Search results for: dates nodes
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 846

Search results for: dates nodes

546 A Cloud-Based Federated Identity Management in Europe

Authors: Jesus Carretero, Mario Vasile, Guillermo Izquierdo, Javier Garcia-Blas

Abstract:

Currently, there is a so called ‘identity crisis’ in cybersecurity caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Federated Identity Management (FIM) could be solution for this crisis, as it is a method that facilitates management of identity processes and policies among collaborating entities without enforcing a global consistency, that is difficult to achieve when there are ID legacy systems. To cope with this problem, the Connecting Europe Facility (CEF) initiative proposed in 2014 a federated solution in anticipation of the adoption of the Regulation (EU) N°910/2014, the so-called eIDAS Regulation. At present, a network of eIDAS Nodes is being deployed at European level to allow that every citizen recognized by a member state is to be recognized within the trust network at European level, enabling the consumption of services in other member states that, until now were not allowed, or whose concession was tedious. This is a very ambitious approach, since it tends to enable cross-border authentication of Member States citizens without the need to unify the authentication method (eID Scheme) of the member state in question. However, this federation is currently managed by member states and it is initially applied only to citizens and public organizations. The goal of this paper is to present the results of a European Project, named eID@Cloud, that focuses on the integration of eID in 5 cloud platforms belonging to authentication service providers of different EU Member States to act as Service Providers (SP) for private entities. We propose an initiative based on a private eID Scheme both for natural and legal persons. The methodology followed in the eID@Cloud project is that each Identity Provider (IdP) is subscribed to an eIDAS Node Connector, requesting for authentication, that is subscribed to an eIDAS Node Proxy Service, issuing authentication assertions. To cope with high loads, load balancing is supported in the eIDAS Node. The eID@Cloud project is still going on, but we already have some important outcomes. First, we have deployed the federation identity nodes and tested it from the security and performance point of view. The pilot prototype has shown the feasibility of deploying this kind of systems, ensuring good performance due to the replication of the eIDAS nodes and the load balance mechanism. Second, our solution avoids the propagation of identity data out of the native domain of the user or entity being identified, which avoids problems well known in cybersecurity due to network interception, man in the middle attack, etc. Last, but not least, this system allows to connect any country or collectivity easily, providing incremental development of the network and avoiding difficult political negotiations to agree on a single authentication format (which would be a major stopper).

Keywords: cybersecurity, identity federation, trust, user authentication

Procedia PDF Downloads 141
545 Multitemporal Satellite Images for Agriculture Change Detection in Al Jouf Region, Saudi Arabia

Authors: Ali A. Aldosari

Abstract:

Change detection of Earth surface features is extremely important for better understanding of our environment in order to promote better decision making. Al-Jawf is remarkable for its abundant agricultural water where there is fertile agricultural land due largely to underground water. As result, this region has large areas of cultivation of dates, olives and fruits trees as well as other agricultural products such as Alfa Alfa and wheat. However this agricultural area was declined due to the reduction of government supports in the last decade. This reduction was not officially recorded or measured in this region at large scale or governorate level. Remote sensing data are primary sources extensively used for change detection in agriculture applications. This study is applied the technology of GIS and used the Normalized Difference Vegetation Index (NDVI) which can be used to measure and analyze the spatial and temporal changes in the agriculture areas in the Aljouf region.

Keywords: spatial analysis, geographical information system, change detection

Procedia PDF Downloads 373
544 Monitoring of Rice Phenology and Agricultural Practices from Sentinel 2 Images

Authors: D. Courault, L. Hossard, V. Demarez, E. Ndikumana, D. Ho Tong Minh, N. Baghdadi, F. Ruget

Abstract:

In the global change context, efficient management of the available resources has become one of the most important topics, particularly for sustainable crop development. Timely assessment with high precision is crucial for water resource and pest management. Rice cultivated in Southern France in the Camargue region must face a challenge, reduction of the soil salinity by flooding and at the same time reduce the number of herbicides impacting negatively the environment. This context has lead farmers to diversify crop rotation and their agricultural practices. The objective of this study was to evaluate this crop diversity both in crop systems and in agricultural practices applied to rice paddy in order to quantify the impact on the environment and on the crop production. The proposed method is based on the combined use of crop models and multispectral data acquired from the recent Sentinel 2 satellite sensors launched by the European Space Agency (ESA) within the homework of the Copernicus program. More than 40 images at fine spatial resolution (10m in the optical range) were processed for 2016 and 2017 (with a revisit time of 5 days) to map crop types using random forest method and to estimate biophysical variables (LAI) retrieved by inversion of the PROSAIL canopy radiative transfer model. Thanks to the high revisit time of Sentinel 2 data, it was possible to monitor the soil labor before flooding and the second sowing made by some farmers to better control weeds. The temporal trajectories of remote sensing data were analyzed for various rice cultivars for defining the main parameters describing the phenological stages useful to calibrate two crop models (STICS and SAFY). Results were compared to surveys conducted with 10 farms. A large variability of LAI has been observed at farm scale (up to 2-3m²/m²) which induced a significant variability in the yields simulated (up to 2 ton/ha). Observations on more than 300 fields have also been collected on land use. Various maps were elaborated, land use, LAI, flooding and sowing, and harvest dates. All these maps allow proposing a new typology to classify these paddy crop systems. Key phenological dates can be estimated from inverse procedures and were validated against ground surveys. The proposed approach allowed to compare the years and to detect anomalies. The methods proposed here can be applied at different crops in various contexts and confirm the potential of remote sensing acquired at fine resolution such as the Sentinel2 system for agriculture applications and environment monitoring. This study was supported by the French national center of spatial studies (CNES, funded by the TOSCA).

Keywords: agricultural practices, remote sensing, rice, yield

Procedia PDF Downloads 247
543 Addressing Scheme for IOT Network Using IPV6

Authors: H. Zormati, J. Chebil, J. Bel Hadj Taher

Abstract:

The goal of this paper is to present an addressing scheme that allows for assigning a unique IPv6 address to each node in the Internet of Things (IoT) network. This scheme guarantees uniqueness by extracting the clock skew of each communication device and converting it into an IPv6 address. Simulation analysis confirms that the presented scheme provides reductions in terms of energy consumption, communication overhead and response time as compared to four studied addressing schemes Strong DAD, LEADS, SIPA and CLOSA.

Keywords: addressing, IoT, IPv6, network, nodes

Procedia PDF Downloads 262
542 The Relationship between Representational Conflicts, Generalization, and Encoding Requirements in an Instance Memory Network

Authors: Mathew Wakefield, Matthew Mitchell, Lisa Wise, Christopher McCarthy

Abstract:

The properties of memory representations in artificial neural networks have cognitive implications. Distributed representations that encode instances as a pattern of activity across layers of nodes afford memory compression and enforce the selection of a single point in instance space. These encoding schemes also appear to distort the representational space, as well as trading off the ability to validate that input information is within the bounds of past experience. In contrast, a localist representation which encodes some meaningful information into individual nodes in a network layer affords less memory compression while retaining the integrity of the representational space. This allows the validity of an input to be determined. The validity (or familiarity) of input along with the capacity of localist representation for multiple instance selections affords a memory sampling approach that dynamically balances the bias-variance trade-off. When the input is familiar, bias may be high by referring only to the most similar instances in memory. When the input is less familiar, variance can be increased by referring to more instances that capture a broader range of features. Using this approach in a localist instance memory network, an experiment demonstrates a relationship between representational conflict, generalization performance, and memorization demand. Relatively small sampling ranges produce the best performance on a classic machine learning dataset of visual objects. Combining memory validity with conflict detection produces a reliable confidence judgement that can separate responses with high and low error rates. Confidence can also be used to signal the need for supervisory input. Using this judgement, the need for supervised learning as well as memory encoding can be substantially reduced with only a trivial detriment to classification performance.

Keywords: artificial neural networks, representation, memory, conflict monitoring, confidence

Procedia PDF Downloads 99
541 The Conservation of the Botanical Collar of Tutankhamun

Authors: Safwat Mohamed Sayed Ali, Hussein Kamal

Abstract:

This paper discusses the conservation procedures of the botanical collar of King Tutankhamun. It dates back to the new Kingdom. This collar was kept in a box but found in bad condition. Many parts of the collar were separated. The collar suffered from dryness and dust, so it needed to be cleaned mechanically and recollected together. Japanese paper was used to collect the separated parts of the collar on a linen thread. The linen thread was dyed with organic dye to match the color of the plant material. The guidance in collecting the different parts of the plant collar is the original photograph captured at the discovery of the tomb. Also, the optical microscope was used in collecting fractured parts. The weak parts of the collar were treated with a suitable consolidation material. Klucel G dissolved in Ethyl Alcohol 0.5% was used in the treatment and gave convenient results. Some investigations were executed in order to identify the plant types used in making the botanical collar. Scanning Electron microscope and optical microscope were used in plant identification.

Keywords: sustainable, consolidation, plant, investigation

Procedia PDF Downloads 41
540 The Use of Correlation Difference for the Prediction of Leakage in Pipeline Networks

Authors: Mabel Usunobun Olanipekun, Henry Ogbemudia Omoregbee

Abstract:

Anomalies such as water pipeline and hydraulic or petrochemical pipeline network leakages and bursts have significant implications for economic conditions and the environment. In order to ensure pipeline systems are reliable, they must be efficiently controlled. Wireless Sensor Networks (WSNs) have become a powerful network with critical infrastructure monitoring systems for water, oil and gas pipelines. The loss of water, oil and gas is inevitable and is strongly linked to financial costs and environmental problems, and its avoidance often leads to saving of economic resources. Substantial repair costs and the loss of precious natural resources are part of the financial impact of leaking pipes. Pipeline systems experts have implemented various methodologies in recent decades to identify and locate leakages in water, oil and gas supply networks. These methodologies include, among others, the use of acoustic sensors, measurements, abrupt statistical analysis etc. The issue of leak quantification is to estimate, given some observations about that network, the size and location of one or more leaks in a water pipeline network. In detecting background leakage, however, there is a greater uncertainty in using these methodologies since their output is not so reliable. In this work, we are presenting a scalable concept and simulation where a pressure-driven model (PDM) was used to determine water pipeline leakage in a system network. These pressure data were collected with the use of acoustic sensors located at various node points after a predetermined distance apart. We were able to determine with the use of correlation difference to determine the leakage point locally introduced at a predetermined point between two consecutive nodes, causing a substantial pressure difference between in a pipeline network. After de-noising the signal from the sensors at the nodes, we successfully obtained the exact point where we introduced the local leakage using the correlation difference model we developed.

Keywords: leakage detection, acoustic signals, pipeline network, correlation, wireless sensor networks (WSNs)

Procedia PDF Downloads 58
539 A Reading Attempt of the Urban Memory of Jordan University of Science and Technology Campus by Cognitive Mapping

Authors: Bsma Adel Bany Mohammad

Abstract:

The University campuses are a small city containing basic city functions such as educational spaces, accommodations, services and transportation. They are spaces of functional and social life with different activities, different occupants. The campus designed and transformed like cities so both experienced and memorized in same way. Campus memory is the ability of individuals to maintain and reveal the spatial components of designed physical spaces, which form the understandings, experiences, sensations of the environment in all. ‘Cognitive mapping’ is used to decode the physical interaction and emotional relationship between individuals and the city; Cognitive maps are created graphically using geometric and verbal elements on paper by remembering the images of the Urban Environment. In this study, to determine the emotional urban identity belonging to Jordan University of science and technology Campus, architecture students Asked to identify the areas they interact with in the campus by drawing a cognitive map. ‘Campus memory items’ are identified by analyzing the cognitive maps of the campus, then the spatial identity result of such data. The analysis based on the five basic elements of Lynch: paths, districts, edges, nodes, and landmarks. As a result of this analysis, it found that Spatial Identity constructed by the shared elements of the maps. The memory of most students listed the gates structure- which is a large desirable structure, located at the main entrances within the campus defined as major landmarks, then the square spaces defined as nodes, in addition to both stairs and corridors defined as paths. Finally, the districts, edges of educational buildings and service spaces are listed correspondingly in cognitive maps. Findings suggest that the spatial identity of the campus design is related mainly to the gates structures, squares and stairs.

Keywords: cognitive maps, university campus, urban memory, identity

Procedia PDF Downloads 120
538 Computational Team Dynamics and Interaction Patterns in New Product Development Teams

Authors: Shankaran Sitarama

Abstract:

New Product Development (NPD) is invariably a team effort and involves effective teamwork. NPD team has members from different disciplines coming together and working through the different phases all the way from conceptual design phase till the production and product roll out. Creativity and Innovation are some of the key factors of successful NPD. Team members going through the different phases of NPD interact and work closely yet challenge each other during the design phases to brainstorm on ideas and later converge to work together. These two traits require the teams to have a divergent and a convergent thinking simultaneously. There needs to be a good balance. The team dynamics invariably result in conflicts among team members. While some amount of conflict (ideational conflict) is desirable in NPD teams to be creative as a group, relational conflicts (or discords among members) could be detrimental to teamwork. Team communication truly reflect these tensions and team dynamics. In this research, team communication (emails) between the members of the NPD teams is considered for analysis. The email communication is processed through a semantic analysis algorithm (LSA) to analyze the content of communication and a semantic similarity analysis to arrive at a social network graph that depicts the communication amongst team members based on the content of communication. The amount of communication (content and not frequency of communication) defines the interaction strength between the members. Social network adjacency matrix is thus obtained for the team. Standard social network analysis techniques based on the Adjacency Matrix (AM) and Dichotomized Adjacency Matrix (DAM) based on network density yield network graphs and network metrics like centrality. The social network graphs are then rendered for visual representation using a Metric Multi-Dimensional Scaling (MMDS) algorithm for node placements and arcs connecting the nodes (representing team members) are drawn. The distance of the nodes in the placement represents the tie-strength between the members. Stronger tie-strengths render nodes closer. Overall visual representation of the social network graph provides a clear picture of the team’s interactions. This research reveals four distinct patterns of team interaction that are clearly identifiable in the visual representation of the social network graph and have a clearly defined computational scheme. The four computational patterns of team interaction defined are Central Member Pattern (CMP), Subgroup and Aloof member Pattern (SAP), Isolate Member Pattern (IMP), and Pendant Member Pattern (PMP). Each of these patterns has a team dynamics implication in terms of the conflict level in the team. For instance, Isolate member pattern, clearly points to a near break-down in communication with the member and hence a possible high conflict level, whereas the subgroup or aloof member pattern points to a non-uniform information flow in the team and some moderate level of conflict. These pattern classifications of teams are then compared and correlated to the real level of conflict in the teams as indicated by the team members through an elaborate self-evaluation, team reflection, feedback form and results show a good correlation.

Keywords: team dynamics, team communication, team interactions, social network analysis, sna, new product development, latent semantic analysis, LSA, NPD teams

Procedia PDF Downloads 36
537 A Contemporary Advertising Strategy on Social Networking Sites

Authors: M. S. Aparna, Pushparaj Shetty D.

Abstract:

Nowadays social networking sites have become so popular that the producers or the sellers look for these sites as one of the best options to target the right audience to market their products. There are several tools available to monitor or analyze the social networks. Our task is to identify the right community web pages and find out the behavior analysis of the members by using these tools and formulate an appropriate strategy to market the products or services to achieve the set goals. The advertising becomes more effective when the information of the product/ services come from a known source. The strategy explores great buying influence in the audience on referral marketing. Our methodology proceeds with critical budget analysis and promotes viral influence propagation. In this context, we encompass the vital bits of budget evaluation such as the number of optimal seed nodes or primary influential users activated onset, an estimate coverage spread of nodes and maximum influence propagating distance from an initial seed to an end node. Our proposal for Buyer Prediction mathematical model arises from the urge to perform complex analysis when the probability density estimates of reliable factors are not known or difficult to calculate. Order Statistics and Buyer Prediction mapping function guarantee the selection of optimal influential users at each level. We exercise an efficient tactics of practicing community pages and user behavior to determine the product enthusiasts on social networks. Our approach is promising and should be an elementary choice when there is little or no prior knowledge on the distribution of potential buyers on social networks. In this strategy, product news propagates to influential users on or surrounding networks. By applying the same technique, a user can search friends who are capable to advise better or give referrals, if a product interests him.

Keywords: viral marketing, social network analysis, community web pages, buyer prediction, influence propagation, budget constraints

Procedia PDF Downloads 236
536 Beam, Column Joints Concrete in Seismic Zone

Authors: Khalifa Kherafa

Abstract:

This east project consists in studying beam–column joints concrete subjected to seismic loads. A bibliographical study was introduced to clarify the work undertaken by the researchers in the field during the three last decades and especially the two last year’s results which were to study for the determination of the method of calculating of transverse reinforcement in the various nodes of a structure. For application, the efforts in the posts el the beams of a building in R+4 in zone 3 were calculate according to the finite element method through the software .

Keywords: beam–column joints, cyclic loading, shearing force, damaged joint

Procedia PDF Downloads 393
535 Lead-Time Estimation Approach Using the Process Capability Index

Authors: Abdel-Aziz M. Mohamed

Abstract:

This research proposes a methodology to estimate the customer order lead time in the supply chain based on the process capability index. The cases when the process output is normally distributed and when it is not are considered. The relationships between the system capability indices in both service and manufacturing applications, delivery system reliability and the percentages of orders delivered after their promised due dates are presented. The proposed method can be used to examine the current process capability to deliver the orders before the promised lead-time. If the system was found to be incapable, the method can be used to help revise the current lead-time to a proper value according to the service reliability level selected by the management. Numerical examples and a case study describing the lead time estimation methodology and testing the system capability of delivering the orders before their promised due date are illustrated.

Keywords: lead-time estimation, process capability index, delivery system reliability, statistical analysis, service achievement index, service quality

Procedia PDF Downloads 532
534 Fog Computing- Network Based Computing

Authors: Navaneeth Krishnan, Chandan N. Bhagwat, Aparajit P. Utpat

Abstract:

Cloud Computing provides us a means to upload data and use applications over the internet. As the number of devices connecting to the cloud grows, there is undue pressure on the cloud infrastructure. Fog computing or Network Based Computing or Edge Computing allows to move a part of the processing in the cloud to the network devices present along the node to the cloud. Therefore the nodes connected to the cloud have a better response time. This paper proposes a method of moving the computation from the cloud to the network by introducing an android like appstore on the networking devices.

Keywords: cloud computing, fog computing, network devices, appstore

Procedia PDF Downloads 348
533 Analysis of the Impact of Suez Canal on the Robustness of Global Shipping Networks

Authors: Zimu Li, Zheng Wan

Abstract:

The Suez Canal plays an important role in global shipping networks and is one of the most frequently used waterways in the world. The 2021 canal obstruction by ship Ever Given in March 2021, however, completed blocked the Suez Canal for a week and caused significant disruption to world trade. Therefore, it is very important to quantitatively analyze the impact of the accident on the robustness of the global shipping network. However, the current research on maritime transportation networks is usually limited to local or small-scale networks in a certain region. Based on the complex network theory, this study establishes a global shipping complex network covering 2713 nodes and 137830 edges by using the real trajectory data of the global marine transport ship automatic identification system in 2018. At the same time, two attack modes, deliberate (Suez Canal Blocking) and random, are defined to calculate the changes in network node degree, eccentricity, clustering coefficient, network density, network isolated nodes, betweenness centrality, and closeness centrality under the two attack modes, and quantitatively analyze the actual impact of Suez Canal Blocking on the robustness of global shipping network. The results of the network robustness analysis show that Suez Canal blocking was more destructive to the shipping network than random attacks of the same scale. The network connectivity and accessibility decreased significantly, and the decline decreased with the distance between the port and the canal, showing the phenomenon of distance attenuation. This study further analyzes the impact of the blocking of the Suez Canal on Chinese ports and finds that the blocking of the Suez Canal significantly interferes withChina's shipping network and seriously affects China's normal trade activities. Finally, the impact of the global supply chain is analyzed, and it is found that blocking the canal will seriously damage the normal operation of the global supply chain.

Keywords: global shipping networks, ship AIS trajectory data, main channel, complex network, eigenvalue change

Procedia PDF Downloads 138
532 Adsorption of Phenolic Compounds on Activated Carbon DSAC36-24

Authors: Khaoula Hidouri, Ali Benhmidene, Bechir Chouachi, Dhananjay R. Mishra, Ammar Houas

Abstract:

Activated carbon DSAC36-24 iy is adsorbent materials, characterized by a specific surface area of 548.13 m²g⁻¹. Their manufacture uses the natural raw materials like the nucleus of dates. In this study the treatment is done in two stages: A chemical treatment by H3PO4 followed by a physical treatment under nitrogen for 1 hour then under stream of CO2 for 24 hours. A characterization of the various parameters was determined such as the measurement of the specific surface area, determination of pHPZC, bulk density, iodine value. The study of the adsorption of organic molecules (hydroquinone, paranitrophenol, 2,4-dinitrophenol, 2,4,6-trinitrophenol) indicates that the adsorption phenomena are essentially due to the van der Waals interaction. In the case of organic molecules carrying the polar substituents, the existence of hydrogen bonds is also proved by the donor-acceptor forces. The study of the pH effect was done with modeling by different models (Langmuir, Freundlich, Langmuir-Freundlich, Redlich-Peterson), a kinetic treatment is also followed by the application of Lagergren, Weber, Macky.

Keywords: adsoprtion ishoterms, adsorption kinetics, DSAC36-24, organic molecule

Procedia PDF Downloads 249
531 Iron-Metal-Organic Frameworks: Potential Application as Theranostics for Inhalable Therapy of Tuberculosis

Authors: Gabriela Wyszogrodzka, Przemyslaw Dorozynski, Barbara Gil, Maciej Strzempek, Bartosz Marszalek, Piotr Kulinowski, Wladyslaw Piotr Weglarz, Elzbieta Menaszek

Abstract:

MOFs (Metal-Organic Frameworks) belong to a new group of porous materials with a hybrid organic-inorganic construction. Their structure is a network consisting of metal cations or clusters (acting as metallic centers, nodes) and the organic linkers between nodes. The interest in MOFs is primarily associated with the use of their well-developed surface and large porous. Possibility to build MOFs of biocompatible components let to use them as potential drug carriers. Furthermore, forming MOFs structure from cations possessing paramagnetic properties (e.g. iron cations) allows to use them as MRI (Magnetic Resonance Imaging) contrast agents. The concept of formation of particles that combine the ability to transfer active substance with imaging properties has been called theranostic (from words combination therapy and diagnostics). By building MOF structure from iron cations it is possible to use them as theranostic agents and monitoring the distribution of the active substance after administration in real time. In the study iron-MOF: Fe-MIL-101-NH2 was chosen, consisting of iron cluster in nodes of the structure and amino-terephthalic acid as a linker. The aim of the study was to investigate the possibility of applying Fe-MIL-101-NH2 as inhalable theranostic particulate system for the first-line anti-tuberculosis antibiotic – isoniazid. The drug content incorporated into Fe-MIL-101-NH2 was evaluated by dissolution study using spectrophotometric method. Results showed isoniazid encapsulation efficiency – ca. 12.5% wt. Possibility of Fe-MIL-101-NH2 application as the MRI contrast agent was demonstrated by magnetic resonance tomography. FeMIL-101-NH2 effectively shortening T1 and T2 relaxation times (increasing R1 and R2 relaxation rates) linearly with the concentrations of suspended material. Images obtained using multi-echo magnetic resonance imaging sequence revealed possibility to use FeMIL-101-NH2 as positive and negative contrasts depending on applied repetition time. MOFs micronization via ultrasound was evaluated by XRD, nitrogen adsorption, FTIR, SEM imaging and did not influence their crystal shape and size. Ultrasonication let to break the aggregates and achieve very homogeneously looking SEM images. MOFs cytotoxicity was evaluated in in vitro test with a highly sensitive resazurin based reagent PrestoBlue™ on L929 fibroblast cell line. After 24h no inhibition of cell proliferation was observed. All results proved potential possibility of application of ironMOFs as an isoniazid carrier and as MRI contrast agent in inhalatory treatment of tuberculosis. Acknowledgments: Authors gratefully acknowledge the National Science Center Poland for providing financial support, grant no 2014/15/B/ST5/04498.

Keywords: imaging agents, metal-organic frameworks, theranostics, tuberculosis

Procedia PDF Downloads 218
530 Comparative Study of Urdu and Hindko Language

Authors: Tahseen Bibi

Abstract:

Language is a source of communicating the ideas, emotions and feelings to others. Languages are different from one another on the basis of symbols and articulation. Regional languages play a role of unification in any country. National language of any country gives strength to its masses as it evaporates the mutual indifferences. There are various regional languages in Pakistan like Sindhi, Pushto, Hindko and Balochi. Hindko language dates back to the ancient times and the Hindko speakers can also easily understand and speak Urdu language. Urdu language is an amalgam of various languages. These languages are interconnected. Thus we can draw an analogy between the two languages under discussion on the basis of the pronunciation. The research will show that there are so many words in both the languages which have the similar pronunciation. It will further tell that the roots of Urdu language lie in Hindko. The reason behind this resemblance is that Urdu has got extracted from Hindko and other languages. Hindko language has played a prominent role in the development of Urdu language. Thus the role of Hindko language in the emergence and development of Urdu cannot be denied. This article will use the qualitative and comparative study as methodology. The research will highlight that there is close resemblance in both the languages on the basis of pronunciation, signifying that Urdu language has been extracted from Hindkon language.

Keywords: Hindko, Urdu, regional languages, vocabulary

Procedia PDF Downloads 365
529 From 'Tabung Haji' to Fully Islamic Bank: Analysis of the Twenty Years of Creating Alternative Banking System in Malaysia

Authors: Maulana Ayoub Ali

Abstract:

Malayan Pilgrims Savings Corporation was introduced in 1963. Six years later, Malaysian Pilgrims Fund Board (Tabung Haji) was formed. The board used to collect funds from pilgrims who expected to perform pilgrimage in the future dates. Money was collected and kept as per given rules and procedures emanated from Islamic sources of law. Twenty years later, the country was ready to run a fully fledged Islamic bank where the Bank Islam Malaysia Berhad (BIMB) came into existence in the year 1983. This paper investigates stages of development of Islamic banking system in Malaysia from 1983 to date. This study discovered that Malaysia had enough time to make Islamic banking system works alongside conventional banking system and for sure, has successfully managed to come up with the comprehensive and workable financial system which accommodates both the conventional and Islamic banking. As a result, Malaysia stands to be the hub of Islamic banking products and services in the world today.

Keywords: Tabung Haji, Islamic Banks, conventional law, Malaysia

Procedia PDF Downloads 309
528 Comparison of 18F-FDG and 11C-Methionine PET-CT for Assessment of Response to Neoadjuvant Chemotherapy in Locally Advanced Breast Carcinoma

Authors: Sonia Mahajan Dinesh, Anant Dinesh, Madhavi Tripathi, Vinod Kumar Ramteke, Rajnish Sharma, Anupam Mondal

Abstract:

Background: Neo-adjuvant chemotherapy plays an important role in treatment of breast cancer by decreasing the tumour load and it offers an opportunity to evaluate response of primary tumour to chemotherapy. Standard anatomical imaging modalities are unable to accurately reflect the response to chemotherapy until several cycles of drug treatment have been completed. Metabolic imaging using tracers like 18F-fluorodeoxyglucose (FDG) as a marker of glucose metabolism or amino acid tracers like L-methyl-11C methionine (MET) have potential role for the measurement of treatment response. In this study, our objective was to compare these two PET tracers for assessment of response to neoadjuvant chemotherapy, in locally advanced breast carcinoma. Methods: In our prospective study, 20 female patients with histology proven locally advanced breast carcinoma underwent PET-CT imaging using FDG and MET before and after three cycles of neoadjuvant chemotherapy (CAF regimen). Thereafter, all patients were taken for MRM and the resected specimen was sent for histo-pathological analysis. Tumour response to the neoadjuvant chemotherapy was evaluated by PET-CT imaging using PERCIST criteria and correlated with histological results. Responses calculated were compared for statistical significance using paired t- test. Results: Mean SUVmax for primary lesion in FDG PET and MET PET was 15.88±11.12 and 5.01±2.14 respectively (p<0.001) and for axillary lymph nodes was 7.61±7.31 and 2.75±2.27 respectively (p=0.001). Statistically significant response in primary tumour and axilla was noted on both FDG and MET PET after three cycles of NAC. Complete response in primary tumour was seen in only 1 patient in FDG and 7 patients in MET PET (p=0.001) whereas there was no histological complete resolution of tumor in any patient. Response to therapy in axillary nodes noted on both PET scans were similar (p=0.45) and correlated well with histological findings. Conclusions: For the primary breast tumour, FDG PET has a higher sensitivity and accuracy than MET PET and for axilla both have comparable sensitivity and specificity. FDG PET shows higher target to background ratios so response is better predicted for primary breast tumour and axilla. Also, FDG-PET is widely available and has the advantage of a whole body evaluation in one study.

Keywords: 11C-methionine, 18F-FDG, breast carcinoma, neoadjuvant chemotherapy

Procedia PDF Downloads 477
527 Evaluation of Wheat Varieties for Water Use Efficiency under Staggering Sowing Times and Variable Irrigation Regimes under Timely and Late Sown Conditions

Authors: Vaibhav Baliyan, S. S. Parihar

Abstract:

With the rise in temperature during reproductive phase and moisture stress, winter wheat yields are likely to decrease because of limited plant growth, higher rate of night respiration, higher spikelet sterility or number of grains per spike and restricted embryo development thereby reducing grain number. Crop management practices play a pivotal role in minimizing adverse effects of terminal heat stress on wheat production. Amongst various agronomic management practices, adjusting sowing date, crop cultivars and irrigation scheduling have been realized to be simple yet powerful, implementable and eco-friendly mitigation strategies to sustain yields under elevated temperature conditions. Taking into account, large variability in wheat production in space and time, a study was conducted to identify the suitable wheat varieties under both early and late planting with suitable irrigation schedule for minimizing terminal heat stress effect and thereby improving wheat production. Experiments were conducted at research farms of Indian Agricultural Research Institute, New Delhi, India, separately for timely and late sown conditions with suitable varieties with staggering dates of sowing from 1st November to 30th November in case of timely sown and from 1st December to 31st December for late sown condition. The irrigation schedule followed for both the experiments were 100% of ETc (evapotranspiration of crop), 80% of ETc and 60% of ETc. Results of the timely sown experiment indicated that 1st November sowing resulted in higher grain yield followed by 10th November. However, delay in sowing thereafter resulted in gradual decrease in yield and the maximum reduction was noticed under 30th November sowing. Amongst the varieties, HD3086 produced higher grain yield compared to other varieties. Irrigation applied based on 100% of ETc gave higher yield comparable to 80% of ETc but both were significantly higher than 60% of ETc. It was further observed that even liberal irrigation under 100% of ETc could not compensate the yield under delayed sowing suggesting that rise in temperature beyond January adversely affected the growth and development of crop as well as forced maturity resulting in significant reduction of yield attributing characters due to terminal heat stress. Similar observations were recorded under late sown experiment too. Planting on 1st December along with 100% ETc of irrigation schedule resulted in significantly higher grain yield as compared to other dates and irrigation regimes. Further, it was observed that reduction in yield under late sown conditions was significantly large than the timely sown conditions irrespective of the variety grown and irrigation schedule followed. Delayed sowing resulted in reducing crop growth period and forced maturity in turn led to significant deterioration in all the yield attributing characters and there by reduction in yield suggesting that terminal heat stress had greater impact on yield under late sown crop than timely sown due to temperature rise coinciding with reproductive phase of the crop.

Keywords: climate, irrigation, mitigation, wheat

Procedia PDF Downloads 89
526 The Stock Price Effect of Apple Keynotes

Authors: Ethan Petersen

Abstract:

In this paper, we analyze the volatility of Apple’s stock beginning January 3, 2005 up to October 9, 2014, then focus on a range from 30 days prior to each product announcement until 30 days after. Product announcements are filtered; announcements whose 60 day range is devoid of other events are separated. This filtration is chosen to isolate, and study, a potential cross-effect. Concerning Apple keynotes, there are two significant dates: the day the invitations to the event are received and the day of the event itself. As such, the statistical analysis is conducted for both invite-centered and event-centered time frames. A comparison to the VIX is made to determine if the trend is simply following the market or deviating. Regardless of the filtration, we find that there is a clear deviation from the market. Comparing these data sets, there are significantly different trends: isolated events have a constantly decreasing, erratic trend in volatility but an increasing, linear trend is observed for clustered events. According to the Efficient Market Hypothesis, we would expect a change when new information is publicly known and the results of this study support this claim.

Keywords: efficient market hypothesis, event study, volatility, VIX

Procedia PDF Downloads 256
525 Mondoc: Informal Lightweight Ontology for Faceted Semantic Classification of Hypernymy

Authors: M. Regina Carreira-Lopez

Abstract:

Lightweight ontologies seek to concrete union relationships between a parent node, and a secondary node, also called "child node". This logic relation (L) can be formally defined as a triple ontological relation (LO) equivalent to LO in ⟨LN, LE, LC⟩, and where LN represents a finite set of nodes (N); LE is a set of entities (E), each of which represents a relationship between nodes to form a rooted tree of ⟨LN, LE⟩; and LC is a finite set of concepts (C), encoded in a formal language (FL). Mondoc enables more refined searches on semantic and classified facets for retrieving specialized knowledge about Atlantic migrations, from the Declaration of Independence of the United States of America (1776) and to the end of the Spanish Civil War (1939). The model looks forward to increasing documentary relevance by applying an inverse frequency of co-ocurrent hypernymy phenomena for a concrete dataset of textual corpora, with RMySQL package. Mondoc profiles archival utilities implementing SQL programming code, and allows data export to XML schemas, for achieving semantic and faceted analysis of speech by analyzing keywords in context (KWIC). The methodology applies random and unrestricted sampling techniques with RMySQL to verify the resonance phenomena of inverse documentary relevance between the number of co-occurrences of the same term (t) in more than two documents of a set of texts (D). Secondly, the research also evidences co-associations between (t) and their corresponding synonyms and antonyms (synsets) are also inverse. The results from grouping facets or polysemic words with synsets in more than two textual corpora within their syntagmatic context (nouns, verbs, adjectives, etc.) state how to proceed with semantic indexing of hypernymy phenomena for subject-heading lists and for authority lists for documentary and archival purposes. Mondoc contributes to the development of web directories and seems to achieve a proper and more selective search of e-documents (classification ontology). It can also foster on-line catalogs production for semantic authorities, or concepts, through XML schemas, because its applications could be used for implementing data models, by a prior adaptation of the based-ontology to structured meta-languages, such as OWL, RDF (descriptive ontology). Mondoc serves to the classification of concepts and applies a semantic indexing approach of facets. It enables information retrieval, as well as quantitative and qualitative data interpretation. The model reproduces a triple tuple ⟨LN, LE, LT, LCF L, BKF⟩ where LN is a set of entities that connect with other nodes to concrete a rooted tree in ⟨LN, LE⟩. LT specifies a set of terms, and LCF acts as a finite set of concepts, encoded in a formal language, L. Mondoc only resolves partial problems of linguistic ambiguity (in case of synonymy and antonymy), but neither the pragmatic dimension of natural language nor the cognitive perspective is addressed. To achieve this goal, forthcoming programming developments should target at oriented meta-languages with structured documents in XML.

Keywords: hypernymy, information retrieval, lightweight ontology, resonance

Procedia PDF Downloads 100
524 FengShui Paradigm as Philosophy of Sustainable Design

Authors: E. Erdogan, H. A. Erdogan

Abstract:

FengShui, an old Chinese discipline, dates back to more than 5000 years, is one of the design principles that aim at creating habitable and sustainable spaces in harmony with nature by systematizing data within its own structure. Having emerged from Chinese mysticism and embodying elements of faith in its principles, FengShui argues that the positive energy in the environment channels human behavior and psychology. This argument is supported with the thesis of quantum physics that ‘everything is made up of energy’ and gains an important place. In spaces where living and working take place with several principles and systematized rules, FengShui promises a happier, more peaceful and comfortable life by influencing human psychology, acts, and soul as well as the professional and social life of the individual. Observing these design properties in houses, workplaces, offices, the environment, and daily life as a design paradigm is significant. In this study, how FengShui, a Central Asian culture emanated from Chinese mysticism, shapes design and how it is used as an element of sustainable design will be explained.

Keywords: Feng Shui, design principle, sustainability, philosophy

Procedia PDF Downloads 512
523 Paucity of Trauma Literature from a Highly Burdened Developing Country

Authors: Rizwan Sultan, Hasnain Zafar

Abstract:

Trauma is the leading cause of death among young population not only in USA but Pakistan as well. The high prevalence of disease should result in larger amount of data and larger number of publications resulting in exploring room for improvement in the field. We aimed to review trauma literature generated from Pakistan in journals indexed with PubMed from January 2010 to December 2014. Search using term “Trauma AND Pakistan” filtering for relevant dates and species human was done on Pubmed. The abstracts and articles were reviewed by the authors to collect data on a preformed performa. 114 articles were published from Pakistan during these 5 years. 64% articles were published in international journals. 63% articles were published in journals with impact factor less than 1. 54% articles were published from one of the four provinces of Pakistan. 64% of articles provided level 4 while 14% articles provided level 5 evidence on the topic. 55% articles discussed epidemiology in non-representative populations. Trauma literature from Pakistan is not only lacking significantly but is also of poor quality and is unable to offer conclusions on this particular subject. There is a lot of space for improvement in the upcoming years.

Keywords: trauma, literature, Pakistan, level of evidence

Procedia PDF Downloads 301
522 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks

Authors: Mehmet Karaata

Abstract:

Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.

Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security

Procedia PDF Downloads 415
521 Designing an Online Case-Based Library for Technology Integration in Teacher Education

Authors: Mustafa Tevfik Hebebci, Sirin Kucuk, Ismail Celik, A. Oguz Akturk, Ismail Sahin, Fetah Eren

Abstract:

The purpose of this paper is to introduce an interactive online case-study library website developed in a national project. The design goal of the website is to provide interactive, enhanced, case-based and online educational resource for educators through the purpose and within the scope of a national project. The ADDIE instructional design model was used in the development of the website for interactive case-based library. This library is developed on a web-based platform, which is important in terms of manageability, accessibility, and updateability of data. Users are able to sort the displayed case-studies by their titles, dates, ratings, view counts, etc. The usability test is used and the expert opinion is taken for the evaluation of the website. This website is a tool to integrate technology into education. It is believed that this website will be beneficial for pre-service and in-service teachers in terms of their professional developments.

Keywords: ADDIE, case-based library, design, technology integration

Procedia PDF Downloads 413
520 The National Idea and Selthindentification of Nation is the Foundation of the Society’s Development

Authors: K. Aisultanova, O. Abdimanuly

Abstract:

The article is told about the factors influencing the formation of the national idea and national identity. Paying attention to the idea and purpose of 'Eternal county', historical dates and examples are given. The structure of the idea 'The eternal country' by ancient Turks is discussed and the history of the legend prevalent among the Kazakh people, the image of the mythical historical figures are analyzed. Al-Farabi’s philosophical work 'Honest city', Zhysip Balasagun’s poem 'Happy Knowledge' are told, the opinions of scholars researching the nation's history, literature, and culture are given. As international experience shows, the idea of a new stage in the development of the country's great national society and the state for the purpose of political, social, economic, cultural, spiritual, and the other efforts are consolidated. The idea of the national, ethnic, religious, cultural and other communities united by a group of people sharing a collective memory, goals, ideas and dreams and , world view, a complex set of beliefs and values are expressed.

Keywords: independence, historical process, national idea, the national ideology, society, state

Procedia PDF Downloads 280
519 Lung Icams and Vcam-1 in Innate and Adaptive Immunity to Influenza Infections: Implications for Vaccination Strategies

Authors: S. Kozlovski, S.W. Feigelson, R. Alon

Abstract:

The b2 integrin ligands ICAM-1 ICAM-2 and the endothelial VLA-4 integrin ligand VCAM-1 are constitutively expressed on different lung vessels and on high endothelial venules (HEVs), the main portal for lymphocyte entry from the blood into lung draining lymph nodes. ICAMs are also ubiquitously expressed by many antigen-presenting leukocytes and have been traditionally suggested as critical for the various antigen-specific immune synapses generated by these distinct leukocytes and specific naïve and effector T cells. Loss of both ICAM-1 and ICAM-2 on the lung vasculature reduces the ability to patrol monocytes and Tregs to patrol the lung vasculature at a steady state. Our new findings suggest, however, that in terms of innate leukocyte trafficking into the lung lamina propria, both constitutively expressed and virus-induced vascular VCAM-1 can functionally compensate for the loss of these ICAMs. In a mouse model for influenza infection, neutrophil and NK cell recruitment and clearance of influenza remained normal in mice deficient in both ICAMs. Strikingly, mice deficient in both ICAMs also mounted normal influenza-specific CD8 proliferation and differentiation. In addition, these mice normally combated secondary influenza infection, indicating that the presence of ICAMs on conventional dendritic cells (cDCs) that present viral antigens are not required for immune synapse formation between these APCs and naïve CD8 T cells as previously suggested. Furthermore, long-lasting humoral responses critical for protection from a secondary homosubtypic influenza infection were also normal in mice deficient in both ICAM-1 and ICAM-2. Collectively, our results suggest that the expression of ICAM-1 and ICAM-2 on lung endothelial and epithelial cells, as well as on DCs and B cells, is not critical for the generation of innate or adaptive anti-viral immunity in the lungs. Our findings also suggest that endothelial VCAM-1 can substitute for the functions of vascular ICAMs in leukocyte trafficking into various lung compartments.

Keywords: emigration, ICAM-1, lymph nodes, VCAM-1

Procedia PDF Downloads 98
518 The Impact of Information Technology Monitoring on Employee Theft and Productivity

Authors: Ajayi Oluwasola Felix

Abstract:

This paper examines how firm investments in technology-based employee monitoring impact both misconduct and productivity. We use unique and detailed theft and sales data from 392 restaurant locations from five firms that adopt a theft monitoring information technology (IT) product. We use difference-in-differences (DD) models with staggered adoption dates to estimate the treatment effect of IT monitoring on theft and productivity. We find significant treatment effects in reduced theft and improved productivity that appear to be primarily driven by changed worker behavior rather than worker turnover. We examine four mechanisms that may drive this productivity result: economic and cognitive multitasking, fairness-based motivation, and perceived increases of general oversight. The observed productivity results represent substantial financial benefits to both firms and the legitimate tip-based earnings of workers. Our results suggest that employee misconduct is not solely a function of individual differences in ethics or morality, but can also be influenced by managerial policies that can benefit both firms and employees.

Keywords: information technology, monitoring, misconduct, employee theft

Procedia PDF Downloads 376
517 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 613