Search results for: John Hang Leung
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 701

Search results for: John Hang Leung

641 Exposure to Natural Outdoor Environment and Positive Health Impacts: A Synthesis of Empirical Research

Authors: Joris Zufferey, Roderick John Lawrence

Abstract:

This paper provides an overview of the state of the art about the positive health impacts of exposure to natural outdoor environments. It presents the results of a “review of reviews” in terms of empirical evidence and identifies some key questions. Finally, the authors stress the need to develop more interdisciplinary and systemic contributions. This synthesis of empirical research has been done as part of the EU- FP7 PHENOTYPE research project.

Keywords: Exposure, environment, phenotype, salutogenic effects

Procedia PDF Downloads 369
640 Mesenteric Vasculitis Causing Perforated Diverticulitis Mimicking Abdominal Sepsis

Authors: Christopher Leung, Assad Zahid

Abstract:

Mesenteric vasculitis can often mimic abdominal sepsis in a postoperative setting leading to a predicament where steroids could improve mesenteric vasculitis whilst worsening abdominal sepsis. Here this study presents a unique and rare case of perforated sigmoid diverticulitis secondary to systemic vasculitis. A 68-year-old gentleman presented with perforated sigmoid diverticulitis requiring an emergency Hartmann’s procedure. Early in his postoperative course, he had painful and asymmetrical neuropathy that, after a careful history and examination, revealed a patient with mono neuritis multiplex on a background history of longstanding rheumatoid arthritis. On day seven of his postoperative course, he had rising inflammatory markers and a CT abdomen and pelvis showing fluid around the mesentery. Whilst contamination from sigmoid perforation was somewhat congruent with these signs, a diagnosis of polyarteritis nodosa, a common cause of mononeuritis multiplex, is also possible, although involvement of the large bowel in polyarteritis nodosa is extremely rare. The histopathology from the initial Hartmann’s procedure was re-examined, showing medium vessel disease vasculitis. Given his lack of fevers, absence of abdominal pain, and worsening neurology, he was given a provisional diagnosis of polyarteritis nodosa and was treated successfully, not on IV antibiotics but on steroids. Large bowel involvement of polyarteritis nodosa is extremely rare and this is the first case of polyarteritis nodosa causing perforated diverticulitis. The learning point here is to obtain a good clinical picture of a patient to identify mesenteric vasculitis as compared to abdominal sepsis as the treatment of one worsens the other.

Keywords: abdominal sepsis, diverticulitis, mesenteric vasculitis, polyarteritis nodosa

Procedia PDF Downloads 222
639 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code

Authors: Deborah Garcia-Magna

Abstract:

The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.

Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting

Procedia PDF Downloads 171
638 Accessing the 'No-Harm' Principle of Protection of the Mekong River’s Environment

Authors: Hang Thuy Tran, Hanh Hong Pham, Ha Thanh Hoa

Abstract:

From 2009 up to now, the water quantity and water quality of the Mekong River, located in the South of Vietnam, have been significantly reduced. The phenomenon happened as a result of climate change and human activities. The Mekong River is an international source of water, flowing across the borders of 6 countries, with Vietnam downstream. Activities to block the flow or build dams to construct hydroelectricity or diversion in upstream countries are either the direct cause or the risk of further deterioration of the water quality and quantity of the Mekong River, as evidenced by two phenomena which are a saline intrusion and transboundary water pollution. The protection of the crucial source of water is done through bilateral and multilateral cooperation mechanisms, notably the Mekong River Commission, established by members of the Agreement on the Cooperation for the Sustainable Development of the Mekong River Basin 1995. In this document, under Article 7, the 'no-harm' principle requires member states to take appropriate measures to prevent causing substantial damage to other member states. This principle has been practiced through the work of a number of committees established by the commission. However, the content of the rules is undetailed, lacks an implementation monitoring mechanism, and has an unreasonable dispute solution. With such difficulties, the provisions in the principle of no-harm are not adequate to protect the Mekong River's water resources in the current context.

Keywords: no-harm principle, transboundary water pollution, Mekong Commission, international source of water

Procedia PDF Downloads 157
637 Cross Attention Fusion for Dual-Stream Speech Emotion Recognition

Authors: Shaode Yu, Jiajian Meng, Bing Zhu, Hang Yu, Qiurui Sun

Abstract:

Speech emotion recognition (SER) is for recognizing human subjective emotions through audio data in-depth analysis. From speech audios, how to comprehensively extract emotional information and how to effectively fuse extracted features remain challenging. This paper presents a dual-stream SER framework that embraces both full training and transfer learning of different networks for thorough feature encoding. Besides, a plug-and-play cross-attention fusion (CAF) module is implemented for the valid integration of the dual-stream encoder output. The effectiveness of the proposed CAF module is compared to the other three fusion modules (feature summation, feature concatenation, and feature-wise linear modulation) on two databases (RAVDESS and IEMO-CAP) using different dual-stream encoders (full training network, DPCNN or TextRCNN; transfer learning network, HuBERT or Wav2Vec2). Experimental results suggest that the CAF module can effectively reconcile conflicts between features from different encoders and outperform the other three feature fusion modules on the SER task. In the future, the plug-and-play CAF module can be extended for multi-branch feature fusion, and the dual-stream SER framework can be widened for multi-stream data representation to improve the recognition performance and generalization capacity.

Keywords: speech emotion recognition, cross-attention fusion, dual-stream, pre-trained

Procedia PDF Downloads 42
636 Artificial Intelligence Created Inventions

Authors: John Goodhue, Xiaonan Wei

Abstract:

Current legal decisions and policies regarding the naming as artificial intelligence as inventor are reviewed with emphasis on the recent decisions by the European Patent Office regarding the DABUS inventions holding that an artificial intelligence machine cannot be an inventor. Next, a set of hypotheticals is introduced and examined to better understand how artificial intelligence might be used to create or assist in creating new inventions and how application of existing or proposed changes in the law would affect the ability to protect these inventions including due to restrictions on artificial intelligence for being named as inventors, ownership of inventions made by artificial intelligence, and the effects on legal standards for inventiveness or obviousness.

Keywords: Artificial intelligence, innovation, invention, patent

Procedia PDF Downloads 140
635 Pathology of Explanted Transvaginal Meshes

Authors: Vladimir V. Iakovlev, Erin T. Carey, John Steege

Abstract:

The use of polypropylene mesh devices for Pelvic Organ Prolapse (POP) spread rapidly during the last decade, yet our knowledge of the mesh-tissue interaction is far from complete. We aimed to perform a thorough pathological examination of explanted POP meshes and describe findings that may explain mechanisms of complications resulting in product excision. We report a spectrum of important findings, including nerve ingrowth, mesh deformation, involvement of detrusor muscle with neural ganglia, and polypropylene degradation. Analysis of these findings may improve and guide future treatment strategies.

Keywords: transvaginal, mesh, nerves, polypropylene degradation

Procedia PDF Downloads 371
634 A Systematic Review for the Association between Active Smoking and Latent Tuberculosis Infection

Authors: Pui Hong Chung, Wing Chi Ho, Jun Li, Cyrus Leung, Ek Yeoh

Abstract:

Background: Cigarette smoking is associated with poor tuberculosis (TB) outcomes in terms of progression of active TB, relapse of TB and TB-related mortality, but the association with latent tuberculosis infection (LTBI) is unclear. The systematic review conducted aimed at studying the association between active smoking and LTBI, and likelihood of dose-response relationship. Methods: Two independent reviewers searched three electronic databases comprising PudMed, Medline by EBSCOHOST, ExcerptaMedica Database (EMBASE), from inception up to 31st Dec 2015 for studies reporting data on current smoking and the LTBI with tuberculin skin test (TST) or interferon-γ release assays (IGRAs) results, comparing the odds ratios (ORs) of outcome measure of TST or IGRAs among current smokers with 95% confidence intervals (CI). Results: Seven studies were identified, including six cross-sectional studies and one longitudinal cohort study. The outcome measures from three studies were in TST, three studies in IGRAs and one for both tests. For TST, OR ranging from 1.39 to 3.40 (95% CI) with all studies shown positive association between cigarette smoking and LTBI. For IGRAs, OR ranging from 0.47 to 1.89 (95% CI) with one study shown the negative association that might be related to impaired interferon-gamma production in immunosuppressive persons. One identified study demonstrated positive dose-response relationship in TST result. Conclusions: Cigarette smoking is likely to be a risk factor of LTBI. There is the important implication for TB and tobacco control program to halt TB by empowering public health policy. Further study is also needed to provide more evidence of the dose-response model/relationship.

Keywords: latent tuberculosis infection, systematic review, active smoking, model

Procedia PDF Downloads 226
633 Personal and Household Hygiene Measures for Prevention of Upper Respiratory Tract Infections among Children: A Cross Sectional Survey on Parental Knowledge, Attitudes and Practices

Authors: Man Wai Leung, Margaret O’Donoghue, Lorna K. P. Suen

Abstract:

Personal and household hygiene measures are important to prevent upper respiratory tract infections (URTIs) and other infectious diseases, including coronavirus disease 2019 (COVID-19). An online survey recruited 414 eligible parents in Hong Kong to study their hygiene knowledge, attitudes, and practices (KAP) in the prevention of URTIs among their children. The average knowledge score was high (10.2/12.0), but some misconceptions were identified. The majority of participants agreed that good personal hygiene (93.5%) and good environmental hygiene (92.8%) can prevent URTIs. The average score for hand hygiene practices was high (3.78/4.00), but only 56.8% of parents always perform hand hygiene before touching their mouth, nose, or eyes. For environmental hygiene, only some household items were disinfected with disinfectants (69.8%: door handles, 60.4%: toilet seats, 42.8%: floor, 24.2%: dining chairs, 20.5%: dining tables). Higher knowledge score was associated with parents having a tertiary educational level or above, working as healthcare professionals, living at private residential flat or staff quarter, and having a household income of $70,000 or above. Hand hygiene practices varied significantly with parents’ age and income. During the 5th wave of the COVID-19 epidemic, misconceptions about hygiene knowledge were found among parents. Health promotion programs should target parents, especially those who are in old age, obtain lower educational levels, live in public housing, or have a lower income. Hand hygiene moments and proper use of disinfectants could be one of the targeted educational topics.

Keywords: hygiene, upper respiratory tract infection, parents, children, COVID-19

Procedia PDF Downloads 77
632 The Importance of Intellectual Property for Universities of Technology in South Africa: Challenges Faced and Proposed Way Forward

Authors: Martha E. Ikome, John M. Ikome

Abstract:

Intellectual property should be a day-to-day business decision due to its value, but increasingly, a number of institution are still not aware of the importance. Intellectual Property (IP) and its value are often not adequately appreciated. In the increasingly knowledge-driven economy, IP is a key consideration in day-to-day business decisions because new ideas and products appear almost daily in the market, which results in continuous innovation and research. Therefore, this paper will focus on the importance of IP for universities of technology and also further demonstrates how IP can become an economic tool and the challenges faced by these universities in implementing an IP system.

Keywords: intellectual property, institutions, challenges, protection

Procedia PDF Downloads 348
631 Shear Behavior of Steel-Fiber-Reinforced Precast/Prestressed Concrete Hollow Core Slabs

Authors: Thi Nguyet Hang Nguyen, Kang Hai Tan

Abstract:

Precast/prestressed concrete hollow core (PCHC) slabs, especially ones with depth more than 300 mm, are susceptible to web-shear failure. The reasons lie on the fact that the production process of PCHC slabs, i.e., the extrusion method (the most common method to cast PCHC slabs nowadays), does not allow them to contain any shear reinforcement. Moreover, due to the presence of the longitudinal voids, cross sections of PCHC slabs are reduced. Therefore, the shear capacity of the slabs depends solely on the tensile strength of concrete which is relatively low. Given that shear is a major concern in using hollow-core slabs, this paper investigates the possibility of adopting steel fibers in PCHC slabs produced by the extrusion method to enhance the shear capacity of the slabs. Three full-scale PCHC slabs with and without hooked-steel fibers were cast and tested until failure. Three different volumetric fiber contents of 0, 0.51 and 0.89% were investigated. The test results showed that there were substantial increases in shear capacity and ductility with the use of hooked-steel fibers. Ultimate shear strength increased with fiber content. In addition, while the specimen without steel fibers and the one with the steel-fiber volume fraction of 0.51% failed in web-shear mode, the specimen with the higher fiber content (0.89%) collapsed in flexural-shear mode. However, as the hooked-steel fibers with the fiber content of 0.89% were used, difficulties in concrete consolidation were observed while concrete was being cast. This could lead to a lower ultimate shear capacity due to a poorer bond between the concrete and the steel fibers.

Keywords: hollow-core slabs, shear strength, steel fibers, web-shear failure

Procedia PDF Downloads 140
630 A Review On Traditional Agroforestry Systems In Europe Revisited: Biodiversity, Ecosystem Services, And Future Perspectives

Authors: Thuy Hang Le

Abstract:

Traditional agroforestry systems are land-use practices still widespread in tropical and subtropical countries, while in Europe have significantly decreased due to land-use intensification, land abandonment, and urbanization. Nevertheless, scientific evidence reveals that traditional agroforestry systems significantly support biodiversity and ecosystem services and may positively contribute to socioeconomic rural regional development. We worked out a review that follows the PRISMA approach and compiled comprehensive information on traditional agroforestry systems in Europe. Based on the differentiation of different land-use systems, also considering the agricultural as well as forestry components, we compiled information regarding current distribution, management (agrodiversity), biodiversity and agrobiodiversity, ecosystem and landscape services, threats, and restoration initiatives. From a total of 3,304 studies that dealt with agroforestry systems in Europe, both “modern” (e.g., buffer strip) and “traditional” (e.g., meadow orchards), we filtered out 158 studies from 35 European countries which represent the basis for in-depth investigation. We found, for example, that the traditional pastoral agroforestry system in the Mediterranean region, the so-called Dehesa, can harbor up to 300 plant species as well as 238 bird species, of which 134 are breeding birds. With regard to carbon storage, the traditional orchard agroforestry system in Germany stocks ranged between 6.5 and 9.8 Mg C ha−1, showing significantly higher values compared to an intensively used grassland with around 3.4 to 6.7 Mg C ha−1. With the remarkably high benefit for biodiversity and ecosystem services provided, the important role and multifunctionality of traditional agroforestry systems in Europe should be acknowledged and promoted.

Keywords: biodiversity, ecosystem services, landscape services, traditional agroforestry systems

Procedia PDF Downloads 42
629 Effects of 8-Week of Yoga Training on Muscular Strength, Muscular Endurance, Flexibility and Agility of Female Hockey Players

Authors: Tarsem Singh

Abstract:

The aim of the present study was to investigate the effect of yoga training on muscular strength, muscular endurance, flexibility and agility of female hockey players. For this purpose, a sample of forty (N=40) female hockey players of age ranging from 18 to 25 years were selected from different colleges affiliated to Guru Nanak Dev University Amritsar. Further, the subjects were purposively divided in two groups. First group, designated as experimental group (N1=20) and the second one as control group (N2=20). All the participants were informed about the objectives and methodology of this study and they volunteered to participate in this experimental study. The study was restricted to the variables: muscular strength, muscular endurance, flexibility and agility. The same were measured by using Flexed Arms Hang Test, Sit-Ups Test, Sit and Reach Test and Shuttle Run Test respectively. Experimental group have undergone yoga training for 8-week by following a sequence of selected yogic asanas i.e. Sarvangasana, Chakra-asana, Utthita Parsvakonasana, Parivrtta Trikonasana, Halasana, Bhujangasana, Dhanurasana, Ustrasana, Gomukasana, Paschimotansana, Ardha-Matsyendrasana and Hanumanasan. Paired sample t-test was applied to study the effects of yoga training on female hockey players. The level of significance was set at 0.05. Results revealed significant differences between pre and post-tests of experimental group in respect to Muscular strength (t-6.946*), Muscular endurance (t-9.863*), Flexibility (t-11.052*) and Agility (t-14.068*). However, insignificant differences were observed between pre and post-tests of control group.

Keywords: yoga, muscular strength, muscular endurance, flexibility, agility

Procedia PDF Downloads 308
628 Solid Waste Management Policy Implementation in Imus, Cavite

Authors: Michael John S. Maceda

Abstract:

Waste has been a global concern aggravated by climate change. In the case of Imus, Cavite which in the past has little or no regard to waste experienced heavy flooding during August 19, 2013. This event led to a full blown implementation of Municipal Solid Waste Management integrating participation and the use of low-cost technology to reduce the amount of waste generated. The methodology employed by the city of Imus, provided a benchmark in the province of Cavite. Reducing the amount of waste generated and Solid Waste Management Cost.

Keywords: SWM, IMUS, composting, policy

Procedia PDF Downloads 777
627 An Analysis of the Effectiveness of Computer-Assisted Instruction on Student Achievement in Differing Science Content Areas

Authors: Edwin Christmann, John Hicks

Abstract:

This meta-analysis compared the mathematics achievement of students who received either traditional instruction or traditional instruction supplemented with computer-assisted instruction (CAI). From the 27 conclusions, an overall mean effect size of 0.236 was calculated, indicating that, on average, students receiving traditional instruction supplemented with CAI attained higher mathematics achievement than did 59.48 percent of those receiving traditional instruction per se.

Keywords: CAI, science, meta-analysis, traditional

Procedia PDF Downloads 141
626 Providing Reliability, Availability and Scalability Support for Quick Assist Technology Cryptography on the Cloud

Authors: Songwu Shen, Garrett Drysdale, Veerendranath Mannepalli, Qihua Dai, Yuan Wang, Yuli Chen, David Qian, Utkarsh Kakaiya

Abstract:

Hardware accelerator has been a promising solution to reduce the cost of cloud data centers. This paper investigates the QoS enhancement of the acceleration of an important datacenter workload: the webserver (or proxy) that faces high computational consumption originated from secure sockets layer (SSL) or transport layer security (TLS) procession in the cloud environment. Our study reveals that for the accelerator maintenance cases—need to upgrade driver/firmware or hardware reset due to hardware hang; we still can provide cryptography services by switching to software during maintenance phase and then switching back to accelerator after maintenance. The switching is seamless to server application such as Nginx that runs inside a VM on top of the server. To achieve this high availability goal, we propose a comprehensive fallback solution based on Intel® QuickAssist Technology (QAT). This approach introduces an architecture that involves the collaboration between physical function (PF) and virtual function (VF), and collaboration among VF, OpenSSL, and web application Nginx. The evaluation shows that our solution could provide high reliability, availability, and scalability (RAS) of hardware cryptography service in a 7x24x365 manner in the cloud environment.

Keywords: accelerator, cryptography service, RAS, secure sockets layer/transport layer security, SSL/TLS, virtualization fallback architecture

Procedia PDF Downloads 119
625 Research on Autonomous Controllability of BeiDou Navigation Satellite System Based on Knowledge Transformation

Authors: Hang Ju, Changmin Zhu

Abstract:

The development level of the BeiDou Navigation Satellite System (BDS) can strongly reflect national defense strength as an important spatial information infrastructure. BDS can be not only used for military purposes, such as intelligence gathering, nuclear explosion monitoring, emergency communications, but also for location services, transportation, mapping, precision agriculture. In order to ensure the national defense security and the wide application of BDS in civil and military areas, BDS must be autonomous and controllable. As a complex system of knowledge-intensive, knowledge transformation runs through the whole process of research and development, production, operation, and maintenance of BDS. Based on the perspective of knowledge transformation, this paper expounds on the meaning of socialization, externalization, combination, and internalization of knowledge transformation, and the coupling relationship of autonomy and control on the basis of analyzing the status quo and problems of the autonomy and control of BDS. The autonomous and controllable framework of BDS based on knowledge transformation is constructed from six dimensions of management capability, R&D capability, technical capability, manufacturing capability, service support capability, and application capability. It can provide support for the smooth implementation of information security policy, provide a reference for the autonomy and control of the upstream and downstream industrial chains in Beidou, and provide a reference for the autonomous and controllable research of aerospace components, military measurement test equipment, and other related industries.

Keywords: knowledge transformation, BeiDou Navigation Satellite System, autonomy and control, framework

Procedia PDF Downloads 157
624 Thermal Conductivity and Diffusivity of Alternative Refrigerants as Retrofit for Freon 12

Authors: Mutalubi Aremu Akintunde, John Isa

Abstract:

The negative impact on the atmosphere, of chlorofluorocarbon refrigerants (CFC) radical changes and measures were put in place to replace them. This has led to search for alternative refrigerants over the past decades. This paper presents thermal conductivity, diffusivity and performance of two alternative refrigerants as replacement to R12, which has been a versatile refrigerant which had turned the refrigeration industries around for decades, but one of the offensive refrigerants. The new refrigerants were coded RA1 (50%R600a/50%R134a;) and RA2 (70%R600a/30%R134a). The diffusivities for RA1 and RA2 were estimated to be, 2.76384 X 10-8 m2/s and 2.74386 X 10-8 m2/s respectively, while that of R12 under the same experimental condition is 2.43772 X 10-8 m2/s. The performances of the two refrigerants in a refrigerator initially designed for R12, were very close to that of R12. Other thermodynamic parameters showed that R12 can be replaced with both RA1 and RA2.

Keywords: alternative refrigerants, conductivity, diffusivity, performance, refrigerants

Procedia PDF Downloads 128
623 The Permutation of Symmetric Triangular Equilateral Group in the Cryptography of Private and Public Key

Authors: Fola John Adeyeye

Abstract:

In this paper, we propose a cryptosystem private and public key base on symmetric group Pn and validates its theoretical formulation. This proposed system benefits from the algebraic properties of Pn such as noncommutative high logical, computational speed and high flexibility in selecting key which makes the discrete permutation multiplier logic (DPML) resist to attack by any algorithm such as Pohlig-Hellman. One of the advantages of this scheme is that it explore all the possible triangular symmetries. Against these properties, the only disadvantage is that the law of permutation multiplicity only allow an operation from left to right. Many other cryptosystems can be transformed into their symmetric group.

Keywords: cryptosystem, private and public key, DPML, symmetric group Pn

Procedia PDF Downloads 172
622 Theoretical Approach for Estimating Transfer Length of Prestressing Strand in Pretensioned Concrete Members

Authors: Sun-Jin Han, Deuck Hang Lee, Hyo-Eun Joo, Hyun Kang, Kang Su Kim

Abstract:

In pretensioned concrete members, the transfer length region is existed, in which the stress in prestressing strand is developed due to the bond mechanism with surrounding concrete. The stress of strands in the transfer length zone is smaller than that in the strain plateau zone, so-called effective prestress, therefore the web-shear strength in transfer length region is smaller than that in the strain plateau zone. Although the transfer length is main key factor in the shear design, a few analytical researches have been conducted to investigate the transfer length. Therefore, in this study, a theoretical approach was used to estimate the transfer length. The bond stress developed between the strands and the surrounding concrete was quantitatively calculated by using the Thick-Walled Cylinder Model (TWCM), based on this, the transfer length of strands was calculated. To verify the proposed model, a total of 209 test results were collected from the previous studies. Consequently, the analysis results showed that the main influencing factors on the transfer length are the compressive strength of concrete, the cover thickness of concrete, the diameter of prestressing strand, and the magnitude of initial prestress. In addition, the proposed model predicted the transfer length of collected test specimens with high accuracy. Acknowledgement: This research was supported by a grant(17TBIP-C125047-01) from Technology Business Innovation Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: bond, Hoyer effect, prestressed concrete, prestressing strand, transfer length

Procedia PDF Downloads 258
621 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 453
620 From Shallow Semantic Representation to Deeper One: Verb Decomposition Approach

Authors: Aliaksandr Huminski

Abstract:

Semantic Role Labeling (SRL) as shallow semantic parsing approach includes recognition and labeling arguments of a verb in a sentence. Verb participants are linked with specific semantic roles (Agent, Patient, Instrument, Location, etc.). Thus, SRL can answer on key questions such as ‘Who’, ‘When’, ‘What’, ‘Where’ in a text and it is widely applied in dialog systems, question-answering, named entity recognition, information retrieval, and other fields of NLP. However, SRL has the following flaw: Two sentences with identical (or almost identical) meaning can have different semantic role structures. Let consider 2 sentences: (1) John put butter on the bread. (2) John buttered the bread. SRL for (1) and (2) will be significantly different. For the verb put in (1) it is [Agent + Patient + Goal], but for the verb butter in (2) it is [Agent + Goal]. It happens because of one of the most interesting and intriguing features of a verb: Its ability to capture participants as in the case of the verb butter, or their features as, say, in the case of the verb drink where the participant’s feature being liquid is shared with the verb. This capture looks like a total fusion of meaning and cannot be decomposed in direct way (in comparison with compound verbs like babysit or breastfeed). From this perspective, SRL looks really shallow to represent semantic structure. If the key point in semantic representation is an opportunity to use it for making inferences and finding hidden reasons, it assumes by default that two different but semantically identical sentences must have the same semantic structure. Otherwise we will have different inferences from the same meaning. To overcome the above-mentioned flaw, the following approach is suggested. Assume that: P is a participant of relation; F is a feature of a participant; Vcp is a verb that captures a participant; Vcf is a verb that captures a feature of a participant; Vpr is a primitive verb or a verb that does not capture any participant and represents only a relation. In another word, a primitive verb is a verb whose meaning does not include meanings from its surroundings. Then Vcp and Vcf can be decomposed as: Vcp = Vpr +P; Vcf = Vpr +F. If all Vcp and Vcf will be represented this way, then primitive verbs Vpr can be considered as a canonical form for SRL. As a result of that, there will be no hidden participants caught by a verb since all participants will be explicitly unfolded. An obvious example of Vpr is the verb go, which represents pure movement. In this case the verb drink can be represented as man-made movement of liquid into specific direction. Extraction and using primitive verbs for SRL create a canonical representation unique for semantically identical sentences. It leads to the unification of semantic representation. In this case, the critical flaw related to SRL will be resolved.

Keywords: decomposition, labeling, primitive verbs, semantic roles

Procedia PDF Downloads 339
619 Image Recognition Performance Benchmarking for Edge Computing Using Small Visual Processing Unit

Authors: Kasidis Chomrat, Nopasit Chakpitak, Anukul Tamprasirt, Annop Thananchana

Abstract:

Internet of Things devices or IoT and Edge Computing has become one of the biggest things happening in innovations and one of the most discussed of the potential to improve and disrupt traditional business and industry alike. With rises of new hang cliff challenges like COVID-19 pandemic that posed a danger to workforce and business process of the system. Along with drastically changing landscape in business that left ruined aftermath of global COVID-19 pandemic, looming with the threat of global energy crisis, global warming, more heating global politic that posed a threat to become new Cold War. How emerging technology like edge computing and usage of specialized design visual processing units will be great opportunities for business. The literature reviewed on how the internet of things and disruptive wave will affect business, which explains is how all these new events is an effect on the current business and how would the business need to be adapting to change in the market and world, and example test benchmarking for consumer marketed of newer devices like the internet of things devices equipped with new edge computing devices will be increase efficiency and reducing posing a risk from a current and looming crisis. Throughout the whole paper, we will explain the technologies that lead the present technologies and the current situation why these technologies will be innovations that change the traditional practice through brief introductions to the technologies such as cloud computing, edge computing, Internet of Things and how it will be leading into future.

Keywords: internet of things, edge computing, machine learning, pattern recognition, image classification

Procedia PDF Downloads 127
618 Flexicommute: A Web-Based Application to Help with Car Rental Services in the Philippines

Authors: Mico Kenshee C. Samarista, John Harvey V. Miranda, Janne Audrae Q. Lebosada, Josef Anton R. Benitez, Juan Miguel C. Rubio

Abstract:

This research paper presents the development and evaluation of a web-based application designed to simplify the process of car rental services in the Philippines. As the demand for convenient and efficient access to rental car information grows, the need for a user-friendly platform becomes increasingly crucial. The web-based application serves as a comprehensive central hub, aggregating and organizing rental car listings from various reputable websites across the Philippines. By collecting essential data through surveys and usability testing, we assess the platform's effectiveness in simplifying the rental car selection process.

Keywords: web, application, car, services

Procedia PDF Downloads 58
617 The Constraint of Machine Breakdown after a Match up Scheduling of Paper Manufacturing Industry

Authors: John M. Ikome

Abstract:

In the process of manufacturing, a machine breakdown usually forces a modified flow shop out of the prescribed state, this strategy reschedules part of the initial schedule to match up with the pre-schedule at some point with the objective to create a schedule that is reliable with the other production planning decisions like material flow, production and suppliers by utilizing a critical decision-making concept. We propose a rescheduling strategy and a match-up point that will have a determination procedure through an advanced feedback control mechanism to increase both the schedule quality and stability. These approaches are compared with alternative re-scheduling methods under different experimental settings.

Keywords: scheduling, heuristics, branch, integrated

Procedia PDF Downloads 389
616 The Employer Brand as Perceived by Salespeople: A Study Based on Glassdoor Reviews

Authors: Juliet F. Poujol, Jeff John Tanner, Christophe Fournier

Abstract:

Employers desire a favorable brand as an employer. This research considers whether motivation theory is applied to identify universally desirable employer brand elements. Based on data from a website where employees give their opinion about their employer (N=200), this research examines what salespeople found positive and negative about their job. Results show that traditional motivators like opportunities of advancement, and 'hygiene' factors such as benefits and work conditions are a source of satisfaction for salespeople. We also found differences by sectors. Implications are related to sales force recruitment and management.

Keywords: employer brand, motivation, qualitative study, salespeople

Procedia PDF Downloads 355
615 Policy Effectiveness in the Situation of Economic Recession

Authors: S. K. Ashiquer Rahman

Abstract:

The proper policy handling might not able to attain the target since some of recessions, e.g., pandemic-led crises, the variables shocks of the economics. At the level of this situation, the Central bank implements the monetary policy to choose increase the exogenous expenditure and level of money supply consecutively for booster level economic growth, whether the monetary policy is relatively more effective than fiscal policy in altering real output growth of a country or both stand for relatively effective in the direction of output growth of a country. The dispute with reference to the relationship between the monetary policy and fiscal policy is centered on the inflationary penalty of the shortfall financing by the fiscal authority. The latest variables socks of economics as well as the pandemic-led crises, central banks around the world predicted just about a general dilemma in relation to increase rates to face the or decrease rates to sustain the economic movement. Whether the prices hang about fundamentally unaffected, the aggregate demand has also been hold a significantly negative attitude by the outbreak COVID-19 pandemic. To empirically investigate the effects of economics shocks associated COVID-19 pandemic, the paper considers the effectiveness of the monetary policy and fiscal policy that linked to the adjustment mechanism of different economic variables. To examine the effects of economics shock associated COVID-19 pandemic towards the effectiveness of Monetary Policy and Fiscal Policy in the direction of output growth of a Country, this paper uses the Simultaneous equations model under the estimation of Two-Stage Least Squares (2SLS) and Ordinary Least Squares (OLS) Method.

Keywords: IS-LM framework, pandemic. Economics variables shocks, simultaneous equations model, output growth

Procedia PDF Downloads 61
614 Adding Security Blocks to the DevOps Lifecycle

Authors: Andrew John Zeller, Francis Pouatcha

Abstract:

Working according to the DevOps principle has gained in popularity over the past decade. While its extension DevSecOps started to include elements of cybersecurity, most real-life projects do not focus risk and security until the later phases of a project as teams are often more familiar with engineering and infrastructure services. To help bridge the gap between security and engineering, this paper will take six building blocks of cybersecurity and apply them to the DevOps approach. After giving a brief overview of the stages in the DevOps lifecycle, the main part discusses to what extent six cybersecurity blocks can be utilized in various stages of the lifecycle. The paper concludes with an outlook on how to stay up to date in the dynamic world of cybersecurity.

Keywords: information security, data security, cybersecurity, devOps, IT management

Procedia PDF Downloads 71
613 The Study on Corpse Floating Time in Shanghai Region of China

Authors: Hang Meng, Wen-Bin Liu, Bi Xiao, Kai-Jun Ma, Jian-Hui Xie, Geng Fei, Tian-Ye Zhang, Lu-Yi Xu, Dong-Chuan Zhang

Abstract:

The victims in water are often found in the coastal region, along river region or the region with lakes. In China, the examination for the bodies of victims in the water is conducted by forensic doctors working in the public security bureau. Because the enter water time for most of the victims are not clear, and often lack of monitor images and other information, so to find out the corpse enter water time for victims is very difficult. After the corpse of the victim enters the water, it sinks first, then corruption gas produces, which can make the density of the corpse to be less than water, and thus rise again. So the factor that determines the corpse floating time is temperature. On the basis of the temperature data obtained in Shanghai region of China (Shanghai is a north subtropical marine monsoon climate, with an average annual temperature of about 17.1℃. The hottest month is July, the average monthly temperature is 28.6℃, and the coldest month is January, the average monthly temperature is 4.8℃). This study selected about 100 cases with definite corpse enter water time and corpse floating time, analyzed the cases and obtained the empirical law of the corpse floating time. For example, in the Shanghai region, on June 15th and October 15th, the corpse floating time is about 1.5 days. In early December, the bodies who entered the water will go up around January 1st of the following year, and the bodies who enter water in late December will float in March of next year. The results of this study can be used to roughly estimate the water enter time of the victims in Shanghai. Forensic doctors around the world can also draw on the results of this study to infer the time when the corpses of the victims in the water go up.

Keywords: corpse enter water time, corpse floating time, drowning, forensic pathology, victims in the water

Procedia PDF Downloads 159
612 Effect of Black Locust Trees on the Nitrogen Dynamics of Black Pine Trees in Shonai Coastal Forest, Japan

Authors: Kazushi Murata, Fabian Watermann, O. B. Herve Gonroudobou, Le Thuy Hang, Toshiro Yamanaka, M. Larry Lopez C.

Abstract:

Aims: Black pine coastal forests play an important role as a windbreak and as a natural barrier to sand and salt spray inland in Japan. The recent invasion of N₂-fxing black locust (Robinia pseudoacacia) trees in these forests is expected to have a nutritional contribution to black pine trees growth. Thus, the effect of this new source of N on black pine trees' N assimilation needs to be assessed. Methods: In order to evaluate this contribution, tree-ring isotopic composition (δ¹⁵N) and nitrogen content (%N) of black pine (Pinus thunbergii) trees in a pure stand (BPP) and a mixed stand (BPM) with black locust (BL) trees were measured for the period 2000–2019 for BPP and BL and 1990–2019 for BPM. The same measurements were conducted in plant tissues and in soil samples. Results: The tree ring δ15N values showed that for the last 30 years, BPM trees gradually switched from BPP to BL-derived soil N starting in the 1990s, becoming the dominant N source from 2000 as no significant diference was found between BPM and BL tree ring δ¹⁵N values from 2000 to 2019. No difference in root and sapwood BPM and BL δ¹⁵N values were found, but BPM foliage (−2.1‰) was different to BPP (−4.4‰) and BL (−0.3‰), which is related to the different N assimilation pathways between BP and BL. Conclusions: Based on the results of this study, the assimilation of BL-derived N inferred from the BPM tissues' δ¹⁵N values is the result of an increase in soil bioavailable N with a higher δ¹⁵N value.

Keywords: nitrogen-15, N₂-fxing species, mixed stand, soil, tree rings

Procedia PDF Downloads 24