Search results for: phonological store
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 489

Search results for: phonological store

249 Hydraulic Performance of Urban Drainage System Using SWMM: A Case Study of Siti Khadijah Retention Pond in Palembang City

Authors: Muhammad B. Al Amin, Nyimas S. Rika, Dwi F. Yanto, Marcelina

Abstract:

Siti Khadijah retention pond is located beside of Siti Khadijah Islamic Hospital on Demang Lebar Daun Street in Palembang City. This retention pond is functioned as storage for runoff from drainage channels in the surrounding area before entering Sekanak River, which is one of Musi River tributaries. However, in recent years, the developments in the surrounding area into paved area trigger to increase runoff discharge that causes the pond can no longer store it adequately. This study aimed to investigate the hydraulic performance of drainage system in the area around Siti Khadijah retention pond. A SWMM model was used to simulate runoff discharge into the pond and out from the pond, so the water level fluctuation within the pond and its capacity could be determined. Besides that, the water depth within drainage channels was simulated as well. The results showed that capacity of retention pond and some drainage channels already inadequate, so the area around it potentially to be flooded. Thus, it is necessary to increase the capacity of the retention pond and drainage channels.

Keywords: flood, retention pond, SWMM, urban drainage system

Procedia PDF Downloads 414
248 Deployment of Electronic Healthcare Records and Development of Big Data Analytics Capabilities in the Healthcare Industry: A Systematic Literature Review

Authors: Tigabu Dagne Akal

Abstract:

Electronic health records (EHRs) can help to store, maintain, and make the appropriate handling of patient histories for proper treatment and decision. Merging the EHRs with big data analytics (BDA) capabilities enable healthcare stakeholders to provide effective and efficient treatments for chronic diseases. Though there are huge opportunities and efforts that exist in the deployment of EMRs and the development of BDA, there are challenges in addressing resources and organizational capabilities that are required to achieve the competitive advantage and sustainability of EHRs and BDA. The resource-based view (RBV), information system (IS), and non- IS theories should be extended to examine organizational capabilities and resources which are required for successful data analytics in the healthcare industries. The main purpose of this study is to develop a conceptual framework for the development of healthcare BDA capabilities based on past works so that researchers can extend. The research question was formulated for the search strategy as a research methodology. The study selection was made at the end. Based on the study selection, the conceptual framework for the development of BDA capabilities in the healthcare settings was formulated.

Keywords: EHR, EMR, Big data, Big data analytics, resource-based view

Procedia PDF Downloads 103
247 Hard Carbon Derived From Dextrose as High-Performance Anode Material for Sodium-Ion Batteries

Authors: Rupan Das Chakraborty, Surendra K. Martha

Abstract:

Hard carbons (HCs) are extensively used as anode materials for sodium-ion batteries due to their availability, low cost, and ease of synthesis. It possesses the ability to store Na ion between stacked sp2 carbon layers and micropores. In this work, hard carbons are synthesized from different concentrations (0.5M to 5M) of dextrose solutions by hydrothermal synthesis followed by high-temperature calcination at 1100 ⁰C in an inert atmosphere. Dextrose has been chosen as a precursor material as it is a eco-friendly and renewable source. Among all hard carbon derived from different concentrations of dextrose solutions, hard carbon derived from 3M dextrose solution delivers superior electrochemical performance compared to other hard carbons. Hard carbon derived from 3M dextrose solution (Dextrose derived Hard Carbon-3M) provides an initial reversible capacity of 257 mAh g-1 with a capacity retention of 83 % at the end of 100 cycles at 30 mA g-1). The carbons obtained from different dextrose concentration show very similar Cyclic Voltammetry and chargedischarging behavior at a scan rate of 0.05 mV s-1 the Cyclic Voltammetry curve indicate that solvent reduction and the solid electrolyte interface (SEI) formation start at E < 1.2 V (vs Na/Na+). Among all 3M dextrose derived electrode indicate as a promising anode material for Sodium-ion batteries (SIBs).

Keywords: dextrose derived hard carbon, anode, sodium-ion battery, electrochemical performance

Procedia PDF Downloads 75
246 A Dynamical Approach for Relating Energy Consumption to Hybrid Inventory Level in the Supply Chain

Authors: Benga Ebouele, Thomas Tengen

Abstract:

Due to long lead time, work in process (WIP) inventory can manifest within the supply chain of most manufacturing system. It implies that there are lesser finished good on hand and more in the process because the work remains in the factory too long and cannot be sold to either customers The supply chain of most manufacturing system is then considered as inefficient as it take so much time to produce the finished good. Time consumed in each operation of the supply chain has an associated energy costs. Such phenomena can be harmful for a hybrid inventory system because a lot of space to store these semi-finished goods may be needed and one is not sure about the final energy cost of producing, holding and delivering the good to customers. The principle that reduces waste of energy within the supply chain of most manufacturing firms should therefore be available to all inventory managers in pursuit of profitability. Decision making by inventory managers in this condition is a modeling process, whereby a dynamical approach is used to depict, examine, specify and even operationalize the relationship between energy consumption and hybrid inventory level. The relationship between energy consumption and inventory level is established, which indicates a poor level of control and hence a potential for energy savings.

Keywords: dynamic modelling, energy used, hybrid inventory, supply chain

Procedia PDF Downloads 231
245 Differences in Cognitive Functioning over the Course of Chemotherapy in Patients Suffering from Multiple Myeloma and the Possibility to Predict Their Cognitive State on the Basis of Biological Factors

Authors: Magdalena Bury-Kaminska, Aneta Szudy-Szczyrek, Aleksandra Nowaczynska, Olga Jankowska-Lecka, Marek Hus, Klaudia Kot

Abstract:

Introduction: The aim of the research was to determine the changes in cognitive functioning in patients with plasma cell myeloma by comparing patients’ state before the treatment and during chemotherapy as well as to determine the biological factors that can be used to predict patients’ cognitive state. Methods: The patients underwent the research procedure twice: before chemotherapy and after 4-6 treatment cycles. A psychological test and measurement of the following biological variables were carried out: TNF-α (tumor necrosis factor), IL-6 (interleukin 6), IL-10 (interleukin 10), BDNF (brain-derived neurotrophic factor). The following research methods were implemented: the Montreal Cognitive Assessment (MoCA), Battery of Tests for Assessing Cognitive Functions PU1, experimental and clinical trials based on the Choynowski’s Memory Scale, Stroop Color-Word Interference Test (SCWT), depression measurement questionnaire. Results: The analysis of the research showed better cognitive functions of patients during chemotherapy in comparison to the phase before it. Moreover, neurotrophin BDNF allows to predict the level of selected cognitive functions (semantic fluency and execution control) already at the diagnosis stage. After 4-6 cycles, it is also possible to draw conclusions concerning the extent of working memory based on the level of BDNF. Cytokine TNF-α allows us to predict the level of letter fluency during anti-cancer treatment. Conclusions: It is possible to presume that BDNF has a protective influence on patients’ cognitive functions and working memory and that cytokine TNF-α co-occurs with a diminished execution control and better material grouping in terms of phonological fluency. Acknowledgment: This work was funded by the National Science Center in Poland [grant no. 2017/27/N/HS6/02057.

Keywords: chemobrain, cognitive impairment, non−central nervous system cancers, hematologic diseases

Procedia PDF Downloads 129
244 Raman and Dielectric Relaxation Investigations of Polyester-CoFe₂O₄ Nanocomposites

Authors: Alhulw H. Alshammari, Ahmed Iraqi, S. A. Saad, T. A. Taha

Abstract:

In this work, we present for the first time the study of Raman spectra and dielectric relaxation of polyester polymer-CoFe₂O₄ (5.0, 10.0, 15.0, and 20.0 wt%) nanocomposites. Raman spectroscopy was applied as a sensitive structural identification technique to characterize the polyester-CoFe₂O₄ nanocomposites. The images of AFM confirmed the uniform distribution of CoFe₂O₄ inside the polymer matrix. Dielectric relaxation was employed as an important analytical technique to obtain information about the ability of the polymer nanocomposites to store and filter electrical signals. The dielectric relaxation analyses were carried out on the polyester-CoFe₂O₄ nanocomposites at different temperatures. An increase in dielectric constant ε₁ was observed for all samples with increasing temperatures due to the alignment of the electric dipoles with the applied electric field. In contrast, ε₁ decreased with increasing frequency. This is attributed to the difficulty for the electric dipoles to follow the electric field. The α relaxation peak that appeared at a high frequency shifted to higher frequencies when increasing the temperature. The activation energies for Maxwell-Wagner Sillar (MWS) changed from 0.84 to 1.01 eV, while the activation energies for α relaxations were 0.54 – 0.94 eV. The conduction mechanism for the polyester- CoFe₂O₄ nanocomposites followed the correlated barrier hopping (CBH) model.

Keywords: AC conductivity, activation energy, dielectric permittivity, polyester nanocomposites

Procedia PDF Downloads 81
243 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 142
242 Synthesis of 2-Aminoisocoumarinoselenazoles via Transition Metal-Free Alkylation and Ru(II)-Catalyzed [4+2] Alkyne Annulation

Authors: Sunil Kumar, Sandip Dhole, Deepak Salunke, Chung-ming Sun

Abstract:

Heterocycles bearing nitrogen, oxygen, and selenium are present in innumerable biologically active compounds. For instance, coumarin containing dicoumarol acts as naturally occurring anticoagulant. 2-Acylamido selenazole works as Store-Operated Calcium (SOC) channel regulator. Therefore, due to biologically significance of selenazole and coumarin and our quest to develop efficient methodologies for the synthesis of complex heterocycles, the trisubstituted angular isocoumarinoselenazole synthesis was proposed and achieved by starting from nitrobenzoic acid derivative, available commercially. Synthetic procedure involves three steps: i) the construction of 2-aminobenzoselenazoles, ii) their regioselective N-alkylation at position-2 and iii) alkyne insertion via Ru catalyzed C-H activation. Transition metal free synthesis of benzoselenazoles was successfully brought about by the addition/elimination reaction via intramolecular C-Se bond formation. In the next step, N-alkylation of selenazole furnished two regioisomers. Both the isomers exhibited different reactivity towards [4+2] alkyne annulation reaction. The fusion of α-pyrone ring on the benzo[1,3-d]selenazole skeleton was achieved via Ru(II)-catalyzed C-H activation and alkyne insertion. As evident from mechanism, the selenazole 'N' plays an important role for the experiential selectivity.

Keywords: alkylation, alkyne insertion, coumarin, selenazole

Procedia PDF Downloads 96
241 Trading Volume on the Tunisian Financial Market: An Approach Explaining the Hypothesis of Investors Overconfidence

Authors: Fatma Ismailia, Malek Saihi

Abstract:

This research provides an explanation of exchange incentives on the Tunis stock market from a behavioural point of view. The elucidation of the anomalies of excessive volume of transactions and that of excessive volatility cannot be done without the recourse to the psychological aspects of investors. The excessive confidence has been given the predominant role for the explanation of these phenomena. Indeed, when investors store increments, they become more confident about the precision of their private information and their exchange activities then become more aggressive on the subsequent periods. These overconfident investors carry out the intensive exchanges leading to an increase of securities volatility. The objective of this research is to identify whether the trading volume and the excessive volatility of securities observed on the Tunisian stock market come from the excessive exchange of overconfident investors. We use a sample of daily observations over the period January 1999 - October 2007 and we relied on various econometric tests including the VAR model. Our results provide evidence on the importance to consider the bias of overconfidence in the analysis of Tunis stock exchange specificities. The results reveal that the excess of confidence has a major impact on the trading volume while using daily temporal intervals.

Keywords: overconfidence, trading volume, efficiency, rationality, anomalies, behavioural finance, cognitive biases

Procedia PDF Downloads 387
240 A Method for Harvesting Atmospheric Lightning-Energy and Utilization of Extra Generated Power of Nuclear Power Plants during the Low Energy Demand Periods

Authors: Akbar Rahmani Nejad, Pejman Rahmani Nejad, Ahmad Rahmani Nejad

Abstract:

we proposed the arresting of atmospheric lightning and passing the electrical current of lightning-bolts through underground water tanks to produce Hydrogen and restoring Hydrogen in reservoirs to be used later as clean and sustainable energy. It is proposed to implement this method for storage of extra electrical power (instead of lightning energy) during low energy demand periods to produce hydrogen as a clean energy source to store in big reservoirs and later generate electricity by burning the stored hydrogen at an appropriate time. This method prevents the complicated process of changing the output power of nuclear power plants. It is possible to pass an electric current through sodium chloride solution to produce chlorine and sodium or human waste to produce Methane, etc. however atmospheric lightning is an accidental phenomenon, but using this free energy just by connecting the output of lightning arresters to the output of power plant during low energy demand period which there is no significant change in the design of power plant or have no cost, can be considered completely an economical design

Keywords: hydrogen gas, lightning energy, power plant, resistive element

Procedia PDF Downloads 109
239 Internet of Assets: A Blockchain-Inspired Academic Program

Authors: Benjamin Arazi

Abstract:

Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.

Keywords: blockchain, education, financial technology, mobile telecommunications services

Procedia PDF Downloads 150
238 Techno-Economic Analysis of Offshore Hybrid Energy Systems with Hydrogen Production

Authors: Anna Crivellari, Valerio Cozzani

Abstract:

Even though most of the electricity produced in the entire world still comes from fossil fuels, new policies are being implemented in order to promote a more sustainable use of energy sources. Offshore renewable resources have become increasingly attractive thanks to the huge entity of power potentially obtained. However, the intermittent nature of renewables often limits the capacity of the systems and creates mismatches between supply and demand. Hydrogen is foreseen to be a promising vector to store and transport large amounts of excess renewable power by using existing oil and gas infrastructure. In this work, an offshore hybrid energy system integrating wind energy conversion with hydrogen production was conceptually defined and applied to offshore gas platforms. A techno-economic analysis was performed by considering two different locations for the installation of the innovative power system, i.e., the North Sea and the Adriatic Sea. The water depth, the distance of the platform from the onshore gas grid, the hydrogen selling price and the green financial incentive were some of the main factors taken into account in the comparison. The results indicated that the use of well-defined indicators allows to capture specifically different cost and revenue features of the analyzed systems, as well as to evaluate their competitiveness in the actual and future energy market.

Keywords: cost analysis, energy efficiency assessment, hydrogen production, offshore wind energy

Procedia PDF Downloads 104
237 Modeling of Hydraulic Networking of Water Supply Subsystem Case of Addis Ababa

Authors: Solomon Weldegebriel Gebrelibanos

Abstract:

Water is one of the most important substances in human life that can give a human liberality with its cost and availability. Water comes from rainfall and runoff and reaches the ground as runoff that is stored in a river, ponds, and big water bodies, including sea and ocean and the remaining water portion is infiltrated into the ground to store in the aquifer. Water can serve human beings in various ways, including irrigation, water supply, hydropower and soon. Water supply is the main pillar of the water service to the human being. Water supply distribution in Addis Ababa arises from Legedadi, Akakai, and Gefersa. The objective of the study is to measure the performance of the water supply distribution in Addis Ababa city. The water supply distribution model is developed by computer-aided design software. The model can analyze the operational change, loss of water, and performance of the network. The two design criteria that have been employed to analyze the network system are velocity and pressure. The result shows that the customers are using the water at high pressure with low demand. The water distribution system is older than the expected service life with more leakage. Hence the study recommended that fixing Pressure valves and new distribution facilities can resolve the performance of the water supply system

Keywords: distribution, model, pressure, velocity

Procedia PDF Downloads 87
236 Analytic Network Process in Location Selection and Its Application to a Real Life Problem

Authors: Eylem Koç, Hasan Arda Burhan

Abstract:

Location selection presents a crucial decision problem in today’s business world where strategic decision making processes have critical importance. Thus, location selection has strategic importance for companies in boosting their strength regarding competition, increasing corporate performances and efficiency in addition to lowering production and transportation costs. A right choice in location selection has a direct impact on companies’ commercial success. In this study, a store location selection problem of Carglass Turkey which operates in vehicle glass branch is handled. As this problem includes both tangible and intangible criteria, Analytic Network Process (ANP) was accepted as the main methodology. The model consists of control hierarchy and BOCR subnetworks which include clusters of actors, alternatives and criteria. In accordance with the management’s choices, five different locations were selected. In addition to the literature review, a strict cooperation with the actor group was ensured and maintained while determining the criteria and during whole process. Obtained results were presented to the management as a report and its feasibility was confirmed accordingly.

Keywords: analytic network process (ANP), BOCR, multi-actor decision making, multi-criteria decision making, real-life problem, location selection

Procedia PDF Downloads 441
235 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 47
234 A Genre-Based Approach to the Teaching of Pronunciation

Authors: Marden Silva, Danielle Guerra

Abstract:

Some studies have indicated that pronunciation teaching hasn’t been paid enough attention by teachers regarding EFL contexts. In particular, segmental and suprasegmental features through genre-based approach may be an opportunity on how to integrate pronunciation into a more meaningful learning practice. Therefore, the aim of this project was to carry out a survey on some aspects related to English pronunciation that Brazilian students consider more difficult to learn, thus enabling the discussion of strategies that can facilitate the development of oral skills in English classes by integrating the teaching of phonetic-phonological aspects into the genre-based approach. Notions of intelligibility, fluency and accuracy were proposed by some authors as an ideal didactic sequence. According to their proposals, basic learners should be exposed to activities focused on the notion of intelligibility as well as intermediate students to the notion of fluency, and finally more advanced ones to accuracy practices. In order to test this hypothesis, data collection was conducted during three high school English classes at Federal Center for Technological Education of Minas Gerais (CEFET-MG), in Brazil, through questionnaires and didactic activities, which were recorded and transcribed for further analysis. The genre debate was chosen to facilitate the oral expression of the participants in a freer way, making them answering questions and giving their opinion about a previously selected topic. The findings indicated that basic students demonstrated more difficulty with aspects of English pronunciation than the others. Many of the intelligibility aspects analyzed had to be listened more than once for a better understanding. For intermediate students, the speeches recorded were considerably easier to understand, but nevertheless they found it more difficult to pronounce the words fluently, often interrupting their speech to think about what they were going to say and how they would talk. Lastly, more advanced learners seemed to express their ideas more fluently, but still subtle errors related to accuracy were perceptible in speech, thereby confirming the proposed hypothesis. It was also seen that using genre-based approach to promote oral communication in English classes might be a relevant method, considering the socio-communicative function inherent in the suggested approach.

Keywords: EFL, genre-based approach, oral skills, pronunciation

Procedia PDF Downloads 110
233 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 221
232 Characterising Stable Model by Extended Labelled Dependency Graph

Authors: Asraful Islam

Abstract:

Extended dependency graph (EDG) is a state-of-the-art isomorphic graph to represent normal logic programs (NLPs) that can characterize the consistency of NLPs by graph analysis. To construct the vertices and arcs of an EDG, additional renaming atoms and rules besides those the given program provides are used, resulting in higher space complexity compared to the corresponding traditional dependency graph (TDG). In this article, we propose an extended labeled dependency graph (ELDG) to represent an NLP that shares an equal number of nodes and arcs with TDG and prove that it is isomorphic to the domain program. The number of nodes and arcs used in the underlying dependency graphs are formulated to compare the space complexity. Results show that ELDG uses less memory to store nodes, arcs, and cycles compared to EDG. To exhibit the desirability of ELDG, firstly, the stable models of the kernel form of NLP are characterized by the admissible coloring of ELDG; secondly, a relation of the stable models of a kernel program with the handles of the minimal, odd cycles appearing in the corresponding ELDG has been established; thirdly, to our best knowledge, for the first time an inverse transformation from a dependency graph to the representing NLP w.r.t. ELDG has been defined that enables transferring analytical results from the graph to the program straightforwardly.

Keywords: normal logic program, isomorphism of graph, extended labelled dependency graph, inverse graph transforma-tion, graph colouring

Procedia PDF Downloads 180
231 Religious Discrimination Against Small Business Owners: Evidence from the 1875 Cadastral Survey of Istanbul

Authors: Burak Unveren, Ecem Uygun, Özdemi̇r Teke

Abstract:

A large body of literature documents how the Ottoman Empire's economic decline in relation to Western Europe was exacerbated by the unequal legal treatment of its subjects based on creed. Motivated by this debate, we empirically explore whether property taxes collected from businesses in Istanbul discriminated against or favored non-Muslims after the cadastral survey of the capital in 1875. The survey was conducted to determine the property taxes. And the process was potentially susceptible to the biased views of the surveyors who calculated the taxes payable via their subjective appraisals of all real properties. According to our results, in contrast to widely held beliefs regarding 19th-century Istanbul, the number of Muslim shop owners is higher than that of non-Muslims. Moreover, we find evidence for taxes collected from non-Muslim shop and store owners to be higher compared to Muslims, even after controlling for all physical features (e.g., size, location, etc.). These results directly pertain to the fiscal capacity of the Ottoman state and its economic divergence from Europe in the 19th century. Surprisingly, the data also indicates no statistically different tax differentials between male and female property owners.

Keywords: economic history, taxation, small business, discrimination

Procedia PDF Downloads 38
230 Objective vs. Perceived Quality in the Cereal Industry

Authors: Albena Ivanova, Jill Kurp, Austin Hampe

Abstract:

Cereal products in the US contain rich information on the front of the package (FOP) as well as point-of-purchase (POP) summaries provided by the store. These summaries frequently are confusing and misleading to the consumer. This study explores the relationship between perceived quality, objective quality, price, and value in the cold cereal industry. A total of 270 cold cereal products were analyzed and the price, quality and value for different summaries were compared using ANOVA tests. The results provide evidence that the United States Department of Agriculture Organic FOP/POP are related to higher objective quality, higher price, but not to a higher value. Whole grain FOP/POP related to a higher objective quality, lower or similar price, and higher value. Heart-healthy POP related to higher objective quality, similar price, and higher value. Gluten-free FOP/POP related to lower objective quality, higher price, and lower value. Kid's cereals were of lower objective quality, same price, and lower value compared to family and adult markets. The findings point to a disturbing tendency of companies to continue to produce lower quality products for the kids’ market, pricing them the same as high-quality products. The paper outlines strategies that marketers and policymakers can utilize to contribute to the increased objective quality and value of breakfast cereal products in the United States.

Keywords: cereals, certifications, front-of-package claims, consumer health.

Procedia PDF Downloads 99
229 Emotional Artificial Intelligence and the Right to Privacy

Authors: Emine Akar

Abstract:

The majority of privacy-related regulation has traditionally focused on concepts that are perceived to be well-understood or easily describable, such as certain categories of data and personal information or images. In the past century, such regulation appeared reasonably suitable for its purposes. However, technologies such as AI, combined with ever-increasing capabilities to collect, process, and store “big data”, not only require calibration of these traditional understandings but may require re-thinking of entire categories of privacy law. In the presentation, it will be explained, against the background of various emerging technologies under the umbrella term “emotional artificial intelligence”, why modern privacy law will need to embrace human emotions as potentially private subject matter. This argument can be made on a jurisprudential level, given that human emotions can plausibly be accommodated within the various concepts that are traditionally regarded as the underlying foundation of privacy protection, such as, for example, dignity, autonomy, and liberal values. However, the practical reasons for regarding human emotions as potentially private subject matter are perhaps more important (and very likely more convincing from the perspective of regulators). In that respect, it should be regarded as alarming that, according to most projections, the usefulness of emotional data to governments and, particularly, private companies will not only lead to radically increased processing and analysing of such data but, concerningly, to an exponential growth in the collection of such data. In light of this, it is also necessity to discuss options for how regulators could address this emerging threat.

Keywords: AI, privacy law, data protection, big data

Procedia PDF Downloads 61
228 Smart Textiles Integration for Monitoring Real-time Air Pollution

Authors: Akshay Dirisala

Abstract:

Humans had developed a highly organized and efficient civilization to live in by improving the basic needs of humans like housing, transportation, and utilities. These developments have made a huge impact on major environmental factors. Air pollution is one prominent environmental factor that needs to be addressed to maintain a sustainable and healthier lifestyle. Textiles have always been at the forefront of helping humans shield from environmental conditions. With the growth in the field of electronic textiles, we now have the capability of monitoring the atmosphere in real time to understand and analyze the environment that a particular person is mostly spending their time at. Integrating textiles with the particulate matter sensors that measure air quality and pollutants that have a direct impact on human health will help to understand what type of air we are breathing. This research idea aims to develop a textile product and a process of collecting the pollutants through particulate matter sensors, which are equipped inside a smart textile product and store the data to develop a machine learning model to analyze the health conditions of the person wearing the garment and periodically notifying them not only will help to be cautious of airborne diseases but will help to regulate the diseases and could also help to take care of skin conditions.

Keywords: air pollution, e-textiles, particulate matter sensors, environment, machine learning models

Procedia PDF Downloads 71
227 A Data Driven Approach for the Degradation of a Lithium-Ion Battery Based on Accelerated Life Test

Authors: Alyaa M. Younes, Nermine Harraz, Mohammad H. Elwany

Abstract:

Lithium ion batteries are currently used for many applications including satellites, electric vehicles and mobile electronics. Their ability to store relatively large amount of energy in a limited space make them most appropriate for critical applications. Evaluation of the life of these batteries and their reliability becomes crucial to the systems they support. Reliability of Li-Ion batteries has been mainly considered based on its lifetime. However, another important factor that can be considered critical in many applications such as in electric vehicles is the cycle duration. The present work presents the results of an experimental investigation on the degradation behavior of a Laptop Li-ion battery (type TKV2V) and the effect of applied load on the battery cycle time. The reliability was evaluated using an accelerated life test. Least squares linear regression with median rank estimation was used to estimate the Weibull distribution parameters needed for the reliability functions estimation. The probability density function, failure rate and reliability function under each of the applied loads were evaluated and compared. An inverse power model is introduced that can predict cycle time at any stress level given.

Keywords: accelerated life test, inverse power law, lithium-ion battery, reliability evaluation, Weibull distribution

Procedia PDF Downloads 141
226 An Integrated Modular Approach Based Simulation of Cold Heavy Oil Production

Authors: Hamidreza Sahaleh

Abstract:

In this paper, the authors display an incorporated secluded way to deal with quantitatively foresee volumetric sand generation and improved oil recuperation. This model is in light of blend hypothesis with erosion mechanics, in which multiphase hydrodynamics and geo-mechanics are coupled in a predictable way by means of principal unknowns, for example, saturation, pressure, porosity, and formation displacements. Foamy oil is demonstrated as a scattering of gas bubbles caught in the oil, where these gas air bubbles keep up a higher repository weight. A secluded methodology is then received to adequately exploit the current propelled standard supply and stress-strain codes. The model is actualized into three coordinated computational modules, i.e. erosion module, store module, and geo-mechanics module. The stress, stream and erosion mathematical statements are understood independently for every time addition, and the coupling terms (porosity, penetrability, plastic shear strain, and so on) are gone among them and iterated until certain union is accomplished on a period step premise. The framework is capable regarding its abilities, yet practical in terms of computer requirements and maintenance. Numerical results of field studies are displayed to show the capacities of the model. The impacts of foamy oil stream and sand generation are additionally inspected to exhibit their effect on the upgraded hydrocarbon recuperation.

Keywords: oil recuperation, erosion mechanics, foamy oil, erosion module.

Procedia PDF Downloads 246
225 Trimma: Trimming Metadata Storage and Latency for Hybrid Memory Systems

Authors: Yiwei Li, Boyu Tian, Mingyu Gao

Abstract:

Hybrid main memory systems combine both performance and capacity advantages from heterogeneous memory technologies. With larger capacities, higher associativities, and finer granularities, hybrid memory systems currently exhibit significant metadata storage and lookup overheads for flexibly remapping data blocks between the two memory tiers. To alleviate the inefficiencies of existing designs, we propose Trimma, the combination of a multi-level metadata structure and an efficient metadata cache design. Trimma uses a multilevel metadata table to only track truly necessary address remap entries. The saved memory space is effectively utilized as extra DRAM cache capacity to improve performance. Trimma also uses separate formats to store the entries with non-identity and identity mappings. This improves the overall remap cache hit rate, further boosting the performance. Trimma is transparent to software and compatible with various types of hybrid memory systems. When evaluated on a representative DDR4 + NVM hybrid memory system, Trimma achieves up to 2.4× and on average 58.1% speedup benefits, compared with a state-of-the-art design that only leverages the unallocated fast memory space for caching. Trimma addresses metadata management overheads and targets future scalable large-scale hybrid memory architectures.

Keywords: memory system, data cache, hybrid memory, non-volatile memory

Procedia PDF Downloads 27
224 Critical Discourse Analysis of Political TV Talk Show of Pakistani Media

Authors: Sumaira Saleem, Sajjad Hussain, Asma Kashif Shahzad, Hina Shaheen

Abstract:

This study aims at exploring the relationship between language and ideology and how such relationships are represented in the analysis of spoken texts, following Van Dijk’s Socio Cognitive Model (2002). In this study, it is tried to show that political Talk shows broadcast by Private TV channels are working apparatuses of ideology and store meanings which are not always obvious for readers. This analysis was about the situation created by Arslan Iftkhar, the son of ex-Chief Justice of Pakistan, Iftikhar Muhammad Chaudry and PTI Chief Imran Khan. Arslan Iftikhar submitted an application against Imran Khan that he is not able to become a member of parliament of Pakistan. In the application, he demanded the documents, which are submitted by Imran Khan at the time of Election to the Election Commission of Pakistan. Murad Ali from PTI also submitted an application against PM Nawaz Sharif to the Election Commission of Pakistan for providing the copies. It also suggests that these talk shows mystify the agency of processes by using various strategies. In other words, critical text analyses reveal how these choices enable speakers to manipulate the realizations of agency and power in the representation of action to produce particular meanings which are not always explicit for all readers.

Keywords: ECP, CDA, socio cognitive model, ideology, TV channels, power

Procedia PDF Downloads 697
223 Mesoporous Carbon Sphere/Nickel Cobalt Sulfide Core-Shell Microspheres for Supercapacitor Electrode Material

Authors: Charmaine Lamiel, Van Hoa Nguyen, Marjorie Baynosa, Jae-Jin Shim

Abstract:

The depletion of non-renewable sources had led to the continuous development of various energy storage systems in order to cope with the world’s demand in energy. Supercapacitors have attracted considerable attention because they can store more energy than conventional capacitors and have higher power density than batteries. The combination of carbon-based material and metal chalcogenides are now being considered in response to the search for active electrode materials exhibiting high electrochemical performance. In this study, a hierarchical mesoporous carbon sphere@nickel cobalt sulfide (CS@Ni-Co-S) core-shell was synthesized using a simple hydrothermal method. The CS@Ni-Co-S core-shell microstructures exhibited a high capacitance of 724.4 F g−1 at 2 A g−1 in a 6 M KOH electrolyte. Good specific retention of 86.1% and high Coulombic efficiency of 97.9% was obtained after 2000 charge-discharge cycles. The electrode exhibited a high energy density of 58.0 Wh kg−1 (1440 W kg−1) and high power density of 7200 W kg−1 (34.2 Wh kg−1). The reaction involved green synthesis without further sulfurization or post-heat treatment. Through this study, a cost-effective and facile synthesis of CS@Ni-Co-S as an active electrode showed favorable electrochemical performance.

Keywords: carbon sphere, electrochemical, hydrothermal, nickel cobalt sulfide, supercapacitor

Procedia PDF Downloads 205
222 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries

Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan

Abstract:

In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.

Keywords: checklist, Google spreadsheet, APP, self-inspection

Procedia PDF Downloads 90
221 Second Language Perception of Japanese /Cju/ and /Cjo/ Sequences by Mandarin-Speaking Learners of Japanese

Authors: Yili Liu, Honghao Ren, Mariko Kondo

Abstract:

In the field of second language (L2) speech learning, it is well-known that that learner’s first language (L1) phonetic and phonological characteristics will be transferred into their L2 production and perception, which lead to foreign accent. For L1 Mandarin learners of Japanese, the confusion of /u/ and /o/ in /CjV/ sequences has been observed in their utterance frequently. L1 transfer is considered to be the cause of this issue, however, other factors which influence the identification of /Cju/ and /Cjo/ sequences still under investigation. This study investigates the perception of Japanese /Cju/ and /Cjo/ units by L1 Mandarin learners of Japanese. It further examined whether learners’ proficiency, syllable position, phonetic features of preceding consonants and background noise affect learners’ performance in perception. Fifty-two Mandarin-speaking learners of Japanese and nine native Japanese speakers were recruited to participate in an identification task. Learners were divided into beginner, intermediate and advanced level according to their Japanese proficiency. The average correct rate was used to evaluate learners’ perceptual performance. Furthermore, the comparison of the correct rate between learners’ groups and the control group was conducted as well to examine learners’ nativelikeness. Results showed that background noise tends to pose an adverse effect on distinguishing /u/ and /o/ in /CjV/ sequences. Secondly, Japanese proficiency has no influence on learners’ perceptual performance in the quiet and in background noise. Then all learners did not reach a native-like level without the distraction of noise. Beginner level learners performed less native-like, although higher level learners appeared to have achieved nativelikeness in the multi-talker babble noise. Finally, syllable position tends to affect distinguishing /Cju/ and /Cjo/ only under the noisy condition. Phonetic features of preceding consonants did not impact learners’ perception in any listening conditions. Findings in this study can give an insight into a further understanding of Japanese vowel acquisition by L1 Mandarin learners of Japanese. In addition, this study indicates that L1 transfer is not the only explanation for the confusion of /u/ and /o/ in /CjV/ sequences, factors such as listening condition and syllable position are also needed to take into consideration in future research. It also suggests the importance of perceiving speech in a noisy environment, which is close to the actual conversation required more attention to pedagogy.

Keywords: background noise, Chinese learners of Japanese, /Cju/ and /Cjo/ sequences, second language perception

Procedia PDF Downloads 135
220 Recommender Systems Using Ensemble Techniques

Authors: Yeonjeong Lee, Kyoung-jae Kim, Youngtae Kim

Abstract:

This study proposes a novel recommender system that uses data mining and multi-model ensemble techniques to enhance the recommendation performance through reflecting the precise user’s preference. The proposed model consists of two steps. In the first step, this study uses logistic regression, decision trees, and artificial neural networks to predict customers who have high likelihood to purchase products in each product group. Then, this study combines the results of each predictor using the multi-model ensemble techniques such as bagging and bumping. In the second step, this study uses the market basket analysis to extract association rules for co-purchased products. Finally, the system selects customers who have high likelihood to purchase products in each product group and recommends proper products from same or different product groups to them through above two steps. We test the usability of the proposed system by using prototype and real-world transaction and profile data. In addition, we survey about user satisfaction for the recommended product list from the proposed system and the randomly selected product lists. The results also show that the proposed system may be useful in real-world online shopping store.

Keywords: product recommender system, ensemble technique, association rules, decision tree, artificial neural networks

Procedia PDF Downloads 263