Search results for: Eric Shannon
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 321

Search results for: Eric Shannon

291 On the Optimality Assessment of Nano-Particle Size Spectrometry and Its Association to the Entropy Concept

Authors: A. Shaygani, R. Saifi, M. S. Saidi, M. Sani

Abstract:

Particle size distribution, the most important characteristics of aerosols, is obtained through electrical characterization techniques. The dynamics of charged nano-particles under the influence of electric field in electrical mobility spectrometer (EMS) reveals the size distribution of these particles. The accuracy of this measurement is influenced by flow conditions, geometry, electric field and particle charging process, therefore by the transfer function (transfer matrix) of the instrument. In this work, a wire-cylinder corona charger was designed and the combined field-diffusion charging process of injected poly-disperse aerosol particles was numerically simulated as a prerequisite for the study of a multi-channel EMS. The result, a cloud of particles with non-uniform charge distribution, was introduced to the EMS. The flow pattern and electric field in the EMS were simulated using computational fluid dynamics (CFD) to obtain particle trajectories in the device and therefore to calculate the reported signal by each electrometer. According to the output signals (resulted from bombardment of particles and transferring their charges as currents), we proposed a modification to the size of detecting rings (which are connected to electrometers) in order to evaluate particle size distributions more accurately. Based on the capability of the system to transfer information contents about size distribution of the injected particles, we proposed a benchmark for the assessment of optimality of the design. This method applies the concept of Von Neumann entropy and borrows the definition of entropy from information theory (Shannon entropy) to measure optimality. Entropy, according to the Shannon entropy, is the ''average amount of information contained in an event, sample or character extracted from a data stream''. Evaluating the responses (signals) which were obtained via various configurations of detecting rings, the best configuration which gave the best predictions about the size distributions of injected particles, was the modified configuration. It was also the one that had the maximum amount of entropy. A reasonable consistency was also observed between the accuracy of the predictions and the entropy content of each configuration. In this method, entropy is extracted from the transfer matrix of the instrument for each configuration. Ultimately, various clouds of particles were introduced to the simulations and predicted size distributions were compared to the exact size distributions.

Keywords: aerosol nano-particle, CFD, electrical mobility spectrometer, von neumann entropy

Procedia PDF Downloads 312
290 Analysis of Creative City Indicators in Isfahan City, Iran

Authors: Reza Mokhtari Malek Abadi, Mohsen Saghaei, Fatemeh Iman

Abstract:

This paper investigates the indices of a creative city in Isfahan. Its main aim is to evaluate quantitative status of the creative city indices in Isfahan city, analyze the dispersion and distribution of these indices in Isfahan city. Concerning these, this study tries to analyze the creative city indices in fifteen area of Isfahan through secondary data, questionnaire, TOPSIS model, Shannon entropy and SPSS. Based on this, the fifteen areas of Isfahan city have been ranked with 12 factors of creative city indices. The results of studies show that fifteen areas of Isfahan city are not equally benefiting from creative indices and there is much difference between the areas of Isfahan city.

Keywords: grading, creative city, creative city evaluation indicators, regional planning model

Procedia PDF Downloads 434
289 Rényi Entropy Correction to Expanding Universe

Authors: Hamidreza Fazlollahi

Abstract:

The Re ́nyi entropy comprises a group of data estimates that sums up the well-known Shannon entropy, acquiring a considerable lot of its properties. It appears as unqualified and restrictive entropy, relative entropy, or common data, and has found numerous applications in information theory. In the Re ́nyi’s argument, the area law of the black hole entropy plays a significant role. However, the total entropy can be modified by some quantum effects, motivated by the randomness of a system. In this note, by employing this modified entropy relation, we have derived corrections to Friedmann equations. Taking this entropy associated with the apparent horizon of the Friedmann-Robertson-Walker Universe and assuming the first law of thermodynamics, dE=T_A (dS)_A+WdV, satisfies the apparent horizon, we have reconsidered expanding Universe. Also, the second thermodynamics law has been examined.

Keywords: Friedmann equations, dark energy, first law of thermodynamics, Reyni entropy

Procedia PDF Downloads 64
288 Combinatory Nutrition Supplementation: A Case of Synergy for Increasing Calcium Bioavailability

Authors: Daniel C. S. Lim, Eric Y. M. Yeo, W. Y. Tan

Abstract:

This paper presents an overview of how calcium interacts with the various essential nutrients within an environment of cellular and hormonal interactions for the purpose of increasing bioavailability to the human body. One example of such interactions can be illustrated with calcium homeostasis. This paper gives an in-depth discussion on the possible interactive permutations with various nutrients and factors leading to the promotion of calcium bioavailability to the body. The review hopes to provide further insights into how calcium supplement formulations can be improved to better influence its bioavailability in the human body.

Keywords: bioavailability, environment of cellular and hormonal interactions, nutritional combinations, synergistic

Procedia PDF Downloads 367
287 Creation of a Test Machine for the Scientific Investigation of Chain Shot

Authors: Mark McGuire, Eric Shannon, John Parmigiani

Abstract:

Timber harvesting increasingly involves mechanized equipment. This has increased the efficiency of harvesting, but has also introduced worker-safety concerns. One such concern arises from the use of harvesters. During operation, harvesters subject saw chain to large dynamic mechanical stresses. These stresses can, under certain conditions, cause the saw chain to fracture. The high speed of harvester saw chain can cause the resulting open chain loop to fracture a second time due to the dynamic loads placed upon it as it travels through space. If a second fracture occurs, it can result in a projectile consisting of one-to-several chain links. This projectile is referred to as a chain shot. It has speeds similar to a bullet but typically has greater mass and is a significant safety concern. Numerous examples exist of chain shots penetrating bullet-proof barriers and causing severe injury and death. Improved harvester-cab barriers can help prevent injury however a comprehensive scientific understanding of chain shot is required to consistently reduce or prevent it. Obtaining this understanding requires a test machine with the capability to cause chain shot to occur under carefully controlled conditions and accurately measure the response. Worldwide few such test machine exist. Those that do focus on validating the ability of barriers to withstand a chain shot impact rather than obtaining a scientific understanding of the chain shot event itself. The purpose of this paper is to describe the design, fabrication, and use of a test machine capable of a comprehensive scientific investigation of chain shot. The capabilities of this machine are to test all commercially-available saw chains and bars at chain tensions and speeds meeting and exceeding those typically encountered in harvester use and accurately measure the corresponding key technical parameters. The test machine was constructed inside of a standard shipping container. This provides space for both an operator station and a test chamber. In order to contain the chain shot under any possible test conditions, the test chamber was lined with a base layer of AR500 steel followed by an overlay of HDPE. To accommodate varying bar orientations and fracture-initiation sites, the entire saw chain drive unit and bar mounting system is modular and capable of being located anywhere in the test chamber. The drive unit consists of a high-speed electric motor with a flywheel. Standard Ponsse harvester head components are used to bar mounting and chain tensioning. Chain lubrication is provided by a separate peristaltic pump. Chain fracture is initiated through ISO standard 11837. Measure parameters include shaft speed, motor vibration, bearing temperatures, motor temperature, motor current draw, hydraulic fluid pressure, chain force at fracture, and high-speed camera images. Results show that the machine is capable of consistently causing chain shot. Measurement output shows fracture location and the force associated with fracture as a function of saw chain speed and tension. Use of this machine will result in a scientific understanding of chain shot and consequently improved products and greater harvester operator safety.

Keywords: chain shot, safety, testing, timber harvesters

Procedia PDF Downloads 124
286 On Musical Information Geometry with Applications to Sonified Image Analysis

Authors: Shannon Steinmetz, Ellen Gethner

Abstract:

In this paper, a theoretical foundation is developed for patterned segmentation of audio using the geometry of music and statistical manifold. We demonstrate image content clustering using conic space sonification. The algorithm takes a geodesic curve as a model estimator of the three-parameter Gamma distribution. The random variable is parameterized by musical centricity and centric velocity. Model parameters predict audio segmentation in the form of duration and frame count based on the likelihood of musical geometry transition. We provide an example using a database of randomly selected images, resulting in statistically significant clusters of similar image content.

Keywords: sonification, musical information geometry, image, content extraction, automated quantification, audio segmentation, pattern recognition

Procedia PDF Downloads 185
285 Arabic Quran Search Tool Based on Ontology

Authors: Mohammad Alqahtani, Eric Atwell

Abstract:

This paper reviews and classifies most of the important types of search techniques that have been applied on the holy Quran. Then, it addresses the limitations in these techniques. Additionally, this paper surveys most existing Quranic ontologies and what are their deficiencies. Finally, it explains a new search tool called: A semantic search tool for Al Quran based on Qur’anic ontologies. This tool will overcome all limitations in the existing Quranic search applications.

Keywords: holy Quran, natural language processing (NLP), semantic search, information retrieval (IR), ontology

Procedia PDF Downloads 541
284 Knowledge Loss Risk Assessment for Departing Employees: An Exploratory Study

Authors: Muhammad Saleem Ullah Khan Sumbal, Eric Tsui, Ricky Cheong, Eric See To

Abstract:

Organizations are posed to a threat of valuable knowledge loss when employees leave either due to retirement, resignation, job change or because of disabilities e.g. death, etc. Due to changing economic conditions, globalization, and aging workforce, organizations are facing challenges regarding retention of valuable knowledge. On the one hand, large number of employees are going to retire in the organizations whereas on the other hand, younger generation does not want to work in a company for a long time and there is an increasing trend of frequent job change among the new generation. Because of these factors, organizations need to make sure that they capture the knowledge of employee before (s)he walks out of the door. The first step in this process is to know what type of knowledge employee possesses and whether this knowledge is important for the organization. Researchers reveal in the literature that despite the serious consequences of knowledge loss in terms of organizational productivity and competitive advantage, there has not been much work done in the area of knowledge loss assessment of departing employees. An important step in the knowledge retention process is to determine the critical ‘at risk’ knowledge. Thus, knowledge loss risk assessment is a process by which organizations can gauge the importance of knowledge of the departing employee. The purpose of this study is to explore this topic of knowledge loss risk assessment by conducting a qualitative study in oil and gas sector. By engaging in dialogues with managers and executives of the organizations through in-depth interviews and adopting a grounded methodology approach, the research will explore; i) Are there any measures adopted by organizations to assess the risk of knowledge loss from departing employees? ii) Which factors are crucial for knowledge loss assessment in the organizations? iii) How can we prioritize the employees for knowledge retention according to their criticality? Grounded theory approach is used when there is not much knowledge available in the area under research and thus new knowledge is generated about the topic through an in-depth exploration of the topic by using methods such as interviews and using a systematic approach to analyze the data. The outcome of the study will generate a model for the risk of knowledge loss through factors such as the likelihood of knowledge loss, the consequence/impact of knowledge loss and quality of the knowledge loss of departing employees. Initial results show that knowledge loss assessment is quite crucial for the organizations and it helps in determining what types of knowledge employees possess e.g. organizations knowledge, subject matter expertise or relationships knowledge. Based on that, it can be assessed which employee is more important for the organizations and how to prioritize the knowledge retention process for departing employees.

Keywords: knowledge loss, risk assessment, departing employees, Hong Kong organizations

Procedia PDF Downloads 373
283 The Comparison of Bird’s Population between Naturally Regenerated Acacia Forest with Adjacent Secondary Indigenous Forest in Universiti Malaysia Sabah

Authors: Jephte Sompud, Emily A. Gilbert, Andy Russel Mojiol, Cynthia B. Sompud, Alim Biun

Abstract:

Naturally regenerated acacia forest and secondary indigenous forest forms some of the urban forests in Sabah. Naturally regenerated acacia trees are usually seen along the road that exists as forest islands. Acacia tree is not an indigenous tree species in Sabah that was introduced in the 1960’s as fire breakers that eventually became one of the preferred trees for forest plantation for paper and pulp production. Due to its adaptability to survive even in impoverished soils and poor-irrigated land, this species has rapidly spread throughout Sabah through natural regeneration. Currently, there is a lack of study to investigate the bird population in the naturally regenerated acacia forest. This study is important because it shed some light on the role of naturally regenerated acacia forest on bird’s population, as bird is known to be a good bioindicator forest health. The aim of this study was to document the bird’s population in naturally regenerated acacia forest with that adjacent secondary indigenous forest. The study site for this study was at Universiti Malaysia Sabah (UMS) Campus. Two forest types in the campus were chosen as a study site, of which were naturally regenerated Acacia Forest and adjacent secondary indigenous forest, located at the UMS Hill. A total of 21 sampling days were conducted in each of the forest types. The method used during this study was solely mist nets with three pockets. Whenever a bird is caught, it is extracted from the net to be identified and measurements were recorded in a standard data sheet. Mist netting was conducted from 6 morning until 5 evening. This study was conducted between February to August 2014. Birds that were caught were ring banded to initiate a long-term study on the understory bird’s population in the Campus The data was analyzed using descriptive analysis, diversity indices, and t-test. The bird population diversity at naturally regenerated Acacia forest with those at the secondary indigenous forest was calculated using two common indices, of which were Shannon-Wiener and Simpson diversity index. There were 18 families with 33 species that were recorded from both sites. The number of species recorded at the naturally regenerated acacia forest was 26 species while at the secondary indigenous forest were 19 species. The Shannon diversity index for Naturally Regenerated Acacia Forest and secondary indigenous forests were 2.87 and 2.46. The results show that there was very significantly higher species diversity at the Naturally Regenerated Acacia Forest as opposed to the secondary indigenous forest (p<0.001). This suggests that Naturally Regenerated Acacia forest plays an important role in urban bird conservation. It is recommended that Naturally Regenerated Acacia Forests should be considered as an established urban forest conservation area as they do play a role in biodiversity conservation. More future studies in Naturally Regenerated Acacia Forest should be encouraged to determine the status and value of biodiversity conservation of this ecosystem.

Keywords: naturally regenerated acacia forest, bird population diversity, Universiti Malaysia Sabah, biodiversity conservation

Procedia PDF Downloads 394
282 Distributed Cyber Physical Secure Framework for DC Microgrids: DC Ship Power System Applications

Authors: Grace karimi Muriithi, Behnaz Papari, Ali Arsalan, Christopher Shannon Edrington

Abstract:

Complexity and nonlinearity of the control system design is increasing for DC microgrid applications when the cyber concept associated with the technology constraints will added to the picture. Controllers’ functionality during the critical operation mode is required to guaranteed specifically for a high profile applications such as NAVY DC ship power system (SPS) as an small-scaled DC microgrid. Thus, SPS is susceptible to cyber-attacks and, accordingly, can provide the disastrous effects. In this study, a machine learning (ML) approach is demonstrated to offer the promising performance of SPS for developing an effective and robust functionality over attacks time. Simulation results analysis demonstrate that the proposed method can improve the controllability successfully.

Keywords: controlability, cyber attacks, distribute control, machine learning

Procedia PDF Downloads 73
281 Peer Instruction, Technology, Education for Textile and Fashion Students

Authors: Jimmy K. C. Lam, Carrie Wong

Abstract:

One of the key goals on Learning and Teaching as documented in the University strategic plan 2012/13 – 2017/18 is to encourage active learning, the use of innovative teaching approaches and technology, and promoting the adoption of flexible and varied teaching delivery methods. This research reported the recent visited to Prof Eric Mazur at Harvard University on Peer Instruction: Collaborative learning in large class and innovative use of technology to enable new mode of learning. Peer Instruction is a research-based, interactive teaching method developed by Prof. Eric Mazur at Harvard University in the 1990s. It has been adopted across the disciplines, institutional type and throughout the world. One problem with conventional teaching lies in the presentation of the material. Frequently, it comes straight out of textbook/notes, giving students little incentive to attend class. This traditional presentation is always delivered as monologue in front of passive audience. Only exceptional lecturers are capable of holding students’ attention for an entire lecture period. Consequently, lectures simply reinforce students’ feelings that the most important step in mastering the material is memorizing a zoo of unrelated examples. In order to address these misconceptions about learning, Prof Mazur’s Team developed “Peer Instruction”, a method which involves students in their own learning during lectures and focuses their attention on underling concepts. Lectures are interspersed with conceptual questions called Concept Tests, designed to expose common difficulties in understanding the material. The students are given one or two minutes to think about the question and formulate their own answers; they then spend two or three minutes discussing their answers in a group of three or four, attempting to reach consensus on the correct answer. This process forces the students to think through the arguments being developed, and enable them to assess their understanding concepts before they leave the classroom. The findings from Peer Instruction and innovative use of technology on teaching at Harvard University were applied to the first year Textiles and Fashion students in Hong Kong. Survey conducted from 100 students showed that over 80% students enjoyed the flexibility of peer instruction and 70% of them enjoyed the instant feedback from the Clicker system (Student Response System used at Harvard University). Further work will continue to explore the possibility of peer instruction to art and fashion students.

Keywords: peer instruction, education, technology, fashion

Procedia PDF Downloads 292
280 Comprehensive Analysis of Power Allocation Algorithms for OFDM Based Communication Systems

Authors: Rakesh Dubey, Vaishali Bahl, Dalveer Kaur

Abstract:

The spiralling urge for high rate data transmission over wireless mediums needs intelligent use of electromagnetic resources considering restrictions like power ingestion, spectrum competence, robustness against multipath propagation and implementation intricacy. Orthogonal frequency division multiplexing (OFDM) is a capable technique for next generation wireless communication systems. For such high rate data transfers there is requirement of proper allocation of resources like power and capacity amongst the sub channels. This paper illustrates various available methods of allocating power and the capacity requirement with the constraint of Shannon limit.

Keywords: Additive White Gaussian Noise, Multi-Carrier Modulation, Orthogonal Frequency Division Multiplexing (OFDM), Signal to Noise Ratio (SNR), Water Filling

Procedia PDF Downloads 526
279 Butterfly Diversity along Urban-Rural Gradient in Kolkata, India

Authors: Sushmita Chaudhuri, Parthiba Basu

Abstract:

Urbanization leads to habitat degradation and is responsible for the fast disappearance of native butterfly species. Random sampling of rural, suburban and urban sites in an around Kolkata metropolis revealed the presence of 28 species of butterfly belonging to 5 different families in winter (February-March). Butterfly diversity, species richness and abundance decreased with increase in urbanization. Psyche (Leptosia nina of family Pieridae) was the most predominant butterfly species found everywhere in Kolkata during the winter period. The most dominant family was Nymphalidae (11species), followed by Pieridae (6 species), Lycaenidae (5 species), Papilionidae (4 species) and Hesperiidae (2 species). The rural and suburban sites had butterfly species that were unique to those sites. Vegetation cover and flowering shrub density were significantly related to butterfly diversity.

Keywords: butterfly, Kolkata metropolis, Shannon-Weiner diversity index, species diversity

Procedia PDF Downloads 257
278 Estimating Big Five Personality Expressions with a Tiered Information Framework

Authors: Laura Kahn, Paul Rodrigues, Onur Savas, Shannon Hahn

Abstract:

An empirical understanding of an individual's personality expression can have a profound impact on organizations seeking to strengthen team performance and improve employee retention. A team's personality composition can impact overall performance. Creating a tiered information framework that leverages proxies for a user's social context and lexical and linguistic content provides insight into location-specific personality expression. We leverage the layered framework to examine domain-specific, psychological, and lexical cues within social media posts. We apply DistilBERT natural language transfer learning models with real world data to examine the relationship between Big Five personality expressions of people in Science, Technology, Engineering and Math (STEM) fields.

Keywords: big five, personality expression, social media analysis, workforce development

Procedia PDF Downloads 101
277 Assessment of Genetic Diversity of Iranian Purslane (Portulaca Oleracea L.) Accessions Using ISSR Makers

Authors: Mehdi Mohebodini, Iman Khalili-Baseri, Mehdi Behnamian, Sara Dezhsetan

Abstract:

Diversity analysis at the molecular level using PCR-based markers is the efficient and rapid method of identifying the relationships and differences among the genotypes. In the present study, genetic diversity and relationships among 20 collected purslane accessions were evaluated using ISSR markers. The genotyping data were used to understand the relationships among the collected accessions and identify genetically diverse purslane accessions. The 25 primers gave a total of 92 bands, of which 62 were polymorphic (67.4%). The genetic diversity as estimated by Shannon’s information index was 0.55, revealing a quite high level of genetic diversity in the germplasm. The average number of an observed allele, effective allele, polymorphic information content (PIC) and Nei’s index were 2, 1.65, 0.37 and 0.37, respectively.

Keywords: Portulaca oleracea L., genetic diversity, ISSR, germplasm

Procedia PDF Downloads 404
276 Risk Assessment of Building Information Modelling Adoption in Construction Projects

Authors: Amirhossein Karamoozian, Desheng Wu, Behzad Abbasnejad

Abstract:

Building information modelling (BIM) is a new technology to enhance the efficiency of project management in the construction industry. In addition to the potential benefits of this useful technology, there are various risks and obstacles to applying it in construction projects. In this study, a decision making approach is presented for risk assessment in BIM adoption in construction projects. Various risk factors of exerting BIM during different phases of the project lifecycle are identified with the help of Delphi method, experts’ opinions and related literature. Afterward, Shannon’s entropy and Fuzzy TOPSIS (Technique for Order Preference by Similarity to Ideal Situation) are applied to derive priorities of the identified risk factors. Results indicated that lack of knowledge between professional engineers about workflows in BIM and conflict of opinions between different stakeholders are the risk factors with the highest priority.

Keywords: risk, BIM, fuzzy TOPSIS, construction projects

Procedia PDF Downloads 191
275 How Tattoos and Brands Impact the Recovery of Sex Trafficking Victim: An Exploratory Study of Sex Trafficking Survivors.

Authors: Jeremy Berry, Shannon Rodrigue, Caroline Norris

Abstract:

This study explores the impact of tattoos and/or brands on the recovery of sex trafficking survivors. Many victims of sex trafficking are forced or coerced to take markings of ownership while in the sex trafficking trade in the form of painful tattoos or brands. As a result, victims who are rescued and in recovery often must live with permanent reminders of their traumatic experiences or are left to resort to expensive cosmetic or cover-up jobs, which for many are out of reach. As is often true of domestic violence victims who are left with scars from their abusers, the impact of these permanent markers can delay the healing process and contribute to post-traumatic stress. This study tells the story from the perspectives of the survivors of sex trafficking, how these specific permanent reminders impacted their healing. The study employs a thematic analysis of interviews with sex trafficking victims via focus group interviews.

Keywords: sex trafficking, tattoos, trauma, healing

Procedia PDF Downloads 156
274 Correlation Matrix for Automatic Identification of Meal-Taking Activity

Authors: Ghazi Bouaziz, Abderrahim Derouiche, Damien Brulin, Hélène Pigot, Eric Campo

Abstract:

Automatic ADL classification is a crucial part of ambient assisted living technologies. It allows to monitor the daily life of the elderly and to detect any changes in their behavior that could be related to health problem. But detection of ADLs is a challenge, especially because each person has his/her own rhythm for performing them. Therefore, we used a correlation matrix to extract custom rules that enable to detect ADLs, including eating activity. Data collected from 3 different individuals between 35 and 105 days allows the extraction of personalized eating patterns. The comparison of the results of the process of eating activity extracted from the correlation matrices with the declarative data collected during the survey shows an accuracy of 90%.

Keywords: elderly monitoring, ADL identification, matrix correlation, meal-taking activity

Procedia PDF Downloads 59
273 Predicting the Effect of Silicon Electrode Design Parameters on Thermal Performance of a Lithium-Ion Battery

Authors: Harika Dasari, Eric Eisenbraun

Abstract:

The present study models the role of electrode structural characteristics on the thermal behavior of lithium-ion batteries. Preliminary modeling runs have employed a 1D lithium-ion battery coupled to a two-dimensional axisymmetric model using silicon as the battery anode material. The two models are coupled by the heat generated and the average temperature. Our study is focused on the silicon anode particle sizes and it is observed that silicon anodes with nano-sized particles reduced the temperature of the battery in comparison to anodes with larger particles. These results are discussed in the context of the relationship between particle size and thermal transport properties in the electrode.

Keywords: particle size, NMC, silicon, heat generation, separator

Procedia PDF Downloads 254
272 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 658
271 3rd Generation Modular Execution: A Global Breakthrough in Modular Facility Construction System

Authors: Sean Bryner S. Rey, Eric Tanjutco

Abstract:

Modular execution strategies are performed to address the various challenges of any projects and are implemented on each project phase that covers Engineering, Procurement, Fabrication and Construction. It was until the recent years that the intent to surpass mechanical modularization approach were conceptualized to give solution to much greater demands of project components such as site location and adverse weather condition, material sourcing, construction schedule, safety risks and overall plot layout and allocation. The intent of this paper is to introduce the 3rd Generation Modular Execution with an overview of its advantages on project execution and will give emphasis on Engineering, Construction, Operation and Maintenance. Most importantly, the paper will present the key differentiator of 3rd Gen modular execution against other conventional project execution and the merits it bears for the industry.

Keywords: 3rd generation modular, process block, construction, operation & maintenance

Procedia PDF Downloads 445
270 Generalization of Tsallis Entropy from a Q-Deformed Arithmetic

Authors: J. Juan Peña, J. Morales, J. García-Ravelo, J. García-Martínes

Abstract:

It is known that by introducing alternative forms of exponential and logarithmic functions, the Tsallis entropy Sq is itself a generalization of Shannon entropy S. In this work, from a deformation through a scaling function applied to the differential operator, it is possible to generate a q-deformed calculus as well as a q-deformed arithmetic, which not only allows generalizing the exponential and logarithmic functions but also any other standard function. The updated q-deformed differential operator leads to an updated integral operator under which the functions are integrated together with a weight function. For each differentiable function, it is possible to identify its q-deformed partner, which is useful to generalize other algebraic relations proper of the original functions. As an application of this proposal, in this work, a generalization of exponential and logarithmic functions is studied in such a way that their relationship with the thermodynamic functions, particularly the entropy, allows us to have a q-deformed expression of these. As a result, from a particular scaling function applied to the differential operator, a q-deformed arithmetic is obtained, leading to the generalization of the Tsallis entropy.

Keywords: q-calculus, q-deformed arithmetic, entropy, exponential functions, thermodynamic functions

Procedia PDF Downloads 30
269 Polyvictimization and the Risk of Harm to Self and Others among Children and Youth

Authors: Shannon L. Stewart, Ashley Toohey, Natalia Lapshina

Abstract:

There is a well-established relationship between childhood maltreatment and negative outcomes (e.g., physical and mental health problems, social skill deficits, poor quality of life). The goal of this study was to examine the relationship between polyvictimization (multiple types of trauma) and risk of harm to self and others, taking into account possible age and sex differences. A total of 8980 children and youth were recruited from over 50 mental health facilities across Ontario, Canada. Among this sample, 29% of children and youth had experienced polyvictimization. Results showed that female children and youth who had experienced trauma were at greater risk of harm to themselves, while their male counterparts were at greater risk of harming others. Further, findings from this study highlight that experiencing polyvictimization, regardless of age or sex, increased the risk of harm to self and others. These findings add to extant literature as to the cumulative relationship between polyvictimization and risk in relation to harming oneself or others. Further, results from this study have significant implications for assessment and care-planning for those children and youth presenting with a trauma background.

Keywords: children's mental health, polyvictimization, risk of harm, sex differences

Procedia PDF Downloads 107
268 Relationship Between Brain Entropy Patterns Estimated by Resting State fMRI and Child Behaviour

Authors: Sonia Boscenco, Zihan Wang, Euclides José de Mendoça Filho, João Paulo Hoppe, Irina Pokhvisneva, Geoffrey B.C. Hall, Michael J. Meaney, Patricia Pelufo Silveira

Abstract:

Entropy can be described as a measure of the number of states of a system, and when used in the context of physiological time-based signals, it serves as a measure of complexity. In functional connectivity data, entropy can account for the moment-to-moment variability that is neglected in traditional functional magnetic resonance imaging (fMRI) analyses. While brain fMRI resting state entropy has been associated with some pathological conditions like schizophrenia, no investigations have explored the association between brain entropy measures and individual differences in child behavior in healthy children. We describe a novel exploratory approach to evaluate brain fMRI resting state data in two child cohorts, and MAVAN (N=54, 4.5 years, 48% males) and GUSTO (N = 206, 4.5 years, 48% males) and its associations to child behavior, that can be used in future research in the context of child exposures and long-term health. Following rs-fMRI data pre-processing and Shannon entropy calculation across 32 network regions of interest to acquire 496 unique functional connections, partial correlation coefficient analysis adjusted for sex was performed to identify associations between entropy data and Strengths and Difficulties questionnaire in MAVAN and Child Behavior Checklist domains in GUSTO. Significance was set at p < 0.01, and we found eight significant associations in GUSTO. Negative associations were found between two frontoparietal regions and cerebellar posterior and oppositional defiant problems, (r = -0.212, p = 0.006) and (r = -0.200, p = 0.009). Positive associations were identified between somatic complaints and four default mode connections: salience insula (r = 0.202, p < 0.01), dorsal attention intraparietal sulcus (r = 0.231, p = 0.003), language inferior frontal gyrus (r = 0.207, p = 0.008) and language posterior superior temporal gyrus (r = 0.210, p = 0.008). Positive associations were also found between insula and frontoparietal connection and attention deficit / hyperactivity problems (r = 0.200, p < 0.01), and insula – default mode connection and pervasive developmental problems (r = 0.210, p = 0.007). In MAVAN, ten significant associations were identified. Two positive associations were found = with prosocial scores: the salience prefrontal cortex and dorsal attention connection (r = 0.474, p = 0.005) and the salience supramarginal gyrus and dorsal attention intraparietal sulcus (r = 0.447, p = 0.008). The insula and prefrontal connection were negatively associated with peer problems (r = -0.437, p < 0.01). Conduct problems were negatively associated with six separate connections, the left salience insula and right salience insula (r = -0.449, p = 0.008), left salience insula and right salience supramarginal gyrus (r = -0.512, p = 0.002), the default mode and visual network (r = -0.444, p = 0.009), dorsal attention and language network (r = -0.490, p = 0.003), and default mode and posterior parietal cortex (r = -0.546, p = 0.001). Entropy measures of resting state functional connectivity can be used to identify individual differences in brain function that are correlated with variation in behavioral problems in healthy children. Further studies applying this marker into the context of environmental exposures are warranted.

Keywords: child behaviour, functional connectivity, imaging, Shannon entropy

Procedia PDF Downloads 170
267 Investigation of Genetic Diversity of Tilia tomentosa Moench. (Silver Lime) in Duzce-Turkey

Authors: Ibrahim Ilker Ozyigit, Ertugrul Filiz, Seda Birbilener, Semsettin Kulac, Zeki Severoglu

Abstract:

In this study, we have performed genetic diversity analysis of Tilia tomentosa genotypes by using randomly amplified polymorphic DNA (RAPD) primers. A total of 28 genotypes, including 25 members from the urban ecosystem and 3 genotypes from forest ecosystem as outgroup were used. 8 RAPD primers produced a total of 53 bands, of which 48 (90.6 %) were polymorphic. Percentage of polymorphic loci (P), observed number of alleles (Na), effective number of alleles (Ne), Nei's (1973) gene diversity (h), and Shannon's information index (I) were found as 94.29 %, 1.94, 1.60, 0.34, and 0.50, respectively. The unweighted pair-group method with arithmetic average (UPGMA) cluster analysis revealed that two major groups were observed. The genotypes of urban and forest ecosystems showed a high genetic similarity between 28% and 92% and these genotypes did not separate from each other in UPGMA tree. Also, urban and forest genotypes clustered together in principal component analysis (PCA).

Keywords: Tilia tomentosa, genetic diversity, urban ecosystem, RAPD, UPGMA

Procedia PDF Downloads 484
266 Augmented Tourism: Definitions and Design Principles

Authors: Eric Hawkinson

Abstract:

After designing and implementing several iterations of implementations of augmented reality (AR) in tourism, this paper takes a deep look into design principles and implementation strategies of using AR at destination tourism settings. The study looks to define augmented tourism from past implementations as well as several cases, uses designed and implemented for tourism. The discussion leads to formation of frameworks and best practices for AR as well as virtual reality( VR) to be used in tourism settings. Some main affordances include guest autonomy, customized experiences, visitor data collection and increased electronic word-of-mouth generation for promotion purposes. Some challenges found include the need for high levels of technology infrastructure, low adoption rates or ‘buy-in’ rates, high levels of calibration and customization, and the need for maintenance and support services. Some suggestions are given as to how to leverage the affordances and meet the challenges of implementing AR for tourism.

Keywords: augmented tourism, augmented reality, eTourism, virtual tourism, tourism design

Procedia PDF Downloads 338
265 Entomofauna Biodiversity of a Citrus Orchard in Baraki, Algeria

Authors: Ahlem Guerzou, Salheddine Doumandji

Abstract:

Orchards and minimally processed with surrounding hedges form a significant source of biodiversity. These orchards are an entire ecosystem, home to a rich insect fauna associated with the presence of a large diversity of plant species. The values of the richness and diversity rise when the intensity of the chemical protection is reduced emphasizing the importance of such orchard in the conservation of biodiversity. To show the interest hedges fauna perspective, we conducted a study in an orange grove located Baraki surrounded by hedges and windbreaks consist of several plant species. With the sweep net there were the invertebrate fauna of the herbaceous and after a year of inventory was collected consists of a 2177 individuals distributed among 156 species grouped into five classes and 15 orders fauna. Hymenoptera and Diptera are in first place with 34 species (AR% = 19.3%), followed by Coleoptera with 27 species (AR% = 15.3%), Homoptera dominate in the workforce with 735 individuals (AR% = 34.1%). The Shannon-Weaver index calculated reflects a great diversity of population sampled equal to 5.2 bits. The equitability is 0.7, showing a strong trend of balance between the numbers of species present.

Keywords: biodiversity, citrus orchard, reaps net, hedges, Baraki

Procedia PDF Downloads 293
264 Analysis of Genetic Variations in Camel Breeds (Camelus dromedarius)

Authors: Yasser M. Saad, Amr A. El Hanafy, Saleh A. Alkarim, Hussein A. Almehdar, Elrashdy M. Redwan

Abstract:

Camels are substantial providers of transport, milk, sport, meat, shelter, security and capital in many countries, particularly in Saudi Arabia. Inter simple sequence repeat technique was used to detect the genetic variations among some camel breeds (Majaheim, Safra, Wadah, and Hamara). Actual number of alleles, effective number of alleles, gene diversity, Shannon’s information index and polymorphic bands were calculated for each evaluated camel breed. Neighbor-joining tree that re-constructed for evaluated these camel breeds showed that, Hamara breed is distantly related from the other evaluated camels. In addition, the polymorphic sites, haplotypes and nucleotide diversity were identified for some camelidae cox1 gene sequences (obtained from NCBI). The distance value between C. bactrianus and C. dromedarius (0.072) was relatively low. Analysis of genetic diversity is an important way for conserving Camelus dromedarius genetic resources.

Keywords: camel, genetics, ISSR, neighbor-joining

Procedia PDF Downloads 440
263 Climate Change and Its Effects on Terrestrial Insect Diversity in Mukuruthi National Park, Nilgiri Biosphere Reserve, Tamilnadu, India

Authors: M. Elanchezhian, C. Gunasekaran, A. Agnes Deepa, M. Salahudeen

Abstract:

In recent years climate change is one of the most emerging threats facing by biodiversity both the animals and plants species. Elevated carbon dioxide and ozone concentrations, extreme temperature, changes in rainfall patterns, insects-plant interaction are the main criteria that affect biodiversity. In the present study, which emphasis the climate change and its effects on terrestrial insect diversity in Mukuruthi National Park a protected areas of Western Ghats in India. Sampling was done seasonally at the three areas using pitfall traps, over the period of January to December 2013. The statistical findings were done by Shannon wiener diversity index (H). A significant seasonal variation pattern was detected for total insect’s diversity at the different study areas. Totally nine orders of insects were recorded. Diversity and abundance of terrestrial insects shows much difference between the Natural, Shoal forest and the Grasslands.

Keywords: biodiversity, climate change, mukuruthi national park, terrestrial invertebrates

Procedia PDF Downloads 491
262 Cryptocurrencies: Business Students’ Awareness and Universities’ Adoption Readiness and Compatibility of Use Considering the Mediation of Attitudes

Authors: Eric S. Parilla, Marc Edward Abadilla

Abstract:

The study aims to determine the effect of awareness of business students towards cryptocurrencies and the readiness of universities and colleges to accept cryptocurrencies as a medium of exchange, considering the mediation of business students’ attitudes. The research used partial least squares structural equation modeling (PLS-SEM) and deployed a questionnaire attuned to the awareness and attitudes of business students towards cryptocurrencies and readiness and compatibility of use in universities and colleges in Ilocos Norte. The output of the investigation revealed that awareness of business students is not correlated to the readiness of universities and colleges, which means that even though students understand cryptocurrencies, it is not an assurance that universities and colleges are ready to accept them as the medium of exchange. The study proposes that training and seminars for business students and professionals should be conducted to expand understanding and acceptance of cryptocurrencies.

Keywords: cryptocurrencies, awareness, readiness, attitudes

Procedia PDF Downloads 181