Search results for: local binary patterns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8222

Search results for: local binary patterns

8192 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 90
8191 Motion of an Infinitesimal Particle in Binary Stellar Systems: Kepler-34, Kepler-35, Kepler-16, Kepler-413

Authors: Rajib Mia, Badam Singh Kushvah

Abstract:

The present research was motivated by the recent discovery of the binary star systems. In this paper, we use the restricted three-body problem in the binary stellar systems, considering photogravitational effects of both the stars. The aim of this study is to investigate the motion of the infinitesimal mass in the vicinity of the Lagrangian points. The stability and periodic orbits of collinear points and the stability and trajectories of the triangular points are studied in stellar binary systems Kepler-34, Kepler-35, Kepler-413 and Kepler-16 systems. A detailed comparison is made among periodic orbits and trajectories.

Keywords: exoplanetary systems, lagrangian points, periodic orbit, restricted three body problem, stability

Procedia PDF Downloads 398
8190 Approximately Similarity Measurement of Web Sites Using Genetic Algorithms and Binary Trees

Authors: Doru Anastasiu Popescu, Dan Rădulescu

Abstract:

In this paper, we determine the similarity of two HTML web applications. We are going to use a genetic algorithm in order to determine the most significant web pages of each application (we are not going to use every web page of a site). Using these significant web pages, we will find the similarity value between the two applications. The algorithm is going to be efficient because we are going to use a reduced number of web pages for comparisons but it will return an approximate value of the similarity. The binary trees are used to keep the tags from the significant pages. The algorithm was implemented in Java language.

Keywords: Tag, HTML, web page, genetic algorithm, similarity value, binary tree

Procedia PDF Downloads 330
8189 Patterns and Extent of Self-Medication Practice among Adolescents in Selected Public Secondary Schools in IFE Central Local Government Area of Osun State, Nigeria

Authors: Olajumoke A. Ojeleye

Abstract:

The study assessed the patterns and extent of self-medication practice among adolescents in selected public senior secondary schools in Ife Central Local Government Area of Osun State. The objectives of the study were to find out the patterns of self-medication among adolescents, to elucidate whether age or gender has any effect on the self-medication patterns of adolescent, to ascertain to what extent adolescents indulge in self-medication, to examine the sources of drug information of these adolescents and also to examine the sources of these drugs. A cross-sectional design was employed for the study. A self-administered questionnaire tested for validity was used to collect data. Multistage sampling technique was used and 238 adolescents participated in the study. Data collection took two weeks and was analysed using Statistical Package for Social Sciences version 17. Results were presented using descriptive (e.g. frequency counts) and inferential statistics (e.g. chi-square). Results showed that more females (55.9%) than males (44.1%) practiced self-medication. Although the results showed that there is a low prevalence rate (33.6%) of self-medication among adolescents, chemists served as both the source of information on how to use the drug as well as the source of the drugs. Also, adolescents under study will only self-medicate in medical conditions such as malaria or wound/injuries but will prefer to see a doctor for conditions such as abdominal pain, infections or allergic reactions. It was recommended that government officials responsible for regulating and controlling of drugs should be more active in ensuring that safe drugs are made available over the counter and the consumer be given adequate information about the use of drugs and when to consult the doctor.

Keywords: adolescents, drugs, patterns, self-medication

Procedia PDF Downloads 166
8188 Soueif’s 'The Returning' and 'The Nativity': A Portrait of the Other as Others

Authors: Samira Brahimi

Abstract:

Throughout Aisha, her first collection of short stories, Ahdaf Soueif draws a multilayered picture of the Other as others, picturing a series of encounters of her protagonist with this very Other as a set of binary elements. The current essay includes a comparative study between two narratives, namely The Returning and The Nativity. The Other is portrayed as a male/female binary in The Returning and as 'The Foreigner' in an exotic land vs. the local in The Nativity. The analysis is to focus on Aisha, the main female character, who figures as conforming to the portrait of the stereotyped Arab Muslim woman as a sex-subject, submissive, and maudlin character, confining her vision of the Other to the boundaries of her cocooned self, epitomizing a self-centered vision of the world. This reduced vision results in the possibility of viewing the Other as a hindrance to her attaining a clarified and centrifugal representation of the latter, herself, and the outside world. The encounters could also be considered as the character's opportunity for a less stigmatized perception of the elements set forth. The main queries to be probed are: what are the different perceptions of the Other by the author in the narratives set forth? How does the protagonist's encounter with the Other(s) impede her ability to understand the Other, herself, and the world around her? Or how does this encounter allow her an enlightened vision of the aforementioned elements to forge a new start? The possibility of imagining a dialogic relation between different perceptions of the Other opens up new perspectives for adopting magnified representations of the later, oneself, and the world, dilating one's imagination.

Keywords: dialogic, female, foreigner, local, male, other, others

Procedia PDF Downloads 97
8187 Efficiency-Based Model for Solar Urban Planning

Authors: M. F. Amado, A. Amado, F. Poggi, J. Correia de Freitas

Abstract:

Today it is widely understood that global energy consumption patterns are directly related to the ongoing urban expansion and development process. This expansion is based on the natural growth of human activities and has left most urban areas totally dependent on fossil fuel derived external energy inputs. This status-quo of production, transportation, storage and consumption of energy has become inefficient and is set to become even more so when the continuous increases in energy demand are factored in. The territorial management of land use and related activities is a central component in the search for more efficient models of energy use, models that can meet current and future regional, national and European goals. In this paper, a methodology is developed and discussed with the aim of improving energy efficiency at the municipal level. The development of this methodology is based on the monitoring of energy consumption and its use patterns resulting from the natural dynamism of human activities in the territory and can be utilized to assess sustainability at the local scale. A set of parameters and indicators are defined with the objective of constructing a systemic model based on the optimization, adaptation and innovation of the current energy framework and the associated energy consumption patterns. The use of the model will enable local governments to strike the necessary balance between human activities, economic development, and the local and global environment while safeguarding fairness in the energy sector.

Keywords: solar urban planning, solar smart city, urban development, energy efficiency

Procedia PDF Downloads 302
8186 Atomistic Insight into the System of Trapped Oil Droplet/ Nanofluid System in Nanochannels

Authors: Yuanhao Chang, Senbo Xiao, Zhiliang Zhang, Jianying He

Abstract:

The role of nanoparticles (NPs) in enhanced oil recovery (EOR) is being increasingly emphasized. In this study, the motion of NPs and local stress distribution of tapped oil droplet/nanofluid in nanochannels are studied with coarse-grained modeling and molecular dynamic simulations. The results illustrate three motion patterns for NPs: hydrophilic NPs are more likely to adsorb on the channel and stay near the three-phase contact areas, hydrophobic NPs move inside the oil droplet as clusters and more mixed NPs are trapped at the oil-water interface. NPs in each pattern affect the flow of fluid and the interfacial thickness to various degrees. Based on the calculation of atomistic stress, the characteristic that the higher value of stress occurs at the place where NPs aggregate can be obtained. Different occurrence patterns correspond to specific local stress distribution. Significantly, in the three-phase contact area for hydrophilic NPs, the local stress distribution close to the pattern of structural disjoining pressure is observed, which proves the existence of structural disjoining pressure in molecular dynamics simulation for the first time. Our results guide the design and screen of NPs for EOR and provide a basic understanding of nanofluid applications.

Keywords: local stress distribution, nanoparticles, enhanced oil recovery, molecular dynamics simulation, trapped oil droplet, structural disjoining pressure

Procedia PDF Downloads 105
8185 The Fashion Fiesta: An Approach for Creating an Environment of Celebration by Uniting Two Art Forms; Fashion and Dance

Authors: Iqra Khan, Ghousia Saeed, Salman Jamil

Abstract:

Fashion is the soul of styles. People of all times want to look trendy, eye catching and unique among all. For this reason, people always adopt different flairs in their outfits including their clothes, shoes, bags and other accessories. However, unfortunately, there is lack of opportunity for accommodating the fashion exposure activities expressed with the folk dances of different regions so as to exhibit the fashion of Pakistan to the world. The paper focuses on the vibrant setting of the whole building according to the social patterns, folk and local trends and existing environment of Lahore. This is done by studying each of the aspect obtained from objectives through research questions evolved from the objectives. The answers to these questions are found through case studies and the existing theories in the world in relevance to the topic. The paper finds out how the geometry of dance works with design principles to create transparent geometry of fashion building. This all creates the fiesta environment taken from the locality of the region from the local and cultural lifestyles of the locals and then assembling it together to create a full festivity experience throughout the building.

Keywords: fashion, folk dance, geometry, local trends, social patterns, transparent

Procedia PDF Downloads 306
8184 Solving the Set Covering Problem Using the Binary Cat Swarm Optimization Metaheuristic

Authors: Broderick Crawford, Ricardo Soto, Natalia Berrios, Eduardo Olguin

Abstract:

In this paper, we present a binary cat swarm optimization for solving the Set covering problem. The set covering problem is a well-known NP-hard problem with many practical applications, including those involving scheduling, production planning and location problems. Binary cat swarm optimization is a recent swarm metaheuristic technique based on the behavior of discrete cats. Domestic cats show the ability to hunt and are curious about moving objects. The cats have two modes of behavior: seeking mode and tracing mode. We illustrate this approach with 65 instances of the problem from the OR-Library. Moreover, we solve this problem with 40 new binarization techniques and we select the technical with the best results obtained. Finally, we make a comparison between results obtained in previous studies and the new binarization technique, that is, with roulette wheel as transfer function and V3 as discretization technique.

Keywords: binary cat swarm optimization, binarization methods, metaheuristic, set covering problem

Procedia PDF Downloads 365
8183 Digital Development of Cultural Heritage: Construction of Traditional Chinese Pattern Database

Authors: Shaojian Li

Abstract:

The traditional Chinese patterns, as an integral part of Chinese culture, possess unique values in history, culture, and art. However, with the passage of time and societal changes, many of these traditional patterns are at risk of being lost, damaged, or forgotten. To undertake the digital preservation and protection of these traditional patterns, this paper will collect and organize images of traditional Chinese patterns. It will provide exhaustive and comprehensive semantic annotations, creating a resource library of traditional Chinese pattern images. This will support the digital preservation and application of traditional Chinese patterns.

Keywords: digitization of cultural heritage, traditional Chinese patterns, digital humanities, database construction

Procedia PDF Downloads 23
8182 Multi-Layer Multi-Feature Background Subtraction Using Codebook Model Framework

Authors: Yun-Tao Zhang, Jong-Yeop Bae, Whoi-Yul Kim

Abstract:

Background modeling and subtraction in video analysis has been widely proved to be an effective method for moving objects detection in many computer vision applications. Over the past years, a large number of approaches have been developed to tackle different types of challenges in this field. However, the dynamic background and illumination variations are two of the most frequently occurring issues in the practical situation. This paper presents a new two-layer model based on codebook algorithm incorporated with local binary pattern (LBP) texture measure, targeted for handling dynamic background and illumination variation problems. More specifically, the first layer is designed by block-based codebook combining with LBP histogram and mean values of RGB color channels. Because of the invariance of the LBP features with respect to monotonic gray-scale changes, this layer can produce block-wise detection results with considerable tolerance of illumination variations. The pixel-based codebook is employed to reinforce the precision from the outputs of the first layer which is to eliminate false positives further. As a result, the proposed approach can greatly promote the accuracy under the circumstances of dynamic background and illumination changes. Experimental results on several popular background subtraction datasets demonstrate a very competitive performance compared to previous models.

Keywords: background subtraction, codebook model, local binary pattern, dynamic background, illumination change

Procedia PDF Downloads 188
8181 OILU Tag: A Projective Invariant Fiducial System

Authors: Youssef Chahir, Messaoud Mostefai, Salah Khodja

Abstract:

This paper presents the development of a 2D visual marker, derived from a recent patented work in the field of numbering systems. The proposed fiducial uses a group of projective invariant straight-line patterns, easily detectable and remotely recognizable. Based on an efficient data coding scheme, the developed marker enables producing a large panel of unique real time identifiers with highly distinguishable patterns. The proposed marker Incorporates simultaneously decimal and binary information, making it readable by both humans and machines. This important feature opens up new opportunities for the development of efficient visual human-machine communication and monitoring protocols. Extensive experiment tests validate the robustness of the marker against acquisition and geometric distortions.

Keywords: visual markers, projective invariants, distance map, level sets

Procedia PDF Downloads 130
8180 Local Procurement in Ghana's Hotel Industry: A Study of the Driving Forces, Perceptions and Procurement Patterns

Authors: Adu-Ampomah Yaw Junior

Abstract:

Local procurement has become one of the latest trends in the discourse of sustainable tourism due to the economic benefits it generates for tourist destinations in developing countries. Local procurement helps in creating jobs which consequently helps in alleviating poverty. However, there have been limited studies on local procurement patterns in developing countries. Research on hotel procurement practices has mainly emphasized the challenges that hoteliers face when procuring locally, leaving questions regarding their motivations to engage in local procurement unanswered. The institutional theory provides a suitable framework to better understand these motivations as it underlines the importance of individual cognitive perceptions on issues in shaping organizational response strategies. More specifically, the extent to which an issue is perceived to belong to the organization’s responsibility. Also the organizational actors’ belief of losses or gains resultant from acting or not acting on an issue (degree of importance). Furthermore the organizational actors’ belief of the probability of resolving an issue (degree of feasibility). These factors influence how an organization will act on this issue. Hence, this paper adopts an institutional perspective to examine local procurement patterns of food by hoteliers in Ghana. Qualitative interviews with 20 procurement managers about their procurement practices and motivations, as well as interviews with different stakeholders for data triangulation purposes, indicated that most hotels sourced their food from middlemen who imported most of their products. However, direct importation was more prevalent foreign owned hotels as opposed to locally owned ones. Notwithstanding, the importation and the usage of foreign foods as opposed to local ones can be explained by the lack of pressure from NGOs and trade associations on hotels to act responsibly. Though guests’ menu preferences were perceived as important to hoteliers business operations, western tourists demand foreign food primarily with the foreign owned hotels make it less important to procure local produce. Lastly hoteliers, particularly those in foreign owned ones, perceive local procurement to be less feasible, raising concerns about quality and variety of local produce. The paper outlines strategies to improve the perception and degree of local Firstly, there is the need for stakeholder engagement in order to make hoteliers feel responsible for acting on the issue.Again it is crucial for Ghana government to promote and encourage hotels to buy local produce. Also, the government has to also make funds and storage facilities available for farmers to impact on the quality and quantity of local produce. Moreover, Sites need to be secured for farmers to engage in sustained farming.Furthermore, there is the need for collaborations between various stakeholders to organize training programs for farmers. Notwithstanding hotels need to market local produce to their guests. Finally, the Ghana hotels association has to encourage hotels to indulge in local procurement.

Keywords: sustainable tourism, feasible, important, local procurement

Procedia PDF Downloads 165
8179 Preparation and Study Corrosion and Electrical Resistivity of Al-Ni-Cr Alloy

Authors: Khalid H. Abass

Abstract:

Al-Ni-Cr alloy contains different ratios of Ni and Cr was prepared by mixing Al, Ni and Cr at 800oC under an argon atmosphere. The prepared alloys were heated for 1300 hr to 560oC, and then cooled rapidly by water at the ambient temperature. Surface morphology for alloys is studied by scanning electron microscope (SEM). The resultant homogeneous surface is a result of heat treatment. The X-ray diffraction patterns showed (111), (200), and (220) diffraction lines from cubic Al crystal structure, and suggested that the intensity of peak (111) orientation is predominant. Three binary phases were observed and grown in alloys: Al3Ni (Orthorhombic, a = 6.598Ǻ, b = 7.352 Ǻ, c = 4.802 Ǻ), Cr9Al17 (Rhombohedra, a = 12.910 Ǻ, c = 15.677), and Ni2Cr3 (Tetragonal, a = 8.82 Ǻ, c = 4.58 Ǻ). The average crystallite sizes of the prepared samples were found to be from 3000 to 3094 nm by SEM, which is much smaller than that estimated from XRD data. Corrosion resistance increases with increasing Ni-Cr content in Al alloys. The electrical volume resistivity decreased with increasing Ni-Cr content at low frequency. This behavior can be seen generally at 50Hz, where the electrical volume resistivity reached the value of 3.98×10-8Ω.cm for the ratio Al-1.8 at.%Ni-0.18at.%Cr.

Keywords: Al-Ni-Cr alloy, corrosion current, electrical volume resistivity, binary phase, homogeneous surface

Procedia PDF Downloads 364
8178 Motion of a Dust Grain Type Particle in Binary Stellar Systems

Authors: Rajib Mia, Badam Singh Kushvah

Abstract:

In this present paper, we use the photogravitational version of the restricted three body problem (RTBP) in binary systems. In the photogravitational RTBP, an infinitesimal particle (dust grain) is moving under the gravitational attraction and radiation pressure from the two bigger primaries. The third particle does not affect the motion of two bigger primaries. The zero-velocity curves, zero-velocity surfaces and their projections on the plane are studied. We have used existing analytical method to solve the equations of motion. We have obtained the Lagrangian points in some binary stellar systems. It is found that mass reduction factor affects the Lagrangian points. The linear stability of Lagrangian points is studied and found that these points are unstable. Moreover, trajectories of the infinitesimal particle at the triangular points are studied.

Keywords: binary systems, Lagrangian points, linear stability, photogravitational RTBP, trajectories

Procedia PDF Downloads 228
8177 Durability Study of Binary Blended High Performance Concrete

Authors: Vatsal Patel, Niraj Shah

Abstract:

This paper presents the results of a laboratory study on the properties of binary blended High Performance cementitious systems containing blends of ordinary Portland cement (OPC), Porcelain Powder or Marble Powder blend proportions of 100:00, 95:05, 90:10, 85:15, 80:20 for OPC: Porcelain Powder/Marble Powder. Studies on the Engineering Properties of the cementitious concrete, namely compressive strength, flexural strength, sorptivity, rapid chloride penetration test and accelerated corrosion test have been performed and those of OPC concrete. The results show that the inclusion of Porcelain powder or Marble Powder as binary blended cement alters to a great degree the properties of the binder as well as the resulting concrete. In addition, the results show that the Porcelain powder with 85:15 proportions and Marble powder with 90:10 proportions as binary systems to produce high-performance concrete could potentially be used in the concrete construction industry particular in lowering down the volume of OPC used and lowering emission of CO2 produces during manufacturing of cement.

Keywords: accelerated corrosion, binary blended cementitious system, rapid chloride penetration, sorptivity

Procedia PDF Downloads 367
8176 Densities and Viscosities of Binary Mixture Containing Diethylamine and 2-Alkanol

Authors: Elham jassemi Zargani, Mohammad almasi

Abstract:

Densities and viscosities for binary mixtures of diethylamine + 2 Alkanol (2 propanol up to 2 pentanol) were measured over the entire composition range and temperature interval of 293.15 to 323.15 K. Excess molar volumes V_m^E and viscosity deviations Δη were calculated and correlated by the Redlich−Kister type function to derive the coefficients and estimate the standard error. For mixtures of diethylamine with used 2-alkanols, V_m^E and Δη are negative over the entire range of mole fraction. The observed variations of these parameters, with alkanols chain length and temperature, are discussed in terms of the inter-molecular interactions between the unlike molecules of the binary mixtures.

Keywords: densities, viscosities, diethylamine, 2-alkanol, Redlich-Kister

Procedia PDF Downloads 357
8175 Transmitting Cultural Capital Through Local Products ‘Chanthaboon Reed Mat'

Authors: Maythaya Preeyanon

Abstract:

Chanthaburi Province is a province with people of many nationalities, such as Thai, Chinese, Vietnamese, Chong, and Khmer, resulting in a cultural mix in the past. What is a famous cultural transmission of Chanthaburi province is Chanthaburi reed mat weaving. Due to the suitability of both the climate and topography near the edge of the location, reeds have the qualities to be used to produce mats very well. There have been improvements in the methods of planting, dyeing, and weaving into various patterns that have been passed down as folk wisdom from generation to generation. Currently, there are brands of products belonging to the new generation that add creativity and add value through storytelling. Revive the value of reed mat products to increase in value until they can be exported to sell abroad. This research has therefore been conducted in order to decipher the success in transferring the Chanthaboon reed mat culture capital which has successfully advanced to being a creative economy so that it can be applied to other types of local wisdom or other local products.

Keywords: cultural capital, creative economy, communication, local product

Procedia PDF Downloads 14
8174 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field

Authors: Tun Myat Aung, Ni Ni Hla

Abstract:

This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.c

Keywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field

Procedia PDF Downloads 198
8173 About the Case Portfolio Management Algorithms and Their Applications

Authors: M. Chumburidze, N. Salia, T. Namchevadze

Abstract:

This work deal with case processing problems in business. The task of strategic credit requirements management of cases portfolio is discussed. The information model of credit requirements in a binary tree diagram is considered. The algorithms to solve issues of prioritizing clusters of cases in business have been investigated. An implementation of priority queues to support case management operations has been presented. The corresponding pseudo codes for the programming application have been constructed. The tools applied in this development are based on binary tree ordering algorithms, optimization theory, and business management methods.

Keywords: credit network, case portfolio, binary tree, priority queue, stack

Procedia PDF Downloads 91
8172 An Analysis of Sequential Pattern Mining on Databases Using Approximate Sequential Patterns

Authors: J. Suneetha, Vijayalaxmi

Abstract:

Sequential Pattern Mining involves applying data mining methods to large data repositories to extract usage patterns. Sequential pattern mining methodologies used to analyze the data and identify patterns. The patterns have been used to implement efficient systems can recommend on previously observed patterns, in making predictions, improve usability of systems, detecting events, and in general help in making strategic product decisions. In this paper, identified performance of approximate sequential pattern mining defines as identifying patterns approximately shared with many sequences. Approximate sequential patterns can effectively summarize and represent the databases by identifying the underlying trends in the data. Conducting an extensive and systematic performance over synthetic and real data. The results demonstrate that ApproxMAP effective and scalable in mining large sequences databases with long patterns.

Keywords: multiple data, performance analysis, sequential pattern, sequence database scalability

Procedia PDF Downloads 302
8171 Irreducible Sign Patterns of Minimum Rank of 3 and Symmetric Sign Patterns That Allow Diagonalizability

Authors: Sriparna Bandopadhyay

Abstract:

It is known that irreducible sign patterns in general may not allow diagonalizability and in particular irreducible sign patterns with minimum rank greater than or equal to 4. It is also known that every irreducible sign pattern matrix with minimum rank of 2 allow diagonalizability with rank of 2 and the maximum rank of the sign pattern. In general sign patterns with minimum rank of 3 may not allow diagonalizability if the condition of irreducibility is dropped, but the problem of whether every irreducible sign pattern with minimum rank of 3 allows diagonalizability remains open. In this paper it is shown that irreducible sign patterns with minimum rank of 3 under certain conditions on the underlying graph allow diagonalizability. An alternate proof of the results that every sign pattern matrix with minimum rank of 2 and no zero lines allow diagonalizability with rank of 2 and also that every full sign pattern allows diagonalizability with all permissible ranks of the sign pattern is given. Some open problems regarding composite cycles in an irreducible symmetric sign pattern that support of a rank principal certificate are also answered.

Keywords: irreducible sign patterns, minimum rank, symmetric sign patterns, rank -principal certificate, allowing diagonalizability

Procedia PDF Downloads 64
8170 A Study and Design Scarf Collection Applied Vietnamese Traditional Patterns by Using Printing Method on Fabric

Authors: Mai Anh Pham Ho

Abstract:

Scarf products today is a symbol of fashion to decorate, to make our life more beautiful and bring new features to our living space. It also shows the cultural identity by using the traditional patterns that make easily to introduce the image of Vietnam to other nations all over the world. Therefore, the purpose of this research is to classify Vietnamese traditional patterns according to the era and dynasties. Vietnamese traditional patterns through the dynasties of Vietnamese history are done and classified by five groups of patterns including the geometric patterns, the natural patterns, the animal patterns, the floral patterns, and the character patterns in the Prehistoric times, the Bronze and Iron age, the Chinese domination, the Ngo-Dinh-TienLe-Ly-Tran-Ho dynasty, and the LeSo-Mac-LeTrinh-TaySon-Nguyen dynasty. Besides, there are some special kinds of Vietnamese traditional patterns like buffalo, lotus, bronze-drum, Phuc Loc Tho character, and so on. Extensive research was conducted for modernizing scarf collection applied Vietnamese traditional patterns which the fashion trend is used on creating works. The concept, target, image map, lifestyle map, motif, colours, arrangement and completion of patterns on scarf were set up. The scarf collection is designed and developed by the Adobe Illustrator program with three colour ways for each scarf. Upon completion of the research, digital printing technology is chosen for using on scarf collection which Vietnamese traditional patterns were researched deeply and widely with the purpose of establishment the basic background for Vietnamese culture in order to identify Vietnamese national personality as well as establish and preserve the cultural heritage.

Keywords: scarf collection, Vietnamese traditional patterns, printing methods, fabric design

Procedia PDF Downloads 314
8169 Quality Assurance in Software Design Patterns

Authors: Rabbia Tariq, Hannan Sajjad, Mehreen Sirshar

Abstract:

Design patterns are widely used to make the process of development easier as they greatly help the developers to develop the software. Different design patterns have been introduced till now but the behavior of same design pattern may differ in different domains that can lead to the wrong selection of the design pattern. The paper aims to discover the design patterns that suits best with respect to their domain thereby helping the developers to choose an effective design pattern. It presents the comprehensive analysis of design patterns based on different methodologies that include simulation, case study and comparison of various algorithms. Due to the difference of the domain the methodology used in one domain may be inapplicable to the other domain. The paper draws a conclusion based on strength and limitation of each design pattern in their respective domain.

Keywords: design patterns, evaluation, quality assurance, software domains

Procedia PDF Downloads 488
8168 Intended and Unintended Outcomes of Partnerships at the Local Level in Slovakia

Authors: Daniel Klimovský

Abstract:

Slovakia belongs to the most fragmented countries if one looks at its local government structure. The Slovak central governments implemented both broad devolution and fiscal decentralization some decades ago. However, neither territorial consolidation nor size categorization of local competences and powers has been implemented yet. Taking this fact into account, it is clear that the local governments are challenged not only by their citizens as customers but also by effectiveness as well as efficiency of delivered services. The paper is focused on behavior of the local governments in Slovakia and their approaches towards other local partners, including other local governments. Analysis of set of interviews shows that inter-municipal cooperation is the most common local partnership in Slovakia, but due to diversity of the local governments, this kind of cooperation leads to both intended and unintended outcomes. While in many cases the local governments are more efficient as well as effective in delivery of local services thanks to inter-municipal cooperation, there are many cases where inter-municipal cooperation fails, and it brings rather questionable or even negative outcomes.

Keywords: local governments, local partnerships, inter-municipal cooperation, delivery of local services

Procedia PDF Downloads 226
8167 Arithmetic Operations Based on Double Base Number Systems

Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan

Abstract:

Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.

Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm

Procedia PDF Downloads 367
8166 Biosorption of Cu (II) and Zn (II) from Real Wastewater onto Cajanus cajan Husk

Authors: Mallappa A. Devani, John U. Kennedy Oubagaranadin, Basudeb Munshi

Abstract:

In this preliminary work, locally available husk of Cajanus cajan (commonly known in India as Tur or Arhar), a bio-waste, has been used in its physically treated and chemically activated form for the removal of binary Cu (II) and Zn(II) ions from the real waste water obtained from an electroplating industry in Bangalore, Karnataka, India and from laboratory prepared binary solutions having almost similar composition of the metal ions, for comparison. The real wastewater after filtration and dilution for five times was used for biosorption studies at the normal pH of the solutions at room temperature. Langmuir's binary model was used to calculate the metal uptake capacities of the biosorbents. It was observed that Cu(II) is more competitive than Zn(II) in biosorption. In individual metal biosorption, Cu(II) uptake was found to be more than that of the Zn(II) and a similar trend was observed in the binary metal biosorption from real wastewater and laboratory prepared solutions. FTIR analysis was carried out to identify the functional groups in the industrial wastewater and EDAX for the elemental analysis of the biosorbents after experiments.

Keywords: biosorption, Cajanus cajan, multi metal remediation, wastewater

Procedia PDF Downloads 360
8165 Restricted Boltzmann Machines and Deep Belief Nets for Market Basket Analysis: Statistical Performance and Managerial Implications

Authors: H. Hruschka

Abstract:

This paper presents the first comparison of the performance of the restricted Boltzmann machine and the deep belief net on binary market basket data relative to binary factor analysis and the two best-known topic models, namely Dirichlet allocation and the correlated topic model. This comparison shows that the restricted Boltzmann machine and the deep belief net are superior to both binary factor analysis and topic models. Managerial implications that differ between the investigated models are treated as well. The restricted Boltzmann machine is defined as joint Boltzmann distribution of hidden variables and observed variables (purchases). It comprises one layer of observed variables and one layer of hidden variables. Note that variables of the same layer are not connected. The comparison also includes deep belief nets with three layers. The first layer is a restricted Boltzmann machine based on category purchases. Hidden variables of the first layer are used as input variables by the second-layer restricted Boltzmann machine which then generates second-layer hidden variables. Finally, in the third layer hidden variables are related to purchases. A public data set is analyzed which contains one month of real-world point-of-sale transactions in a typical local grocery outlet. It consists of 9,835 market baskets referring to 169 product categories. This data set is randomly split into two halves. One half is used for estimation, the other serves as holdout data. Each model is evaluated by the log likelihood for the holdout data. Performance of the topic models is disappointing as the holdout log likelihood of the correlated topic model – which is better than Dirichlet allocation - is lower by more than 25,000 compared to the best binary factor analysis model. On the other hand, binary factor analysis on its own is clearly surpassed by both the restricted Boltzmann machine and the deep belief net whose holdout log likelihoods are higher by more than 23,000. Overall, the deep belief net performs best. We also interpret hidden variables discovered by binary factor analysis, the restricted Boltzmann machine and the deep belief net. Hidden variables characterized by the product categories to which they are related differ strongly between these three models. To derive managerial implications we assess the effect of promoting each category on total basket size, i.e., the number of purchased product categories, due to each category's interdependence with all the other categories. The investigated models lead to very different implications as they disagree about which categories are associated with higher basket size increases due to a promotion. Of course, recommendations based on better performing models should be preferred. The impressive performance advantages of the restricted Boltzmann machine and the deep belief net suggest continuing research by appropriate extensions. To include predictors, especially marketing variables such as price, seems to be an obvious next step. It might also be feasible to take a more detailed perspective by considering purchases of brands instead of purchases of product categories.

Keywords: binary factor analysis, deep belief net, market basket analysis, restricted Boltzmann machine, topic models

Procedia PDF Downloads 165
8164 Syntactic Errors in Written Assessments of Non-Native English-Speaking Undergraduate Students and Pedagogical Implications in Correcting Grammatical Mistakes

Authors: Cheng Shuk Ling

Abstract:

This paper examines the English syntactic errors and their patterns in the written assignments of a General Education course at City University of Hong Kong. Subjects are 60 local and non-local (exchange) undergraduate students who are all EFL learners and L2 users with diversified education and disciplinary background (i.e. their major of study), which are unrelated to English language studies. The objective of this paper brings to the foreground a broad discussion of EFL/L2 undergraduate learners’ average syntactic ability in terms of written assessment. This paper is an attempt in classifying the patterns and categories of syntactic errors committed by students who were brought up and educated in non-native English-speaking countries. Thus, pedagogical recommendations are offered for both EFL/L2 learners and educators in tertiary education settings in such ways as to calibrate how and in what manner English language as the medium of instruction can lead to more enduring effects in learners within non-native English-speaking countries.

Keywords: syntactic errors, english as a foreign language, second language users, pedagogy

Procedia PDF Downloads 52
8163 The Comparative Study of Binary Artifact Repository Managers

Authors: Evgeny Chugunnyy, Alena Gerasimova, Kirill Chernyavskiy, Alexander Krasnov

Abstract:

One of the primary component of Continuous deployment (CD) is a binary artifact repository — the place where artifacts are stored with metadata in a structured way. The binary artifact repository manager (BARM) is a software, which implements this repository logic and exposes a public application programming interface (API) for managing these artifacts. Almost every programming language ecosystem has its own artifact repository kind. During creating Artipie — BARM constructor and server, we analyzed and implemented a lot of different artifact repositories. In this paper we present criterias for comparing artifact repositories, and analyze the most popular repositories using these metrics. We also describe some of the notable features of different repositories. This paper aimed to help people who are creating, maintaining or optimizing software repository and CI tools.

Keywords: artifact, repository, continuous deployment, build automation, artifacts management

Procedia PDF Downloads 112