Search results for: MDS codes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 569

Search results for: MDS codes

449 One vs. Rest and Error Correcting Output Codes Principled Rebalancing Schemes for Solving Imbalanced Multiclass Problems

Authors: Alvaro Callejas-Ramos, Lorena Alvarez-Perez, Alexander Benitez-Buenache, Anibal R. Figueiras-Vidal

Abstract:

This contribution presents a promising formulation which allows to extend the principled binary rebalancing procedures, also known as neutral re-balancing mechanisms in the sense that they do not alter the likelihood ratio

Keywords: Bregman divergences, imbalanced multiclass classifi-cation, informed re-balancing, invariant likelihood ratio

Procedia PDF Downloads 174
448 Quantification of Factors Contributing to Wave-In-Deck on Fixed Jacket Platforms

Authors: C. Y. Ng, A. M. Johan, A. E. Kajuputra

Abstract:

Wave-in-deck phenomenon for fixed jacket platforms at shallow water condition has been reported as a notable risk to the workability and reliability of the platform. Reduction in reservoir pressure, due to the extraction of hydrocarbon for an extended period of time, has caused the occurrence of seabed subsidence. Platform experiencing subsidence promotes reduction of air gaps, which eventually allows the waves to attack the bottom decks. The impact of the wave-in-deck generates additional loads to the structure and therefore increases the values of the moment arms. Higher moment arms trigger instability in terms of overturning, eventually decreases the reserve strength ratio (RSR) values of the structure. The mechanics of wave-in-decks, however, is still not well understood and have not been fully incorporated into the design codes and standards. Hence, it is necessary to revisit the current design codes and standards for platform design optimization. The aim of this study is to evaluate the effects of RSR due to wave-in-deck on four-legged jacket platforms in Malaysia. Base shear values with regards to calibration and modifications of wave characteristics were obtained using SESAM GeniE. Correspondingly, pushover analysis is conducted using USFOS to retrieve the RSR. The effects of the contributing factors i.e. the wave height, wave period and water depth with regards to the RSR and base shear values were analyzed and discussed. This research proposal is important in optimizing the design life of the existing and aging offshore structures. Outcomes of this research are expected to provide a proper evaluation of the wave-in-deck mechanics and in return contribute to the current mitigation strategies in managing the issue.

Keywords: wave-in-deck loads, wave effects, water depth, fixed jacket platforms

Procedia PDF Downloads 403
447 Fatigue Truck Modification Factor for Design Truck (CL-625)

Authors: Mohamad Najari, Gilbert Grondin, Marwan El-Rich

Abstract:

Design trucks in standard codes are selected based on the amount of damage they cause on structures-specifically bridges- and roads to represent the real traffic loads. Some limited numbers of trucks are run on a bridge one at a time and the damage on the bridge is recorded for each truck. One design track is also run on the same bridge “n” times -“n” is the number of trucks used previously- to calculate the damage of the design truck on the same bridge. To make these damages equal a reduction factor is needed for that specific design truck in the codes. As the limited number of trucks cannot be the exact representative of real traffic through the life of the structure, these reduction factors are not accurately calculated and they should be modified accordingly. Started on July 2004, the vehicle load data were collected in six weigh in motion (WIM) sites owned by Alberta Transportation for eight consecutive years. This database includes more than 200 million trucks. Having these data gives the opportunity to compare the effect of any standard fatigue trucks weigh and the real traffic load on the fatigue life of the bridges which leads to a modification for the fatigue truck factor in the code. To calculate the damage for each truck, the truck is run on the bridge, moment history of the detail under study is recorded, stress range cycles are counted, and then damage is calculated using available S-N curves. A 2000 lines FORTRAN code has been developed to perform the analysis and calculate the damages of the trucks in the database for all eight fatigue categories according to Canadian Institute of Steel Construction (CSA S-16). Stress cycles are counted using rain flow counting method. The modification factors for design truck (CL-625) are calculated for two different bridge configurations and ten span lengths varying from 1 m to 200 m. The two considered bridge configurations are single-span bridge and four span bridge. This was found to be sufficient and representative for a simply supported span, positive moment in end spans of bridges with two or more spans, positive moment in interior spans of three or more spans, and the negative moment at an interior support of multi-span bridges. The moment history of the mid span is recorded for single-span bridge and, exterior positive moment, interior positive moment, and support negative moment are recorded for four span bridge. The influence lines are expressed by a polynomial expression obtained from a regression analysis of the influence lines obtained from SAP2000. It is found that for design truck (CL-625) fatigue truck factor is varying from 0.35 to 0.55 depending on span lengths and bridge configuration. The detail results will be presented in the upcoming papers. This code can be used for any design trucks available in standard codes.

Keywords: bridge, fatigue, fatigue design truck, rain flow analysis, FORTRAN

Procedia PDF Downloads 496
446 Some Codes for Variants in Graphs

Authors: Sofia Ait Bouazza

Abstract:

We consider the problem of finding a minimum identifying code in a graph. This problem was initially introduced in 1998 and has been since fundamentally connected to a wide range of applications (fault diagnosis, location detection …). Suppose we have a building into which we need to place fire alarms. Suppose each alarm is designed so that it can detect any fire that starts either in the room in which it is located or in any room that shares a doorway with the room. We want to detect any fire that may occur or use the alarms which are sounding to not only to not only detect any fire but be able to tell exactly where the fire is located in the building. For reasons of cost, we want to use as few alarms as necessary. The first problem involves finding a minimum domination set of a graph. If the alarms are three state alarms capable of distinguishing between a fire in the same room as the alarm and a fire in an adjacent room, we are trying to find a minimum locating domination set. If the alarms are two state alarms that can only sound if there is a fire somewhere nearby, we are looking for a differentiating domination set of a graph. These three areas are the subject of much active research; we primarily focus on the third problem. An identifying code of a graph G is a dominating set C such that every vertex x of G is distinguished from other vertices by the set of vertices in C that are at distance at most r≥1 from x. When only vertices out of the code are asked to be identified, we get the related concept of a locating dominating set. The problem of finding an identifying code (resp a locating dominating code) of minimum size is a NP-hard problem, even when the input graph belongs to a number of specific graph classes. Therefore, we study this problem in some restricted classes of undirected graphs like split graph, line graph and path in a directed graph. Then we present some results on the identifying code by giving an exact value of upper total locating domination and a total 2-identifying code in directed and undirected graph. Moreover we determine exact values of locating dominating code and edge identifying code of thin headless spider and locating dominating code of complete suns.

Keywords: identiying codes, locating dominating set, split graphs, thin headless spider

Procedia PDF Downloads 428
445 Disadvantages and Drawbacks of Concrete Blocks and Fix Their Defects

Authors: Ehsan Sadie

Abstract:

Today, the cost of repair and maintenance of structures is very important and by studying the behavior of reinforced concrete structures Will become specified several factors such as : Design and calculation errors, lack of proper implementation of structural changes, the damage caused by the introduction of random loads, concrete corrosion and environmental conditions reduce durability of the structures . Meanwhile building codes alteration also cause changes in the assessment and review of the design and structure rather if necessary will be improved and strengthened in the future.

Keywords: concrete building , expandable cement, honeycombed surface , reinforcement corrosion

Procedia PDF Downloads 402
444 Features of Testing of the Neuronetwork Converter Biometrics-Code with Correlation Communications between Bits of the Output Code

Authors: B. S. Akhmetov, A. I. Ivanov, T. S. Kartbayev, A. Y. Malygin, K. Mukapil, S. D. Tolybayev

Abstract:

The article examines the testing of the neural network converter of biometrics code. Determined the main reasons that prevented the use adopted in the works of foreign researchers classical a Binomial Law when describing distribution of measures of Hamming "Alien" codes-responses.

Keywords: biometrics, testing, neural network, converter of biometrics-code, Hamming's measure

Procedia PDF Downloads 1109
443 Static Application Security Testing Approach for Non-Standard Smart Contracts

Authors: Antonio Horta, Renato Marinho, Raimir Holanda

Abstract:

Considered as an evolution of the Blockchain, the Ethereum platform, besides allowing transactions of its cryptocurrency named Ether, it allows the programming of decentralised applications (DApps) and smart contracts. However, this functionality into blockchains has raised other types of threats, and the exploitation of smart contracts vulnerabilities has taken companies to experience big losses. This research intends to figure out the number of contracts that are under risk of being drained. Through a deep investigation, more than two hundred thousand smart contracts currently available in the Ethereum platform were scanned and estimated how much money is at risk. The experiment was based in a query run on Google Big Query in July 2022 and returned 50,707,133 contracts published on the Ethereum platform. After applying the filtering criteria, the experimentgot 430,584 smart contracts to download and analyse. The filtering criteria consisted of filtering out: ERC20 and ERC721 contracts, contracts without transactions, and contracts without balance. From this amount of 430,584 smart contracts selected, only 268,103 had source codes published on Etherscan, however, we discovered, using a hashing process, that there were contracts duplication. Removing the duplicated contracts, the process ended up with 20,417 source codes, which were analysed using the open source SAST tool smartbugswith oyente and securify algorithms. In the end, there was nearly $100,000 at risk of being drained from the potentially vulnerable smart contracts. It is important to note that the tools used in this study may generate false positives, which may interfere with the number of vulnerable contracts. To address this point, our next step in this research is to develop an application to test the contract in a parallel environment to verify the vulnerability. Finally, this study aims to alert users and companies about the risk on not properly creating and analysing their smart contracts before publishing them into the platform. As any other application, smart contracts are at risk of having vulnerabilities which, in this case, may result in direct financial losses.

Keywords: blockchain, reentrancy, static application security testing, smart contracts

Procedia PDF Downloads 55
442 Validating Chronic Kidney Disease-Specific Risk Factors for Cardiovascular Events Using National Data: A Retrospective Cohort Study of the Nationwide Inpatient Sample

Authors: Fidelis E. Uwumiro, Chimaobi O. Nwevo, Favour O. Osemwota, Victory O. Okpujie, Emeka S. Obi, Omamuyovbi F. Nwoagbe, Ejiroghene Tejere, Joycelyn Adjei-Mensah, Christopher N. Ekeh, Charles T. Ogbodo

Abstract:

Several risk factors associated with cardiovascular events have been identified as specific to Chronic Kidney Disease (CKD). This study endeavors to validate these CKD-specific risk factors using up-to-date national-level data, thereby highlighting the crucial significance of confirming the validity and generalizability of findings obtained from previous studies conducted on smaller patient populations. The study utilized the nationwide inpatient sample database to identify adult hospitalizations for CKD from 2016 to 2020, employing validated ICD-10-CM/PCS codes. A comprehensive literature review was conducted to identify both traditional and CKD-specific risk factors associated with cardiovascular events. Risk factors and cardiovascular events were defined using a combination of ICD-10-CM/PCS codes and statistical commands. Only risk factors with specific ICD-10 codes and hospitalizations with complete data were included in the study. Cardiovascular events of interest included cardiac arrhythmias, sudden cardiac death, acute heart failure, and acute coronary syndromes. Univariate and multivariate regression models were employed to evaluate the association between chronic kidney disease-specific risk factors and cardiovascular events while adjusting for the impact of traditional CV risk factors such as old age, hypertension, diabetes, hypercholesterolemia, inactivity, and smoking. A total of 690,375 hospitalizations for CKD were included in the analysis. The study population was predominantly male (375,564, 54.4%) and primarily received care at urban teaching hospitals (512,258, 74.2%). The mean age of the study population was 61 years (SD 0.1), and 86.7% (598,555) had a CCI of 3 or more. At least one traditional risk factor for CV events was present in 84.1% of all hospitalizations (580,605), while 65.4% (451,505) included at least one CKD-specific risk factor for CV events. The incidence of CV events in the study was as follows: acute coronary syndromes (41,422; 6%), sudden cardiac death (13,807; 2%), heart failure (404,560; 58.6%), and cardiac arrhythmias (124,267; 18%). 91.7% (113,912) of all cardiac arrhythmias were atrial fibrillations. Significant odds of cardiovascular events on multivariate analyses included: malnutrition (aOR: 1.09; 95% CI: 1.06–1.13; p<0.001), post-dialytic hypotension (aOR: 1.34; 95% CI: 1.26–1.42; p<0.001), thrombophilia (aOR: 1.46; 95% CI: 1.29–1.65; p<0.001), sleep disorder (aOR: 1.17; 95% CI: 1.09–1.25; p<0.001), and post-renal transplant immunosuppressive therapy (aOR: 1.39; 95% CI: 1.26–1.53; p<0.001). The study validated malnutrition, post-dialytic hypotension, thrombophilia, sleep disorders, and post-renal transplant immunosuppressive therapy, highlighting their association with increased risk for cardiovascular events in CKD patients. No significant association was observed between uremic syndrome, hyperhomocysteinemia, hyperuricemia, hypertriglyceridemia, leptin levels, carnitine deficiency, anemia, and the odds of experiencing cardiovascular events.

Keywords: cardiovascular events, cardiovascular risk factors in CKD, chronic kidney disease, nationwide inpatient sample

Procedia PDF Downloads 39
441 The Role Previous Cytomegalovirus Infection in Subsequent Lymphoma Develompment

Authors: Amalia Ardeljan, Lexi Frankel, Divesh Manjani, Gabriela Santizo, Maximillian Guerra, Omar Rashid

Abstract:

Introduction: Cytomegalovirus (CMV) infection is a widespread infection affecting between 60-70% of people in industrialized countries. CMV has been previously correlated with a higher incidence of Hodgkin Lymphoma compared to noninfected persons. Research regarding prior CMV infection and subsequent lymphoma development is still controversial. With limited evidence, further research is needed in order to understand the relationship between previous CMV infection and subsequent lymphoma development. This study assessed the effect of CMV infection and the incidence of lymphoma afterward. Methods: A retrospective cohort study (2010-2019) was conducted through a Health Insurance Portability and Accountability Act (HIPAA) compliant national database and conducted using International Classification of Disease (ICD) 9th,10th codes, and Current Procedural Terminology (CPT) codes. These were used to identify lymphoma diagnosis in a previously CMV infected population. Patients were matched for age range and Charlson Comorbidity Index (CCI). A chi-squared test was used to assess statistical significance. Results: A total number of 14,303 patients was obtained in the CMV infected group as well as in the control population (matched by age range and CCI score). Subsequent lymphoma development was seen at a rate of 11.44% (1,637) in the CMV group and 5.74% (822) in the control group, respectively. The difference was statistically significant by p= 2.2x10-16, odds ratio = 2.696 (95% CI 2.483- 2.927). In an attempt to stratify the population by antiviral medication exposure, the outcomes were limited by the decreased number of members exposed to antiviral medication in the control population. Conclusion: This study shows a statistically significant correlation between prior CMV infection and an increased incidence of lymphoma afterward. Further exploration is needed to identify the potential carcinogenic mechanism of CMV and whether the results are attributed to a confounding bias.

Keywords: cytomegalovirus, lymphoma, cancer, microbiology

Procedia PDF Downloads 199
440 Identifying Coloring in Graphs with Twins

Authors: Souad Slimani, Sylvain Gravier, Simon Schmidt

Abstract:

Recently, several vertex identifying notions were introduced (identifying coloring, lid-coloring,...); these notions were inspired by identifying codes. All of them, as well as original identifying code, is based on separating two vertices according to some conditions on their closed neighborhood. Therefore, twins can not be identified. So most of known results focus on twin-free graph. Here, we show how twins can modify optimal value of vertex-identifying parameters for identifying coloring and locally identifying coloring.

Keywords: identifying coloring, locally identifying coloring, twins, separating

Procedia PDF Downloads 112
439 Numerical Modeling of Turbulent Natural Convection in a Square Cavity

Authors: Mohammadreza Sedighi, Mohammad Said Saidi, Hesamoddin Salarian

Abstract:

A numerical study has been performed to investigate the effect of using different turbulent models on natural convection flow field and temperature distributions in partially heated square cavity compare to benchmark. The temperature of the right vertical wall is lower than that of heater while other walls are insulated. The commercial CFD codes are used to model. Standard k-w model provided good agreement with the experimental data.

Keywords: Buoyancy, Cavity, CFD, Heat Transfer, Natural Convection, Turbulence

Procedia PDF Downloads 313
438 Habermas: A Unity of the Law and Democracy

Authors: Qi Jing

Abstract:

This paper examines and defends Jürgen Habermas’s claim that law is the other side of democracy. It is believed that law and democracy are related, for Habermas, through the mediation of communicative rationality and discourse ethics. These ground a procedural conception of democracy, which legitimizes and rationalizes legal codes in a robust public sphere, linking the exercise of democratic political power to the form of law. The strengths of Habermas’s approach lie, it should be claimed, in its overcoming of relativism, its combination of democratically-enacted law with post-conventional morality, and its correction of the one-sided emphasis on private and public autonomy in Kant and Rousseau, respectively.

Keywords: habermas, law, democracy, reason, public sphere

Procedia PDF Downloads 40
437 Iraqi Women’s Rights Under State Civil Law and Conservative Influences: A Study of Legal Documents and Social Implementation

Authors: Rose Hattab

Abstract:

Women have been an important dynamic in religious context and the state-building process of Arab countries throughout history. During the 1970s as the movement for women’s activism and rights developed, the Iraqi state under the Ba’ath Party began to provide Iraqi women with legal and civil rights. This was done to liberate women from the grasps of social traditions and was a tangible espousing of equality between men and women in the process of nation-building. Whereas women’s rights were stronger and more supported throughout the earliest years of the Ba’ath Regime (1970-1990), the aftermath of the Gulf War and economic sanctions on the conditions of Iraqi society laid the foundation for a division of women’s rights between civil and religious authorities. Personal status codes that were secured in 1959 were being pushed back by amendments made in coordination with religious leaders. Civil laws were present on paper, but religious authority took prominence in practice. The written legal codes were inclusive of women’s rights, but there is not an active or ensured practice of these rights within Iraqi society. This is due to many different factors, such as religious, sectarian, political and conservative reasons that hold back or limit the ability for Iraqi women to have autonomy in aspects such as participation in the workforce, getting married, and ensuring social justice. This paper argues that the Personal Status Code introduced in 1959 – which replaced Sharia-run courts with personal status courts – provided Iraqi women with equality and increased mobility in social and economic dynamics. The statewide crisis felt after the Gulf War and the economic sanctions imposed by the United Nations led to a stark shift in the Ba’ath party’s political ideology. This ideological turn guided the social system to the embracement of social conservatism and religious traditions in the 1990s. The effect of this implementation continued after the establishment of a new Iraqi government during 2003-2005. Consequently, Iraqi women's rights in employment, marriage, and family became divided into paper and practice by religious authorities and civil law from that period to the present day. This paper also contributes to the literature by expanding on the gap between legal codes on paper and in practice, through providing an analysis of Iraqi women’s rights in the Iraqi Constitution of 2005 and Iraq’s Penal Code. The turn to conservative and religious traditions is derived from the multiplicity of identities that make up the Iraqi social fabric. In the aftermath of a totalitarian regime, active wars, and economic sanctions, the Iraqi people attempted to unite together through their different identities to create a sense of security in the midst of violence and chaos. This is not an excuse to diminish the importance of women’s rights, but in the process of building a new nation-state, women were lost from the narrative. Thus, the presence of gender equity is found in the written text but is not practiced and upheld in the social context.

Keywords: civil rights, Iraqi women, nation building, religion and conflict

Procedia PDF Downloads 115
436 Qualitative Needs Assessment for Development of a Smart Thumb Prosthetic

Authors: Syena Moltaji, Stephanie Posa, Sander Hitzig, Amanda Mayo, Heather Baltzer

Abstract:

Purpose: To critically assess deficits following thumb amputation and delineate elements of an ideal thumb prosthesis from the end-user perspective. Methods: This was a qualitative study based on grounded theory. End-user stakeholder groups of thumb amputees and prosthetists were interviewed. Transcripts were reviewed whole first for familiarity. Data coding was then performed by two individual authors. Coded units were grouped by similarity and reviewed to reach a consensus. Codes were then analyzed for emergent themes by each author. A consensus meeting was held with all authors to finalize themes. Results: Three patients with traumatic thumb amputation and eight prosthetists were interviewed. Seven themes emerged. First was the significant impact of losing a thumb, in which codes of functional impact, mental impact, and occupational impact were included. The second theme was the unique nature of each thumb amputee, including goals, readiness for prosthesis, nature of the injury, and insurance. The third emergent theme was cost, surrounding government funding, insurability, and prosthetic pricing. The fourth theme was patient frustration, which included mismatches of prosthetic expectations and realities, activity limitations, and causes of devices abandonment. Themes five and six surrounded the strengths and weaknesses of current prosthetics, respectively. Theme seven was the ideal design for a thumb prosthetic, including abilities, suspension, and materials. Conclusions: Representative data from stakeholders mapped the current status of thumb prosthetics. Preferences for an ideal thumb prosthetic emerged, with suggestions for a simple, durable design. The ability to oppose, grasp and sense pressure was reported as functional priorities. Feasible cost and easy fitting emerged as systemic objectives. This data will be utilized in the development of a sensate thumb prosthetic.

Keywords: smart thumb, thumb prosthetic, sensate prosthetic, amputation

Procedia PDF Downloads 89
435 I²C Master-Slave Integration

Authors: Rozita Borhan, Lam Kien Sieng

Abstract:

This paper describes I²C Slave implementation using I²C master obtained from the OpenCores website. This website provides free Verilog and VHDL Codes to users. The design implementation for the I²C slave is in Verilog Language and uses EDA tools for ASIC design known as ModelSim from Mentor Graphic. This tool is used for simulation and verification purposes. Common application for this I²C Master-Slave integration is also included. This paper also addresses the advantages and limitations of the said design.

Keywords: I²C, master, OpenCores, slave, Verilog, verification

Procedia PDF Downloads 406
434 Computational Fluid Dynamicsfd Simulations of Air Pollutant Dispersion: Validation of Fire Dynamic Simulator Against the Cute Experiments of the Cost ES1006 Action

Authors: Virginie Hergault, Siham Chebbah, Bertrand Frere

Abstract:

Following in-house objectives, Central laboratory of Paris police Prefecture conducted a general review on models and Computational Fluid Dynamics (CFD) codes used to simulate pollutant dispersion in the atmosphere. Starting from that review and considering main features of Large Eddy Simulation, Central Laboratory Of Paris Police Prefecture (LCPP) postulates that the Fire Dynamics Simulator (FDS) model, from National Institute of Standards and Technology (NIST), should be well suited for air pollutant dispersion modeling. This paper focuses on the implementation and the evaluation of FDS in the frame of the European COST ES1006 Action. This action aimed at quantifying the performance of modeling approaches. In this paper, the CUTE dataset carried out in the city of Hamburg, and its mock-up has been used. We have performed a comparison of FDS results with wind tunnel measurements from CUTE trials on the one hand, and, on the other, with the models results involved in the COST Action. The most time-consuming part of creating input data for simulations is the transfer of obstacle geometry information to the format required by SDS. Thus, we have developed Python codes to convert automatically building and topographic data to the FDS input file. In order to evaluate the predictions of FDS with observations, statistical performance measures have been used. These metrics include the fractional bias (FB), the normalized mean square error (NMSE) and the fraction of predictions within a factor of two of observations (FAC2). As well as the CFD models tested in the COST Action, FDS results demonstrate a good agreement with measured concentrations. Furthermore, the metrics assessment indicate that FB and NMSE meet the tolerance acceptable.

Keywords: numerical simulations, atmospheric dispersion, cost ES1006 action, CFD model, cute experiments, wind tunnel data, numerical results

Procedia PDF Downloads 104
433 Speech Community and Social Language Codes: A Sociolinguistic Study of Mampruli-English Codeswitching in Nalerigu, Ghana

Authors: Gertrude Yidanpoa Grumah

Abstract:

Ghana boasts of a rich linguistic diversity, with around eighty-seven indigenous languages coexisting with English, the official language. Within this multilingual environment, speech communities adopt bilingual code choices as a common practice, as people seamlessly switch between Ghanaian languages and English. Extensive research has delved into this phenomenon from various perspectives, including the role of bilingual code choices in teaching, its implications for language policy, and its significance in multilingual communities. Yet, a noticeable gap in the literature persists, with most studies focusing on codeswitching between English and the major southern Ghanaian languages like Twi, Ga, and Ewe. The intricate dynamics of codeswitching with minority indigenous languages, such as Mampruli spoken in northern Ghana, remain largely unexplored. This thesis embarks on an investigation into Mampruli-English codeswitching, delving into the linguistic practices of educated Mampruli speakers. The data collection methods encompass interviews, recorded radio programs, and ethnographic observation. The analytical framework employed draws upon the Ethnography of Communication, with observation notes and transcribed interviews thoughtfully classified into discernible themes. The research findings suggest that a bilingual's tendency to switch from Mampruli to English is significantly influenced by factors such as the level of education, age, gender, perceptions of language prestige, and religious beliefs. In essence, this study represents a pioneering endeavor, marking the first comprehensive study on codeswitching practices within the Mampruli-English context and making a significant contribution to our understanding of Mampruli linguistics, covering the social language codes reflecting the speech community. In a region where such research has been scarce for the past four decades, this study addresses a critical knowledge gap, shedding light on the intricate dynamics of language use in northern Ghana.

Keywords: codeswitching, English, ethnography of communication, Mampruli, sociolinguistics

Procedia PDF Downloads 28
432 Unequal Error Protection of VQ Image Transmission System

Authors: Khelifi Mustapha, A. Moulay lakhdar, I. Elawady

Abstract:

We will study the unequal error protection for VQ image. We have used the Reed Solomon (RS) Codes as Channel coding because they offer better performance in terms of channel error correction over a binary output channel. One such channel (binary input and output) should be considered if it is the case of the application layer, because it includes all the features of the layers located below and on the what it is usually not feasible to make changes.

Keywords: vector quantization, channel error correction, Reed-Solomon channel coding, application

Procedia PDF Downloads 327
431 [Keynote Talk]: Let Us Move to Ethical Finance: A Case Study of Takaful

Authors: Syed Ahmed Salman

Abstract:

Ethicality is essential in our daily activities, including personal and commercial activities. This is evidenced by referring to the historical development of the corporate governance and ethical guidelines. The first corporate governance guideline, i.e. Cadbury Report from U.K. focuses the responsibility of board members towards the shareholders only. Gradually, realising the need to take care of the society and community, stakeholders are now concerns of business entities. Consequently, later codes of corporate governance started extending the responsibility to the other stakeholders in addition to the shareholders. One prevailing corporate governance theory, i.e. stakeholder theory, has been widely used in the research to explore the effects of business entities on society. In addition, the Global Reporting Initiative (GRI) is the leading organisation which promotes social care from businesses for sustainable development. Conventionally, history shows that ethics is key to the long term success of businesses. Many organisations, societies, and regulators give full attention and consideration to ethics. Several countries have introduced ethical codes of conduct to direct trade activities. Similarly, Islam and other religions prohibit the practice of interest, uncertainty, and gambling because of its unethical nature. These prohibited practices are not at all good for the society, business, and any organisation especially as it is detrimental to the well-being of society. In order to avoid unethicality in the finance industry, Shari’ah scholars come out with the idea of Islamic finance which is free from the prohibited elements from the Islamic perspective. It can also be termed ethical finance. This paper highlights how Takaful as one of the Islamic finance products offers fair and just products to the contracting parties and the society. Takaful is framed based on ethical guidelines which are extracted from Shari’ah principles and divine sources such as the Quran and Sunnah. Takaful products have been widely offered all over the world, including in both Muslim and non-Muslim countries. It seems that it is gaining acceptance regardless of religion. This is evidence that Takaful is being accepted as an ethical financial product.

Keywords: ethics, insurance, Islamic finance, religion and takaful

Procedia PDF Downloads 241
430 Portrait of Musical Creativity or Indolence: A Critique of Unoka Character in Achebe’s Things Fall Apart

Authors: Ebim Matthew Abua

Abstract:

In Chinua Achebe’s Things Fall Apart (henceforth, TFA), the character Unoka is portrayed as a weakling and indolent person even when he was a creative artist, a talented musician, and a mathematician. His lack of achievement becomes the barometer for measuring his success. Right from time, music is considered to be of great significance because of its capacity to recreate and retell social events. To this end, music is both a social act and a creative art. As a social act, music is a discursive medium that exploits the dynamics of art in its evaluation of society. Music is so much a part of human existence that its presence in literature can help readers relate to fictional situations and characters. In this paper, the character Unoka is examined against the backdrop of his musical proclivities and his contributions to the overall development of TFA. Unfortunately, Achebe’s Things Fall Apart, a product of artistic creativity, portrays the personality of Unoka as lazy and uninspiring because he (Unoka) is a musician who is busy playing his flute and hardly doing anything productive. This paper is significant because it examines the literary and or linguistic depiction of Unoka and the aftermath of that depiction on the entire novel and, by extension, the larger society. Methodologically, this paper adopted the qualitative approach from the ethnography of communication (EOC), which is the analysis of communication within the wider context of the social and cultural practices and beliefs of the members of a particular culture or speech community. The aim of this qualitative research method includes the ability to discern which communication acts and/or codes are important to different groups, what types of meanings groups apply to different communication events, and how group members learn these codes to provide insight into particular communities. The study reveals that the people of Umuofia were mono-directional in their economy, and there was no room for diversification. One was either a farmer, or such a person was relegated to the background. Unoka, taking up a new challenge of diversifying the economy from the perspective of entertainment, was viewed as a misnomer. This study opens the door to other areas of studying Achebe’s epic novel apart from the critical works of literary artists that have been dished out over time.

Keywords: literature, popular culture, unoka, things fall apart

Procedia PDF Downloads 28
429 The Effect of Expanding the Early Pregnancy Assessment Clinic and COVID-19 on Emergency Department and Urgent Care Visits for Early Pregnancy Bleeding

Authors: Harley Bray, Helen Pymar, Michelle Liu, Chau Pham, Tomislav Jelic, Fran Mulhall

Abstract:

Background: Our study assesses the impact of the COVID-19 pandemic on Early Pregnancy Assessment Clinic (EPAC) referrals and the use of virtual consultation in Winnipeg, Manitoba. Our clinic expanded to accept referrals from all Winnipeg Emergency Department (ED)/Urgent Care (UC) sites beginning November 2019 to April 2020. By May 2020, the COVID-19 pandemic reached Manitoba, and EPAC virtual care was expanded by performing hCG remotely and reviewing blood and ED/UC ultrasound results by phone. Methods: Emergency Department Information Systems (EDIS) and EPAC data reviewed ED/UC visits for pregnancy <20 weeks and vaginal bleeding 1-year pre-COVID (March 12, 2019, to March 11, 2020) and during COVID (March 12, 2020 (first case in Manitoba) to March 11, 2021). Results: There were fewer patient visits for vaginal bleeding or pregnancy of <20 weeks (4264 vs. 5180), diagnoses of threatened abortion (1895 vs. 2283), and ectopic pregnancy (78 vs. 97) during COVID compared with pre-COVID, respectively. International Classification of Disease 10 codes were missing in 849 (20%) and 1183 (23%) of patients during COVID and pre-COVID, respectively. Wait times for all patient visits improved during COVID-19 compared to pre-COVID (5.1 ±4.4 hours vs. 5.5 ± 3.8 hours), more patients received obstetrical ultrasounds, 761 (18%) vs. 787 (15%), and fewer patients returned within 30 days (1360 (32%) vs. 1848 (36%); p<0.01). EPAC saw 708 patients (218; 31% new ED/UC) during COVID compared to 552 (37; 7% new ED/UC) pre-COVID. Fewer operative interventions for pregnancy loss (346 vs. 456) and retained products (236 vs. 272) were noted. Surgeries to treat ectopic pregnancy (106 vs. 113) remained stable during the study time interval. Conclusion: Accurate identification of pregnancy complications was difficult, with over 20% missing ICD-10 diagnostic codes. There were fewer ED/UC visits and surgical management for threatened abortion during COVID, but ectopic pregnancy operative management remained unchanged.

Keywords: obstetrics and gynecology, EPAC, early pregnancy assessment, first trimester, emergency department, abortion, pregnancy, COVID-19

Procedia PDF Downloads 35
428 Sustainability with Health: A Daylighting Approach

Authors: Mohamed Boubekri

Abstract:

Daylight in general and sunlight in particular are vital to life on earth, and it is not difficult to believe that their absence fosters conditions that promote disease. Through photosynthesis and other processes, sunlight provides photochemical ingredients necessary for our lives. There are fundamental biological, hormonal, and physiological functions coordinated by cycles that are crucial to life for cells, plants, animals, and humans. Many plants and animals, including humans, develop abnormal behaviors when sunlight is absent because their diurnal cycle is disturbed. Building​ codes disregard this aspect of daylighting when promulgating windows for buildings. This paper discusses the health aspects of daylighting design.

Keywords: daylighting, health, sunlight, sleep, disorders, circadian rythm, cancer

Procedia PDF Downloads 309
427 Low Voltage Ride through Capability Techniques for DFIG-Based Wind Turbines

Authors: Sherif O. Zain Elabideen, Ahmed A. Helal, Ibrahim F. El-Arabawy

Abstract:

Due to the drastic increase of the wind turbines installed capacity; the grid codes are increasing the restrictions aiming to treat the wind turbines like other conventional sources sooner. In this paper, an intensive review has been presented for different techniques used to add low voltage ride through capability to Doubly Fed Induction Generator (DFIG) wind turbine. A system model with 1.5 MW DFIG wind turbine is constructed and simulated using MATLAB/SIMULINK to explore the effectiveness of the reviewed techniques.

Keywords: DFIG, grid side converters, low voltage ride through, wind turbine

Procedia PDF Downloads 381
426 Quick Response Codes in Physio: A Simple Click to Long-Term Oxygen Therapy Education

Authors: K. W. Lee, C. M. Choi, H. C. Tsang, W. K. Fong, Y. K. Cheng, L. Y. Chan, C. K. Yuen, P. W. Lau, Y. L. To, K. C. Chow

Abstract:

QR (Quick Response) Code is a matrix barcode. It enables users to open websites, photos and other information with mobile devices by just snapping the code. In usual Long Term Oxygen Therapy arrangement, piles of LTOT related information like leaflets from different oxygen service providers are given to patients to choose an appropriate plan according to their needs. If these printed materials are transformed into electronic format (QR Code), it would be more environmentally-friendly. More importantly, electronic materials including LTOT equipment operation and dyspnoea relieving techniques also empower patients in long-term disease management. The objective to this study is to investigate the effect of QR code in patient education on new LTOT users. This study was carried out in medical wards of North District Hospital. Adult patients and relatives who followed commands, were able to use smartphones with internet services and required LTOT arrangement on hospital discharge were recruited. In LTOT arrangement, apart from the usual LTOT education booklets which included patients’ personal information (e.g. oxygen titration and six-minute walk test results etc.), extra leaflets consisted of 1. QR codes of LTOT plans from different oxygen service providers, 2. Education materials of dyspnoea management and 3. Instructions on LTOT equipment operation were given. Upon completion of LTOT arrangement, a questionnaire about the use of QR code on patient education was filled in by patients or relatives. A total of 10 new LTOT users were recruited from November 2017 to January 2018. Initially, 70% of them did not know anything about the QR code, but all of them understood its operation after a simple demonstration. 70% of them agreed that it was convenient to use (20% strongly agree, 40% agree, 10% somewhat agree). 80% of them agreed that QR code could facilitate the retrieval of more LTOT related information (10% strongly agree, 70% agree) while 90% agreed that we should continue delivering QR code leaflets to new LTOT users in the future (30% strongly agree, 40% agree, 20% somewhat agree). It is proven that QR code is a convenient and environmentally-friendly tool to deliver information. It is also relatively easy to be introduced to new users. It has received welcoming feedbacks from current users.

Keywords: long-term oxygen therapy, physiotherapy, patient education, QR code

Procedia PDF Downloads 115
425 Eliminating Cutter-Path Deviation For Five-Axis Nc Machining

Authors: Alan C. Lin, Tsong Der Lin

Abstract:

This study proposes a deviation control method to add interpolation points to numerical control (NC) codes of five-axis machining in order to achieve the required machining accuracy. Specific research issues include: (1) converting machining data between the CL (cutter location) domain and the NC domain, (2) calculating the deviation between the deviated path and the linear path, (3) finding interpolation points, and (4) determining tool orientations for the interpolation points. System implementation with practical examples will also be included to highlight the applicability of the proposed methodology.

Keywords: CAD/CAM, cutter path, five-axis machining, numerical control

Procedia PDF Downloads 394
424 Cyclostationary Analysis of Polytime Coded Signals for LPI Radars

Authors: Metuku Shyamsunder, Kakarla Subbarao, P. Prasanna

Abstract:

In radars, an electromagnetic waveform is sent, and an echo of the same signal is received by the receiver. From this received signal, by extracting various parameters such as round trip delay, Doppler frequency it is possible to find distance, speed, altitude, etc. However, nowadays as the technology increases, intruders are intercepting transmitted signal as it reaches them, and they will be extracting the characteristics and trying to modify them. So there is a need to develop a system whose signal cannot be identified by no cooperative intercept receivers. That is why LPI radars came into existence. In this paper, a brief discussion on LPI radar and its modulation (polytime code (PT1)), detection (cyclostationary (DFSM & FAM) techniques such as DFSM, FAM are presented and compared with respect to computational complexity.

Keywords: LPI radar, polytime codes, cyclostationary DFSM, FAM

Procedia PDF Downloads 442
423 On Hankel Matrices Approach to Interpolation Problem in Infinite and Finite Fields

Authors: Ivan Baravy

Abstract:

Interpolation problem, as it was initially posed in terms of polynomials, is well researched. However, further mathematical developments extended it significantly. Trigonometric interpolation is widely used in Fourier analysis, while its generalized representation as exponential interpolation is applicable to such problem of mathematical physics as modelling of Ziegler-Biersack-Littmark repulsive interatomic potentials. Formulated for finite fields, this problem arises in decoding Reed--Solomon codes. This paper shows the relation between different interpretations of the problem through the class of matrices of special structure - Hankel matrices.

Keywords: Berlekamp-Massey algorithm, exponential interpolation, finite fields, Hankel matrices, Hankel polynomials

Procedia PDF Downloads 481
422 Compressive and Torsional Strength of Self-Compacting Concrete

Authors: Moosa Mazloom, Morteza Mehrvand

Abstract:

The goal of this study was to investigate the effects of silica fume and super plasticizer dosages on compressive and torsional properties of SCC. This work concentrated on concrete mixes having water/binder ratios of 0.45 and 0.35, which contained constant total binder contents of 400 kg/m3 and 500 kg/m3, respectively. The percentages of silica fume that replaced cement were 0 % and 10 %. The super plasticizer dosages utilized in the mixtures were 0.4%, 0.8%, 1.2 % and 1.6 % of the weight of cement. Prism dimensions used in this test were 10 × 10 × 40 cm3. The results of this research indicated that torsional strength of SCC prisms can be calculated using the equations presented in Canadian and American concrete building codes.

Keywords: self-compacting concrete, rectangular prism, torsional strength

Procedia PDF Downloads 483
421 A New Scheme for Chain Code Normalization in Arabic and Farsi Scripts

Authors: Reza Shakoori

Abstract:

This paper presents a structural correction of Arabic and Persian strokes using manipulation of their chain codes in order to improve the rate and performance of Persian and Arabic handwritten word recognition systems. It collects pure and effective features to represent a character with one consolidated feature vector and reduces variations in order to decrease the number of training samples and increase the chance of successful classification. Our results also show that how the proposed approaches can simplify classification and consequently recognition by reducing variations and possible noises on the chain code by keeping orientation of characters and their backbone structures.

Keywords: Arabic, chain code normalization, OCR systems, image processing

Procedia PDF Downloads 368
420 Efficient Single Relay Selection Scheme for Cooperative Communication

Authors: Sung-Bok Choi, Hyun-Jun Shin, Hyoung-Kyu Song

Abstract:

This paper proposes a single relay selection scheme in cooperative communication. Decode and forward scheme is considered when a source node wants to cooperate with a single relay for data transmission. To use the proposed single relay selection scheme, the source node make a little different pattern signal which is not complex pattern and broadcasts it. The proposed scheme does not require the channel state information between the source node and candidates of the relay during the relay selection. Therefore, it is able to be used in many fields.

Keywords: relay selection, cooperative communication, df, channel codes

Procedia PDF Downloads 637