Search results for: traditional costume
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4979

Search results for: traditional costume

2039 Exploring the Intricate Microbiology of Street Cuisine: Delving into Potential Dangers in Order to Enhance Safety and Quality

Authors: Raana Babadi Fathipour

Abstract:

Street foods hold a significant place in the tapestry of socioeconomic and cultural norms, beloved across the globe. Serving as a convenient and affordable option for city dwellers seeking nourishment, these culinary delights also serve as a vital source of income for vendors, particularly women. Additionally, street food acts as a mirror reflecting traditional local customs and practices, an element that draws tourists to experience the authenticity of a culture firsthand. Despite its many virtues, concerns have emerged regarding the microbiological safety of street food worldwide. Often prepared and sold in subpar conditions without proper oversight or regulation, street food has become synonymous with potential health risks. The presence of elevated levels of fecal indicator bacteria and various pathogens in these unregulated delicacies further perpetuates anxieties surrounding their consumption. This analysis delves into the intricate microbiological intricacies inherent in street food, shedding light on the pertinent safety concerns and prevalent pathogens. Additionally, it elaborates on the worldwide standing of this vital economic endeavor. Moreover, it advocates for the adoption of molecular detection techniques over conventional culture-based methods to gain a more comprehensive grasp of the true microbial risks posed by street cuisine. Acknowledgment marks the initial step towards resolving any given issue.

Keywords: foodborne pathogens, microbiological safety, street food, viruses

Procedia PDF Downloads 55
2038 Improving the Teaching of Mathematics at University Using the Inverted Classroom Model: A Case in Greece

Authors: G. S. Androulakis, G. Deli, M. Kaisari, N. Mihos

Abstract:

Teaching practices at the university level have changed and developed during the last decade. Implementation of inverted classroom method in secondary education consists of a well-formed basis for academic teachers. On the other hand, distance learning is a well-known field in education research and widespread as a method of teaching. Nonetheless, the new pandemic found many Universities all over the world unprepared, which made adaptations to new methods of teaching a necessity. In this paper, we analyze a model of an inverted university classroom in a distance learning context. Thus, the main purpose of our research is to investigate students’ difficulties as they transit to a new style of teaching and explore their learning development during a semester totally different from others. Our teaching experiment took place at the Business Administration department of the University of Patras, in the context of two courses: Calculus, a course aimed at first-year students, and Statistics, a course aimed at second-year students. Second-year students had the opportunity to attend courses in the university classroom. First-year students started their semester with distance learning. Using a comparative study of these two groups, we explored significant differences in students’ learning procedures. Focused group interviews, written tests, analyses of students’ dialogues were used in a mixed quantity and quality research. Our analysis reveals students’ skills, capabilities but also a difficulty in following, non-traditional style of teaching. The inverted classroom model, according to our findings, offers benefits in the educational procedure, even in a distance learning environment.

Keywords: distance learning, higher education, inverted classroom, mathematics teaching

Procedia PDF Downloads 136
2037 A Study of the Establishment of the Evaluation Index System for Tourist Attraction Disaster Resilience

Authors: Chung-Hung Tsai, Ya-Ping Li

Abstract:

Tourism industry is highly depended on the natural environment and climate. Compared to other industries, it is more susceptible to environment and climate. Taiwan belongs to a sea island country and located in the subtropical monsoon zone. The events of climate variability, frequency of typhoons and rainfalls raged are caused regularly serious disaster. In traditional disaster assessment, it usually focuses on the disaster damage and risk assessment, which is short of the features from different industries to understand the impact of the restoring force in post-disaster resilience and the main factors that constitute resilience. The object of this study is based on disaster recovery experience of tourism area and to understand the main factors affecting the tourist area of disaster resilience. The combinations of literature review and interviews with experts are prepared an early indicator system of the disaster resilience. Then, it is screened through a Fuzzy Delphi Method and Analytic Network Process for weight analysis. Finally, this study will establish the tourism disaster resilience evaluation index system considering the Taiwan's tourism industry characteristics. We hope that be able to enhance disaster resilience after tourist areas and increases the sustainability of industrial development. It is expected to provide government departments the tourism industry as the future owner of the assets in extreme climates responses.

Keywords: resilience, Fuzzy Delphi Method, Analytic Network Process, industrial development

Procedia PDF Downloads 412
2036 Bullying with Neurodiverse Students and Education Policy Reform

Authors: Fharia Tilat Loba

Abstract:

Studies show that there is a certain group of students who are more vulnerable to bullying due to their physical appearance, disability, sexual preference, race, and lack of social and behavioral skills. Students with autism spectrum disorders (ASD) are one of the most vulnerable groups among these at-risk groups. Researchers suggest that focusing on vulnerable groups of students who can be the target of bullying helps to understand the causes and patterns of aggression, which ultimately helps in structuring intervention programs to reduce bullying. Since Australia ratified the United Nations Convention on the Rights of Persons with Disabilities in 2006, it has been committed to providing an inclusive, safe, and effective learning environment for all children. In addition, the 2005 Disability Standards for Education seeks to ensure that students with disabilities can access and participate in education on the same basis as other students, covering all aspects of education, including harassment and victimization. However, bullying hinders students’ ability to fully participate in schooling. The proposed study aims to synthesize the notions of traditional bullying and cyberbullying and attempts to understand the experiences of students with ASD who are experiencing bullying in their schools. The proposed study will primarily focus on identifying the gaps between policy and practice related to bullying, and it will also attempt to understand the experiences of parents of students with ASD and professionals who have experience dealing with bullying at the school level in Australia. This study is expected to contribute to the theoretical knowledge of the bullying phenomenon and provide a reference for advocacy at the school, organization, and government levels.

Keywords: education policy, bullying, Australia, neurodiversity

Procedia PDF Downloads 58
2035 A Static Android Malware Detection Based on Actual Used Permissions Combination and API Calls

Authors: Xiaoqing Wang, Junfeng Wang, Xiaolan Zhu

Abstract:

Android operating system has been recognized by most application developers because of its good open-source and compatibility, which enriches the categories of applications greatly. However, it has become the target of malware attackers due to the lack of strict security supervision mechanisms, which leads to the rapid growth of malware, thus bringing serious safety hazards to users. Therefore, it is critical to detect Android malware effectively. Generally, the permissions declared in the AndroidManifest.xml can reflect the function and behavior of the application to a large extent. Since current Android system has not any restrictions to the number of permissions that an application can request, developers tend to apply more than actually needed permissions in order to ensure the successful running of the application, which results in the abuse of permissions. However, some traditional detection methods only consider the requested permissions and ignore whether it is actually used, which leads to incorrect identification of some malwares. Therefore, a machine learning detection method based on the actually used permissions combination and API calls was put forward in this paper. Meanwhile, several experiments are conducted to evaluate our methodology. The result shows that it can detect unknown malware effectively with higher true positive rate and accuracy while maintaining a low false positive rate. Consequently, the AdaboostM1 (J48) classification algorithm based on information gain feature selection algorithm has the best detection result, which can achieve an accuracy of 99.8%, a true positive rate of 99.6% and a lowest false positive rate of 0.

Keywords: android, API Calls, machine learning, permissions combination

Procedia PDF Downloads 331
2034 Effects of Hierarchy on Poisson’s Ratio and Phononic Bandgaps of Two-Dimensional Honeycomb Structures

Authors: Davood Mousanezhad, Ashkan Vaziri

Abstract:

As a traditional cellular structure, hexagonal honeycombs are known for their high strength-to-weight ratio. Here, we introduce a class of fractal-appearing hierarchical metamaterials by replacing the vertices of the original non-hierarchical hexagonal grid with smaller hexagons and iterating this process to achieve higher levels of hierarchy. It has been recently shown that the isotropic in-plane Young's modulus of this hierarchical structure at small deformations becomes 25 times greater than its regular counterpart with the same mass. At large deformations, we find that hierarchy-dependent elastic buckling introduced at relatively early stages of deformation decreases the value of Poisson's ratio as the structure is compressed uniaxially leading to auxeticity (i.e., negative Poisson's ratio) in subsequent stages of deformation. We also show that the topological hierarchical architecture and instability-induced pattern transformations of the structure under compression can be effectively used to tune the propagation of elastic waves within the structure. We find that the hierarchy tends to shift the existing phononic bandgaps (defined as frequency ranges of strong wave attenuation) to lower frequencies while opening up new bandgaps. Deformation is also demonstrated as another mechanism for opening more bandgaps in hierarchical structures. The results provide new insights into the role of structural organization and hierarchy in regulating mechanical properties of materials at both the static and dynamic regimes.

Keywords: cellular structures, honeycombs, hierarchical structures, metamaterials, multifunctional structures, phononic crystals, auxetic structures

Procedia PDF Downloads 353
2033 Signals Affecting Crowdfunding Success for Australian Social Enterprises

Authors: Mai Yen Nhi Doan, Viet Le, Chamindika Weerakoon

Abstract:

Social enterprises have emerged as sustainable organisations that deliver social achievement along with long-term financial advancement. However, recorded financial barriers have urged social enterprises to divert to other financing methods due to the misaligned ideology with traditional financing capitalists, in which crowdfunding can be a promising alternative. Previous studies in crowdfunding have inadequately addressed crowdfunding for social enterprises, with conflicting results due to the unsuitable analysis of signals in isolation rather than in combinations, using the data from platforms that do not support social enterprises. Extending the signalling theory, this study suggests that crowdfunding success results from the collaboration between costly and costless signals. The proposed conceptual framework enlightens the interaction between costly signals as “organisational information”, “social entrepreneur’s credibility,” and “third-party endorsement” and costless signals as various sub-signals under the “campaign preparedness” signal to achieve crowdfunding success. Using Qualitative Comparative Analysis, this study examined 45 crowdfunding campaigns run by Australian social enterprises on StartSomeGood and Chuffed. The analysis found that different combinations of costly and costless signals can lead to crowdfunding success, allowing social enterprises to adopt suitable combinations of signals to their context. Costless signal – campaign preparedness is fundamental for success, though different costless sub-signals under campaign preparedness can interact with different costly signals for the desired outcome. Third-party endorsement signal was found to be the necessary signal for crowdfunding success for Australian social enterprises.

Keywords: crowdfunding, qualitative comparative analysis (QCA), signalling theory, social enterprises

Procedia PDF Downloads 108
2032 Fuzzy Optimization Multi-Objective Clustering Ensemble Model for Multi-Source Data Analysis

Authors: C. B. Le, V. N. Pham

Abstract:

In modern data analysis, multi-source data appears more and more in real applications. Multi-source data clustering has emerged as a important issue in the data mining and machine learning community. Different data sources provide information about different data. Therefore, multi-source data linking is essential to improve clustering performance. However, in practice multi-source data is often heterogeneous, uncertain, and large. This issue is considered a major challenge from multi-source data. Ensemble is a versatile machine learning model in which learning techniques can work in parallel, with big data. Clustering ensemble has been shown to outperform any standard clustering algorithm in terms of accuracy and robustness. However, most of the traditional clustering ensemble approaches are based on single-objective function and single-source data. This paper proposes a new clustering ensemble method for multi-source data analysis. The fuzzy optimized multi-objective clustering ensemble method is called FOMOCE. Firstly, a clustering ensemble mathematical model based on the structure of multi-objective clustering function, multi-source data, and dark knowledge is introduced. Then, rules for extracting dark knowledge from the input data, clustering algorithms, and base clusterings are designed and applied. Finally, a clustering ensemble algorithm is proposed for multi-source data analysis. The experiments were performed on the standard sample data set. The experimental results demonstrate the superior performance of the FOMOCE method compared to the existing clustering ensemble methods and multi-source clustering methods.

Keywords: clustering ensemble, multi-source, multi-objective, fuzzy clustering

Procedia PDF Downloads 192
2031 Using Thinking Blocks to Encourage the Use of Higher Order Thinking Skills among Students When Solving Problems on Fractions

Authors: Abdul Halim Abdullah, Nur Liyana Zainal Abidin, Mahani Mokhtar

Abstract:

Problem-solving is an activity which can encourage students to use Higher Order Thinking Skills (HOTS). Learning fractions can be challenging for students since empirical evidence shows that students experience difficulties in solving the fraction problems. However, visual methods can help students to overcome the difficulties since the methods help students to make meaningful visual representations and link abstract concepts in Mathematics. Therefore, the purpose of this study was to investigate whether there were any changes in students’ HOTS at the four highest levels when learning the fractions by using Thinking Blocks. 54 students participated in a quasi-experiment using pre-tests and post-tests. Students were divided into two groups. The experimental group (n=32) received a treatment to improve the students’ HOTS and the other group acted as the control group (n=22) which used a traditional method. Data were analysed by using Mann-Whitney test. The results indicated that during post-test, students who used Thinking Blocks showed significant improvement in their HOTS level (p=0.000). In addition, the results of post-test also showed that the students’ performance improved significantly at the four highest levels of HOTS; namely, application (p=0.001), analyse (p=0.000), evaluate (p=0.000), and create (p=0.000). Therefore, it can be concluded that Thinking Blocks can effectively encourage students to use the four highest levels of HOTS which consequently enable them to solve fractions problems successfully.

Keywords: Thinking Blocks, Higher Order Thinking Skills (HOTS), fractions, problem solving

Procedia PDF Downloads 273
2030 Anomaly Detection in Financial Markets Using Tucker Decomposition

Authors: Salma Krafessi

Abstract:

The financial markets have a multifaceted, intricate environment, and enormous volumes of data are produced every day. To find investment possibilities, possible fraudulent activity, and market oddities, accurate anomaly identification in this data is essential. Conventional methods for detecting anomalies frequently fail to capture the complex organization of financial data. In order to improve the identification of abnormalities in financial time series data, this study presents Tucker Decomposition as a reliable multi-way analysis approach. We start by gathering closing prices for the S&P 500 index across a number of decades. The information is converted to a three-dimensional tensor format, which contains internal characteristics and temporal sequences in a sliding window structure. The tensor is then broken down using Tucker Decomposition into a core tensor and matching factor matrices, allowing latent patterns and relationships in the data to be captured. A possible sign of abnormalities is the reconstruction error from Tucker's Decomposition. We are able to identify large deviations that indicate unusual behavior by setting a statistical threshold. A thorough examination that contrasts the Tucker-based method with traditional anomaly detection approaches validates our methodology. The outcomes demonstrate the superiority of Tucker's Decomposition in identifying intricate and subtle abnormalities that are otherwise missed. This work opens the door for more research into multi-way data analysis approaches across a range of disciplines and emphasizes the value of tensor-based methods in financial analysis.

Keywords: tucker decomposition, financial markets, financial engineering, artificial intelligence, decomposition models

Procedia PDF Downloads 71
2029 Automatic Multi-Label Image Annotation System Guided by Firefly Algorithm and Bayesian Method

Authors: Saad M. Darwish, Mohamed A. El-Iskandarani, Guitar M. Shawkat

Abstract:

Nowadays, the amount of available multimedia data is continuously on the rise. The need to find a required image for an ordinary user is a challenging task. Content based image retrieval (CBIR) computes relevance based on the visual similarity of low-level image features such as color, textures, etc. However, there is a gap between low-level visual features and semantic meanings required by applications. The typical method of bridging the semantic gap is through the automatic image annotation (AIA) that extracts semantic features using machine learning techniques. In this paper, a multi-label image annotation system guided by Firefly and Bayesian method is proposed. Firstly, images are segmented using the maximum variance intra cluster and Firefly algorithm, which is a swarm-based approach with high convergence speed, less computation rate and search for the optimal multiple threshold. Feature extraction techniques based on color features and region properties are applied to obtain the representative features. After that, the images are annotated using translation model based on the Net Bayes system, which is efficient for multi-label learning with high precision and less complexity. Experiments are performed using Corel Database. The results show that the proposed system is better than traditional ones for automatic image annotation and retrieval.

Keywords: feature extraction, feature selection, image annotation, classification

Procedia PDF Downloads 587
2028 Pilot-Assisted Direct-Current Biased Optical Orthogonal Frequency Division Multiplexing Visible Light Communication System

Authors: Ayad A. Abdulkafi, Shahir F. Nawaf, Mohammed K. Hussein, Ibrahim K. Sileh, Fouad A. Abdulkafi

Abstract:

Visible light communication (VLC) is a new approach of optical wireless communication proposed to support the congested radio frequency (RF) spectrum. VLC systems are combined with orthogonal frequency division multiplexing (OFDM) to achieve high rate transmission and high spectral efficiency. In this paper, we investigate the Pilot-Assisted Channel Estimation for DC biased Optical OFDM (PACE-DCO-OFDM) systems to reduce the effects of the distortion on the transmitted signal. Least-square (LS) and linear minimum mean-squared error (LMMSE) estimators are implemented in MATLAB/Simulink to enhance the bit-error-rate (BER) of PACE-DCO-OFDM. Results show that DCO-OFDM system based on PACE scheme has achieved better BER performance compared to conventional system without pilot assisted channel estimation. Simulation results show that the proposed PACE-DCO-OFDM based on LMMSE algorithm can more accurately estimate the channel and achieves better BER performance when compared to the LS based PACE-DCO-OFDM and the traditional system without PACE. For the same signal to noise ratio (SNR) of 25 dB, the achieved BER is about 5×10-4 for LMMSE-PACE and 4.2×10-3 with LS-PACE while it is about 2×10-1 for system without PACE scheme.

Keywords: channel estimation, OFDM, pilot-assist, VLC

Procedia PDF Downloads 183
2027 Fault Tolerant (n,k)-star Power Network Topology for Multi-Agent Communication in Automated Power Distribution Systems

Authors: Ning Gong, Michael Korostelev, Qiangguo Ren, Li Bai, Saroj K. Biswas, Frank Ferrese

Abstract:

This paper investigates the joint effect of the interconnected (n,k)-star network topology and Multi-Agent automated control on restoration and reconfiguration of power systems. With the increasing trend in development in Multi-Agent control technologies applied to power system reconfiguration in presence of faulty components or nodes. Fault tolerance is becoming an important challenge in the design processes of the distributed power system topology. Since the reconfiguration of a power system is performed by agent communication, the (n,k)-star interconnected network topology is studied and modeled in this paper to optimize the process of power reconfiguration. In this paper, we discuss the recently proposed (n,k)-star topology and examine its properties and advantages as compared to the traditional multi-bus power topologies. We design and simulate the topology model for distributed power system test cases. A related lemma based on the fault tolerance and conditional diagnosability properties is presented and proved both theoretically and practically. The conclusion is reached that (n,k)-star topology model has measurable advantages compared to standard bus power systems while exhibiting fault tolerance properties in power restoration, as well as showing efficiency when applied to power system route discovery.

Keywords: (n, k)-star topology, fault tolerance, conditional diagnosability, multi-agent system, automated power system

Procedia PDF Downloads 513
2026 Fault Tolerant (n, k)-Star Power Network Topology for Multi-Agent Communication in Automated Power Distribution Systems

Authors: Ning Gong, Michael Korostelev, Qiangguo Ren, Li Bai, Saroj Biswas, Frank Ferrese

Abstract:

This paper investigates the joint effect of the interconnected (n,k)-star network topology and Multi-Agent automated control on restoration and reconfiguration of power systems. With the increasing trend in development in Multi-Agent control technologies applied to power system reconfiguration in presence of faulty components or nodes. Fault tolerance is becoming an important challenge in the design processes of the distributed power system topology. Since the reconfiguration of a power system is performed by agent communication, the (n,k)-star interconnected network topology is studied and modeled in this paper to optimize the process of power reconfiguration. In this paper, we discuss the recently proposed (n,k)-star topology and examine its properties and advantages as compared to the traditional multi-bus power topologies. We design and simulate the topology model for distributed power system test cases. A related lemma based on the fault tolerance and conditional diagnosability properties is presented and proved both theoretically and practically. The conclusion is reached that (n,k)-star topology model has measurable advantages compared to standard bus power systems while exhibiting fault tolerance properties in power restoration, as well as showing efficiency when applied to power system route discovery.

Keywords: (n, k)-star topology, fault tolerance, conditional diagnosability, multi-agent system, automated power system

Procedia PDF Downloads 466
2025 The Cell Viability Study of Extracts of Bark, Flowers, Leaves and Seeds of Indian Dhak Tree, Flame of Forest

Authors: Madhavi S. Apte, Milind Bhitre

Abstract:

In pharmaceutical research and new drug development, medicinal plants have important roles. Similarly, Indian dhak tree belonging to family Fabaceae has been widely used in the traditional Indian medical system of ‘Ayurveda’ for the treatment of a variety of ailments. Hence the cell viability study was undertaken to evaluate and compare the activity of extracts of various parts like flower, bark, leaf, seed by conducting MTT assay method along with other pharmacognostical studies. The methanolic extracts of bark, flowers, leaves, and seeds were used for the study. The cell viability MTT assay was performed using the standard operating procedures. The extracts were dissolved in DMSO and serially diluted with complete medium to get the concentrations range of test concentration. DMSO concentration was kept < 0.1% in all the samples. HUVEC cells maintained in appropriate conditions were seeded in 96 well plates and treated with different concentrations of the test samples and incubated at 37°C, 5% CO₂ for 96 hours. MTT reagent was added to the wells and incubated for 4 hours; the dark blue formazan product formed by the cells was dissolved in DMSO under a safety cabinet and read at 550nm. Percentage inhibitions were calculated and plotted with the concentrations used to calculate the IC50 values. The bark, flower, leaves and seed extracts have shown the cytotoxicity activity and can be further studied for antiangiogenesis activity.

Keywords: pharmacognosy, Cell viability, MTT assay, anti-angiogenesis

Procedia PDF Downloads 296
2024 Technology Valuation of Unconventional Gas R&D Project Using Real Option Approach

Authors: Young Yoon, Jinsoo Kim

Abstract:

The adoption of information and communication technologies (ICT) in all industry is growing under industry 4.0. Many oil companies also are increasingly adopting ICT to improve the efficiency of existing operations, take more accurate and quicker decision making and reduce entire cost by optimization. It is true that ICT is playing an important role in the process of unconventional oil and gas development and companies must take advantage of ICT to gain competitive advantage. In this study, real option approach has been applied to Unconventional gas R&D project to evaluate ICT of them. Many unconventional gas reserves such as shale gas and coal-bed methane(CBM) has developed due to technological improvement and high energy price. There are many uncertainties in unconventional development on the three stage(Exploration, Development, Production). The traditional quantitative benefits-cost method, such as net present value(NPV) is not sufficient for capturing ICT value. We attempted to evaluate the ICT valuation by applying the compound option model; the model is applied to real CBM project case, showing how it consider uncertainties. Variables are treated as uncertain and a Monte Carlo simulation is performed to consider variables effect. Acknowledgement—This work was supported by the Energy Efficiency & Resources Core Technology Program of the Korea Institute of Energy Technology Evaluation and Planning (KETEP) granted financial resource from the Ministry of Trade, Industry & Energy, Republic of Korea (No. 20152510101880) and by the National Research Foundation of Korea Grant funded by the Korean Government (NRF-205S1A3A2046684).

Keywords: information and communication technologies, R&D, real option, unconventional gas

Procedia PDF Downloads 232
2023 Origins of Strict Liability for Abnormally Dangerous Activities in the United States, Rylands v. Fletcher and a General Clause of Strict Liability in the UK

Authors: Maria Lubomira Kubica

Abstract:

The paper reveals the birth and evolution of the British precedent Rylands v. Fletcher that, once adopted on the other side of the Ocean (in United States), gave rise to a general clause of liability for abnormally dangerous activities recognized by the §20 of the American Restatements of the Law Third, Liability for Physical and Emotional Harm. The main goal of the paper was to analyze the development of the legal doctrine and of the case law posterior to the precedent together with the intent of the British judicature to leapfrog from the traditional rule contained in Rylands v. Fletcher to a general clause similar to that introduced in the United States and recently also on the European level. As it is well known, within the scope of tort law two different initiatives compete with the aim of harmonizing the European laws: European Group on Tort Law with its Principles of European Tort Law (hereinafter PETL) in which article 5:101 sets forth a general clause for strict liability for abnormally dangerous activities and Study Group on European Civil Code with its Common Frame of Reference (CFR) which promotes rather ad hoc model of listing out determined cases of strict liability. Very narrow application scope of the art. 5:101 PETL, restricted only to abnormally dangerous activities, stays in opposition to very broad spectrum of strict liability cases governed by the CFR. The former is a perfect example of a general clause that offers a minimum and basic standard, possibly acceptable also in those countries in which, like in the United Kingdom, this regime of liability is completely marginalized.

Keywords: Rylands v. Fletcher, strict liability, dangerous activities, general clause

Procedia PDF Downloads 323
2022 A Methodology for Automatic Diversification of Document Categories

Authors: Dasom Kim, Chen Liu, Myungsu Lim, Su-Hyeon Jeon, ByeoungKug Jeon, Kee-Young Kwahk, Namgyu Kim

Abstract:

Recently, numerous documents including unstructured data and text have been created due to the rapid increase in the usage of social media and the Internet. Each document is usually provided with a specific category for the convenience of the users. In the past, the categorization was performed manually. However, in the case of manual categorization, not only can the accuracy of the categorization be not guaranteed but the categorization also requires a large amount of time and huge costs. Many studies have been conducted towards the automatic creation of categories to solve the limitations of manual categorization. Unfortunately, most of these methods cannot be applied to categorizing complex documents with multiple topics because the methods work by assuming that one document can be categorized into one category only. In order to overcome this limitation, some studies have attempted to categorize each document into multiple categories. However, they are also limited in that their learning process involves training using a multi-categorized document set. These methods therefore cannot be applied to multi-categorization of most documents unless multi-categorized training sets are provided. To overcome the limitation of the requirement of a multi-categorized training set by traditional multi-categorization algorithms, we previously proposed a new methodology that can extend a category of a single-categorized document to multiple categorizes by analyzing relationships among categories, topics, and documents. In this paper, we design a survey-based verification scenario for estimating the accuracy of our automatic categorization methodology.

Keywords: big data analysis, document classification, multi-category, text mining, topic analysis

Procedia PDF Downloads 275
2021 Analysis and Experimental Research on the Influence of Lubricating Oil on the Transmission Efficiency of New Energy Vehicle Gearbox

Authors: Chen Yong, Bi Wangyang, Zang Libin, Li Jinkai, Cheng Xiaowei, Liu Jinmin, Yu Miao

Abstract:

New energy vehicle power transmission systems continue to develop in the direction of high torque, high speed, and high efficiency. The cooling and lubrication of the motor and the transmission system are integrated, and new requirements are placed on the lubricants for the transmission system. The effects of traditional lubricants and special lubricants for new energy vehicles on transmission efficiency were studied through experiments and simulation methods. A mathematical model of the transmission efficiency of the lubricating oil in the gearbox was established. The power loss of each part was analyzed according to the working conditions. The relationship between the speed and the characteristics of different lubricating oil products on the power loss of the stirring oil was discussed. The minimum oil film thickness was required for the life of the gearbox. The accuracy of the calculation results was verified by the transmission efficiency test conducted on the two-motor integrated test bench. The results show that the efficiency increases first and then decreases with the increase of the speed and decreases with the increase of the kinematic viscosity of the lubricant. The increase of the kinematic viscosity amplifies the transmission power loss caused by the high speed. New energy vehicle special lubricants have less attenuation of transmission efficiency in the range above mid-speed. The research results provide a theoretical basis and guidance for the evaluation and selection of transmission efficiency of gearbox lubricants for new energy vehicles.

Keywords: new energy vehicles, lubricants, transmission efficiency, kinematic viscosity, test and simulation

Procedia PDF Downloads 132
2020 Characterisation of Wind-Driven Ventilation in Complex Terrain Conditions

Authors: Daniel Micallef, Damien Bounaudet, Robert N. Farrugia, Simon P. Borg, Vincent Buhagiar, Tonio Sant

Abstract:

The physical effects of upstream flow obstructions such as vegetation on cross-ventilation phenomena of a building are important for issues such as indoor thermal comfort. Modelling such effects in Computational Fluid Dynamics simulations may also be challenging. The aim of this work is to establish the cross-ventilation jet behaviour in such complex terrain conditions as well as to provide guidelines on the implementation of CFD numerical simulations in order to model complex terrain features such as vegetation in an efficient manner. The methodology consists of onsite measurements on a test cell coupled with numerical simulations. It was found that the cross-ventilation flow is highly turbulent despite the very low velocities encountered internally within the test cells. While no direct measurement of the jet direction was made, the measurements indicate that flow tends to be reversed from the leeward to the windward side. Modelling such a phenomenon proves challenging and is strongly influenced by how vegetation is modelled. A solid vegetation tends to predict better the direction and magnitude of the flow than a porous vegetation approach. A simplified terrain model was also shown to provide good comparisons with observation. The findings have important implications on the study of cross-ventilation in complex terrain conditions since the flow direction does not remain trivial, as with the traditional isolated building case.

Keywords: complex terrain, cross-ventilation, wind driven ventilation, wind resource, computational fluid dynamics, CFD

Procedia PDF Downloads 396
2019 The Changing Role of the Chief Academic Officer in American Higher Education: Causes and Consequences

Authors: Michael W. Markowitz, Jeffrey Gingerich

Abstract:

The landscape of higher education in the United States has undergone significant changes in the last 25 years. What was once a domain of competition among prospective students for a limited number of college and university seats has become a marketplace in which institutions vie for the enrollment of educational consumers. A central figure in this paradigm shift has been the Chief Academic Officer (CAO), whose institutional role has also evolved beyond academics to include such disparate responsibilities as strategic planning, fiscal oversight, student recruitment, fundraising and personnel management. This paper explores the scope and impact of this transition by, first, explaining its context: the intersection of key social, economic and political factors in neo-conservative, late 20th Century America that redefined the value and accountability of institutions of higher learning. This context, in turn, is shown to have redefined the role and function of the CAO from a traditional academic leader to one centered on the successful application of corporate principles of organizational and fiscal management. Information gathered from a number of sitting Provosts, Vice-Presidents of Academic Affairs and Deans of Faculty is presented to illustrate the parameters of this change, as well as the extent to which today’s academic officers feel prepared and equipped to fulfill this broader institutional role. The paper concludes with a discussion of the impact of this transition on the American academy and whether it serves as a portend of change to come in higher education systems around the globe.

Keywords: academic administration, higher education, leadership, organizational management

Procedia PDF Downloads 222
2018 3D Multiuser Virtual Environments in Language Teaching

Authors: Hana Maresova, Daniel Ecler

Abstract:

The paper focuses on the use of 3D multi-user virtual environments (MUVE) in language teaching and presents the results of four years of research at the Faculty of Education, Palacký University in Olomouc (Czech Republic). In the form of an experiment, mother tongue language teaching in the 3D virtual worlds Second Life and Kitely (experimental group) and parallel traditional teaching on identical topics representing teacher's interpretation using a textbook (control group) were implemented. The didactic test, which was presented to the experimental and control groups in an identical form before and after the instruction, verified the effect of the instruction in the experimental group by comparing the results obtained by both groups. Within the three components of mother-tongue teaching (vocabulary, literature, style and communication education), the students in the literature group achieved partially better results (statistically significant in the case of items devoted to the area of visualization of the learning topic), while in the case of grammar and style education the respondents of the control group achieved better results. On the basis of the results obtained, we can conclude that the most appropriate use of MUVE can be seen in the teaching of those topics that provide the possibility of dramatization, experiential learning and group involvement and cooperation, on the contrary, with regard to the need to divide students attention between the topic taught and the control of avatar and movement in virtual reality as less suitable for teaching in the area of memorization of the topic or concepts.

Keywords: distance learning, 3D virtual environments, online teaching, language teaching

Procedia PDF Downloads 164
2017 Integrated Evaluation of Green Design and Green Manufacturing Processes Using a Mathematical Model

Authors: Yuan-Jye Tseng, Shin-Han Lin

Abstract:

In this research, a mathematical model for integrated evaluation of green design and green manufacturing processes is presented. To design a product, there can be alternative options to design the detailed components to fulfill the same product requirement. In the design alternative cases, the components of the product can be designed with different materials and detailed specifications. If several design alternative cases are proposed, the different materials and specifications can affect the manufacturing processes. In this paper, a new concept for integrating green design and green manufacturing processes is presented. A green design can be determined based the manufacturing processes of the designed product by evaluating the green criteria including energy usage and environmental impact, in addition to the traditional criteria of manufacturing cost. With this concept, a mathematical model is developed to find the green design and the associated green manufacturing processes. In the mathematical model, the cost items include material cost, manufacturing cost, and green related cost. The green related cost items include energy cost and environmental cost. The objective is to find the decisions of green design and green manufacturing processes to achieve the minimized total cost. In practical applications, the decision-making can be made to select a good green design case and its green manufacturing processes. In this presentation, an example product is illustrated. It shows that the model is practical and useful for integrated evaluation of green design and green manufacturing processes.

Keywords: supply chain management, green supply chain, green design, green manufacturing, mathematical model

Procedia PDF Downloads 811
2016 Large Scale Production of Polyhydroxyalkanoates (PHAs) from Waste Water: A Study of Techno-Economics, Energy Use, and Greenhouse Gas Emissions

Authors: Cora Fernandez Dacosta, John A. Posada, Andrea Ramirez

Abstract:

The biodegradable family of polymers polyhydroxyalkanoates are interesting substitutes for convectional fossil-based plastics. However, the manufacturing and environmental impacts associated with their production via intracellular bacterial fermentation are strongly dependent on the raw material used and on energy consumption during the extraction process, limiting their potential for commercialization. Industrial wastewater is studied in this paper as a promising alternative feedstock for waste valorization. Based on results from laboratory and pilot-scale experiments, a conceptual process design, techno-economic analysis and life cycle assessment are developed for the large-scale production of the most common type of polyhydroxyalkanoate, polyhydroxbutyrate. Intracellular polyhydroxybutyrate is obtained via fermentation of microbial community present in industrial wastewater and the downstream processing is based on chemical digestion with surfactant and hypochlorite. The economic potential and environmental performance results help identifying bottlenecks and best opportunities to scale-up the process prior to industrial implementation. The outcome of this research indicates that the fermentation of wastewater towards PHB presents advantages compared to traditional PHAs production from sugars because the null environmental burdens and financial costs of the raw material in the bioplastic production process. Nevertheless, process optimization is still required to compete with the petrochemicals counterparts.

Keywords: circular economy, life cycle assessment, polyhydroxyalkanoates, waste valorization

Procedia PDF Downloads 459
2015 Significance of Water Saving through Subsurface Drip Irrigation for Date Palm Trees

Authors: Ahmed I. Al-Amoud

Abstract:

A laboratory and field study were conducted on subsurface drip irrigation systems. In the first laboratory study, eight subsurface drip irrigation lines available locally, were selected and a number of experiments were made to evaluate line hydraulic characteristics to insure it's suitability for drip irrigation design requirements and high performance to select the best for field experiments. The second study involves field trials on mature date palm trees to study the effect of subsurface drip irrigation system on the yield and water consumption of date palms, and to compare that with the traditional surface drip irrigation system. Experiments were conducted in Alwatania Agricultural Project, on 50 mature palm trees (17 years old) of Helwa type with 10 meters spacing between rows and between trees. A high efficiency subsurface line (Techline) was used based on the results of the first study. Irrigation scheduling was made through a soil moisture sensing device to ensure enough soil water levels in the soil. Experiment layouts were installed during 2001 season, measurements continued till end of 2008 season. Results have indicated that there is an increase in the yield and a considerable saving in water compared to the conventional drip irrigation method. In addition there were high increases in water use efficiency using the subsurface system. The subsurface system proves to be durable and highly efficient for irrigating date palm trees.

Keywords: drip irrigation, subsurface drip irrigation, date palm trees, date palm water use, date palm yield

Procedia PDF Downloads 436
2014 Development of Multilayer Capillary Copper Wick Structure using Microsecond CO₂ Pulsed Laser

Authors: Talha Khan, Surendhar Kumaran, Rajeev Nair

Abstract:

The development of economical, efficient, and reliable next-generation thermal and water management systems to provide efficient cooling and water management technologies is being pursued application in compact and lightweight spacecraft. The elimination of liquid-vapor phase change-based thermal and water management systems is being done due to issues with the reliability and robustness of this technology. To achieve the motive of implementing the principle of using an innovative evaporator and condenser design utilizing bimodal wicks manufactured using a microsecond pulsed CO₂ laser has been proposed in this study. Cylin drical, multilayered capillary copper wicks with a substrate diameter of 39 mm are additively manufactured using a pulsed laser. The copper particles used for layer-by-layer addition on the substrate measure in a diameter range of 225 to 450 micrometers. The primary objective is to develop a novel, high-quality, fast turnaround, laser-based additive manufacturing process that will eliminate the current technical challenges involved with the traditional manufacturing processes for nano/micro-sized powders, like particle agglomeration. Raster-scanned, pulsed-laser sintering process has been developed to manufacture 3D wicks with controlled porosity and permeability.

Keywords: liquid-vapor phase change, bimodal wicks, multilayered, capillary, raster-scanned, porosity, permeability

Procedia PDF Downloads 194
2013 A Multi-Objective Gate Assignment Model Based on Airport Terminal Configuration

Authors: Seyedmirsajad Mokhtarimousavi, Danial Talebi, Hamidreza Asgari

Abstract:

Assigning aircrafts’ activities to appropriate gates is one the most challenging issues in airport authorities’ multiple criteria decision making. The potential financial loss due to imbalances of demand and supply in congested airports, higher occupation rates of gates, and the existing restrictions to expand facilities provide further evidence for the need for an optimal supply allocation. Passengers walking distance, towing movements, extra fuel consumption (as a result of awaiting longer to taxi when taxi conflicts happen at the apron area), etc. are the major traditional components involved in GAP models. In particular, the total cost associated with gate assignment problem highly depends on the airport terminal layout. The study herein presents a well-elaborated literature review on the topic focusing on major concerns, applicable variables and objectives, as well as proposing a three-objective mathematical model for the gate assignment problem. The model has been tested under different concourse layouts in order to check its performance in different scenarios. Results revealed that terminal layout pattern is a significant parameter in airport and that the proposed model is capable of dealing with key constraints and objectives, which supports its practical usability for future decision making tools. Potential solution techniques were also suggested in this study for future works.

Keywords: airport management, terminal layout, gate assignment problem, mathematical modeling

Procedia PDF Downloads 231
2012 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 255
2011 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 343
2010 A Deep Learning Approach to Online Social Network Account Compromisation

Authors: Edward K. Boahen, Brunel E. Bouya-Moko, Changda Wang

Abstract:

The major threat to online social network (OSN) users is account compromisation. Spammers now spread malicious messages by exploiting the trust relationship established between account owners and their friends. The challenge in detecting a compromised account by service providers is validating the trusted relationship established between the account owners, their friends, and the spammers. Another challenge is the increase in required human interaction with the feature selection. Research available on supervised learning (machine learning) has limitations with the feature selection and accounts that cannot be profiled, like application programming interface (API). Therefore, this paper discusses the various behaviours of the OSN users and the current approaches in detecting a compromised OSN account, emphasizing its limitations and challenges. We propose a deep learning approach that addresses and resolve the constraints faced by the previous schemes. We detailed our proposed optimized nonsymmetric deep auto-encoder (OPT_NDAE) for unsupervised feature learning, which reduces the required human interaction levels in the selection and extraction of features. We evaluated our proposed classifier using the NSL-KDD and KDDCUP'99 datasets in a graphical user interface enabled Weka application. The results obtained indicate that our proposed approach outperformed most of the traditional schemes in OSN compromised account detection with an accuracy rate of 99.86%.

Keywords: computer security, network security, online social network, account compromisation

Procedia PDF Downloads 121