Search results for: string of pearls strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3750

Search results for: string of pearls strategy

3750 China's New "Pivots" in the Indian Ocean: Towards "String of Pearls" Strategy 2.0

Authors: Mike Chia-Yu Huang

Abstract:

China’s port facility construction projects in the Indian Ocean (IO) region, Gwadar Port and Djibouti Port projects in particular, have led to a heated debate among both Chinese and Western strategists over whether the country has literally been carrying out its “string of pearls” strategy, an alleged Chinese plan to challenge America’s military predominance in South Asia. Even though the Chinese government repeatedly denied the existence of such a strategy and highlighted the civilian/commercial nature of its port projects, it has significantly enhanced its strategic cooperation with littoral countries in the IO region since the “One Belt One Road” initiative was introduced by Chinese President Xi Jinping in 2013. Whether China does have a plan to expand its sphere of military influence westward concerns the balance of power in the IO region. If the answer is positive, the security environment there will be changed drastically. This paper argues that rather than simply copying the U.S. model of developing overseas military bases along the IO periphery, Beijing has been deliberating a more sophisticated plan for its physical presence there: creating a new set of “overseas strategic pivots.” These “pivots,” semi-military and semi-commercial in nature, are designed to help Beijing sustain its anti-piracy operations in the Gulf of Aden and serve as forward stations for the transportation of China’s imported energy and merchandise. They can support the Chinese Navy’s operations overseas but are not supposed to undertake face-to-face combat missions. This upgraded Chinese scheme can be identified as “string of pearls” strategy 2.0. Moreover, it is expected to help China deepen its roots in the IO region, implying that Beijing has to a large extent scratched its old diplomatic philosophy which highlighted the merits of non-interference and nonalignment. While a full-scale maritime confrontation between China and the U.S.-India security alliance is unlikely to be witnessed in the near future, an ambitious Chinese plan to step into the global maritime domain has been evidently shown.

Keywords: Chinese navy, Djibouti, Gwadar, Indian Ocean, string of pearls strategy

Procedia PDF Downloads 305
3749 Automata-Based String Analysis for Detecting Malware in Android Programs

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We design and implement a precise model of string operations using finite state machine transformers and state transformers to approximate the values string variables can take throughout the execution of the program.We use our model to analyze Android program string variables. Our experimental results show that our string analysis is very efficient at detecting the contextual effect of string operations on the string variables. Our model proved to be very useful when it came to verifying statements about the string variables of the program.

Keywords: abstract interpretation, android, static analysis, string analysis

Procedia PDF Downloads 149
3748 Improving Taint Analysis of Android Applications Using Finite State Machines

Authors: Assad Maalouf, Lunjin Lu, James Lynott

Abstract:

We present a taint analysis that can automatically detect when string operations result in a string that is free of taints, where all the tainted patterns have been removed. This is an improvement on the conservative behavior of previous taint analyzers, where a string operation on a tainted string always leads to a tainted string unless the operation is manually marked as a sanitizer. The taint analysis is built on top of a string analysis that uses finite state automata to approximate the sets of values that string variables can take during the execution of a program. The proposed approach has been implemented as an extension of FlowDroid and experimental results show that the resulting taint analyzer is much more precise than the original FlowDroid.

Keywords: android, static analysis, string analysis, taint analysis

Procedia PDF Downloads 146
3747 Kemmer Oscillator in Cosmic String Background

Authors: N. Messai, A. Boumali

Abstract:

In this work, we aim to solve the two dimensional Kemmer equation including Dirac oscillator interaction term, in the background space-time generated by a cosmic string which is submitted to an uniform magnetic field. Eigenfunctions and eigenvalues of our problem have been found and the influence of the cosmic string space-time on the energy spectrum has been analyzed.

Keywords: Kemmer oscillator, cosmic string, Dirac oscillator, eigenfunctions

Procedia PDF Downloads 557
3746 Nacre Deposition Rate in Japanese and Hybrid Mother Oysters, Pinctada Fucata, and Its Relationship with Their Respective Pearls

Authors: Gunawan Muhammad, Takashi Atsumi, Akira Komaru

Abstract:

Pinctada fucata has been the most important pearl culture species in Japan and known as Japanese Akoya Pearl Oyster. However, during summer 1994, mass mortality devastated pearl culture in most parts of Japan. Therefore, pearl farmers started to import Chinese Pearl Oysters from Hainan Island that came from the same species because they are believed to be more resistant towards high water temperature, despite their lack of ability in producing high-quality pearls. The local farmers were then hybridized Japanese and Chinese pearl oysters and currently known as Hybrid pearl oysters, as an attempt to produce a new oyster's strain which is more resistant towards high temperature but also able to produce higher quality pearls. However, despite both strains were implanted by mantle tissues from the same group of donors, the thickness of pearl nacre produced by both strains was different, even though tablet thickness shows a rather similar pattern. Hence, this leads to a question of whether mother oysters play a major role in both nacre deposition rate and tablet thickness of pearls or not. This study first describes the nacre deposition rate of the shells of Japanese and Hybrid mother oysters towards the water temperature condition in Ago Bay, Mie Prefecture, Japan. Later, a comparative study was conducted among 4 shell positions that had been chosen according to the mantle tissue location and shell growth directions. A correlative study was then taken between shells and pearls nacre deposition rate to know whether mother oyster ability in depositing nacre on their shells is related to that of pearls. All the four shell positions were significantly different in shell nacre growth rate (Kruskal-Wallis, p-value < 0.05), and the third position have faster nacre growth among the other three both in Japanese and Hybrid strains, especially in warm temperature. The ability to deposit nacre between Japanese and Hybrid during warm water conditions (August and September) is also significantly different in almost all positions (Mann Whitney U, p-value < 0.01), Japanese oyster growth faster than Hybrid in all four positions. This leads to a different total growth among the two strains and a higher possibility of thicker nacre thickness in Japanese shell nacre. Tablet thickness is significantly different among all positions of shells (Kruskal-Wallis, p-value < 0.01), the 2nd position deposited rather thinner tablet thickness than the other three, including on the 6th month of culture which is more desirable in producing pearls with good luster. This result gives us new information that pearl growth rate is highly affected by the mother oysters; however, nacre tablet thickness might be the result of the shell matrix expressed by different mantle position from donor oysters.

Keywords: nacre, deposition, biomineralization, pearl aquaculture, pearl oyster, Akoya pearl, pearl

Procedia PDF Downloads 113
3745 Frequency of Oral Lesions in Newborns at Mashhad Imam Reza Hospital

Authors: Javad Vaezi, Ashraf Mohammadzadeh, Behjatalomoluk Ajami, Azin Vaezi, Aradokht Vaezi

Abstract:

Introduction: Neonatal period is the first developing phase after birth, followed by different developmental processes up to the age of puberty. A neonate may be born with different oral lesions. The aim of this study was to evaluate oral lesions in newborns at Mashhad Imam Reza Hospital, which belongs to Mashhad University of Medical Sciences. Materials and Methods: In this cross–sectional descriptive study, 600 newborns were observed during 2.5 months in 2001. The total oral cavity, including the soft palate, hard palate, tongue, alveolar ridge, and oral cavity floor, was examined with a tongue blade and light. Results: Results showed that 52.6% of newborns (316 cases) had oral lesions. 0.66% cases had natal and neonatal teeth, 0.5% cases had congenital epulis, 1.8% cases were with ankyloglossia, 41.5% cases with Epstein’s pearls, 22.3% cases with Bohn nodules and 0.16% case with exostosis. There were no cases of cleft lip or cleft palate. The most frequent oral lesion observed was Epstein’s pearls. Conclusion: Our study showed that the prevalence of natal teeth in the city of Mashhad was more than in other countries except for Bohn nodule and Epstein’s pearls, which occurred less frequently than in other countries.

Keywords: newborn, oral lesion, epidemiology, frequency

Procedia PDF Downloads 52
3744 Data Quality Enhancement with String Length Distribution

Authors: Qi Xiu, Hiromu Hota, Yohsuke Ishii, Takuya Oda

Abstract:

Recently, collectable manufacturing data are rapidly increasing. On the other hand, mega recall is getting serious as a social problem. Under such circumstances, there are increasing needs for preventing mega recalls by defect analysis such as root cause analysis and abnormal detection utilizing manufacturing data. However, the time to classify strings in manufacturing data by traditional method is too long to meet requirement of quick defect analysis. Therefore, we present String Length Distribution Classification method (SLDC) to correctly classify strings in a short time. This method learns character features, especially string length distribution from Product ID, Machine ID in BOM and asset list. By applying the proposal to strings in actual manufacturing data, we verified that the classification time of strings can be reduced by 80%. As a result, it can be estimated that the requirement of quick defect analysis can be fulfilled.

Keywords: string classification, data quality, feature selection, probability distribution, string length

Procedia PDF Downloads 285
3743 Preparation of Bead-On-String Alginate/Soy Protein Isolated Nanofibers via Water-Based Electrospinning and Its Application for Drug Loading

Authors: Patcharakamon Nooeaid, Piyachat Chuysrinuan

Abstract:

Electrospun natural polymers-based nanofibers are one of the most interesting materials used in tissue engineering and drug delivery applications. Bead-on-string nanofibers have gained considerable interest for sustained drug release. Vancomycin was used as the model drug and sodium alginate (SA)/soy protein isolated (SPI) as the polymer blend to fabricate the bead-on-string nanofibers by aqueous-based electrospinning. The bead-on-string SA/SPI nanofibers were successfully fabricated by the addition of poly(ethylene oxide) (PEO) as a co-blending polymer. SA-PEO with mass ratio of 70/30 showed the best spinnability with continuous nanofibers without the occurrence of beads. Bead structure formed with the addition of SPI and bead number increased with increasing SPI content. The electrospinning of 80/20 SA-PEO/SPI was obtained as a great promising bead-on-string nanofibers for drug loading, while the solution of 50/50 was not able to obtain continuous fibers. In vitro release tests showed that a more sustainable release profile up to 14 days with less initial burst release on day 1 could be obtained from the bead-on-string fibers than from smooth fibers with uniform diameter. In addition, vancomycin-loaded beaded fibers inhibited the growth of Staphylococcus aureus (S. aureus) bacteria. Therefore, the SA-PEO/SPI nanofibers showed the potential to be used as biomaterials for tissue engineering and drug delivery.

Keywords: bead-on-string fibers, electrospinning, drug delivery, tissue engineering

Procedia PDF Downloads 304
3742 Defining the Term of Strategy within Military Point of View

Authors: Ismail Menderes Sema, Murat Sözen, M. K. Barış

Abstract:

The strategy is about winning or preventing your enemy from winning. The origin of the term comes from the military. After utilizing the strategy for limited military purposes in early ages, soldiers and statesmen used the term together to achieve the goals of states. In ancient times, those people who made strategy and implemented it was the same. With the industrial revolution, the strategy changed like everything and the term “grand strategy” came forward. Today, from business to economy, management to philosophy there is a broad using of the term strategy. Economic strategy, business strategy, trade strategy, irrigation strategy, and even recruitment strategy are used by professionals. The purpose of this study is to analyze the evolution of the strategy and clarify actually what is about.

Keywords: strategy, military, art, grand strategy, strategist

Procedia PDF Downloads 421
3741 Using ε Value in Describe Regular Languages by Using Finite Automata, Operation on Languages and the Changing Algorithm Implementation

Authors: Abdulmajid Mukhtar Afat

Abstract:

This paper aims at introducing nondeterministic finite automata with ε value which is used to perform some operations on languages. a program is created to implement the algorithm that converts nondeterministic finite automata with ε value (ε-NFA) to deterministic finite automata (DFA).The program is written in c++ programming language. The program inputs are FA 5-tuples from text file and then classifies it into either DFA/NFA or ε -NFA. For DFA, the program will get the string w and decide whether it is accepted or rejected. The tracking path for an accepted string is saved by the program. In case of NFA or ε-NFA automation, the program changes the automation to DFA to enable tracking and to decide if the string w exists in the regular language or not.

Keywords: DFA, NFA, ε-NFA, eclose, finite automata, operations on languages

Procedia PDF Downloads 460
3740 Ureteral Stents with Extraction Strings: Patient-Reported Outcomes

Authors: Rammah Abdlbagi, Similoluwa Biyi, Aakash Pai

Abstract:

Introduction: Short-term ureteric stents are commonly placed after ureteroscopy procedures. The removal usually entails having a flexible cystoscopy, which entails a further invasive procedure. There are often delays in removing the stent as departments have limited cystoscopy availability. However, if stents with extraction strings are used, the patient or a clinician can remove them. The aim of the study is to assess the safety and effectiveness of the use of a stent with a string. Method: A retrospective, single-institution study was conducted over a three-month period. Twenty consecutive patients had ureteric stents with string insertion. Ten of the patients had a stent removal procedure previously with flexible cystoscopy. A validated questionnaire was used to assess outcomes. Primary outcomes included: dysuria, hematuria, urinary frequency, and disturbance of the patient’s daily activities. Secondary outcomes included pain experience during the stent removal. Result: Fifteen patients (75%) experienced hematuria and frequency. Two patients experienced pain and discomfort during the stent removal (10%). Two patients had experienced a disturbance in their daily activity (10%). All patients who had stent removal before using flexible cystoscopy preferred the removal of the stent using a string. None of the patients had stent displacement. The median stent dwell time was five days. Conclusion: Patient reported outcomes measures for the indwelling period of a stent with extraction string are equivalent to the published data on stents. Extraction strings mean that the stent dwell time can be reduced. The removal of the stent on extraction strings is more tolerable than the conventional stent.

Keywords: ureteric stent, string flexible cystoscopy, stent symptoms, validated questionnaire

Procedia PDF Downloads 70
3739 Global Modeling of Drill String Dragging and Buckling in 3D Curvilinear Bore-Holes

Authors: Valery Gulyayev, Sergey Glazunov, Elena Andrusenko, Nataliya Shlyun

Abstract:

Enhancement of technology and techniques for drilling deep directed oil and gas bore-wells are of essential industrial significance because these wells make it possible to increase their productivity and output. Generally, they are used for drilling in hard and shale formations, that is why their drivage processes are followed by the emergency and failure effects. As is corroborated by practice, the principal drilling drawback occurring in drivage of long curvilinear bore-wells is conditioned by the need to obviate essential force hindrances caused by simultaneous action of the gravity, contact and friction forces. Primarily, these forces depend on the type of the technological regime, drill string stiffness, bore-hole tortuosity and its length. They can lead to the Eulerian buckling of the drill string and its sticking. To predict and exclude these states, special mathematic models and methods of computer simulation should play a dominant role. At the same time, one might note that these mechanical phenomena are very complex and only simplified approaches (‘soft string drag and torque models’) are used for their analysis. Taking into consideration that now the cost of directed wells increases essentially with complication of their geometry and enlargement of their lengths, it can be concluded that the price of mistakes of the drill string behavior simulation through the use of simplified approaches can be very high and so the problem of correct software elaboration is very urgent. This paper deals with the problem of simulating the regimes of drilling deep curvilinear bore-wells with prescribed imperfect geometrical trajectories of their axial lines. On the basis of the theory of curvilinear flexible elastic rods, methods of differential geometry, and numerical analysis methods, the 3D ‘stiff-string drag and torque model’ of the drill string bending and the appropriate software are elaborated for the simulation of the tripping in and out regimes and drilling operations. It is shown by the computer calculations that the contact and friction forces can be calculated and regulated, providing predesigned trouble-free modes of operation. The elaborated mathematic models and software can be used for the emergency situations prognostication and their exclusion at the stages of the drilling process design and realization.

Keywords: curvilinear drilling, drill string tripping in and out, contact forces, resistance forces

Procedia PDF Downloads 115
3738 Comparative Analysis of Photovoltaic Systems

Authors: Irtaza M. Syed, Kaameran Raahemifar

Abstract:

This paper presents comparative analysis of photovoltaic systems (PVS) and proposes practical techniques to improve operational efficiency of the PVS. The best engineering and construction practices for PVS are identified and field oriented recommendation are made. Comparative analysis of central and string inverter based, as well as 600 and 1000 VDC PVS are performed. In addition, direct current (DC) and alternating current (AC) photovoltaic (PV) module based systems are compared. Comparison shows that 1000 V DC String Inverters based PVS is the best choice.

Keywords: photovoltaic module, photovoltaic systems, operational efficiency improvement, comparative analysis

Procedia PDF Downloads 452
3737 Effectiveness of Language Learning Strategy Instruction Based on CALLA on Iranian EFL Language Strategy Use

Authors: Reza Khani, Ziba Hosseini

Abstract:

Ever since the importance of language learning strategy instruction (LLS) has been distinguished, there has been growing interest on how to teach LLS in language learning classrooms. So thus this study attempted to implement language strategy instruction based on CALLA approach for Iranian EFL learners in a real classroom setting. The study was testing the hypothesis that strategy instruction result in improved linguistic strategy of students. The participant of the study were 240 EFL learners who received language learning instruction for four months. The data collected using Oxford strategy inventory for language learning. The results indicated the instruction had statistically significant effect on language strategy use of intervention group who received instruction.

Keywords: CALLA, language learning strategy, language learning strategy instruction, Iranian EFL language strategy

Procedia PDF Downloads 531
3736 Portuguese Guitar Strings Characterization and Comparison

Authors: P. Serrão, E. Costa, A. Ribeiro, V. Infante

Abstract:

The characteristic sonority of the Portuguese guitar is in great part what makes Fado so distinguishable from other traditional song styles. The Portuguese guitar is a pear-shaped plucked chordophone with six courses of double strings. This study compares the two types of plain strings available for Portuguese guitar and used by the musicians. One is stainless steel spring wire, the other is high carbon spring steel (music wire). Some musicians mention noticeable differences in sound quality between these two string materials, such as a little more brightness and sustain in the steel strings. Experimental tests were performed to characterize string tension at pitch; mechanical strength and tuning stability using the universal testing machine; dimensional control and chemical composition analysis using the scanning electron microscope. The string dynamical behaviour characterization experiments, including frequency response, inharmonicity, transient response, damping phenomena and were made in a monochord test set-up designed and built in-house. Damping factor was determined for the fundamental frequency. As musicians are able to detect very small damping differences, an accurate a characterization of the damping phenomena for all harmonics was necessary. With that purpose, another improved monochord was set and a new system identification methodology applied. Due to the complexity of this task several adjustments were necessary until obtaining good experimental data. In a few cases, dynamical tests were repeated to detect any evolution in damping parameters after break-in period when according to players experience a new string sounds gradually less dull until reaching the typically brilliant timbre. Finally, each set of strings was played on one guitar by a distinguished player and recorded. The recordings which include individual notes, scales, chords and a study piece, will be analysed to potentially characterize timbre variations.

Keywords: damping factor, music wire, portuguese guitar, string dynamics

Procedia PDF Downloads 524
3735 Segmentation of Arabic Handwritten Numeral Strings Based on Watershed Approach

Authors: Nidal F. Shilbayeh, Remah W. Al-Khatib, Sameer A. Nooh

Abstract:

Arabic offline handwriting recognition systems are considered as one of the most challenging topics. Arabic Handwritten Numeral Strings are used to automate systems that deal with numbers such as postal code, banking account numbers and numbers on car plates. Segmentation of connected numerals is the main bottleneck in the handwritten numeral recognition system.  This is in turn can increase the speed and efficiency of the recognition system. In this paper, we proposed algorithms for automatic segmentation and feature extraction of Arabic handwritten numeral strings based on Watershed approach. The algorithms have been designed and implemented to achieve the main goal of segmenting and extracting the string of numeral digits written by hand especially in a courtesy amount of bank checks. The segmentation algorithm partitions the string into multiple regions that can be associated with the properties of one or more criteria. The numeral extraction algorithm extracts the numeral string digits into separated individual digit. Both algorithms for segmentation and feature extraction have been tested successfully and efficiently for all types of numerals.

Keywords: handwritten numerals, segmentation, courtesy amount, feature extraction, numeral recognition

Procedia PDF Downloads 350
3734 An Authentic Algorithm for Ciphering and Deciphering Called Latin Djokovic

Authors: Diogen Babuc

Abstract:

The question that is a motivation of writing is how many devote themselves to discovering something in the world of science where much is discerned and revealed, but at the same time, much is unknown. Methods: The insightful elements of this algorithm are the ciphering and deciphering algorithms of Playfair, Caesar, and Vigenère. Only a few of their main properties are taken and modified, with the aim of forming a specific functionality of the algorithm called Latin Djokovic. Specifically, a string is entered as input data. A key k is given, with a random value between the values a and b = a+3. The obtained value is stored in a variable with the aim of being constant during the run of the algorithm. In correlation to the given key, the string is divided into several groups of substrings, and each substring has a length of k characters. The next step involves encoding each substring from the list of existing substrings. Encoding is performed using the basis of Caesar algorithm, i.e., shifting with k characters. However, that k is incremented by 1 when moving to the next substring in that list. When the value of k becomes greater than b+1, it’ll return to its initial value. The algorithm is executed, following the same procedure, until the last substring in the list is traversed. Results: Using this polyalphabetic method, ciphering and deciphering of strings are achieved. The algorithm also works for a 100-character string. The x character isn’t used when the number of characters in a substring is incompatible with the expected length. The algorithm is simple to implement, but it’s questionable if it works better than the other methods from the point of view of execution time and storage space.

Keywords: ciphering, deciphering, authentic, algorithm, polyalphabetic cipher, random key, methods comparison

Procedia PDF Downloads 75
3733 Model-Based Global Maximum Power Point Tracking at Photovoltaic String under Partial Shading Conditions Using Multi-Input Interleaved Boost DC-DC Converter

Authors: Seyed Hossein Hosseini, Seyed Majid Hashemzadeh

Abstract:

Solar energy is one of the remarkable renewable energy sources that have particular characteristics such as unlimited, no environmental pollution, and free access. Generally, solar energy can be used in thermal and photovoltaic (PV) types. The cost of installation of the PV system is very high. Additionally, due to dependence on environmental situations such as solar radiation and ambient temperature, electrical power generation of this system is unpredictable and without power electronics devices, there is no guarantee to maximum power delivery at the output of this system. Maximum power point tracking (MPPT) should be used to achieve the maximum power of a PV string. MPPT is one of the essential parts of the PV system which without this section, it would be impossible to reach the maximum amount of the PV string power and high losses are caused in the PV system. One of the noticeable challenges in the problem of MPPT is the partial shading conditions (PSC). In PSC, the output photocurrent of the PV module under the shadow is less than the PV string current. The difference between the mentioned currents passes from the module's internal parallel resistance and creates a large negative voltage across shaded modules. This significant negative voltage damages the PV module under the shadow. This condition is called hot-spot phenomenon. An anti-paralleled diode is inserted across the PV module to prevent the happening of this phenomenon. This diode is known as the bypass diode. Due to the performance of the bypass diode under PSC, the P-V curve of the PV string has several peaks. One of the P-V curve peaks that makes the maximum available power is the global peak. Model-based Global MPPT (GMPPT) methods can estimate the optimal point with higher speed than other GMPPT approaches. Centralized, modular, and interleaved DC-DC converter topologies are the significant structures that can be used for GMPPT at a PV string. there are some problems in the centralized structure such as current mismatch losses at PV sting, loss of power of the shaded modules because of bypassing by bypass diodes under PSC, needing to series connection of many PV modules to reach the desired voltage level. In the modular structure, each PV module is connected to a DC-DC converter. In this structure, by increasing the amount of demanded power from the PV string, the number of DC-DC converters that are used at the PV system will increase. As a result, the cost of the modular structure is very high. We can implement the model-based GMPPT through the multi-input interleaved boost DC-DC converter to increase the power extraction from the PV string and reduce hot-spot and current mismatch error in a PV string under different environmental condition and variable load circumstances. The interleaved boost DC-DC converter has many privileges than other mentioned structures, such as high reliability and efficiency, better regulation of DC voltage at DC link, overcome the notable errors such as module's current mismatch and hot spot phenomenon, and power switches voltage stress reduction.

Keywords: solar energy, photovoltaic systems, interleaved boost converter, maximum power point tracking, model-based method, partial shading conditions

Procedia PDF Downloads 101
3732 Language Activation Theory: Unlocking Bilingual Language Processing

Authors: Leorisyl D. Siarot

Abstract:

It is conventional to see and hear Filipinos, in general, speak two or more languages. This phenomenon brings us to a closer look on how our minds process the input and produce an output with a specific chosen language. This study aimed to generate a theoretical model which explained the interaction of the first and the second languages in the human mind. After a careful analysis of the gathered data, a theoretical prototype called Language Activation Model was generated. For every string, there are three specialized banks: lexico-semantics, morphono-syntax, and pragmatics. These banks are interrelated to other banks of other language strings. As the bilingual learns more languages, a new string is replicated and is filled up with the information of the new language learned. The principles of the first and second languages' interaction are drawn; these are expressed in laws, namely: law of dominance, law of availability, law of usuality and law of preference. Furthermore, difficulties encountered in the learning of second languages were also determined.

Keywords: bilingualism, psycholinguistics, second language learning, languages

Procedia PDF Downloads 478
3731 Advertising Message Strategy on Ghana’s TV

Authors: Aisha Iddrisu, Ferruh Uztuğ

Abstract:

This study is a quantitative content analysis of advertising message strategies used in Ghana’s TV commercials (2020-2021) using the modified strategy of Wang and Praet (2016) with the objective of exploring the various advertising message strategies used in Ghana’s TV advertisement, its variation according to product category including the most widely used message strategy. The findings indicate that, out of the 220 commercials used in the study, the Affective message strategy (n=122, 55%) was the dominant message strategy used in Ghana’s TV commercials. The most advertised product category in Ghana’s TV commercials (2020-2021) was the food category, and a significant relationship was observed between message strategy and product category as well as message strategy and brand type.

Keywords: advertising, message strategy, Ghana, television

Procedia PDF Downloads 150
3730 Neuronal Mechanisms of Observational Motor Learning in Mice

Authors: Yi Li, Yinan Zheng, Ya Ke, Yungwing Ho

Abstract:

Motor learning is a process that frequently happens among humans and rodents, which is defined as the changes in the capability to perform a skill that is conformed to have a relatively permanent improvement through practice or experience. There are many ways to learn a behavior, among which is observational learning. Observational learning is the process of learning by watching the behaviors of others, for example, a child imitating parents, learning a new sport by watching the training videos or solving puzzles by watching the solutions. Many research explores observational learning in humans and primates. However, the neuronal mechanism of which, especially observational motor learning, was uncertain. It’s well accepted that mirror neurons are essential in the observational learning process. These neurons fire when the primate performs a goal-directed action and sees someone else demonstrating the same action, which suggests they have high firing activity both completing and watching the behavior. The mirror neurons are assumed to mediate imitation or play a critical and fundamental role in action understanding. They are distributed in many brain areas of primates, i.e., posterior parietal cortex (PPC), premotor cortex (M2), and primary motor cortex (M1) of the macaque brain. However, few researchers report the existence of mirror neurons in rodents. To verify the existence of mirror neurons and the possible role in motor learning in rodents, we performed customised string-pulling behavior combined with multiple behavior analysis methods, photometry, electrophysiology recording, c-fos staining and optogenetics in healthy mice. After five days of training, the demonstrator (demo) mice showed a significantly quicker response and shorter time to reach the string; fast, steady and accurate performance to pull down the string; and more precisely grasping the beads. During three days of observation, the mice showed more facial motions when the demo mice performed behaviors. On the first training day, the observer reduced the number of trials to find and pull the string. However, the time to find beads and pull down string were unchanged in the successful attempts on the first day and other training days, which indicated successful action understanding but failed motor learning through observation in mice. After observation, the post-hoc staining revealed that the c-fos expression was increased in the cognitive-related brain areas (medial prefrontal cortex) and motor cortices (M1, M2). In conclusion, this project indicated that the observation led to a better understanding of behaviors and activated the cognitive and motor-related brain areas, which suggested the possible existence of mirror neurons in these brain areas.

Keywords: observation, motor learning, string-pulling behavior, prefrontal cortex, motor cortex, cognitive

Procedia PDF Downloads 55
3729 Simulating the Interaction of Strategy Development and Project Delivery

Authors: Nipun Agarwal, David Paul, Fareed Un Din

Abstract:

Every organization develops a strategy that needs to be implemented and is undertaken through project delivery. In essence, project requirements should exactly replicate an organization’s strategy. In reality this does not happen, and behavioral factors deviate the project delivery from the strategic objectives. This occurs as project stakeholders can have competing objectives. Resultantly, requirements that are implemented through projects are less aligned to the strategy. This paper develops a game theoretic model to simulate why such deviations occur. That explains the difference between strategy development and implementation.

Keywords: strategy, simulation, project management, game theory

Procedia PDF Downloads 99
3728 Shade Effect on Photovoltaic Systems: A Comparison between String and Module-Based Solution

Authors: Iyad M. Muslih, Yehya Abdellatif

Abstract:

In general, shading will reduce the electrical power produced from PV modules and arrays in locations where shading is unavoidable or caused by dynamic moving parts. This reduction is based on the shade effect on the I-V curve of the PV module or array and how the DC/AC inverter can search and control the optimum value of power from this module or array configuration. This is a very complicated task due to different patterns of shaded PV modules and arrays. One solution presented by the inverter industry is to perform the maximum power point tracking (MPPT) at the module level rather than the series string level. This solution is supposed to reduce the shade effect on the total harvested energy. However, this isn’t necessarily the best solution to reduce the shade effect as will be shown in this study.

Keywords: photovoltaic, shade effect, I-V curve, MPPT

Procedia PDF Downloads 361
3727 Dual Duality for Unifying Spacetime and Internal Symmetry

Authors: David C. Ni

Abstract:

The current efforts for Grand Unification Theory (GUT) can be classified into General Relativity, Quantum Mechanics, String Theory and the related formalisms. In the geometric approaches for extending General Relativity, the efforts are establishing global and local invariance embedded into metric formalisms, thereby additional dimensions are constructed for unifying canonical formulations, such as Hamiltonian and Lagrangian formulations. The approaches of extending Quantum Mechanics adopt symmetry principle to formulate algebra-group theories, which evolved from Maxwell formulation to Yang-Mills non-abelian gauge formulation, and thereafter manifested the Standard model. This thread of efforts has been constructing super-symmetry for mapping fermion and boson as well as gluon and graviton. The efforts of String theory currently have been evolving to so-called gauge/gravity correspondence, particularly the equivalence between type IIB string theory compactified on AdS5 × S5 and N = 4 supersymmetric Yang-Mills theory. Other efforts are also adopting cross-breeding approaches of above three formalisms as well as competing formalisms, nevertheless, the related symmetries, dualities, and correspondences are outlined as principles and techniques even these terminologies are defined diversely and often generally coined as duality. In this paper, we firstly classify these dualities from the perspective of physics. Then examine the hierarchical structure of classes from mathematical perspective referring to Coleman-Mandula theorem, Hidden Local Symmetry, Groupoid-Categorization and others. Based on Fundamental Theorems of Algebra, we argue that rather imposing effective constraints on different algebras and the related extensions, which are mainly constructed by self-breeding or self-mapping methodologies for sustaining invariance, we propose a new addition, momentum-angular momentum duality at the level of electromagnetic duality, for rationalizing the duality algebras, and then characterize this duality numerically with attempt for addressing some unsolved problems in physics and astrophysics.

Keywords: general relativity, quantum mechanics, string theory, duality, symmetry, correspondence, algebra, momentum-angular-momentum

Procedia PDF Downloads 357
3726 Modeling and Control Design of a Centralized Adaptive Cruise Control System

Authors: Markus Mazzola, Gunther Schaaf

Abstract:

A vehicle driving with an Adaptive Cruise Control System (ACC) is usually controlled decentrally, based on the information of radar systems and in some publications based on C2X-Communication (CACC) to guarantee stable platoons. In this paper, we present a Model Predictive Control (MPC) design of a centralized, server-based ACC-System, whereby the vehicular platoon is modeled and controlled as a whole. It is then proven that the proposed MPC design guarantees asymptotic stability and hence string stability of the platoon. The Networked MPC design is chosen to be able to integrate system constraints optimally as well as to reduce the effects of communication delay and packet loss. The performance of the proposed controller is then simulated and analyzed in an LTE communication scenario using the LTE/EPC Network Simulator LENA, which is based on the ns-3 network simulator.

Keywords: adaptive cruise control, centralized server, networked model predictive control, string stability

Procedia PDF Downloads 483
3725 Alignment of Information System Strategy and Green Information System Strategy: Comprehension and A Review of the Literature

Authors: Wartika Memed Purawinata, Kridanto Surendro, Husni Sastramiharja, Iping Supriana S.

Abstract:

The information system is one of the contributors to environmental degradation and pollution are known to be released, such as the increasing of use of IT equipment and energy consumption , life cycles of IT equipment are getting shorter, IT equipment waste disposal and so on, therefore the information system should have a role in related environmental issues. Organization need to develop the ability of green to minimize negative impacts on the environment. Although the green information system is an important topic, many organizations fail to manage the environment in a way that is adequate because they ignore aspect of strategy. Alignment strategy is very important to ensure that all people do the activities of the organization headed in the same direction. Alignment strategy helps organization, determine which is more important for organization, and then make road mad to achieve the organization goal. Therefore, this paper discusses the review of the alignment, information systems strategy, and IS green strategy. With this discussion is expected there is an understanding about the alignment of information systems strategy and strategy of green IS, and its relationship with the achievement of business goals that have commitment to reduce the negative impact of information systems on the environment.

Keywords: alignment, strategy, information system, green

Procedia PDF Downloads 424
3724 India’s Strategy toward Afghanistan since 9\11

Authors: Saifurahman Fayiz

Abstract:

overall, India had friendly relation with different governments in Afghanistan except for the Taliban regime amongst the years 1996 to 2001. The terrorist attack in the United States provided India a chance to follow its strategy in Afghanistan. India support Afghanistan since 9\11. The objectives of this study to study India’s strategy towards Afghanistan and its implication to neighbor countries. The research method conducted based on qualitative research method with descriptive. The research findings propose that; India has chosen a soft power policy to implement its strategy in Afghanistan.

Keywords: strategy, policy, soft power, Afghanistan

Procedia PDF Downloads 223
3723 Homogeneity among Diversity

Authors: Yu Guang

Abstract:

“Case studies are the preferred strategy when ‘how’ or ‘why’ questions are being posed.” Therefore, the study is based on two cases: strategy performed in JingNan War and by NIKE. The two samples are chosen as they are of comparability. Data are gathered and PEST and SWOT are used as analysis models to examine their strategic employment in order that the answer to brilliant strategies in variety is found. The niche strategy has been used in the past and present, in the battle fields and business. The homogeneity among diversity is the skill of performing strategies.

Keywords: challenger, homogeneity, managing diversity, niche strategy

Procedia PDF Downloads 494
3722 STML: Service Type-Checking Markup Language for Services of Web Components

Authors: Saqib Rasool, Adnan N. Mian

Abstract:

Web components are introduced as the latest standard of HTML5 for writing modular web interfaces for ensuring maintainability through the isolated scope of web components. Reusability can also be achieved by sharing plug-and-play web components that can be used as off-the-shelf components by other developers. A web component encapsulates all the required HTML, CSS and JavaScript code as a standalone package which must be imported for integrating a web component within an existing web interface. It is then followed by the integration of web component with the web services for dynamically populating its content. Since web components are reusable as off-the-shelf components, these must be equipped with some mechanism for ensuring their proper integration with web services. The consistency of a service behavior can be verified through type-checking. This is one of the popular solutions for improving the quality of code in many programming languages. However, HTML does not provide type checking as it is a markup language and not a programming language. The contribution of this work is to introduce a new extension of HTML called Service Type-checking Markup Language (STML) for adding support of type checking in HTML for JSON based REST services. STML can be used for defining the expected data types of response from JSON based REST services which will be used for populating the content within HTML elements of a web component. Although JSON has five data types viz. string, number, boolean, object and array but STML is made to supports only string, number and object. This is because of the fact that both object and array are considered as string, when populated in HTML elements. In order to define the data type of any HTML element, developer just needs to add the custom STML attributes of st-string, st-number and st-boolean for string, number and boolean respectively. These all annotations of STML are used by the developer who is writing a web component and it enables the other developers to use automated type-checking for ensuring the proper integration of their REST services with the same web component. Two utilities have been written for developers who are using STML based web components. One of these utilities is used for automated type-checking during the development phase. It uses the browser console for showing the error description if integrated web service is not returning the response with expected data type. The other utility is a Gulp based command line utility for removing the STML attributes before going in production. This ensures the delivery of STML free web pages in the production environment. Both of these utilities have been tested to perform type checking of REST services through STML based web components and results have confirmed the feasibility of evaluating service behavior only through HTML. Currently, STML is designed for automated type-checking of integrated REST services but it can be extended to introduce a complete service testing suite based on HTML only, and it will transform STML from Service Type-checking Markup Language to Service Testing Markup Language.

Keywords: REST, STML, type checking, web component

Procedia PDF Downloads 223
3721 Pure and Mixed Nash Equilibria Domain of a Discrete Game Model with Dichotomous Strategy Space

Authors: A. S. Mousa, F. Shoman

Abstract:

We present a discrete game theoretical model with homogeneous individuals who make simultaneous decisions. In this model the strategy space of all individuals is a discrete and dichotomous set which consists of two strategies. We fully characterize the coherent, split and mixed strategies that form Nash equilibria and we determine the corresponding Nash domains for all individuals. We find all strategic thresholds in which individuals can change their mind if small perturbations in the parameters of the model occurs.

Keywords: coherent strategy, split strategy, pure strategy, mixed strategy, Nash equilibrium, game theory

Procedia PDF Downloads 116