers are again confronted with a choice between high-level programming and high-performance programs. To investigate a potential solution to this problem, we developed Peridot, a prototype programming language. Peridot’s main contribution is that it enables library developers to easily extend the language with new optimizations themselves. This allows the optimization workload to be taken off the compiler developers’ hands and given to a much larger set of people who can specialize in each problem domain. Because of this, optimizations can be much more effective while also being much more numerous. To enable this, Peridot supports metaprogramming designed for implementing program transformations. The language is split into two fragments or “levels”, one for metaprogramming, the other for high-level general-purpose programming. The metaprogramming level supports logic programming. Peridot’s key idea is that optimizations are simply implemented as metaprograms. The meta level supports several specific features which make it particularly suited to implementing optimizers. For instance, metaprograms can automatically deduce equalities between the programs they are optimizing via unification, deal with variable binding declaratively via higher-order abstract syntax, and avoid the phase-ordering problem via non-determinism. We have found that this design centered around logic programming makes optimizers concise and easy to write compared to their equivalents in functional or imperative languages. Overall, implementing Peridot has shown that its design is a viable solution to the problem of writing code which is both high-level and performant.Keywords: optimization, metaprogramming, logic programming, abstraction
Procedia PDF Downloads 886015 Comparative Study of Scheduling Algorithms for LTE Networks
Authors: Samia Dardouri, Ridha Bouallegue
Abstract:
Scheduling is the process of dynamically allocating physical resources to User Equipment (UE) based on scheduling algorithms implemented at the LTE base station. Various algorithms have been proposed by network researchers as the implementation of scheduling algorithm which represents an open issue in Long Term Evolution (LTE) standard. This paper makes an attempt to study and compare the performance of PF, MLWDF and EXP/PF scheduling algorithms. The evaluation is considered for a single cell with interference scenario for different flows such as Best effort, Video and VoIP in a pedestrian and vehicular environment using the LTE-Sim network simulator. The comparative study is conducted in terms of system throughput, fairness index, delay, packet loss ratio (PLR) and total cell spectral efficiency.Keywords: LTE, multimedia flows, scheduling algorithms, mobile computing
Procedia PDF Downloads 3836014 Agroforestry Systems and Practices and Its Adoption in Kilombero Cluster of Sagcot, Tanzania
Authors: Lazaro E. Nnko, Japhet J. Kashaigili, Gerald C. Monela, Pantaleo K. T. Munishi
Abstract:
Agroforestry systems and practices are perceived to improve livelihood and sustainable management of natural resources. However, their adoption in various regions differs with the biophysical conditions and societal characteristics. This study was conducted in Kilombero District to investigate the factors influencing the adoption of different agroforestry systems and practices in agro-ecosystems and farming systems. A household survey, key informant interviews, and focus group discussion was used for data collection in three villages. Descriptive statistics and multinomial logistic regression in SPSS were applied for analysis. Results show that Igima and Ngajengwa villages had home garden practices dominated, as revealed by 63.3% and 66.7%, respectively, while Mbingu village had mixed intercropping practice with 56.67%. Agrosilvopasture systems were dominant in Igima and Ngajengwa villages with 56.7% and 66.7%, respectively, while in Mbingu village, the dominant system was agrosilviculture with 66.7%. The results from multinomial logistic regression show that different explanatory variable was statistical significance as predictors of the adoption of agroforestry systems and practices. Residence type and sex were the most dominant factor influencing the adoption of agroforestry systems. Duration of stay in the village, availability of extension education, residence, and sex were the dominant factor influencing the adoption of agroforestry practices. The most important and statistically significant factors among these were residence type and sex. The study concludes that agroforestry will be more successful if the local priorities, which include social-economic need characteristics of the society, will be considered in designing systems and practices. The socio-economic need of the community should be addressed in the process of expanding the adoption of agroforestry systems and practices.Keywords: agroforestry adoption, agroforestry systems, agroforestry practices, agroforestry, Kilombero
Procedia PDF Downloads 1186013 Improving Physical, Social, and Mental Health Outcomes for People Living with an Intellectual Disability through Cycling
Authors: Sarah Faulkner, Patrick Faulkner, Caroline Ellison
Abstract:
Improved mental and physical health, community connection, and increased life satisfaction has been strongly associated with bike riding for those with and without a disability. However, much evidence suggests that people living with a disability face increased barriers to engaging in cycling compared to members of the general population. People with an intellectual disability often live more sedentary and socially isolated lives that negatively impact their mental and physical health, as well as life satisfaction. This paper is based on preliminary findings from a three-year intervention cycling project funded by the South Australian Government. The cycling project was developed in partnership with community stakeholders that provided weekly instruction, training, and support to individuals living with intellectual disabilities to increase their capacity in cycling. This project aimed to support people living with intellectual disabilities to foster and facilitate improved physical and mental health, confidence, and independence and enhance social networking through their engagement in community cycling. The program applied principles of social role valorisation (SRV) theory as its guiding framework. Preliminary data collected is based on qualitative interviews with over 50 program participants, results from two participant wellness questionnaires, as well as a perceptually regulated exercise test administered throughout the project implementation. Preliminary findings are further supplemented with ethnographic analyses by the researchers who took a phenology of life experience approach. Preliminary findings of the program suggest a variety of social motivations behind participants' desire to learn cycling that acknowledges previous barriers to engagement and cycling’s role to address feelings of loneliness and social isolation. Meaningful health benefits can be achieved as demonstrated by increases in predicted V02 max measures, suggesting that physical intervention can not only improve physical health outcomes but also provide a variety of other social benefits. Initial engagement in the project has demonstrated an increase in participants' sense of confidence, well-being, and physical fitness. Implementation of the project in partnership with a variety of community stakeholders has identified a number of critical factors and processes necessary for future service replication, sustainability, and success. Findings from this intervention study contribute to the development of a knowledge base on how best to support individuals living with an intellectual disability to partake in bike riding and increase positive outcomes associated with their capacity building, social interaction, increased physical activity, physical health, and mental well-being. The initial findings of this study provide critical academic insights into the social and physical benefits of cycling for people living with a disability, as well as practical advice for future human service applications.Keywords: cycling, disability, social inclusion, capacity building
Procedia PDF Downloads 666012 A Framework for Evaluating the QoS and Cost of Web Services Based on Its Functional Performance
Authors: M. Mohemmed Sha, T. Manesh, A. Ahmed Mohamed Mustaq
Abstract:
In this corporate world, the technology of Web services has grown rapidly and its significance for the development of web based applications gradually rises over time. The success of Business to Business integration rely on finding novel partners and their services in a global business environment. But the selection of the most suitable Web service from the list of services with the identical functionality is more vital. The satisfaction level of the customer and the provider’s reputation of the Web service are primarily depending on the range it reaches the customer’s requirements. In most cases the customer of the Web service feels that he is spending for the service which is undelivered. This is because the customer always thinks that the real functionality of the web service is not reached. This will lead to change of the service frequently. In this paper, a framework is proposed to evaluate the Quality of Service (QoS) and its cost that makes the optimal correlation between each other. Also this research work proposes some management decision against the functional deviancy of the web service that are guaranteed at time of selection.Keywords: web service, service level agreement, quality of a service, cost of a service, QoS, CoS, SOA, WSLA, WsRF
Procedia PDF Downloads 4196011 Developing a Model to Objectively Assess the Culture of Individuals and Teams in Order to Effectively and Efficiently Achieve Sustainability in the Manpower
Authors: Ahmed Mohamed Elnady Mohamed Elsafty
Abstract:
This paper explains a developed applied objective model to measure the culture qualitatively and quantitatively, whether in individuals or in teams, in order to be able to use culture correctly or modify it efficiently. This model provides precise measurements and consistent interpretations by being comprehensive, updateable, and protected from being misled by imitations. Methodically, the provided model divides the culture into seven dimensions (total 43 cultural factors): First dimension is outcome-orientation which consists of five factors and should be highest in leaders. Second dimension is details-orientation which consists of eight factors and should be in highest intelligence members. Third dimension is team-orientation which consists of five factors and should be highest in instructors or coaches. Fourth dimension is change-orientation which consists of five factors and should be highest in soldiers. Fifth dimension is people-orientation which consists of eight factors and should be highest in media members. Sixth dimension is masculinity which consists of seven factors and should be highest in hard workers. Last dimension is stability which consists of seven factors and should be highest in soft workers. In this paper, the details of all cultural factors are explained. Practically, information collection about each cultural factor in the targeted person or team is essential in order to calculate the degrees of all cultural factors using the suggested equation of multiplying 'the score of factor presence' by 'the score of factor strength'. In this paper, the details of how to build each score are explained. Based on the highest degrees - to identify which cultural dimension is the prominent - choosing the tested individual or team in the supposedly right position at the right time will provide a chance to use minimal efforts to make everyone aligned to the organization’s objectives. In other words, making everyone self-motivated by setting him/her at the right source of motivation is the most effective and efficient method to achieve high levels of competency, commitment, and sustainability. Modifying a team culture can be achieved by excluding or including new members with relatively high or low degrees in specific cultural factors. For conclusion, culture is considered as the software of the human beings and it is one of the major compression factors on the managerial discretion. It represents the behaviors, attitudes, and motivations of the human resources which are vital to enhance quality and safety, expanding the market share, and defending against attacks from external environments. Thus, it is tremendously essential and useful to use such a comprehensive model to measure, use, and modify culture.Keywords: culture dimensions, culture factors, culture measurement, cultural analysis, cultural modification, self-motivation, alignment to objectives, competency, sustainability
Procedia PDF Downloads 1646010 Radiation Protection Assessment of the Emission of a d-t Neutron Generator: Simulations with MCNP Code and Experimental Measurements in Different Operating Conditions
Authors: G. M. Contessa, L. Lepore, G. Gandolfo, C. Poggi, N. Cherubini, R. Remetti, S. Sandri
Abstract:
Practical guidelines are provided in this work for the safe use of a portable d-t Thermo Scientific MP-320 neutron generator producing pulsed 14.1 MeV neutron beams. The neutron generator’s emission was tested experimentally and reproduced by MCNPX Monte Carlo code. Simulations were particularly accurate, even generator’s internal components were reproduced on the basis of ad-hoc collected X-ray radiographic images. Measurement campaigns were conducted under different standard experimental conditions using an LB 6411 neutron detector properly calibrated at three different energies, and comparing simulated and experimental data. In order to estimate the dose to the operator vs. the operating conditions and the energy spectrum, the most appropriate value of the conversion factor between neutron fluence and ambient dose equivalent has been identified, taking into account both direct and scattered components. The results of the simulations show that, in real situations, when there is no information about the neutron spectrum at the point where the dose has to be evaluated, it is possible - and in any case conservative - to convert the measured value of the count rate by means of the conversion factor corresponding to 14 MeV energy. This outcome has a general value when using this type of generator, enabling a more accurate design of experimental activities in different setups. The increasingly widespread use of this type of device for industrial and medical applications makes the results of this work of interest in different situations, especially as a support for the definition of appropriate radiation protection procedures and, in general, for risk analysis.Keywords: instrumentation and monitoring, management of radiological safety, measurement of individual dose, radiation protection of workers
Procedia PDF Downloads 1326009 Development of the Religious Out-Group Aggression Scale
Authors: Rylle Evan Gabriel Zamora, Micah Dennise Malia, Abygail Deniese Villabona
Abstract:
When examining studies on aggression, the studies about individual aggression vastly outnumbers those studies on group aggression. Given the nature of aggression to be violent and cyclical, and the amount violent events that have occurred in the near present, the study of group aggression is relevant now more than ever. This discrepancy is parallel with the number of valid and reliable psychological tests that measure group aggression. Throughout history, one of the biggest causes of group based violence and aggression is religion. This is particularly true within the context of the Philippines as there are a large number of religious groups. Thus, this study aimed to develop a standardized test that measures an individual’s tendency to be aggressive to those who are in conflict with his or her religious beliefs. This study employs a test development design that employs a qualitative phase to ensure the validity of the scale. Thus, the study was divided into three phases. First is a pilot test wherein an instrument was designed from existing literature which was then administered to 173 respondents from the four largest religious groups in the Philippines. After extensive factor analysis and reliability testing, new items were then formed from the qualitative data collected from eight participants, consisting of two individuals per religious group. The final testing integrates all statistically significant items from the first phase, and the newly formed items from the second phase, which was then administered to 200 respondents. The results were then tested further for reliability using Cronbach’s alpha and validity through factor analysis. The items that were proven to be significant were then combined to create a final instrument that may be used by future studies.Keywords: religious aggression, group aggression, test development, psychological assessment, social psychology
Procedia PDF Downloads 2946008 Analysis of Users’ Behavior on Book Loan Log Based on Association Rule Mining
Authors: Kanyarat Bussaban, Kunyanuth Kularbphettong
Abstract:
This research aims to create a model for analysis of student behavior using Library resources based on data mining technique in case of Suan Sunandha Rajabhat University. The model was created under association rules, apriori algorithm. The results were found 14 rules and the rules were tested with testing data set and it showed that the ability of classify data was 79.24 percent and the MSE was 22.91. The results showed that the user’s behavior model by using association rule technique can use to manage the library resources.Keywords: behavior, data mining technique, a priori algorithm, knowledge discovery
Procedia PDF Downloads 4046007 Parallel 2-Opt Local Search on GPU
Authors: Wen-Bao Qiao, Jean-Charles Créput
Abstract:
To accelerate the solution for large scale traveling salesman problems (TSP), a parallel 2-opt local search algorithm with simple implementation based on Graphics Processing Unit (GPU) is presented and tested in this paper. The parallel scheme is based on technique of data decomposition by dynamically assigning multiple K processors on the integral tour to treat K edges’ 2-opt local optimization simultaneously on independent sub-tours, where K can be user-defined or have a function relationship with input size N. We implement this algorithm with doubly linked list on GPU. The implementation only requires O(N) memory. We compare this parallel 2-opt local optimization against sequential exhaustive 2-opt search along integral tour on TSP instances from TSPLIB with more than 10000 cities.Keywords: parallel 2-opt, double links, large scale TSP, GPU
Procedia PDF Downloads 6256006 Professional Management on Ecotourism and Conservation to Ensure the Future of Komodo National Park
Authors: Daningsih Sulaeman, Achmad Sjarmidi, Djoko T. Iskandar
Abstract:
Komodo National Park can be associated with the implementation of ecotourism program. The result of Principal Components Analysis is synthesized, tested, and compared to the basic concept of ecotourism with some field adjustments. Principal aspects of professional management should involve ecotourism and wildlife welfare. The awareness should be focused on the future of the Natural Park as 7th Wonder Natural Heritage and its wildlife components, free from human wastes and beneficial to wildlife and local people. According to perceptions and expectations of visitors from various results of tourism programs, the visitor’s perceptions showed that the tourism management in Komodo National Park should pay more attention to visitor's satisfaction and expectation and gives positive impact directly to the ecosystem sustainability, local community and transparency to the conservation program.Keywords: 7th wonders of nature, ecotourism, Komodo dragon, visitor’s perceptions, wildlife management
Procedia PDF Downloads 2026005 IEEE802.15.4e Based Scheduling Mechanisms and Systems for Industrial Internet of Things
Authors: Ho-Ting Wu, Kai-Wei Ke, Bo-Yu Huang, Liang-Lin Yan, Chun-Ting Lin
Abstract:
With the advances in advanced technology, wireless sensor network (WSN) has become one of the most promising candidates to implement the wireless industrial internet of things (IIOT) architecture. However, the legacy IEEE 802.15.4 based WSN technology such as Zigbee system cannot meet the stringent QoS requirement of low powered, real-time, and highly reliable transmission imposed by the IIOT environment. Recently, the IEEE society developed IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) access mode to serve this purpose. Furthermore, the IETF 6TiSCH working group has proposed standards to integrate IEEE 802.15.4e with IPv6 protocol smoothly to form a complete protocol stack for IIOT. In this work, we develop key network technologies for IEEE 802.15.4e based wireless IIoT architecture, focusing on practical design and system implementation. We realize the OpenWSN-based wireless IIOT system. The system architecture is divided into three main parts: web server, network manager, and sensor nodes. The web server provides user interface, allowing the user to view the status of sensor nodes and instruct sensor nodes to follow commands via user-friendly browser. The network manager is responsible for the establishment, maintenance, and management of scheduling and topology information. It executes centralized scheduling algorithm, sends the scheduling table to each node, as well as manages the sensing tasks of each device. Sensor nodes complete the assigned tasks and sends the sensed data. Furthermore, to prevent scheduling error due to packet loss, a schedule inspection mechanism is implemented to verify the correctness of the schedule table. In addition, when network topology changes, the system will act to generate a new schedule table based on the changed topology for ensuring the proper operation of the system. To enhance the system performance of such system, we further propose dynamic bandwidth allocation and distributed scheduling mechanisms. The developed distributed scheduling mechanism enables each individual sensor node to build, maintain and manage the dedicated link bandwidth with its parent and children nodes based on locally observed information by exchanging the Add/Delete commands via two processes. The first process, termed as the schedule initialization process, allows each sensor node pair to identify the available idle slots to allocate the basic dedicated transmission bandwidth. The second process, termed as the schedule adjustment process, enables each sensor node pair to adjust their allocated bandwidth dynamically according to the measured traffic loading. Such technology can sufficiently satisfy the dynamic bandwidth requirement in the frequently changing environments. Last but not least, we propose a packet retransmission scheme to enhance the system performance of the centralized scheduling algorithm when the packet delivery rate (PDR) is low. We propose a multi-frame retransmission mechanism to allow every single network node to resend each packet for at least the predefined number of times. The multi frame architecture is built according to the number of layers of the network topology. Performance results via simulation reveal that such retransmission scheme is able to provide sufficient high transmission reliability while maintaining low packet transmission latency. Therefore, the QoS requirement of IIoT can be achieved.Keywords: IEEE 802.15.4e, industrial internet of things (IIOT), scheduling mechanisms, wireless sensor networks (WSN)
Procedia PDF Downloads 1606004 Implementation of Cloud Customer Relationship Management in Banking Sector: Strategies, Benefits and Challenges
Authors: Ngoc Dang Khoa Nguyen, Imran Ali
Abstract:
The cloud customer relationship management (CRM) has emerged as an innovative tool to augment the customer satisfaction and performance of banking systems. Cloud CRM allows to collect, analyze and utilize customer-associated information and update the systems, thereby offer superior customer service. Cloud technologies have invaluable potential to ensure innovative customer experiences, successful collaboration, enhanced speed to marketplace and IT effectiveness. As such, many leading banks have been attracted towards adoption of such innovative and customer-driver solutions to revolutionize their existing business models. Chief Information Officers (CIOs) are already implemented or in the process of implementation of cloud CRM. However, many organizations are still reluctant to take such initiative due to the lack of information on the factors influencing its implementation. This paper, therefore, aims to delve into the strategies, benefits and challenges intertwined in the implementation of Cloud CRM in banking sector and provide reliable solutions.Keywords: banking sector, cloud computing, cloud CRM, strategy
Procedia PDF Downloads 1666003 Fake news and Conspiracy Narratives in the Covid-19 Crisis: An International Comparison
Authors: Caja Thimm
Abstract:
Already well before the Corona pandemic hit the world, ‘fake news‘ were no longer regarded as harmless twists of the truth but as intentionally composed disinformation, often with the goal of manipulative populist propaganda. During the Corona crisis, particularly conspiracy narratives have become a worldwide phenomenon with dangerous consequences (anti vaccination myths). The success of these manipulated news need s to be counteracted by trustworthy news, which in Europe particularly includes public broadcasting media and their social media channels. To understand better how the main public broadcasters in Germany, the UK, and France used Instagram strategically, a comparative study was carried out. The study – comparative analysis of Instagram during the Corona Crisis In our empirical study, we compared the activities by selected formats during the Corona crisis in order to see how the public broadcasters reached their audiences and how this might, in the longer run, affect journalistic strategies on social media platforms. First analysis showed that the increase in the use of social media overall was striking. Almost one in two adult online users (48 %) obtained information about the virus in social media, and in total, 38% of the younger age group (18-24) looked for Covid19 information on Instagram, so the platform can be regarded as one of the central digital spaces for Corona related information searches. Quantitative measures showed that 47% of recent posts by the broadcasters were related to Corona, and 7% treated conspiracy myths. For the more detailed content analysis, the following categories of analysis were applied: • Digital storytelling and instastories • Textuality and semantic keys • links to information • stickers • videochat • fact checking • news ticker • service • infografics and animated tables Additionally to these basic features, we particularly looked for new formats created during the crisis. Journalistic use of social media platforms opens up immediate and creative ways of applying the media logics of the respective platforms, and particularly the BBC and ARD formats proved to be interactive, responsive, and entertaining. Among them were new formats such as a space for user questions and personal uploads, interviews, music, comedy, etc. Particularly the fact checking channel got a lot of attention, as many user questions were focused on the conspiracy theories, which dominated the public discourse during many weeks in 2020. In the presentation, we will introduce eight particular strategies that show how public broadcasting journalism can adopt digital platforms and use them creatively and, hence help to counteract against conspiracy narratives and fake news.Keywords: fake news, social media, digital journalism, digital methods
Procedia PDF Downloads 1566002 The New Face of TV: An Exploratory Study on the Effects of Snapchat on TV Ratings in Kuwait
Authors: Bashaiar Alsanaa
Abstract:
The advent of new forms of media has always led to a change in the way existing media deliver content. No medium has been replaced by another yet over the course of history. Whether this fact changes with the introduction of new age technology and social media remains to be seen. Snapchat may be the first application, to seriously challenge TV. It is perhaps the new face of television. The individualistic nature of Snapchat, whereby users control who, when, and in what order to watch, assesses user freedom from traditional broadcasters’ control. This study aims to fill the void in research conducted around such topic. The research explores how Snapchat maybe slowly but replacing TV. The study surveys users in Kuwait in order to present an overview of the topic. It also draws a framework through which implications and suggestions for future research may be discussed to better serve the advancement of media research.Keywords: Kuwait, media, Snapchat, television
Procedia PDF Downloads 240