Search results for: state space.
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3324

Search results for: state space.

2514 Study of Coupled Lateral-Torsional Free Vibrations of Laminated Composite Beam: Analytical Approach

Authors: S.H. Mirtalaie, M.A. Hajabasi

Abstract:

In this paper, an analytical approach is used to study the coupled lateral-torsional vibrations of laminated composite beam. It is known that in such structures due to the fibers orientation in various layers, any lateral displacement will produce a twisting moment. This phenomenon is modeled by the bending-twisting material coupling rigidity and its main feature is the coupling of lateral and torsional vibrations. In addition to the material coupling, the effects of shear deformation and rotary inertia are taken into account in the definition of the potential and kinetic energies. Then, the governing differential equations are derived using the Hamilton-s principle and the mathematical model matches the Timoshenko beam model when neglecting the effect of bending-twisting rigidity. The equations of motion which form a system of three coupled PDEs are solved analytically to study the free vibrations of the beam in lateral and rotational modes due to the bending, as well as the torsional mode caused by twisting. The analytic solution is carried out in three steps: 1) assuming synchronous motion for the kinematic variables which are the lateral, rotational and torsional displacements, 2) solving the ensuing eigenvalue problem which contains three coupled second order ODEs and 3) imposing different boundary conditions related to combinations of simply, clamped and free end conditions. The resulting natural frequencies and mode shapes are compared with similar results in the literature and good agreement is achieved.

Keywords: Free vibration, laminated composite beam, material coupling, state space.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2285
2513 A Statistical Identification Approach by the Boundary Field Changes

Authors: Rumena D. Stancheva, Ilona I. Iatcheva

Abstract:

In working mode some unexpected changes could be arise in inner structure of electromagnetic device. They influence modification in electromagnetic field propagation map. The field values at an observed boundary are also changed. The development of the process has to be watched because the arising structural changes would provoke the device to be gone out later. The probabilistic assessment of the state is possible to be made. The numerical assessment points if the resulting changes have only accidental character or they are due to the essential inner structural disturbances. The presented application example is referring to the 200MW turbine-generator. A part of the stator core end teeth zone is simulated broken. Quasi three-dimensional electromagnetic and temperature field are solved applying FEM. The stator core state diagnosis is proposed to be solved as an identification problem on the basis of a statistical criterion.

Keywords: Identification, structural disturbance, statistical criterion.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1282
2512 Restricted Pedestrian Flow Performance Measures during Egress from a Complex Facility

Authors: Luthful A. Kawsar, Noraida A. Ghani, Anton A. Kamil, Adli Mustafa

Abstract:

In this paper, we use an M/G/C/C state dependent queuing model within a complex network topology to determine the different performance measures for pedestrian traffic flow. The occupants in this network topology need to go through some source corridors, from which they can choose their suitable exiting corridors. The performance measures were calculated using arrival rates that maximize the throughputs of source corridors. In order to increase the throughput of the network, the result indicates that the flow direction of pedestrian through the corridors has to be restricted and the arrival rates to the source corridor need to be controlled.

Keywords: Arrival rate, Multiple arrival sources, Probability of blocking, State dependent queuing networks, Throughput.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1565
2511 On the Paradigm Shift of the Overall Urban Design in China

Authors: Gaoyuan Wang, Tian Chen, Junnan Liu

Abstract:

Facing a period of major change that is rarely seen in a century, China formulates the 14th Five-Year Plan and places emphasis on promoting high-quality development. In this context, the overall urban design has become a crucial and systematic tool for high-quality urban development. However, there are bottlenecks in the cognition of nature, content scope and transmission mechanisms of the current overall urban design in China. The paper interprets the emerging demands of the 14th Five-Year Plan on urban design in terms of new value-quality priority, new dynamic-space performance, new target-region coordination and new path-refined governance. Based on the new trend and appeal, the multi-dimensional thinking integrated with the major tasks of urban design are proposed accordingly, which is the biomass thinking in ecological, production and living element, the strategic thinking in spatial structure, the systematic thinking in the cityscape, the low-carbon thinking in urban form, the governance thinking in public space, the user thinking in design implementation. The paper explores the possibility of transforming the value thinking and technical system of urban design in China and provides a breakthrough path for the urban planning and design industry to better respond to the propositions of the country’s 14th Five-Year Plan.

Keywords: China’s 14th five-year plan, overall urban design, urban design thinking, transformation of urban design.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 512
2510 An Image Enhancement Method Based on Curvelet Transform for CBCT-Images

Authors: Shahriar Farzam, Maryam Rastgarpour

Abstract:

Image denoising plays extremely important role in digital image processing. Enhancement of clinical image research based on Curvelet has been developed rapidly in recent years. In this paper, we present a method for image contrast enhancement for cone beam CT (CBCT) images based on fast discrete curvelet transforms (FDCT) that work through Unequally Spaced Fast Fourier Transform (USFFT). These transforms return a table of Curvelet transform coefficients indexed by a scale parameter, an orientation and a spatial location. Accordingly, the coefficients obtained from FDCT-USFFT can be modified in order to enhance contrast in an image. Our proposed method first uses a two-dimensional mathematical transform, namely the FDCT through unequal-space fast Fourier transform on input image and then applies thresholding on coefficients of Curvelet to enhance the CBCT images. Consequently, applying unequal-space fast Fourier Transform leads to an accurate reconstruction of the image with high resolution. The experimental results indicate the performance of the proposed method is superior to the existing ones in terms of Peak Signal to Noise Ratio (PSNR) and Effective Measure of Enhancement (EME).

Keywords: Curvelet transform, image enhancement, CBCT, image denoising.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1250
2509 Explorations in the Role of Emotion in Moral Judgment

Authors: Arthur Yan

Abstract:

Recent theorizations on the cognitive process of moral judgment have focused on the role of intuitions and emotions, marking a departure from previous emphasis on conscious, step-by-step reasoning. My study investigated how being in a disgusted mood state affects moral judgment. Participants were induced to enter a disgusted mood state through listening to disgusting sounds and reading disgusting descriptions. Results shows that they, when compared to control who have not been induced to feel disgust, are more likely to endorse actions that are emotionally aversive but maximizes utilitarian return The result is analyzed using the 'emotion-as-information' approach to decision making. The result is consistent with the view that emotions play an important role in determining moral judgment.

Keywords: Disgust, mood induction, moral judgment, emotion-as-information.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2295
2508 Physico-Chemical Characteristics of Cement Manufactured with Artificial Pozzolan (Waste Brick)

Authors: A. Naceri, M. Chikouche Hamina, P. Grosseau

Abstract:

The effect of artificial pozzolan (waste brick) on the physico-chemical properties of cement manufactured was investigated. The waste brick is generated by the manufacture of bricks. It was used in the proportions of 0%, 5%, 10%, 15% and 20% by mass of cement to study its effect on the physico-chemical properties of cement incorporating artificial pozzolan. The physicochemical properties of cement at anhydrous state and the hydrated state (chemical composition, specific weight, fineness, consistency of the cement paste and setting times) were studied. The experimental results obtained show that the quantity of pozzolanic admixture (waste brick) of cement manufactured is the principal parameter who influences on the variation of the physico-chemical properties of the cement tested.

Keywords: Artificial pozzolan, waste brick, cement, physicochemicalcharacteristics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1738
2507 A Model to Study the Effect of Na+ ions on Ca2+diffusion under Rapid Buffering Approximation

Authors: Vikas Tewari, K.R. Pardasani

Abstract:

Calcium is very important for communication among the neurons. It is vital in a number of cell processes such as secretion, cell movement, cell differentiation. To reduce the system of reactiondiffusion equations of [Ca2+] into a single equation, two theories have been proposed one is excess buffer approximation (EBA) other is rapid buffer approximation (RBA). The RBA is more realistic than the EBA as it considers both the mobile and stationary endogenous buffers. It is valid near the mouth of the channel. In this work we have studied the effects of different types of buffers on calcium diffusion under RBA. The novel thing studied is the effect of sodium ions on calcium diffusion. The model has been made realistic by considering factors such as variable [Ca2+], [Na+] sources, sodium-calcium exchange protein(NCX), Sarcolemmal Calcium ATPase pump. The proposed mathematical leads to a system of partial differential equations which has been solved numerically to study the relationships between different parameters such as buffer concentration, buffer disassociation rate, calcium permeability. We have used Forward Time Centred Space (FTCS) approach to solve the system of partial differential equations.

Keywords: rapid buffer approximation, sodium-calcium exchangeprotein, Sarcolemmal Calcium ATPase pump, buffer disassociationrate, forward time centred space.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1508
2506 Evolutionary Training of Hybrid Systems of Recurrent Neural Networks and Hidden Markov Models

Authors: Rohitash Chandra, Christian W. Omlin

Abstract:

We present a hybrid architecture of recurrent neural networks (RNNs) inspired by hidden Markov models (HMMs). We train the hybrid architecture using genetic algorithms to learn and represent dynamical systems. We train the hybrid architecture on a set of deterministic finite-state automata strings and observe the generalization performance of the hybrid architecture when presented with a new set of strings which were not present in the training data set. In this way, we show that the hybrid system of HMM and RNN can learn and represent deterministic finite-state automata. We ran experiments with different sets of population sizes in the genetic algorithm; we also ran experiments to find out which weight initializations were best for training the hybrid architecture. The results show that the hybrid architecture of recurrent neural networks inspired by hidden Markov models can train and represent dynamical systems. The best training and generalization performance is achieved when the hybrid architecture is initialized with random real weight values of range -15 to 15.

Keywords: Deterministic finite-state automata, genetic algorithm, hidden Markov models, hybrid systems and recurrent neural networks.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1885
2505 Food Security in India: A Case Study of Kandi Region of Punjab

Authors: Savita Ahlawat, Dhian Kaur

Abstract:

Banishing hunger from the face of earth has been frequently expressed in various international, national and regional level conferences since 1974. Providing food security has become important issue across the world particularly in developing countries. In a developing country like India, where growth rate of population is more than that of the food grains production, food security is a question of great concern. According to the International Food Policy Research Institute's Global Hunger Index, 2011, India ranks 67 of the 81 countries of the world with the worst food security status. After Green Revolution, India became a food surplus country. Its production has increased from 74.23 million tonnes in 1966-67 to 257.44 million tonnes in 2011-12. But after achieving selfsufficiency in food during last three decades, the country is now facing new challenges due to increasing population, climate change, stagnation in farm productivity. Therefore, the main objective of the present paper is to examine the food security situation at national level in the country and further to explain the paradox of food insecurity in a food surplus state of India i.e in Punjab at micro level. In order to achieve the said objectives, secondary data collected from the Ministry of Agriculture and the Agriculture department of Punjab State was analyzed. The result of the study showed that despite having surplus food production the country is still facing food insecurity problem at micro level. Within the Kandi belt of Punjab state, the area adjacent to plains is food secure while the area along the hills falls in food insecure zone. The present paper is divided into following three sections (i) Introduction, (ii) Analysis of food security situation at national level as well as micro level (Kandi belt of Punjab State) (iii) Concluding Observations

Keywords: Availability, consumption, food security, poverty.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6752
2504 Crystalline Model Approach for Studying the Nuclear Properties of Light Nuclei

Authors: A. Amar, O. Hemeda

Abstract:

A study of the structure of the nucleus with the analogy by solid-state physics has been developed. We have used binding energy to calculate R (a parameter that is proportional to the radius of the nucleus) for deuteron, alpha, and 8Be. The calculated parameter r calculated from solid state physics produces a probe for calculation the nuclear radii. 8Be has special attention as it is radioactive nucleus and the latest nucleus to be calculated from crystalline model approach. The distribution of nucleons inside the nucleus is taken to be tetrahedral for 16O. The model has failed to expect the radius of 9Be which is an impression about the modification should be done on the model at near future. A comparison between our calculations and those from literature has been made, and a good agreement has been obtained.

Keywords: The structure of the nucleus, binding energy, crystalline model approach, nuclear radii, tetrahedral for 16O.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 490
2503 Human Face Detection and Segmentation using Eigenvalues of Covariance Matrix, Hough Transform and Raster Scan Algorithms

Authors: J. Prakash, K. Rajesh

Abstract:

In this paper we propose a novel method for human face segmentation using the elliptical structure of the human head. It makes use of the information present in the edge map of the image. In this approach we use the fact that the eigenvalues of covariance matrix represent the elliptical structure. The large and small eigenvalues of covariance matrix are associated with major and minor axial lengths of an ellipse. The other elliptical parameters are used to identify the centre and orientation of the face. Since an Elliptical Hough Transform requires 5D Hough Space, the Circular Hough Transform (CHT) is used to evaluate the elliptical parameters. Sparse matrix technique is used to perform CHT, as it squeeze zero elements, and have only a small number of non-zero elements, thereby having an advantage of less storage space and computational time. Neighborhood suppression scheme is used to identify the valid Hough peaks. The accurate position of the circumference pixels for occluded and distorted ellipses is identified using Bresenham-s Raster Scan Algorithm which uses the geometrical symmetry properties. This method does not require the evaluation of tangents for curvature contours, which are very sensitive to noise. The method has been evaluated on several images with different face orientations.

Keywords: Circular Hough Transform, Covariance matrix, Eigenvalues, Elliptical Hough Transform, Face segmentation, Raster Scan Algorithm.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2506
2502 Application of Building Information Modeling in Energy Management of Individual Departments Occupying University Facilities

Authors: Kung-Jen Tu, Danny Vernatha

Abstract:

To assist individual departments within universities in their energy management tasks, this study explores the application of Building Information Modeling in establishing the ‘BIM based Energy Management Support System’ (BIM-EMSS). The BIM-EMSS consists of six components: (1) sensors installed for each occupant and each equipment, (2) electricity sub-meters (constantly logging lighting, HVAC, and socket electricity consumptions of each room), (3) BIM models of all rooms within individual departments’ facilities, (4) data warehouse (for storing occupancy status and logged electricity consumption data), (5) building energy management system that provides energy managers with various energy management functions, and (6) energy simulation tool (such as eQuest) that generates real time 'standard energy consumptions' data against which 'actual energy consumptions' data are compared and energy efficiency evaluated. Through the building energy management system, the energy manager is able to (a) have 3D visualization (BIM model) of each room, in which the occupancy and equipment status detected by the sensors and the electricity consumptions data logged are displayed constantly; (b) perform real time energy consumption analysis to compare the actual and standard energy consumption profiles of a space; (c) obtain energy consumption anomaly detection warnings on certain rooms so that energy management corrective actions can be further taken (data mining technique is employed to analyze the relation between space occupancy pattern with current space equipment setting to indicate an anomaly, such as when appliances turn on without occupancy); and (d) perform historical energy consumption analysis to review monthly and annually energy consumption profiles and compare them against historical energy profiles. The BIM-EMSS was further implemented in a research lab in the Department of Architecture of NTUST in Taiwan and implementation results presented to illustrate how it can be used to assist individual departments within universities in their energy management tasks.

Keywords: Sensor, electricity sub-meters, database, energy anomaly detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2272
2501 Echo State Networks for Arabic Phoneme Recognition

Authors: Nadia Hmad, Tony Allen

Abstract:

This paper presents an ESN-based Arabic phoneme recognition system trained with supervised, forced and combined supervised/forced supervised learning algorithms. Mel-Frequency Cepstrum Coefficients (MFCCs) and Linear Predictive Code (LPC) techniques are used and compared as the input feature extraction technique. The system is evaluated using 6 speakers from the King Abdulaziz Arabic Phonetics Database (KAPD) for Saudi Arabia dialectic and 34 speakers from the Center for Spoken Language Understanding (CSLU2002) database of speakers with different dialectics from 12 Arabic countries. Results for the KAPD and CSLU2002 Arabic databases show phoneme recognition performances of 72.31% and 38.20% respectively.

Keywords: Arabic phonemes recognition, echo state networks (ESNs), neural networks (NNs), supervised learning.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2402
2500 Graph Codes-2D Projections of Multimedia Feature Graphs for Fast and Effective Retrieval

Authors: Stefan Wagenpfeil, Felix Engel, Paul McKevitt, Matthias Hemmje

Abstract:

Multimedia Indexing and Retrieval is generally de-signed and implemented by employing feature graphs. These graphs typically contain a significant number of nodes and edges to reflect the level of detail in feature detection. A higher level of detail increases the effectiveness of the results but also leads to more complex graph structures. However, graph-traversal-based algorithms for similarity are quite inefficient and computation intensive, espe-cially for large data structures. To deliver fast and effective retrieval, an efficient similarity algorithm, particularly for large graphs, is mandatory. Hence, in this paper, we define a graph-projection into a 2D space (Graph Code) as well as the corresponding algorithms for indexing and retrieval. We show that calculations in this space can be performed more efficiently than graph-traversals due to a simpler processing model and a high level of parallelisation. In consequence, we prove that the effectiveness of retrieval also increases substantially, as Graph Codes facilitate more levels of detail in feature fusion. Thus, Graph Codes provide a significant increase in efficiency and effectiveness (especially for Multimedia indexing and retrieval) and can be applied to images, videos, audio, and text information.

Keywords: indexing, retrieval, multimedia, graph code, graph algorithm

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 431
2499 Investigating the Effectiveness of Iranian Architecture on Sustainable Space Creation

Authors: Mansour Nikpour, Mohsen Ghasemi, Elahe Mosavi, Mohd Zin Kandar

Abstract:

lack of convenience condition is one of the problems in open spaces in hot and dry regions. Nowadays parks and green landscapes was designed and constructed without any attention to convenience condition. If this process continues, Citizens will encounter with some problems. Harsh climatic condition decreases the efficiency of people-s activities. However there is hard environment condition in hot and dry regions, Convenience condition has been provided in Iranian traditional architecture by using techniques and methods. In this research at the first step characteristics of Iranian garden that can effect on creating sustainable spaces were investigated through observation method. Pleasure space in cities will be created with using these methods and techniques in future cities. Furthermore the comparison between Iranian garden and landscape in today-s cities demonstrate the effectiveness of Iranian garden characteristics on sustainable spaces. Iranian architects used simple and available methods for creating open architectural spaces. In addition desirable conditions were provided with taking in to account both physically and spiritually. Parks and landscapes in future cities can be designed and constructed with respect to architectural techniques that used in Iranian gardens in hot and arid regions.

Keywords: Iranian garden, convenience condition, landscape, sustainable

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1839
2498 Resilient Machine Learning in the Nuclear Industry: Crack Detection as a Case Study

Authors: Anita Khadka, Gregory Epiphaniou, Carsten Maple

Abstract:

There is a dramatic surge in the adoption of Machine Learning (ML) techniques in many areas, including the nuclear industry (such as fault diagnosis and fuel management in nuclear power plants), autonomous systems (including self-driving vehicles), space systems (space debris recovery, for example), medical surgery, network intrusion detection, malware detection, to name a few. Artificial Intelligence (AI) has become a part of everyday modern human life. To date, the predominant focus has been developing underpinning ML algorithms that can improve accuracy, while factors such as resiliency and robustness of algorithms have been largely overlooked. If an adversarial attack is able to compromise the learning method or data, the consequences can be fatal, especially but not exclusively in safety-critical applications. In this paper, we present an in-depth analysis of five adversarial attacks and two defence methods on a crack detection ML model. Our analysis shows that it can be dangerous to adopt ML techniques without rigorous testing, since they may be vulnerable to adversarial attacks, especially in security-critical areas such as the nuclear industry. We observed that while the adopted defence methods can effectively defend against different attacks, none of them could protect against all five adversarial attacks entirely.

Keywords: Resilient Machine Learning, attacks, defences, nuclear industry, crack detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 481
2497 Investigating Quality Metrics for Multimedia Traffic in OLSR Routing Protocol

Authors: B. Prabhakara Rao, M. V. H. Bhaskara Murthy

Abstract:

An Ad hoc wireless network comprises of mobile terminals linked and communicating with each other sans the aid of traditional infrastructure. Optimized Link State Protocol (OLSR) is a proactive routing protocol, in which routes are discovered/updated continuously so that they are available when needed. Hello messages generated by a node seeks information about its neighbor and if the latter fails to respond to a specified number of hello messages regulated by neighborhood hold time, the node is forced to assume that the neighbor is not in range. This paper proposes to evaluate OLSR routing protocol in a random mobility network having various neighborhood hold time intervals. The throughput and delivery ratio are also evaluated to learn about its efficiency for multimedia loads.

Keywords: Ad hoc Network, Optimized Link State Routing, Multimedia traffic

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1937
2496 Controller Synthesis of Switched Positive Systems with Bounded Time-Varying Delays

Authors: Xinhui Wang, Xiuyong Ding

Abstract:

This paper addresses the controller synthesis problem of discrete-time switched positive systems with bounded time-varying delays. Based on the switched copositive Lyapunov function approach, some necessary and sufficient conditions for the existence of state-feedback controller are presented as a set of linear programming and linear matrix inequality problems, hence easy to be verified. Another advantage is that the state-feedback law is independent on time-varying delays and initial conditions. A numerical example is provided to illustrate the effectiveness and feasibility of the developed controller.

Keywords: Switched copositive Lyapunov functions, positive linear systems, switched systems, time-varying delays, stabilization.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1433
2495 Globalization and Public Policy Analysis: A Case Study of Foreign Policy of ASEAN Member States

Authors: Nattapol Pourprasert

Abstract:

This study has an objective to analyze foreign policy of member states in globalization current, aiming to answer that the foreign policy of member states have been changed or remained the same and there are any factors affecting changing of foreign policy of the member states. From the study results, it is found that the foreign policy of Thailand is a friendly foreign policy with all states. The policy of Indonesia is more opened because of a change in leader, allowing more democratic development in the country; the government has proceeded with friendly foreign policy with the states in order to bring funds into the state. The foreign policy of Malaysia is not much changed as there is no changing in the leader; the policy of Malaysia has reconciled relations with main city of Indian and Chinese residing in the country in order to bring investments into the country and to relieve tensions in the country. The foreign policy of the Philippines has proceeded with policy under the ASEAN framework and emphasized on international Islam communities. The foreign policy of Singapore has the least changed as the Singapore's policy focuses on internal trade since the state was found. As for the foreign policy of Brunei Darussalam, Brunei has a little role in the international stage; the state having closest relationship as from the view of history is Singapore as the Singaporean has invested in retailing business in Brunei. The foreign policy of Vietnam has emphasized on an omnidirectional foreign policy in order to compete with several states in global stage. The foreign policy of Myanmar has proceeded with a friendly foreign policy with all ASEAN member states, the East-west Corridor transportation line from Myanmar through Thailand and Lao to Vietnam has been developed. As for the foreign policy of Lao, In 2001, the Thai government and Lao government held a discussion which Thailand reaffirmed the position not to support the anti-Lao group. The foreign policy of Cambodia has proceeded with more openness, having good relation with China, Russia and USA as these states has invested in the state, especially the US company.

Keywords: Globalization, Public Policy Analysis, Foreign Policy, ASEAN Member States.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1899
2494 An Integrated Natural Language Processing Approach for Conversation System

Authors: Zhi Teng, Ye Liu, Fuji Ren

Abstract:

The main aim of this research is to investigate a novel technique for implementing a more natural and intelligent conversation system. Conversation systems are designed to converse like a human as much as their intelligent allows. Sometimes, we can think that they are the embodiment of Turing-s vision. It usually to return a predetermined answer in a predetermined order, but conversations abound with uncertainties of various kinds. This research will focus on an integrated natural language processing approach. This approach includes an integrated knowledge-base construction module, a conversation understanding and generator module, and a state manager module. We discuss effectiveness of this approach based on an experiment.

Keywords: Conversation System, integrated knowledge-base construction, conversation understanding and generator, state manager

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1724
2493 Testing Loaded Programs Using Fault Injection Technique

Authors: S. Manaseer, F. A. Masooud, A. A. Sharieh

Abstract:

Fault tolerance is critical in many of today's large computer systems. This paper focuses on improving fault tolerance through testing. Moreover, it concentrates on the memory faults: how to access the editable part of a process memory space and how this part is affected. A special Software Fault Injection Technique (SFIT) is proposed for this purpose. This is done by sequentially scanning the memory of the target process, and trying to edit maximum number of bytes inside that memory. The technique was implemented and tested on a group of programs in software packages such as jet-audio, Notepad, Microsoft Word, Microsoft Excel, and Microsoft Outlook. The results from the test sample process indicate that the size of the scanned area depends on several factors. These factors are: process size, process type, and virtual memory size of the machine under test. The results show that increasing the process size will increase the scanned memory space. They also show that input-output processes have more scanned area size than other processes. Increasing the virtual memory size will also affect the size of the scanned area but to a certain limit.

Keywords: Complex software systems, Error detection, Fault tolerance, Injection and testing methodology, Memory faults, Process and virtual memory.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1877
2492 In situ Observation of the State and Stability of Hemoglobin Adsorbed onto Glass Surface by Slab Optical Waveguide (SOWG) Spectroscopy

Authors: Masayoshi Matsui, Akiko Nakahara, Akiko Takatsu, Kenji Kato, Naoki Matsuda

Abstract:

The state and stability of hemoglobin adsorbed on the glass surface was investigated using slab optical waveguide (SOWG) spectroscopy. The peak position of the absorption band of hemoglobin adsorbed on the glass surface was same as that of the hemoglobin in solution. This result suggests that no significant denaturation occurred by adsorption. The adsorption of hemoglobin is relatively strong that the hemoglobin molecules even remained adsorbed after rinsing the cell with buffer solution. The peak shift caused by the reduction of adsorbed hemoglobin was also observed.

Keywords: hemoglobin, reduction, slab optical waveguide spectroscopy, solid/liquid interface.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1609
2491 Child Abuse: Emotional, Physical, Neglect, Sexual and the Psychological Effects: A Case Scenario in Lagos State, Nigeria

Authors: Ololade M. Aminu

Abstract:

Child abuse is a significant issue worldwide, affecting the socio-development and mental and physical health of young individuals. It is the maltreatment of a child by an adult or a child. This paper focuses on child abuse in Communities in Lagos State, Nigeria. The aim of this study is to investigate the extent of child abuse and its impact on the mood, social activities, self-worth, concentration, and academic performance of children in Communities in Lagos State. The primary research instrument used in this study was the interview (Forensic), which consisted of two sections. The first section gathered data on the details of the child and the forms and impacts of abuse experienced, while the second section focused on family structure and parental style. The study found that children who experienced various forms of abuse, such as emotional, neglect, physical, or sexual abuse, were hesitant to report it out of fear of threats or even death from the abuser. These abused children displayed withdrawn behaviour, depression, and low self-worth and underperformed academically compared to their peers who did not experience abuse. The findings align with socio-learning theory and intergenerational transmission of violence, which suggest that parents and caregivers who engage in child abuse often do so because they themselves experienced or witnessed abuse as children, thereby normalizing violence. The study highlights the prevalent issue of child abuse in Lagos State and emphasizes the need for advocacy programs and capacity building to raise awareness about child abuse and prevention. The distribution of the Child’s Rights Act/Child’s Right Law in various sectors is also recommended to underscore the importance of protecting the rights of children. Additionally, the inclusion of courses on child abuse in the school curriculum is proposed to ensure children are educated on recognizing and reporting abuse.

Keywords: Child abuse, physical ill-treatment, neglect, parental style, psychological effect, sexual offence, reporting.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 73
2490 Small Entrepreneurship Supporting Economic Policy in Georgia

Authors: G. Erkomaishvili

Abstract:

This paper discusses small entrepreneurship development strategy in Georgia and the tools and regulations that will encourage development of small entrepreneurship. The current situation in the small entrepreneurship sector, as well as factors affecting growth and decline in the sector and the priorities of state support, are studied and analyzed. The objective of this research is to assess the current situation of the sector to highlight opportunities and reveal the gaps. State support of small entrepreneurship should become a key priority in the country’s economic policy, as development of the sector will ensure social, economic and political stability. Based on the research, a small entrepreneurship development strategy is presented; corresponding conclusions are made and recommendations are developed.

Keywords: Economic policy for small entrepreneurship development, small entrepreneurship, regulations, small entrepreneurship development strategy.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1913
2489 Proton Radius Calculation for Muonic Hydrogen 2S-2P Transition Experiment

Authors: Jing-Gang Xie

Abstract:

Scientists are making attempts to solve proton radius puzzle. In this paper, the calculated value matches the experiment observation within 0.1%, compared to those obtained from CODATA, and muonic hydrogen scattering experiments of 4%. The calculation is made based on the assumption that the muonic hydrogen system has (Ep – Eµ) energy state (or frequency mix state of np –nµ), which interacts resonantly with the incoming photon of energy 206.2949(32) meV. A similar calculation is also made for muonic deuterium 2S-2P transition experiment with an accuracy of 1% from the experimental observation. The paper has also explored the theoretical as well as experimentation advancements that have led towards the development of results with lesser deviations.

Keywords: 2s-2p transition, muonic hydrogen, proton radius, scattering experiment, photon, quantum, Lamb shift.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 710
2488 Sonic Localization Cues for Classrooms: A Structural Model Proposal

Authors: Abhijit Mitra, C. Ardil

Abstract:

We investigate sonic cues for binaural sound localization within classrooms and present a structural model for the same. Two of the primary cues for localization, interaural time difference (ITD) and interaural level difference (ILD) created between the two ears by sounds from a particular point in space, are used. Although these cues do not lend any information about the elevation of a sound source, the torso, head, and outer ear carry out elevation dependent spectral filtering of sounds before they reach the inner ear. This effect is commonly captured in head related transfer function (HRTF) which aids in resolving the ambiguity from the ITDs and ILDs alone and helps localize sounds in free space. The proposed structural model of HRTF produces well controlled horizontal as well as vertical effects. The implemented HRTF is a signal processing model which tries to mimic the physical effects of the sounds interacting with different parts of the body. The effectiveness of the method is tested by synthesizing spatial audio, in MATLAB, for use in listening tests with human subjects and is found to yield satisfactory results in comparison with existing models.

Keywords: Auditory localization, Binaural sound, Head related impulse response, Head related transfer function, Interaural level difference, Interaural time difference, Localization cues.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1722
2487 Comparative Analysis of Various Multiuser Detection Techniques in SDMA-OFDM System Over the Correlated MIMO Channel Model for IEEE 802.16n

Authors: Susmita Das, Kala Praveen Bagadi

Abstract:

SDMA (Space-Division Multiple Access) is a MIMO (Multiple-Input and Multiple-Output) based wireless communication network architecture which has the potential to significantly increase the spectral efficiency and the system performance. The maximum likelihood (ML) detection provides the optimal performance, but its complexity increases exponentially with the constellation size of modulation and number of users. The QR decomposition (QRD) MUD can be a substitute to ML detection due its low complexity and near optimal performance. The minimum mean-squared-error (MMSE) multiuser detection (MUD) minimises the mean square error (MSE), which may not give guarantee that the BER of the system is also minimum. But the minimum bit error rate (MBER) MUD performs better than the classic MMSE MUD in term of minimum probability of error by directly minimising the BER cost function. Also the MBER MUD is able to support more users than the number of receiving antennas, whereas the rest of MUDs fail in this scenario. In this paper the performance of various MUD techniques is verified for the correlated MIMO channel models based on IEEE 802.16n standard.

Keywords: Multiple input multiple output, multiuser detection, orthogonal frequency division multiplexing, space division multiple access, Bit error rate

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1916
2486 A Functional Interpretation of Quantum Theory

Authors: Hans H. Diel

Abstract:

In this paper a functional interpretation of quantum theory (QT) with emphasis on quantum field theory (QFT) is proposed. Besides the usual statements on relations between a functions initial state and final state, a functional interpretation also contains a description of the dynamic evolution of the function. That is, it describes how things function. The proposed functional interpretation of QT/QFT has been developed in the context of the author-s work towards a computer model of QT with the goal of supporting the largest possible scope of QT concepts. In the course of this work, the author encountered a number of problems inherent in the translation of quantum physics into a computer program. He came to the conclusion that the goal of supporting the major QT concepts can only be satisfied, if the present model of QT is supplemented by a "functional interpretation" of QT/QFT. The paper describes a proposal for that

Keywords: Computability, Foundation of Quantum Mechanics, Measurement Problem, Models of Physics.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2029
2485 A New Efficient RNS Reverse Converter for the 4-Moduli Set 

Authors: Edem K. Bankas, Kazeem A. Gbolagade

Abstract:

In this paper, we propose a new efficient reverse converter for the 4-moduli set {2n, 2n + 1, 2n 1, 22n+1 1} based on a modified Chinese Remainder Theorem and Mixed Radix Conversion. Additionally, the resulting architecture is further reduced to obtain a reverse converter that utilizes only carry save adders, a multiplexer and carry propagate adders. The proposed converter has an area cost of (12n + 2) FAs and (5n + 1) HAs with a delay of (9n + 6)tFA + tMUX. When compared with state of the art, our proposal demonstrates to be faster, at the expense of slightly more hardware resources. Further, the Area-Time square metric was computed which indicated that our proposed scheme outperforms the state of the art reverse converter.

Keywords: Modified Chinese Remainder Theorem, Mixed Radix Conversion, Reverse Converter, Carry Save Adder, Carry Propagate Adder.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2311