Search results for: Access point
1657 Time Map
Authors: A. Peveri
Abstract:
The interaction of mass will determine the curvature of space-time, may determine that events proceed at different rates of time at each point in space, so each has a corresponding gravitational potential time. So we can find different values of gravity (g), corresponding to different times (t), thus making a "map of time in space." The space-time is curved by present mass, causing a force of attraction towards the body, but if you invest the curvature of space-time, we find that this field is repulsive: Obtaining negative gravitational forces and positive gravitational forces respectively.
Keywords: Space-time, time, positive gravitation, negative gravitation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 15191656 The Prospects and Challenges of Open Learning and Distance Education in Malawi
Authors: Andrew Chimpololo
Abstract:
Open and distance learning is a fairly new concept in Malawi. The major public provider, the Malawi College of Distance Education, rolled out its activities only about 40 years ago. Over the years, the demand for distance education has tremendously increased. The present government has displayed positive political will to uplift ODL as outlined in the Malawi Growth and Development Strategy as well as the National Education Sector Plan. A growing national interest in education coupled with political stability and a booming ICT industry also raise hope for success. However, a fragile economy with a GNI per capita of -US$ 200 over the last decade, poor public funding, erratic power supply and lack of expertise put strain on efforts towards the promotion of ODL initiatives. Despite the challenges, the nation appears determined to go flat out and explore all possible avenues that could revolutionise education access and equity through ODL.Keywords: challenges, distance education, Malawi, openlearning, prospects.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 37201655 High Performance of Hollow Fiber Supported Liquid Membrane to Separate Silver Ions from Medicinal Wastewater
Authors: Thidarat Wongsawa, Ura Pancharoen, Anchaleeporn Waritswat Lothongkum
Abstract:
The separation of silver ions from medicinal wastewater via hollow fiber supported liquid membrane (HFSLM) was examined to promote the performance of this technique. The wastewater consisting of 30mg/L silver ions and 120mg/L ferric ions was used as the feed solution. LIX84I dissolving in kerosene and sodium thiosulfate pentahydrate solution were used as the liquid membrane and stripping solution, respectively. In order to access the highest performance of HFSLM, the optimum condition was investigated via several influential variables. Final concentration of silver ions in feed solution was obtained 0.2mg/L which was lower than the discharge limit of Thailand’s mandatory.
Keywords: Hollow fiber, Liquid membrane, Separation, Silver ions.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 20271654 Two Fourth-order Iterative Methods Based on Continued Fraction for Root-finding Problems
Authors: Shengfeng Li, Rujing Wang
Abstract:
In this paper, we present two new one-step iterative methods based on Thiele-s continued fraction for solving nonlinear equations. By applying the truncated Thiele-s continued fraction twice, the iterative methods are obtained respectively. Analysis of convergence shows that the new methods are fourth-order convergent. Numerical tests verifying the theory are given and based on the methods, two new one-step iterations are developed.Keywords: Iterative method, Fixed-point iteration, Thiele's continued fraction, Order of convergence.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18821653 Real-Time Visualization Using GPU-Accelerated Filtering of LiDAR Data
Authors: Sašo Pečnik, Borut Žalik
Abstract:
This paper presents a real-time visualization technique and filtering of classified LiDAR point clouds. The visualization is capable of displaying filtered information organized in layers by the classification attribute saved within LiDAR datasets. We explain the used data structure and data management, which enables real-time presentation of layered LiDAR data. Real-time visualization is achieved with LOD optimization based on the distance from the observer without loss of quality. The filtering process is done in two steps and is entirely executed on the GPU and implemented using programmable shaders.
Keywords: Filtering, graphics, level-of-details, LiDAR, realtime visualization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 25451652 Designing of Virtual Laboratories Based on Extended Event Driving Simulation Method
Abstract:
Here are many methods for designing and implementation of virtual laboratories, because of their special features. The most famous architectural designs are based on the events. This model of architecting is so efficient for virtual laboratories implemented on a local network. Later, serviceoriented architecture, gave the remote access ability to them and Peer-To-Peer architecture, hired to exchanging data with higher quality and more speed. Other methods, such as Agent- Based architecting, are trying to solve the problems of distributed processing in a complicated laboratory system. This study, at first, reviews the general principles of designing a virtual laboratory, and then compares the different methods based on EDA, SOA and Agent-Based architecting to present weaknesses and strengths of each method. At the end, we make the best choice for design, based on existing conditions and requirements.Keywords: Virtual Laboratory, Software Engineering, Simulation, EDA, SOA, Agent-Based Architecting.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16001651 Anti-Social Networking?
Authors: Jarrod Trevathan, Trina Myers
Abstract:
Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples- personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can arise through undisciplined use and/or misuse of social media. We specifically address identity theft, misrepresentation of information posted, cyber bullying, children and social networking, and social networking in the work place. Recommendations are provided for how to reduce the risk of being the victim of a crime or engaging in embarrassing behavior that could irrevocably harm one-s reputation either professionally or personally. We also discuss what responsibilities social networking companies have to protect their users and also what law enforcement and policy makers can do to help alleviate the problems.
Keywords: Identity theft, misrepresentation, cyber bullying, online scams.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 21491650 Telemedicine and Medical Informatics: The Global Approach
Authors: F. Lievens, M. Jordanova
Abstract:
Telemedicine is brought to life by contemporary changes of our world and summarizes the entire range of services that are at the crossroad of traditional healthcare and information technology. It is believed that eHealth can help in solving critical issues of rising costs, care for ageing and housebound population, staff shortage. It is a feasible tool to provide routine as well as specialized health service as it has the potential to improve both the access to and the standard of care. eHealth is no more an optional choice. It has already made quite a way but it still remains a fantastic challenge for the future requiring cooperation and coordination at all possible levels. The strategic objectives of this paper are: 1. To start with an attempt to clarify the mass of terms used nowadays; 2. To answer the question “Who needs eHealth"; 3. To focus on the necessity of bridging telemedicine and medical (health) informatics as well as on the dual relationship between them; as well as 4. To underline the need of networking in understanding, developing and implementing eHealth.
Keywords: E-Health/telemedicine, networking, medical informatics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24111649 Parametric Optimization of Hospital Design
Authors: M. K. Holst, P. H. Kirkegaard, L. D. Christoffersen
Abstract:
Present paper presents a parametric performancebased design model for optimizing hospital design. The design model operates with geometric input parameters defining the functional requirements of the hospital and input parameters in terms of performance objectives defining the design requirements and preferences of the hospital with respect to performances. The design model takes point of departure in the hospital functionalities as a set of defined parameters and rules describing the design requirements and preferences.Keywords: Architectural Layout Design, Hospital Design, Parametric design, Performance-based models.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 27191648 The Digital Filing Cabinet–A GIS Based Management Solution Tool for the Land Surveyor and Engineer
Authors: A. Giraldo, A. Lapatka, A. Namyslak, S. Pilny, J. B. Miima
Abstract:
This paper explains how the New Jersey Institute of Technology surveying student team members designed and created an interactive GIS map, the purpose of which is to be useful to the land surveyor and engineer for project management. This was achieved by building a research and storage database that can be easily integrated into any land surveyor’s current operations through the use of ArcGIS 10, Arc Catalog, and AutoCAD. This GIS database allows for visual representation and information querying for multiple job sites, and simple access to uploaded data, which is geospatially referenced to each individual job site or project. It can also be utilized by engineers to determine design criteria, or to store important files. This cost-effective approach to a surveying map not only saves time, but saves physical storage space and paper resources.
Keywords: Data Storage, GIS, Land Surveying, Mapping.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19161647 Calculation of the Thermal Stresses in an Elastoplastic Plate Heated by Local Heat Source
Authors: M. Khaing, A. V. Tkacheva
Abstract:
The work is devoted to solving the problem of temperature stresses, caused by the heating point of the round plate. The plate is made of elastoplastic material, so the Prandtl-Reis model is used. A piecewise-linear condition of the Ishlinsky-Ivlev flow is taken as the loading surface, in which the yield stress depends on the temperature. Piecewise-linear conditions (Treska or Ishlinsky-Ivlev), in contrast to the Mises condition, make it possible to obtain solutions of the equilibrium equation in an analytical form. In the problem under consideration, using the conditions of Tresca, it is impossible to obtain a solution. This is due to the fact that the equation of equilibrium ceases to be satisfied when the two Tresca conditions are fulfilled at once. Using the conditions of plastic flow Ishlinsky-Ivlev allows one to solve the problem. At the same time, there are also no solutions on the edge of the Ishlinsky-Ivlev hexagon in the plane-stressed state. Therefore, the authors of the article propose to jump from the edge to the edge of the mine edge, which gives an opportunity to obtain an analytical solution. At the same time, there is also no solution on the edge of the Ishlinsky-Ivlev hexagon in a plane stressed state; therefore, in this paper, the authors of the article propose to jump from the side to the side of the mine edge, which gives an opportunity to receive an analytical solution. The paper compares solutions of the problem of plate thermal deformation. One of the solutions was obtained under the condition that the elastic moduli (Young's modulus, Poisson's ratio) which depend on temperature. The yield point is assumed to be parabolically temperature dependent. The main results of the comparisons are that the region of irreversible deformation is larger in the calculations obtained for solving the problem with constant elastic moduli. There is no repeated plastic flow in the solution of the problem with elastic moduli depending on temperature. The absolute value of the irreversible deformations is higher for the solution of the problem in which the elastic moduli are constant; there are also insignificant differences in the distribution of the residual stresses.Keywords: Temperature stresses, elasticity, plasticity, Ishlinsky-Ivlev condition, plate, annular heating, elastic moduli.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 7281646 Meta-reasoning for Multi-agent Communication of Semantic Web Information
Authors: Visit Hirankitti, Vuong Tran Xuan
Abstract:
Meta-reasoning is essential for multi-agent communication. In this paper we propose a framework of multi-agent communication in which agents employ meta-reasoning to reason with agent and ontology locations in order to communicate semantic information with other agents on the semantic web and also reason with multiple distributed ontologies. We shall argue that multi-agent communication of Semantic Web information cannot be realized without the need to reason with agent and ontology locations. This is because for an agent to be able to communicate with another agent, it must know where and how to send a message to that agent. Similarly, for an agent to be able to reason with an external semantic web ontology, it must know where and how to access to that ontology. The agent framework and its communication mechanism are formulated entirely in meta-logic.
Keywords: Semantic Web, agent communication, ontologies.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16561645 Rule-Based Message Passing for Collaborative Application in Distributed Environments
Authors: Wataru Yamazaki, Hironori Hiraishi, Fumio Mizoguchi
Abstract:
In this paper, we describe a rule-based message passing method to support developing collaborative applications, in which multiple users share resources in distributed environments. Message communications of applications in collaborative environments tend to be very complex because of the necessity to manage context situations such as sharing events, access controlling of users, and network places. In this paper, we propose a message communications method based on unification of artificial intelligence and logic programming for defining rules of such context information in a procedural object-oriented programming language. We also present an implementation of the method as java classes.
Keywords: agent programming, logic programming, multi-media application, collaborative application.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 14321644 Usability Issues of Smart Phone Applications: For Visually Challenged People
Authors: Anam Ashraf, Arif Raza
Abstract:
In this era of globalization, adoption of technology is quite difficult for people with physical disabilities compared to people with normal abilities. The advancement in mobile based accessible applications have opened up several different avenues for the visually challenged across the globe. Smartphones applications are not very common for blind people, but they access and use these applications in their daily lives to some extent. Several smartphone applications have a number of usability issues for the visually impaired. In this paper, we evaluate the usability of various android & iPhone applications for blind people through analysis and surveys. This paper aspires to provide guidance in order to increase smartphone application accessibility for the visually impaired. An abstract application design is also proposed to overcome usability issues in smartphone applications for visually challenged people.
Keywords: Eyes-free shell, human computer interaction, usability engineering, visually challenged.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 51891643 Parental Attitudes as a Predictor of Cyber Bullying among Primary School Children
Authors: Bülent Dilmaç, Didem Aydoğan
Abstract:
Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Keywords: Cyber bullying, cyber victim, parental attitudes, primary school students.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 38671642 A Computational Model of Minimal Consciousness Functions
Authors: Nabila Charkaoui
Abstract:
Interest in Human Consciousness has been revived in the late 20th century from different scientific disciplines. Consciousness studies involve both its understanding and its application. In this paper, a computational model of the minimum consciousness functions necessary in my point of view for Artificial Intelligence applications is presented with the aim of improving the way computations will be made in the future. In section I, human consciousness is briefly described according to the scope of this paper. In section II, a minimum set of consciousness functions is defined - based on the literature reviewed - to be modelled, and then a computational model of these functions is presented in section III. In section IV, an analysis of the model is carried out to describe its functioning in detail.
Keywords: Consciousness, perception, attention.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18911641 Development of an Autonomous Greenhouse Gas Monitoring System
Authors: Breda M. Kiernan, Cormac Fay, Stephen Beirne, Dermot Diamond
Abstract:
This paper describes the designs of a first and second generation autonomous gas monitoring system and the successful field trial of the final system (2nd generation). Infrared sensing technology is used to detect and measure the greenhouse gases methane (CH4) and carbon dioxide (CO2) at point sources. The ability to monitor real-time events is further enhanced through the implementation of both GSM and Bluetooth technologies to communicate these data in real-time. These systems are robust, reliable and a necessary tool where the monitoring of gas events in real-time are needed.Keywords: Environmental monitoring, infrared sensing, autonomous system.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 22521640 A Method of Protecting Relational Databases Copyright with Cloud Watermark
Authors: Yong ZHANG, Xiamu NIU, Dongning ZHAO
Abstract:
With the development of Internet and databases application techniques, the demand that lots of databases in the Internet are permitted to remote query and access for authorized users becomes common, and the problem that how to protect the copyright of relational databases arises. This paper simply introduces the knowledge of cloud model firstly, includes cloud generators and similar cloud. And then combined with the property of the cloud, a method of protecting relational databases copyright with cloud watermark is proposed according to the idea of digital watermark and the property of relational databases. Meanwhile, the corresponding watermark algorithms such as cloud watermark embedding algorithm and detection algorithm are proposed. Then, some experiments are run and the results are analyzed to validate the correctness and feasibility of the watermark scheme. In the end, the foreground of watermarking relational database and its research direction are prospected.Keywords: cloud watermark, copyright protection, digitalwatermark, relational database
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19151639 A New Sufficient Conditions of Stability for Discrete Time Non-autonomous Delayed Hopfield Neural Networks
Authors: Adnene Arbi, Chaouki Aouiti, Abderrahmane Touati
Abstract:
In this paper, we consider the uniform asymptotic stability, global asymptotic stability and global exponential stability of the equilibrium point of discrete Hopfield neural networks with delays. Some new stability criteria for system are derived by using the Lyapunov functional method and the linear matrix inequality approach, for estimating the upper bound of Lyapunov functional derivative.
Keywords: Hopfield neural networks, uniform asymptotic stability, global asymptotic stability, exponential stability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 19701638 Determining the Workability of the New Metallurgical Materials
Authors: Ondrej Dupala, Josef Brychta, Robert Cep, Adam Janasek
Abstract:
The aim of this paper is to experimentally discover the workability coefficient of the Inconel 718 material by using a slide turning machining. Two different types of cutting inserts, one made of carbide and the other one made of ceramic, are being used. The purpose is to compare measured results and recommend the appropriate materials and cutting parameters for a machining of the Inconel 718. Furthermore, the durability of inserts with the chosen wear criterion is being compared for different cutting speeds. Machinability of these materials is a crucial characteristic as it allows us to shorten the technological cycle time and increase the machining productivity. And this is of great importance from an economic point of view.
Keywords: Workability, Inconel 718, Turning Machining, Durability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16431637 Error Propagation in the RK5GL3 Method
Authors: J.S.C. Prentice
Abstract:
The RK5GL3 method is a numerical method for solving initial value problems in ordinary differential equations, and is based on a combination of a fifth-order Runge-Kutta method and 3-point Gauss-Legendre quadrature. In this paper we describe the propagation of local errors in this method, and show that the global order of RK5GL3 is expected to be six, one better than the underlying Runge- Kutta method.Keywords: RK5GL3, RKrGLm, Runge-Kutta, Gauss-Legendre, initial value problem, order, local error, global error.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 12111636 Effect of Iterative Algorithm on the Performance of MC-CDMA System with Nonlinear Models of HPA
Authors: R. Blicha
Abstract:
High Peak to Average Power Ratio (PAPR) of the transmitted signal is a serious problem in multicarrier systems (MC), such as Orthogonal Frequency Division Multiplexing (OFDM), or in Multi-Carrier Code Division Multiple Access (MC-CDMA) systems, due to large number of subcarriers. This effect is possible reduce with some PAPR reduction techniques. Spreading sequences at the presence of Saleh and Rapp models of high power amplifier (HPA) have big influence on the behavior of system. In this paper we investigate the bit-error-rate (BER) performance of MC-CDMA systems. Basically we can see from simulations that the MC-CDMA system with Iterative algorithm can be providing significantly better results than the MC-CDMA system. The results of our analyses are verified via simulation.
Keywords: MC-CDMA, Iterative algorithm, PAPR, BER, Saleh, Rapp, Spreading Sequences.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 23781635 Numerical Simulation of a Solar Photovoltaic Panel Cooled by a Forced Air System
Authors: D. Nebbali, R. Nebbali, A. Ouibrahim
Abstract:
This study focuses on the cooling of a photovoltaic panel (PV). Indeed, the cooling improves the conversion capacity of this one and maintains, under extreme conditions of air temperature, the panel temperature at an appreciable level which avoids the altering. To do this, a fan provides forced circulation of air. Because the fan is supplied by the panel, it is necessary to determine the optimum operating point that unites efficiency of the PV with the consumption of the fan. For this matter, numerical simulations are performed at varying mass flow rates of air, under two extreme air temperatures (50°C, 25°C) and a fixed solar radiation (1000W.m2) in a case of no wind.
Keywords: Energy conversion, efficiency, balance energy, solar cell.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 24791634 Academic Staff Perceptions of the Value of the Elements of an Online Learning Environment
Authors: Stuart Palmer, Dale Holt
Abstract:
Based on 276 responses from academic staff in an evaluation of an online learning environment (OLE), this paper identifies those elements of the OLE that were most used and valued by staff, those elements of the OLE that staff most wanted to see improved, and those factors that most contributed to staff perceptions that the use of the OLE enhanced their teaching. The most used and valued elements were core functions, including accessing unit information, accessing lecture/tutorial/lab notes, and reading online discussions. The elements identified as most needing attention related to online assessment: submitting assignments, managing assessment items, and receiving feedback on assignments. Staff felt that using the OLE enhanced their teaching when they were satisfied that their students were able to access and use their learning materials, and when they were satisfied with the professional development they received and were confident with their ability to teach with the OLE.Keywords: Academic staff, Distance education, Evaluation, Online learning environment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16431633 Analysis on Fractals in Intuitionistic Fuzzy Metric Spaces
Authors: R. Uthayakumar, D. Easwaramoorthy
Abstract:
This paper investigates the fractals generated by the dynamical system of intuitionistic fuzzy contractions in the intuitionistic fuzzy metric spaces by generalizing the Hutchinson-Barnsley theory. We prove some existence and uniqueness theorems of fractals in the standard intuitionistic fuzzy metric spaces by using the intuitionistic fuzzy Banach contraction theorem. In addition to that, we analyze some results on intuitionistic fuzzy fractals in the standard intuitionistic fuzzy metric spaces with respect to the Hausdorff intuitionistic fuzzy metrics.Keywords: Fractal Analysis, Fixed Point, Contraction, Iterated Function System, Intuitionistic Fuzzy Metric Space.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 18521632 A Holistic Approach for Technical Product Optimization
Authors: H. Lang, M. Bader, A. Buchroithner
Abstract:
Holistic methods covering the development process as a whole – e.g. systems engineering – have established themselves in product design. However, technical product optimization, representing improvements in efficiency and/or minimization of loss, usually applies to single components of a system. A holistic approach is being defined based on a hierarchical point of view of systems engineering. This is subsequently presented using the example of an electromechanical flywheel energy storage system for automotive applications.Keywords: Design, product development, product optimization, systems engineering, flywheel energy storage.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 26521631 Meta-Classification using SVM Classifiers for Text Documents
Authors: Daniel I. Morariu, Lucian N. Vintan, Volker Tresp
Abstract:
Text categorization is the problem of classifying text documents into a set of predefined classes. In this paper, we investigated three approaches to build a meta-classifier in order to increase the classification accuracy. The basic idea is to learn a metaclassifier to optimally select the best component classifier for each data point. The experimental results show that combining classifiers can significantly improve the accuracy of classification and that our meta-classification strategy gives better results than each individual classifier. For 7083 Reuters text documents we obtained a classification accuracies up to 92.04%.Keywords: Meta-classification, Learning with Kernels, Support Vector Machine, and Performance Evaluation.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 16161630 Two-Phase Optimization for Selecting Materialized Views in a Data Warehouse
Authors: Jiratta Phuboon-ob, Raweewan Auepanwiriyakul
Abstract:
A data warehouse (DW) is a system which has value and role for decision-making by querying. Queries to DW are critical regarding to their complexity and length. They often access millions of tuples, and involve joins between relations and aggregations. Materialized views are able to provide the better performance for DW queries. However, these views have maintenance cost, so materialization of all views is not possible. An important challenge of DW environment is materialized view selection because we have to realize the trade-off between performance and view maintenance. Therefore, in this paper, we introduce a new approach aimed to solve this challenge based on Two-Phase Optimization (2PO), which is a combination of Simulated Annealing (SA) and Iterative Improvement (II), with the use of Multiple View Processing Plan (MVPP). Our experiments show that 2PO outperform the original algorithms in terms of query processing cost and view maintenance cost.Keywords: Data warehouse, materialized views, view selectionproblem, two-phase optimization.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 17051629 Pre-Service EFL Teachers' Perceptions of Written Corrective Feedback in a Wiki-Based Environment
Authors: Mabel Ortiz, Claudio Díaz
Abstract:
This paper explores Chilean pre-service teachers' perceptions about the provision of corrective feedback in a wiki environment during the collaborative writing of an argumentative essay. After conducting a semi-structured interview on 22 participants, the data were processed through the content analysis technique. The results show that students have positive perceptions about corrective feedback, provided through a wiki virtual environment, which in turn facilitates feedback provision and impacts language learning effectively. Some of the positive perceptions about virtual feedback refer to permanent access, efficiency, simultaneous revision and immediacy. It would then be advisable to integrate wiki-based feedback as a methodology for the language classroom and collaborative writing tasks.
Keywords: Argumentative essay, focused corrective feedback, perception, wiki environment.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 9861628 Concurrency without Locking in Parallel Hash Structures used for Data Processing
Authors: Ákos Dudás, Sándor Juhász
Abstract:
Various mechanisms providing mutual exclusion and thread synchronization can be used to support parallel processing within a single computer. Instead of using locks, semaphores, barriers or other traditional approaches in this paper we focus on alternative ways for making better use of modern multithreaded architectures and preparing hash tables for concurrent accesses. Hash structures will be used to demonstrate and compare two entirely different approaches (rule based cooperation and hardware synchronization support) to an efficient parallel implementation using traditional locks. Comparison includes implementation details, performance ranking and scalability issues. We aim at understanding the effects the parallelization schemes have on the execution environment with special focus on the memory system and memory access characteristics.Keywords: Lock-free synchronization, mutual exclusion, parallel hash tables, parallel performance
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1821