Search results for: clarification request
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 293

Search results for: clarification request

293 Studying Second Language Learners' Language Behavior from Conversation Analysis Perspective

Authors: Yanyan Wang

Abstract:

This paper on second language teaching and learning uses conversation analysis (CA) approach and focuses on how second language learners of Chinese do repair when making clarification requests. In order to demonstrate their behavior in interaction, a comparison was made to study the differences between native speakers of Chinese with non-native speakers of Chinese. The significance of the research is to make second language teachers and learners aware of repair and how to seek clarification. Utilizing the methodology of CA, the research involved two sets of naturally occurring recordings, one of native speaker students and the other of non-native speaker students. Both sets of recording were telephone talks between students and teachers. There were 50 native speaker students and 50 non-native speaker students. From multiple listening to the recordings, the parts with repairs for clarification were selected for analysis which included the moments in the talk when students had problems in understanding or hearing the speaker and had to seek clarification. For example, ‘Sorry, I do not understand ‘and ‘Can you repeat the question? ‘were the parts as repair to make clarification requests. In the data, there were 43 such cases from native speaker students and 88 cases from non-native speaker students. The non-native speaker students were more likely to use repair to seek clarification. Analysis on how the students make clarification requests during their conversation was carried out by investigating how the students initiated problems and how the teachers repaired the problems. In CA term, it is called other-initiated self-repair (OISR), which refers to student-initiated teacher-repair in this research. The findings show that, in initiating repair, native speaker students pay more attention to mutual understanding (inter-subjectivity) while non-native speaker students, due to their lack of language proficiency, pay more attention to their status of knowledge (epistemic) switch. There are three major differences: 1, native Chinese students more often initiate closed-class OISR (seeking specific information in the request) such as repeating a word or phrases from the previous turn while non-native students more frequently initiate open-class OISR (not specifying clarification) such as ‘sorry, I don’t understand ‘. 2, native speakers’ clarification requests are treated by the teacher as understanding of the content while non-native learners’ clarification requests are treated by teacher as language proficiency problem. 3, native speakers don’t see repair as knowledge issue and there is no third position in the repair sequences to close repair while non-native learners take repair sequence as a time to adjust their knowledge. There is clear closing third position token such as ‘oh ‘ to close repair sequence so that the topic can go back. In conclusion, this paper uses conversation analysis approach to compare differences between native Chinese speakers and non-native Chinese learners in their ways of conducting repair when making clarification requests. The findings are useful in future Chinese language teaching and learning, especially in teaching pragmatics such as requests.

Keywords: conversation analysis (CA), clarification request, second language (L2), teaching implication

Procedia PDF Downloads 225
292 The Effectiveness of Video Modeling Procedures on Request an Item Behavior Children with Autism Spectrum Disorders

Authors: Melih Cattik

Abstract:

The present study investigate effectiveness of video modeling procedures on request an item behavior of children with ASD. Two male and a female children with ASD participated in the study. A multiple baseline across participant single-subject design was used to evaluate the effects of the video modeling procedures on request an item behavior. During baseline, no prompts were presented to participants. In the intervention phase, the teacher gave video model to the participant and than created opportunity for request an item to him/her. When the first participant reached to criterion, the second participant began intervention. This procedure continued till all participants completed intervention. Finally, all three participants learned to request an item behavior. Based upon findings of this study, it will make suggestions to future researches.

Keywords: autism spectrum disorders, video modeling procedures, request an item behavior, single subject design

Procedia PDF Downloads 371
291 Content and Language Integrated Instruction: An Investigation of Oral Corrective Feedback in the Chinese Immersion Classroom

Authors: Qin Yao

Abstract:

Content and language integrated instruction provides second language learners instruction in subject matter and language, and is greatly valued, particularly in the language immersion classroom where a language other than students’ first language is the vehicle for teaching school curriculum. Corrective feedback is an essential instructional technique for teachers to integrate a focus on language into their content instruction. This study aims to fill a gap in the literature on immersion—the lack of studies examining corrective feedback in Chinese immersion classrooms, by studying learning opportunities brought by oral corrective feedback in a Chinese immersion classroom. Specifically, it examines what is the distribution of different types of teacher corrective feedback and how students respond to each feedback type, as well as how the focus of the teacher-student interactional exchanges affect the effect of feedback. Two Chinese immersion teachers and their immersion classes were involved, and data were collected through classroom observations interviews. Observations document teachers’ provision of oral corrective feedback and students’ responses following the feedback in class, and interviews with teachers collected teachers’ reflective thoughts about their teaching. A primary quantitative and qualitative analysis of the data revealed that, among different types of corrective feedback, recast occurred most frequently. Metalinguistic clue and repetition were the least occurring feedback types. Clarification request lead to highest percentage of learner uptake manifested by learners’ oral production immediately following the feedback, while explicit correction came the second and recast the third. In addition, the results also showed the interactional context played a role in the effectiveness of the feedback: teachers were most likely to give feedback in conversational exchanges that focused on explicit language and content, while students were most likely to use feedback in exchanges that focused on explicit language. In conclusion, the results of this study indicate recasts are preferred by Chinese immersion teachers, confirming results of previous studies on corrective feedback in non-Chinese immersion classrooms; and clarification request and explicit language instruction elicit more target language production from students and are facilitative in their target language development, thus should not be overlooked in immersion and other content and language integrated classrooms.

Keywords: Chinese immersion, content and language integrated instruction, corrective feedback, interaction

Procedia PDF Downloads 375
290 Gender Difference in the Use of Request Strategies by Urdu/Punjabi Native Speakers

Authors: Muzaffar Hussain

Abstract:

Requests strategies are considered as a part of the speech acts, which are frequently used in everyday communication. Each language provides speech acts to the speakers; therefore, the selection of appropriate form seems more culture-specific rather than language. The present paper investigates the gender-based difference in the use of request strategies by native speakers of Urdu/Punjabi male and female who are learning English as a second language. The data for the present study were collected from 68 graduate students, who are learning English as an L2 in Pakistan. They were given an online close-ended questionnaire, based on Discourse Completion Test (DCT). After analyzing the data, it was found that the L1 male Urdu/Punjabi speakers were inclined to use more direct request strategies while the female Urdu/Punjabi speakers used indirect request strategies. This paper also found that in some situations female participants used more direct strategies than male participants. The present study concludes that the use of request strategies is influenced by culture, social status, and power distribution in a society.

Keywords: gender variation, request strategies, face-threatening, second language pragmatics, language competence

Procedia PDF Downloads 154
289 Research on Load Balancing Technology for Web Service Mobile Host

Authors: Yao Lu, Xiuguo Zhang, Zhiying Cao

Abstract:

In this paper, Load Balancing idea is used in the Web service mobile host. The main idea of Load Balancing is to establish a one-to-many mapping mechanism: An entrance-mapping request to plurality of processing node in order to realize the dividing and assignment processing. Because the mobile host is a resource constrained environment, there are some Web services which cannot be completed on the mobile host. When the mobile host resource is not enough to complete the request, Load Balancing scheduler will divide the request into a plurality of sub-requests and transfer them to different auxiliary mobile hosts. Auxiliary mobile host executes sub-requests, and then, the results will be returned to the mobile host. Service request integrator receives results of sub-requests from the auxiliary mobile host, and integrates the sub-requests. In the end, the complete request is returned to the client. Experimental results show that this technology adopted in this paper can complete requests and have a higher efficiency.

Keywords: Dinic, load balancing, mobile host, web service

Procedia PDF Downloads 294
288 Maternal Request: A Minor but Important Contributor to the Rising Rates of Caesarean Section: A Retrospective Observational Study

Authors: Katherine Russell

Abstract:

Background: Over recent decades the number of caesarean sections performed in the UK has continued to rise. The cause of the rising caesarean rate (CSR) is not well understood. However, one of the most heavily cited reasons is an increase in maternal request for caesarean section. Maternal request for caesarean section (CDMR) refers to a caesarean section performed on maternal request with no medical indication. The true rate of caesarean delivery on maternal request in the UK and its contribution to the caesarean section rate is not known. Methods: To elucidate current understanding of the cause of the rising caesarean section rate and the role of CDMR we conducted a systematic review of the literature. To determine the role of CDMR in the CSR at the PRH we conducted a retrospective observational study of the caesarean section rates and CDMR from 2009-2015. Results: We demonstrated a negative correlation between rates of elective sections and CDMR over the study period (-0.123). On average, there were more elective sections performed after 2011 (15.10% of all deliveries) than before 2011 (12.41% of all deliveries); this difference was statistically significant (p = < 0.001). There were more cases of CDMR after 2011 (1.39% of all deliveries) than before 2011 (0.85% of all deliveries). The difference in average rates of CDMR before and after 2011 was statistically significant (p ≤ 0.001). Conclusions: CDMR is only a minor contributor to the CSR at the PRH. However, it remains an important factor because it represents a target for the reduction of the CSR that is more manageable than other, more complex and ubiquitous causes of the rising CSR.

Keywords: cesarean section, maternal request for cesarean section, obstetrics, pre-natal health

Procedia PDF Downloads 64
287 The Study on Energy Saving in Clarification Process for Water Treatment Plant

Authors: Wiwat Onnakklum

Abstract:

Clarification is the turbidity removal process of water treatment plant. This paper was to study the factors affecting on energy consumption in order to control energy saving strategy. The factors studied were raw water turbidity in the range of 26-40 NTU and production rate in the range of 3.76-5.20 m³/sec. Clarifiers were sludge blanket and sludge recirculation clarifier. Experimental results found that the raw water turbidity was not affected significantly by energy consumption, while the production rate was affected significantly by energy consumption. Sludge blanket clarifier provided lower energy consumption than sludge recirculation clarifier about 32-37%. Subsequently, the operating pattern in production rate can be arranged to decreased energy consumption. The results showed that it can be reduced about 5.09 % of energy saving of clarification process about 754,655 Baht per year.

Keywords: sludge blanket clarifier, sludge recirculation clarifier, water treatment plant, energy

Procedia PDF Downloads 281
286 The Speech Act Responses of Students on the Teacher’s Request in the EFL Classroom

Authors: Agis Andriani

Abstract:

To create an effective teaching condition, the teacher requests the students as the instruction to guide the them interactively in the learning activities in the classroom. This study involves 160 Indonesian students who study English in the university, as participants in the discourse completion test, and ten of them are interviewed. The result shows that when the students response the teacher’s request, it realizes assertives, directives, commisives, expressives, and declaratives. These indicate that the students are active, motivated, and responsive in the learning process, although in the certain condition these responses are to prevent their faces from the shyness of their silence in interaction. Therefore, it needs the teacher’s creativity to give the conducive atmosphere in order to support the students’ participation in learning English.

Keywords: discourse completion test, effective teaching, request, teacher’s creativity

Procedia PDF Downloads 376
285 Investigating Kinetics and Mathematical Modeling of Batch Clarification Process for Non-Centrifugal Sugar Production

Authors: Divya Vats, Sanjay Mahajani

Abstract:

The clarification of sugarcane juice plays a pivotal role in the production of non-centrifugal sugar (NCS), profoundly influencing the quality of the final NCS product. In this study, we have investigated the kinetics and mathematical modeling of the batch clarification process. The turbidity of the clarified cane juice (NTU) emerges as the determinant of the end product’s color. Moreover, this parameter underscores the significance of considering other variables as performance indicators for accessing the efficacy of the clarification process. Temperature-controlled experiments were meticulously conducted in a laboratory-scale batch mode. The primary objective was to discern the essential and optimized parameters crucial for augmenting the clarity of cane juice. Additionally, we explored the impact of pH and flocculant loading on the kinetics. Particle Image Velocimetry (PIV) is employed to comprehend the particle-particle and fluid-particle interaction. This technique facilitated a comprehensive understanding, paving the way for the subsequent multiphase computational fluid dynamics (CFD) simulations using the Eulerian-Lagrangian approach in the Ansys fluent. Impressively, these simulations accurately replicated comparable velocity profiles. The final mechanism of this study helps to make a mathematical model and presents a valuable framework for transitioning from the traditional batch process to a continuous process. The ultimate aim is to attain heightened productivity and unwavering consistency in product quality.

Keywords: non-centrifugal sugar, particle image velocimetry, computational fluid dynamics, mathematical modeling, turbidity

Procedia PDF Downloads 33
284 Evaluation of Pragmatic Information in an English Textbook: Focus on Requests

Authors: Israa A. Qari

Abstract:

Learning to request in a foreign language is a key ability within pragmatics language teaching. This paper examines how requests are taught in English Unlimited Book 3 (Cambridge University Press), an EFL textbook series employed by King Abdulaziz University in Jeddah, Saudi Arabia to teach advanced foundation year students English. The focus of analysis is the evaluation of the request linguistic strategies present in the textbook, frequency of the use of these strategies, and the contextual information provided on the use of these linguistic forms. The researcher collected all the linguistic forms which consisted of the request speech act and divided them into levels employing the CCSARP request coding manual. Findings demonstrated that simple and commonly employed request strategies are introduced. Looking closely at the exercises throughout the chapters, it was noticeable that the book exclusively employed the most direct form of requesting (the imperative) when giving learners instructions: e.g. listen, write, ask, answer, read, look, complete, choose, talk, think, etc. The book also made use of some other request strategies such as ‘hedged performatives’ and ‘query preparatory’. However, it was also found that many strategies were not dealt with in the book, specifically strategies with combined functions (e.g. possibility, ability). On a sociopragmatic level, a strong focus was found to exist on standard situations in which relations between the requester and requestee are clear. In general, contextual information was communicated implicitly only. The textbook did not seem to differentiate between formal and informal request contexts (register) which might consequently impel students to overgeneralize. The paper closes with some recommendations for textbook and curriculum designers. Findings are also contrasted with previous results from similar body of research on EFL requests.

Keywords: EFL, requests, saudi, speech acts, textbook evaluation

Procedia PDF Downloads 90
283 Prospection of Technology Production in Physiotherapy in Brazil

Authors: C. M. Priesnitz, G. Zanandrea, J. P. Fabris, S. L. Russo, M. E. Camargo

Abstract:

This study aimed to the prospection the physiotherapy area technological production registered with the National Intellectual Property Institute (INPI) in Brazil, for understand the evolution of the technological production in the country over time and visualize the distribution this production request in Brazil. There was an evolution in the technology landscape, where the average annual deposits had an increase of 102%, from 3.14 before the year 2004 to 6,33 after this date. It was found differences in the distribution of the number the deposits requested to each Brazilian region, being that of the 132 request, 68,9% were from the southeast region. The international patent classification evaluated the request deposits, and the more found numbers were A61H and A63B. So even with an improved panorama of technology production, this should still have incentives since it is an important tool for the development of the country.

Keywords: distribution, evolution, patent, physiotherapy, technological prospecting

Procedia PDF Downloads 289
282 The Clarification of Palm Oil Wastewater Treatment by Coagulant Composite from Palm Oil Ash

Authors: Rewadee Anuwattana, Narumol Soparatana, Pattamaphorn Phuangngamphan, Worapong Pattayawan, Atiporn Jinprayoon, Saroj Klangkongsap, Supinya Sutthima

Abstract:

In this work focus on clarification in palm oil wastewater treatment by using coagulant composite from palm oil ash. The design of this study was carried out by two steps; first, synthesis of new coagulant composite from palm oil ash which was fused by using Al source combined with Fe source and form to the crystal by the hydrothermal crystallization process. The characterization of coagulant composite from palm oil ash was analyzed by advanced instruments, and The pattern was analyzed by X-ray Diffraction (XRD), chemical composition by X-Ray Fluorescence (XRFS) and morphology characterized by SEM. The second step, the clarification wastewater treatment efficiency of synthetic coagulant composite, was evaluated by coagulation/flocculation process based on the COD, turbidity, phosphate and color removal of wastewater from palm oil factory by varying the coagulant dosage (1-8 %w/v) with no adjusted pH and commercial coagulants (Alum, Ferric Chloride and poly aluminum chloride) which adjusted the pH (6). The results found that the maximum removal of 6% w/v of synthetic coagulant from palm oil ash can remove COD, turbidity, phosphate and color was 88.44%, 93.32%, 93.32% and 93.32%, respectively. The experiments were compared using 6% w/v of commercial coagulants (Alum, Ferric Chloride and Polyaluminum Chloride) can remove COD of 74.29%, 71.43% and 57.14%, respectively.

Keywords: coagulation, coagulant, wastewater treatment, waste utilization, palm oil ash

Procedia PDF Downloads 146
281 Prioritized Processor-Sharing with a Maximum Permissible Sojourn Time

Authors: Yoshiaki Shikata

Abstract:

A prioritized processor-sharing (PS) system with a maximum permissible sojourn time (MPST) is proposed. In this PS system, a higher-priority request is allocated a larger service ratio than a lower-priority request. Moreover, each request receiving service is guaranteed the maximum permissible sojourn time determined by each priority class, regardless of its service time. Arriving requests that cannot receive service due to this guarantee are rejected. We further propose a guarantee method for implementing such a system, and discuss performance evaluation procedures for the resulting system. Practical performance measures, such as the relationships between the loss probability or mean sojourn time of each class request and the maximum permissible sojourn time are evaluated via simulation. At the arrival of each class request, its acceptance or rejection is judged using extended sojourn times of all requests receiving service in the server. As the MPST increases, the mean sojourn time increases almost linearly. However, the logarithm of the loss probability decreases almost linearly. Moreover with an MPST, the difference in the mean sojourn time for different MPSTs increases with the traffic rate. Conversely, the difference in the loss probability for different MPSTs decreases as the traffic rate increases.

Keywords: prioritized processor sharing, priority ratio, permissible sojourn time, loss probability, mean sojourn time, simulation

Procedia PDF Downloads 159
280 AIPM:An Integrator and Pull Request Matching Model in Github

Authors: Zhifang Liao, Yanbing Li, Li Xu, Yan Zhang, Xiaoping Fan, Jinsong Wu

Abstract:

Pull Request (PR) is the primary method for code contributions from the external contributors in Github. PR review is an essential part of open source software developments for maintaining the quality of software. Matching a new PR of an appropriate integrator will make the PR review more effective. However, PR and integrator matching are now organized manually in Github. To reduce this cost, we presented an AIPM model to predict highly relevant integrator of incoming PRs. AIPM uses topic model to extract topics from the PRs, and builds a one-to-one correspondence between topics and integrators. Then, AIPM finds the most suitable integrator according to the maximum entry of the topic-document distribution. On average, AIPM can reach a precision of 60%, and even in some projects, can reach a precision of 80%.

Keywords: pull Request, integrator matching, Github, open source project, topic model

Procedia PDF Downloads 265
279 HD-WSComp: Hypergraph Decomposition for Web Services Composition Based on QoS

Authors: Samah Benmerbi, Kamal Amroun, Abdelkamel Tari

Abstract:

The increasing number of Web service (WS)providers throughout the globe, have produced numerous Web services providing the same or similar functionality. Therefore, there is a need of tools developing the best answer of queries by selecting and composing services with total transparency. This paper reviews various QoS based Web service selection mechanisms and architectures which facilitate qualitatively optimal selection, in other fact Web service composition is required when a request cannot be fulfilled by a single web service. In such cases, it is preferable to integrate existing web services to satisfy user’s request. We introduce an automatic Web service composition method based on hypergraph decomposition using hypertree decomposition method. The problem of selection and the composition of the web services is transformed into a resolution in a hypertree by exploring the relations of dependency between web services to get composite web service via employing an execution order of WS satisfying global request.

Keywords: web service, web service selection, web service composition, QoS, hypergraph decomposition, BE hypergraph decomposition, hypertree resolution

Procedia PDF Downloads 468
278 A Discourse Completion Test Analysis of Email Request Strategies as Used by Tunisian Postgraduate Students

Authors: Imen Aribi Ben Amor

Abstract:

The aim of the present study is to analyze the performance of requests in emails among a group of Tunisian postgraduate students. It also seeks to determine the influence of the social factors on the participants’ requests performance. For this purpose, the data were collected using a discourse completion test (DCT). Accordingly, 42 Tunisian postgraduate students were asked to respond in English to eight different situations in which they carried out the speech act of request in emails. The data were analyzed based on the degree of directness. A detailed analysis of the head acts found in the DCT revealed that Tunisian Postgraduate students use a varied repertoire of request strategies (direct, conventionally indirect and non-conventionally indirect) but at the same time rely heavily on direct request strategies. They tended to address their requestees directly except for distant superiors. DCT results suggest that the participants are to some extent aware of the influence of the ranking of imposition and social distance but fail to acknowledge the weight of social power when performing requests in emails. The preference of the participants to use direct strategies may be the result of the effect of Tunisian culture and the negative transfer of Tunisian communicative strategies. Accordingly, this study suggests some pedagogical implications and suggestions for Tunisian EFL (English as a Foreign Language) instructors. They are required to pay closer attention to the pragmalinguistic nuances of the ways in which requests in emails are realized. Teachers can also help students understand academic email etiquettes by explicitly explaining what they expect in the student email. Thus, EFL teachers and syllabus designers should devote more attention to developing EFL learners’ pragmatic competence through teaching L2 pragmatics.

Keywords: directness, ranking of imposition, request strategies, social distance, social power

Procedia PDF Downloads 198
277 Magnetite Nanoparticles Immobilized Pectinase: Preparation, Characterization and Application for the Fruit Juices Clarification

Authors: Leila Mosafa, Majid Moghadam, Mohammad Shahedi

Abstract:

In this work, pectinase was immobilized on the surface of silica-coated magnetite nanoparticles via covalent attachment. The magnetite-immobilized enzyme was characterized by Fourier transform infrared spectroscopy, X-ray powder diffraction, scanning electron microscopy and vibrating sample magnetometry techniques. Response surface methodology using Minitab Software was applied for statistical designing of operating conditions in order to immobilize pectinase on magnetic nanoparticles. The optimal conditions were obtained at 30°C and pH 5.5 with 42.97 µl pectinase for 2 h. The immobilization yield was 50.6% at optimized conditions. Compared to the free pectinase, the immobilized pectinase was found to exhibit enhanced enzyme activity, better tolerance to the variation of pH and temperature, and improved storage stability. Both free and immobilized samples reduced the viscosity of apple juice from 1.12 to 0.88 and 0.92 mm2s-1, respectively, after 30 min at their optimum temperature. Furthermore, the immobilized enzyme could be reused six consecutive cycles and the efficiency loss in viscosity reduction was found to be only 8.16%.

Keywords: magnetite nanoparticles, pectinase enzyme, immobilization, juice clarification, enzyme activity

Procedia PDF Downloads 375
276 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery

Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi

Abstract:

The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.

Keywords: CSRF, CSRF detection extension, attackers, attacks

Procedia PDF Downloads 380
275 Polite Request Strategies in Commuter Discourse in Xhosa

Authors: Mawande Dlali

Abstract:

This paper examines the request strategies in commuter discourse involving taxi drivers and passengers in Khayelitsha as well as the responses to these requests. The present study considers requests in commuter transport as face threatening acts (FTAs), hence the need for the commuter crew to strategically shape their communicative actions to achieve their overall discourse goal of getting passengers to perform actions that are in their own interest with minimum resistance or confrontation. The crew presents itself by using communicative devices that prompt the passengers to evaluate it positively as warm, friendly, and respectful. However, the passengers' responses to requests range from compliance to resistance depending on their interpretation of the speaker’s motive and the probable social consequences. Participant observation by the researcher was the main method of collecting examples of requests and responses to the requests. Unstructured interviews and informal discussions were made with randomly selected taxi drivers and commuters. The findings and explanations presented in this article revealed the predominance of polite requests as speech acts in taxi discourse in Khayelitsha. This research makes a contribution to the contemporary pragmatics study of African languages in urban context.

Keywords: face threatening acts, speech acts, request strategies, discourse

Procedia PDF Downloads 123
274 Performance Evaluation of a Prioritized, Limited Multi-Server Processor-Sharing System that Includes Servers with Various Capacities

Authors: Yoshiaki Shikata, Nobutane Hanayama

Abstract:

We present a prioritized, limited multi-server processor sharing (PS) system where each server has various capacities, and N (≥2) priority classes are allowed in each PS server. In each prioritized, limited server, different service ratio is assigned to each class request, and the number of requests to be processed is limited to less than a certain number. Routing strategies of such prioritized, limited multi-server PS systems that take into account the capacity of each server are also presented, and a performance evaluation procedure for these strategies is discussed. Practical performance measures of these strategies, such as loss probability, mean waiting time, and mean sojourn time, are evaluated via simulation. In the PS server, at the arrival (or departure) of a request, the extension (shortening) of the remaining sojourn time of each request receiving service can be calculated by using the number of requests of each class and the priority ratio. Utilising a simulation program which executes these events and calculations, the performance of the proposed prioritized, limited multi-server PS rule can be analyzed. From the evaluation results, most suitable routing strategy for the loss or waiting system is clarified.

Keywords: processor sharing, multi-server, various capacity, N-priority classes, routing strategy, loss probability, mean sojourn time, mean waiting time, simulation

Procedia PDF Downloads 300
273 Capacity Estimation of Hybrid Automated Repeat Request Protocol for Low Earth Orbit Mega-Constellations

Authors: Arif Armagan Gozutok, Alper Kule, Burak Tos, Selman Demirel

Abstract:

Wireless communication chain requires effective ways to keep throughput efficiency high while it suffers location-dependent, time-varying burst errors. Several techniques are developed in order to assure that the receiver recovers the transmitted information without errors. The most fundamental approaches are error checking and correction besides re-transmission of the non-acknowledged packets. In this paper, stop & wait (SAW) and chase combined (CC) hybrid automated repeat request (HARQ) protocols are compared and analyzed in terms of throughput and average delay for the usage of low earth orbit (LEO) mega-constellations case. Several assumptions and technological implementations are considered as well as usage of low-density parity check (LDPC) codes together with several constellation orbit configurations.

Keywords: HARQ, LEO, satellite constellation, throughput

Procedia PDF Downloads 109
272 Message Authentication Scheme for Vehicular Ad-Hoc Networks under Sparse RSUs Environment

Authors: Wen Shyong Hsieh, Chih Hsueh Lin

Abstract:

In this paper, we combine the concepts of chameleon hash function (CHF) and identification based cryptography (IBC) to build a message authentication environment for VANET under sparse RSUs. Based on the CHF, TA keeps two common secrets that will be embedded to all identities to be as the evidence of mutual trusting. TA will issue one original identity to every RSU and vehicle. An identity contains one public ID and one private key. The public ID, includes three components: pseudonym, random key, and public key, is used to present one entity and can be verified to be a legal one. The private key is used to claim the ownership of the public ID. Based on the concept of IBC, without any negotiating process, a CHF pairing key multiplied by one private key and other’s public key will be used for mutually trusting and to be utilized as the session key of secure communicating between RSUs and vehicles. To help the vehicles to do message authenticating, the RSUs are assigned to response the vehicle’s temple identity request using two short time secretes that are broadcasted by TA. To light the loading of request information, one day is divided into M time slots. At every time slot, TA will broadcast two short time secretes to all valid RSUs for that time slot. Any RSU can response the temple identity request from legal vehicles. With the collected announcement of public IDs from the neighbor vehicles, a vehicle can set up its neighboring set, which includes the information about the neighbor vehicle’s temple public ID and temple CHF pairing key that can be derived by the private key and neighbor’s public key and will be used to do message authenticating or secure communicating without the help of RSU.

Keywords: Internet of Vehicles (IOV), Vehicular Ad-hoc Networks (VANETs), Chameleon Hash Function (CHF), message authentication

Procedia PDF Downloads 357
271 Jelly and Beans: Appropriate Use of Ultrasound in Acute Kidney Injury

Authors: Raja Ezman Raja Shariff

Abstract:

Acute kidney injury (AKI) is commonly seen in inpatients, and places a great cost on the NHS and patients. Timely and appropriate management is both nephron sparing and potentially life-saving. Ultrasound scanning (USS) is a well-recognised method for stratifying patients. Subsequently, the NICE AKI guidance has defined groups in whom scanning is recommended within 6 hours of request (pyonephrosis), within 24 hours (obstruction/cause unknown), and in whom routine scanning isn't recommended (cause for AKI identified). The audit looks into whether Stockport NHS Trust USS practice was in line with such recommendations. The audit evaluated 92 patients with AKI who had USS, between 01/01/14 to 30/04/14. Data collection was divided into 2 parts. Firstly, radiology request cards and the online imaging software (PACS) were evaluated. Then, the electronic case notes (ADVANTIS) was evaluated further. Based on request cards, 10% of requests were for pyonephrosis. Only 33% were scanned within 6hours and a further 33% within 24hours. 75% were requested for possible obstructions and unknown cause collectively. Of those due to possible obstruction, 71% of patients were scanned within 24 hours. Of those with unknown cause, 50% were scanned within 24 hours. 15% of requests had a cause declared and so potentially did not require scanning. Evaluation of the patients’ notes suggested further interesting findings. Firstly, potentially 39% of patients had a known cause for AKI, therefore, did not need USS. Subsequently, the cohort of unknown cause and possible obstruction was collectively reduced to 45%. Alarmingly the patient cohort with possible pyonephrosis went up to 16%, suggesting an under-recognition of this life-threatening condition. We plan to highlight these findings within our institution and make changes to encourage more appropriate requesting and timely scanning. Time will tell if we manage to save or increase our costs in this cost-conscious NHS. Patient benefits, though, seem to be guaranteed.

Keywords: AKI, ARF, kidney, renal

Procedia PDF Downloads 364
270 Dynamic Self-Scheduling of Pumped-Storage Power Plant in Energy and Ancillary Service Markets Using Sliding Window Technique

Authors: P. Kanakasabapathy, S. Radhika

Abstract:

In the competitive electricity market environment, the profit of the pumped-storage plant in the energy market can be maximized by operating it as a generator, when market clearing price is high and as a pump, to pump water from lower reservoir to upper reservoir, when the price is low. An optimal self-scheduling plan has been developed for a pumped-storage plant, carried out on weekly basis in order to maximize the profit of the plant, keeping into account of all the major uncertainties such as the sudden ancillary service delivery request and the price forecasting errors. For a pumped storage power plant to operate in a real time market successive self-scheduling has to be done by considering the forecast of the day-ahead market and the modified reservoir storage due to the ancillary service request of the previous day. Sliding Window Technique has been used for successive self-scheduling to ensure profit for the plant.

Keywords: ancillary services, BPSO, power system economics, self-scheduling, sliding window technique

Procedia PDF Downloads 372
269 3D Remote Sensing Images Parallax Refining Based On HTML5

Authors: Qian Pei, Hengjian Tong, Weitao Chen, Hai Wang, Yanrong Feng

Abstract:

Horizontal parallax is the foundation of stereoscopic viewing. However, the human eye will feel uncomfortable and it will occur diplopia if horizontal parallax is larger than eye separation. Therefore, we need to do parallax refining before conducting stereoscopic observation. Although some scholars have been devoted to online remote sensing refining, the main work of image refining is completed on the server side. There will be a significant delay when multiple users access the server at the same time. The emergence of HTML5 technology in recent years makes it possible to develop rich browser web application. Authors complete the image parallax refining on the browser side based on HTML5, while server side only need to transfer image data and parallax file to browser side according to the browser’s request. In this way, we can greatly reduce the server CPU load and allow a large number of users to access server in parallel and respond the user’s request quickly.

Keywords: 3D remote sensing images, parallax, online refining, rich browser web application, HTML5

Procedia PDF Downloads 426
268 A Study on the Treatment of Municipal Waste Water Using Sequencing Batch Reactor

Authors: Bhaven N. Tandel, Athira Rajeev

Abstract:

Sequencing batch reactor process is a suspended growth process operating under non-steady state conditions which utilizes a fill and draw reactor with complete mixing during the batch reaction step (after filling) and where the subsequent steps of aeration and clarification occur in the same tank. All sequencing batch reactor systems have five steps in common, which are carried out in sequence as follows, (1) fill (2) react (3) settle (sedimentation/clarification) (4) draw (decant) and (5) idle. The study was carried out in a sequencing batch reactor of dimensions 44cmx30cmx70cm with a working volume of 40 L. Mechanical stirrer of 100 rpm was used to provide continuous mixing in the react period and oxygen was supplied by fish tank aerators. The duration of a complete cycle of sequencing batch reactor was 8 hours. The cycle period was divided into different phases in sequence as follows-0.25 hours fill phase, 6 hours react period, 1 hour settling phase, 0.5 hours decant period and 0.25 hours idle phase. The study consisted of two runs, run 1 and run 2. Run 1 consisted of 6 hours aerobic react period and run 2 consisted of 3 hours aerobic react period followed by 3 hours anoxic react period. The influent wastewater used for the study had COD, BOD, NH3-N and TKN concentrations of 308.03±48.94 mg/L, 100.36±22.05 mg/L, 14.12±1.18 mg/L, and 24.72±2.21 mg/L respectively. Run 1 had an average COD removal efficiency of 41.28%, BOD removal efficiency of 56.25%, NH3-N removal efficiency of 86.19% and TKN removal efficiency of 54.4%. Run 2 had an average COD removal efficiency of 63.19%, BOD removal efficiency of 73.85%, NH3-N removal efficiency of 90.74% and TKN removal efficiency of 65.25%. It was observed that run 2 gave better performance than run 1 in the removal of COD, BOD and TKN.

Keywords: municipal waste water, aerobic, anoxic, sequencing batch reactor

Procedia PDF Downloads 504
267 Vulnerable Paths Assessment for Distributed Denial of Service Attacks in a Cloud Computing Environment

Authors: Manas Tripathi, Arunabha Mukhopadhyay

Abstract:

In Cloud computing environment, cloud servers, sometimes may crash after receiving huge amount of request and cloud services may stop which can create huge loss to users of that cloud services. This situation is called Denial of Service (DoS) attack. In Distributed Denial of Service (DDoS) attack, an attacker targets multiple network paths by compromising various vulnerable systems (zombies) and floods the victim with huge amount of request through these zombies. There are many solutions to mitigate this challenge but most of the methods allows the attack traffic to arrive at Cloud Service Provider (CSP) and then only takes actions against mitigation. Here in this paper we are rather focusing on preventive mechanism to deal with these attacks. We analyze network topology and find most vulnerable paths beforehand without waiting for the traffic to arrive at CSP. We have used Dijkstra's and Yen’s algorithm. Finally, risk assessment of these paths can be done by multiplying the probabilities of attack for these paths with the potential loss.

Keywords: cloud computing, DDoS, Dijkstra, Yen’s k-shortest path, network security

Procedia PDF Downloads 248
266 Not Suitable for Repatriation nor Refugee Status: How Undocumented Immigrant Women Survives Street Policing

Authors: Angel Mabudusha

Abstract:

The impression created by the high volume of foreign nationals being deported by the South African Home Affairs and the police departments is that all undocumented foreign nationals insist on staying in South Africa and voluntary repatriation is open for every person. However, those foreign nationals whose request for deportation has been rejected are often not reported on especially their everyday survival as undocumented immigrant women and their encounter with the police on the street. As a result, this paper aims at exploring the everyday experiences of these women on the street and on why the number of undocumented immigrant women in this country will remain a challenge to the police department. The research was conducted in two cities in South Africa, namely: Johannesburg and Pretoria where the police, the undocumented immigrant women, the human rights lawyers and NGO officials were interviewed on this matter. Based on the idea that voluntary repatriation is open for every immigrant, this study has found that some women’ request for voluntary repatriation remain a dream that never came true. Furthermore, this article proposes more humanitarian ways of dealing with undocumented immigrant women.

Keywords: repatriation, refugee status, undocumented foreign nationals, humanitarian

Procedia PDF Downloads 386
265 An Efficient Architecture for Dynamic Customization and Provisioning of Virtual Appliance in Cloud Environment

Authors: Rajendar Kandan, Mohammad Zakaria Alli, Hong Ong

Abstract:

Cloud computing is a business model which provides an easier management of computing resources. Cloud users can request virtual machine and install additional softwares and configure them if needed. However, user can also request virtual appliance which provides a better solution to deploy application in much faster time, as it is ready-built image of operating system with necessary softwares installed and configured. Large numbers of virtual appliances are available in different image format. User can download available appliances from public marketplace and start using it. However, information published about the virtual appliance differs from each providers leading to the difficulty in choosing required virtual appliance as it is composed of specific OS with standard software version. However, even if user choses the appliance from respective providers, user doesn’t have any flexibility to choose their own set of softwares with required OS and application. In this paper, we propose a referenced architecture for dynamically customizing virtual appliance and provision them in an easier manner. We also add our experience in integrating our proposed architecture with public marketplace and Mi-Cloud, a cloud management software.

Keywords: cloud computing, marketplace, virtualization, virtual appliance

Procedia PDF Downloads 253
264 Problem Gambling in the Conceptualization of Health Professionals: A Qualitative Analysis of the Discourses Produced by Psychologists, Psychiatrists and General Practitioners

Authors: T. Marinaci, C. Venuleo

Abstract:

Different conceptualizations of disease affect patient care. This study aims to address this gap. It explores how health professionals conceptualize gambling problem, addiction and the goals of recovery process. In-depth, semi-structured, open-ended interviews were conducted with Italian psychologists, psychiatrists, general practitioners, and support staff (N= 114), working within health centres for the treatment of addiction (public health services or therapeutic communities) or medical offices. A Lexical Correspondence Analysis (LCA) was applied to the verbatim transcripts. LCA allowed to identify two main factorial dimensions, which organize similarity and dissimilarity in the discourses of the interviewed. The first dimension labelled 'Models of relationship with the problem', concerns two different models of relationship with the health problem: one related to the request for help and the process of taking charge and the other related to the identification of the psychopathology underlying the disorder. The second dimension, labelled 'Organisers of the intervention' reflects the dialectic between two ways to address the problem. On the one hand, they are the gambling dynamics and its immediate life-consequences to organize the intervention (whatever the request of the user is); on the other hand, they are the procedures and the tools which characterize the health service to organize the way the professionals deal with the user’ s problem (whatever it is and despite the specify of the user’s request). The results highlight how, despite the differences, the respondents share a central assumption: understanding gambling problem implies the reference to the gambler’s identity, more than, for instance, to the relational, social, cultural or political context where the gambler lives. A passive stance is attributed to the user, who does not play any role in the definition of the goal of the intervention. The results will be discussed to highlight the relationship between professional models and users’ ways to understand and deal with the problems related to gambling.

Keywords: cultural models, health professionals, intervention models, problem gambling

Procedia PDF Downloads 113