Search results for: human language technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14556

Search results for: human language technologies

11556 Organizational Innovations of the 20th Century as High Tech of the 21st: Evidence from Patent Data

Authors: Valery Yakubovich, Shuping wu

Abstract:

Organization theorists have long claimed that organizational innovations are nontechnological, in part because they are unpatentable. The claim rests on the assumption that organizational innovations are abstract ideas embodied in persons and contexts rather than in context-free practical tools. However, over the last three decades, organizational knowledge has been increasingly embodied in digital tools which, in principle, can be patented. To provide the first empirical evidence regarding the patentability of organizational innovations, we trained two machine learning algorithms to identify a population of 205,434 patent applications for organizational technologies (OrgTech) and, among them, 141,285 applications that use organizational innovations accumulated over the 20th century. Our event history analysis of the probability of patenting an OrgTech invention shows that ideas from organizational innovations decrease the probability of patent allowance unless they describe a practical tool. We conclude that the present-day digital transformation places organizational innovations in the realm of high tech and turns the debate about organizational technologies into the challenge of designing practical organizational tools that embody big ideas about organizing. We outline an agenda for patent-based research on OrgTech as an emerging phenomenon.

Keywords: organizational innovation, organizational technology, high tech, patents, machine learning

Procedia PDF Downloads 116
11555 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 85
11554 Unraveling Language Contact through Syntactic Dynamics of ‘Also’ in Hong Kong and Britain English

Authors: Xu Zhang

Abstract:

This article unveils an indicator of language contact between English and Cantonese in one of the Outer Circle Englishes, Hong Kong (HK) English, through an empirical investigation into 1000 tokens from the Global Web-based English (GloWbE) corpus, employing frequency analysis and logistic regression analysis. It is perceived that Cantonese and general Chinese are contextually marked by an integral underlying thinking pattern. Chinese speakers exhibit a reliance on semantic context over syntactic rules and lexical forms. This linguistic trait carries over to their use of English, affording greater flexibility to formal elements in constructing English sentences. The study focuses on the syntactic positioning of the focusing subjunct ‘also’, a linguistic element used to add new or contrasting prominence to specific sentence constituents. The English language generally allows flexibility in the relative position of 'also’, while there is a preference for close marking relationships. This article shifts attention to Hong Kong, where Cantonese and English converge, and 'also' finds counterparts in Cantonese ‘jaa’ and Mandarin ‘ye’. Employing a corpus-based data-driven method, we investigate the syntactic position of 'also' in both HK and GB English. The study aims to ascertain whether HK English exhibits a greater 'syntactic freedom,' allowing for a more distant marking relationship with 'also' compared to GB English. The analysis involves a random extraction of 500 samples from both HK and GB English from the GloWbE corpus, forming a dataset (N=1000). Exclusions are made for cases where 'also' functions as an additive conjunct or serves as a copulative adverb, as well as sentences lacking sufficient indication that 'also' functions as a focusing particle. The final dataset comprises 820 tokens, with 416 for GB and 404 for HK, annotated according to the focused constituent and the relative position of ‘also’. Frequency analysis reveals significant differences in the relative position of 'also' and marking relationships between HK and GB English. Regression analysis indicates a preference in HK English for a distant marking relationship between 'also' and its focused constituent. Notably, the subject and other constituents emerge as significant predictors of a distant position for 'also.' Together, these findings underscore the nuanced linguistic dynamics in HK English and contribute to our understanding of language contact. It suggests that future pedagogical practice should consider incorporating the syntactic variation within English varieties, facilitating leaners’ effective communication in diverse English-speaking environments and enhancing their intercultural communication competence.

Keywords: also, Cantonese, English, focus marker, frequency analysis, language contact, logistic regression analysis

Procedia PDF Downloads 46
11553 First-Person Pronoun Pragmatic Functions in Three Historical Chinese Texts

Authors: Cher Leng Lee

Abstract:

The existence of multiple first-person pronouns (1PPs) in classical Chinese is an issue that has not been resolved despite linguists using the grammatical perspective. This paper proposes pragmatics as a viable solution. There is also a lack of research exploring the evolving usage patterns of 1PPs within the historical context of Chinese language use. Such research can help us comprehend the changes and developments of these linguistic elements. To fill these research gaps, we use the diachronic pragmatics approach to contrast the functions of Chinese 1PPs in three representative texts from three different historical periods: The Analects (The Spring and Autumn Period), The Grand Scribe’s Records (Grand Records) (Qin and Han Period), and A New Account of Tales of the World (New Account) (The Wei, Jin and Southern and Northern Period). The 1PPs of these texts are manually identified and classified according to the pragmatic functions in the given contexts to observe their historical changes, understand the factors that contribute to these changes, and provide possible answers to the development of how wo became the only 1PP in today’s spoken Mandarin.

Keywords: Chinese language, classical Chinese, historical linguistics, pragmatics, first-person pronouns

Procedia PDF Downloads 12
11552 The Truth about Good and Evil: A Mixed-Methods Approach to Color Theory

Authors: Raniya Alsharif

Abstract:

The color theory of good and evil is the association of colors to the omnipresent concept of good and evil, where human behavior and perception can be highly influenced by seeing black and white, making these connotations almost dangerously distinctive where they can be very hard to distinguish. This theory is a human construct that dates back to ancient Egypt and has been used since then in almost all forms of communication and expression, such as art, fashion, literature, and religious manuscripts, helping the implantation of preconceived ideas that influence behavior and society. This is a mixed-methods research that uses both surveys to collect quantitative data related to the theory and a vignette to collect qualitative data by using a scenario where participants aged between 18-25 will style two characters of good and bad characteristics with color contrasting clothes, both yielding results about the nature of the preconceived perceptions associated with ‘black and white’ and ‘good and evil’, illustrating the important role of media and communications in human behavior and subconscious, and also uncover how far this theory goes in the age of social media enlightenment.

Keywords: color perception, interpretivism, thematic analysis, vignettes

Procedia PDF Downloads 118
11551 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 157
11550 3D Modelling and Numerical Analysis of Human Inner Ear by Means of Finite Elements Method

Authors: C. Castro-Egler, A. Durán-Escalante, A. García-González

Abstract:

This paper presents a method to generate a finite element model of the human auditory inner ear system. The geometric model has been realized using 2D images from a virtual model of temporal bones. A point cloud has been gotten manually from those images to construct a whole mesh with hexahedral elements. The main difference with the predecessor models is the spiral shape of the cochlea with its three scales completely defined: scala tympani, scala media and scala vestibuli; which are separate by basilar membrane and Reissner membrane. To validate this model, numerical simulations have been realised with two models: an isolated inner ear and a whole model of human auditory system. Ideal conditions of displacement are applied over the oval window in the isolated Inner Ear model. The whole model is made up of the outer auditory channel, the tympani, the ossicular chain, and the inner ear. The boundary condition for the whole model is 1Pa over the auditory channel entrance. The numerical simulations by FEM have been done using a harmonic analysis with a frequency range between 100-10.000 Hz with an interval of 100Hz. The following results have been carried out: basilar membrane displacement; the scala media pressure according to the cochlea length and the transfer function of the middle ear normalized with the pressure in the tympanic membrane. The basilar membrane displacements and the pressure in the scala media make it possible to validate the response in frequency of the basilar membrane.

Keywords: finite elements method, human auditory system model, numerical analysis, 3D modelling cochlea

Procedia PDF Downloads 358
11549 The Risk of Prioritizing Management over Education at Japanese Universities

Authors: Masanori Kimura

Abstract:

Due to the decline of the 18-year-old population, Japanese universities have a tendency to convert their form of employment from tenured positions to fixed-term positions for newly hired teachers. The advantage of this is that universities can be more flexible in their employment plans in case they fail to fill the enrollment of quotas of prospective students or they need to supplement teachers who can engage in other academic fields or research areas where new demand is expected. The most serious disadvantage of this, however, is that if secure positions cannot be provided to faculty members, there is the possibility that coherence of education and continuity of research supported by the university cannot be achieved. Therefore, the question of this presentation is as follows: Are universities aiming to give first priority to management, or are they trying to prioritize educational and research rather than management? To answer this question, the author examined the number of job offerings for college foreign language teachers posted on the JREC-IN (Japan Research Career Information Network, which is run by Japan Science and Technology Agency) website from April 2012 to October 2015. The results show that there were 1,002 and 1,056 job offerings for tenured positions and fixed-term contracts respectively, suggesting that, overall, today’s Japanese universities show a tendency to give first priority to management. More detailed examinations of the data, however, show that the tendency slightly varies depending on the types of universities. National universities which are supported by the central government and state universities which are supported by local governments posted more job offerings for tenured positions than for fixed-term contracts: national universities posted 285 and 257 job offerings for tenured positions and fixed-term contracts respectively, and state universities posted 106 and 86 job offerings for tenured positions and fixed-term contracts respectively. Yet the difference in number between the two types of employment status at national and state universities is marginal. As for private universities, they posted 713 job offerings for fixed-term contracts and 616 offerings for tenured positions. Moreover, 73% of the fixed-term contracts were offered for low rank positions including associate professors, lectures, and so forth. Generally speaking, those positions are offered to younger teachers. Therefore, this result indicates that private universities attempt to cut their budgets yet expect the same educational effect by hiring younger teachers. Although the results have shown that there are some differences in personal strategies among the three types of universities, the author argues that all three types of universities may lose important human resources that will take a pivotal role at their universities in the future unless they urgently review their employment strategies.

Keywords: higher education, management, employment status, foreign language education

Procedia PDF Downloads 125
11548 The Impact of the Business Process Reengineering on the Practices of the Human Resources Management in the Franco Tunisian Company-Network

Authors: Nesrine Bougarech, Habib Affes

Abstract:

This research lays the emphasis on the business process reengineering (BPR) which consists in radically altering the organizational processes through the optimal use of information technology (IT) to attain major enhancements in terms of quality, performance and productivity. A survey of the business process reengineering (BPR) was carried out in three French groups and their subsidiaries in Tunisia. The data collected were qualitatively analyzed in an attempt to test the main indicators of the success of a business process reengineering project (BPR) and to compare the importance of these indicators in the context of France versus Tunisia. The study corroborates that the respect of the inherent principles of the business process reengineering (BPR) and the diversity of the human resources involved in the project can lead to better productivity, higher quality of the goods or services and lower cost. Additionally, our results mirror the extent to which the respect of the principles and the diversity of resources are more important in the French companies than in their Tunisian subsidiaries.

Keywords: business process reengineering (BPR), human resources management (HRM), information technology (IT), management

Procedia PDF Downloads 400
11547 Trusting the Eyes: The Changing Landscape of Eyewitness Testimony

Authors: Manveen Singh

Abstract:

Since the very advent of law enforcement, eyewitness testimony has played a pivotal role in identifying, arresting and convicting suspects. Reliant heavily on the accuracy of human memory, nothing seems to carry more weight with the judiciary than the testimony of an actual witness. The acceptance of eyewitness testimony as a substantive piece of evidence lies embedded in the assumption that the human mind is adept at recording and storing events. Research though, has proven otherwise. Having carried out extensive study in the field of eyewitness testimony for the past 40 years, psychologists have concluded that human memory is fragile and needs to be treated carefully. The question that arises then, is how reliable is eyewitness testimony? The credibility of eyewitness testimony, simply put, depends on several factors leaving it reliable at times while not so much at others. This is further substantiated by the fact that as per scientific research, over 75 percent of all eyewitness testimonies may stand in error; quite a few of these cases resulting in life sentences. Although the advancement of scientific techniques, especially DNA testing, helped overturn many of these eyewitness testimony-based convictions, yet eyewitness identifications continue to form the backbone of most police investigations and courtroom decisions till date. What then is the solution to this long standing concern regarding the accuracy of eyewitness accounts? The present paper shall analyze the linkage between human memory and eyewitness identification as well as look at the various factors governing the credibility of eyewitness testimonies. Furthermore, it shall elaborate upon some best practices developed over the years to help reduce mistaken identifications. Thus, in the process, trace out the changing landscape of eyewitness testimony amidst the evolution of DNA and trace evidence.

Keywords: DNA, eyewitness, identification, testimony, evidence

Procedia PDF Downloads 324
11546 The Use of Synthetic Soil for The Vegetables Cultivation in Conditions of Limited Water Consumption

Authors: Italo Luigi de Paoli

Abstract:

The use of synthetic soil for the vegetables cultivation in conditions of limited water consumption The separate collection of urban organic waste and green waste for the countries of the European Union averages 100 kg / inhabitant x year with an annual growth of about 10%. The production of quality compost averages 38% - 40% of the production of organic waste material. Most of the compost produced is used as an organic soil improver in those nutrient-poor soils in order to improve its quality. This study seeks to enhance the production of quality compost by creating a synthetic soil, where the percentages of compost on average oscillate between 50% and 60% in which, with appropriate precautions, different species of horticultural can be grown in conditions of high environmental safety without the use of pesticides and with a consumption of water used for irrigation limited to the actual evaporation of the plants. The project started in 2018 and is still ongoing, confirms its validity through a series of different horticultural productions, especially if this technology is applied where the availability of land suitable for the cultivation of vegetables is limited and where the use of water for irrigation represents a cultural criticality. Furthermore, the creation of "open field" crops, together with their automation, represents a further possibility in the concrete development of such technologies, giving the final product organoleptic characteristics equal if not superior to what the market offers today for human nutrition.

Keywords: water scarcity, compost, vegetable foods, syntetic soil

Procedia PDF Downloads 167
11545 New Quinazoline Derivative Induce Cytotoxic Effect against Mcf-7 Human Breast Cancer Cell

Authors: Maryam Zahedi Fard, Nazia Abdul Majid, Hapipah Mohd Ali, Mahmood Ameen Abdulla

Abstract:

New quinazoline schiff base 3-(5-bromo-2-hydroxy-3-methoxybenzylideneamino)-2-(5-bromo-2-hydroxy-3-methoxyphenyl)-2,3-dihydroquinazolin-4(1H)-one was investigated for anticancer activity against MCF-7 human breast cancer cell line with involved mechanism of apoptosis. The compound demonstrated a remarkable antiproliferative effect, with an IC50 value of 3.41 ± 0.34, after 72 hours of treatment. Morphological apoptotic features in treated MCF-7 cells were observed by AO/PI staining. Furthermore, treated MCF-7 cells subjected to apoptosis death, as exhibited by perturbation of mitochondrial membrane potential and cytochrome c release as well as increase in ROS generation. We also found activation of caspases 3/7 and -9. Moreover, acute toxicity test demonstrated the nontoxic nature of the compound in mice. Our results showed the selected compound significantly induce apoptosis in MCF-7 cells via intrinsic pathway, which might be considered as a potent candidate for further in vivo and clinical breast cancer studies.

Keywords: antiproliferative effect, MCF-7 human breast cancer cell line, apoptosis, caspases

Procedia PDF Downloads 524
11544 Investigating the Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: Anan Alssbaiheen, Steve Love

Abstract:

Given the lack of research into potential opportunities and challenges which are likely to be associated with the implementation of mobile services in developing countries including Saudi Arabia, the research reported here investigated the challenges and opportunities which are associated with the implementation of mobile government services in Saudi Arabia. By collecting data through surveys from 103 Saudi citizens and 46 employees working at the Ministry of Communication and Information Technology Saudi Arabia, this study indicates that the high level of mobile penetration in the country offers an opportunity for Saudi Arabian government to offer mobile government services in the country. The results also suggest that though a large percentage of populations do not have access to mobile technologies, there is still a strong desire among users for the provision of mobile government services. Moreover, the results suggest that effective implementation of mobile government services would help to increase the technological development of Saudi Arabia. However, there are certain challenges which may prevent the effective implementation of such services. First, there does not appear to be a sufficient level of understanding among the Saudi Arabian population about the benefits which are associated with mobile government services. Secondly, the results suggest that the implementation of the services needs to be closely tailored and personalised to the individual needs of target users. Finally, the lack of access to mobile technologies would be a challenge to the successful introduction of these services.

Keywords: challenges, e-government, mobile government, opportunities

Procedia PDF Downloads 409
11543 Canonical Objects and Other Objects in Arabic

Authors: Safiah Ahmed Madkhali

Abstract:

The grammatical relation object has not attracted the same attention in the literature as subject has. Where there is a clearly monotransitive verb such as kick, the criteria for identifying the grammatical relation may converge. However, the term object is also used to refer to phenomena that do not subsume all, or even most, of the recognized properties of the canonical object. Instances of such phenomena include non-canonical objects such as the ones in the so-called double-object construction i.e. the indirect object and the direct object as in (He bought his dog a new collar). In this paper, it is demonstrated how criteria of identifying the grammatical relation object that are found in the theoretical and typological literature can be applied to Arabic. Also, further language-specific criteria are here derived from the regularities of the canonical object in the language. The criteria established in this way are then applied to the non-canonical objects to demonstrate how far they conform to, or diverge from, the canonical object. Contrary to the claim that the direct object is more similar to the canonical object than is the indirect object, it was found that it is, in fact, the indirect object rather than the direct object that shares most of the aspects of the canonical object in monotransitive clauses.

Keywords: canonical objects, double-object constructions, cognate object constructions, non-canonical objects

Procedia PDF Downloads 224
11542 A Survey of Recognizing of Daily Living Activities in Multi-User Smart Home Environments

Authors: Kulsoom S. Bughio, Naeem K. Janjua, Gordana Dermody, Leslie F. Sikos, Shamsul Islam

Abstract:

The advancement in information and communication technologies (ICT) and wireless sensor networks have played a pivotal role in the design and development of real-time healthcare solutions, mainly targeting the elderly living in health-assistive smart homes. Such smart homes are equipped with sensor technologies to detect and record activities of daily living (ADL). This survey reviews and evaluates existing approaches and techniques based on real-time sensor-based modeling and reasoning in single-user and multi-user environments. It classifies the approaches into three main categories: learning-based, knowledge-based, and hybrid, and evaluates how they handle temporal relations, granularity, and uncertainty. The survey also highlights open challenges across various disciplines (including computer and information sciences and health sciences) to encourage interdisciplinary research for the detection and recognition of ADLs and discusses future directions.

Keywords: daily living activities, smart homes, single-user environment, multi-user environment

Procedia PDF Downloads 136
11541 Reading Strategy Awareness of English Major Students

Authors: Hsin-Yi Lien

Abstract:

The study explored the role of metacognition in foreign language anxiety on a sample of 411 Taiwanese students of English as a Foreign Language. The reading strategy inventory was employed to evaluate the tertiary learners’ level of metacognitive awareness and a semi-structured background questionnaire was also used to examine the learners’ perceptions of their English proficiency and satisfaction of their current English learning. In addition, gender and academic level differences in employment of reading strategies were investigated. The results showed the frequency of reading strategy use increase slightly along with academic years and males and females actually employ different reading strategies. The EFL tertiary learners in the present study utilized cognitive strategies more frequently than metacognitive strategies or support strategies. Male students use metacognitive strategy more often while female students use cognitive and support strategy more frequently.

Keywords: cognitive strategy, gender differences, metacognitive strategy, support strategy

Procedia PDF Downloads 407
11540 Design and Implementation of Wireless Syncronized AI System for Security

Authors: Saradha Priya

Abstract:

Developing virtual human is very important to meet the challenges occurred in many applications where human find difficult or risky to perform the task. A robot is a machine that can perform a task automatically or with guidance. Robotics is generally a combination of artificial intelligence and physical machines (motors). Computational intelligence involves the programmed instructions. This project proposes a robotic vehicle that has a camera, PIR sensor and text command based movement. It is specially designed to perform surveillance and other few tasks in the most efficient way. Serial communication has been occurred between a remote Base Station, GUI Application, and PC.

Keywords: Zigbee, camera, pirsensor, wireless transmission, DC motor

Procedia PDF Downloads 342
11539 Zero Energy Buildings in Hot-Humid Tropical Climates: Boundaries of the Energy Optimization Grey Zone

Authors: Nakul V. Naphade, Sandra G. L. Persiani, Yew Wah Wong, Pramod S. Kamath, Avinash H. Anantharam, Hui Ling Aw, Yann Grynberg

Abstract:

Achieving zero-energy targets in existing buildings is known to be a difficult task requiring important cuts in the building energy consumption, which in many cases clash with the functional necessities of the building wherever the on-site energy generation is unable to match the overall energy consumption. Between the building’s consumption optimization limit and the energy, target stretches a case-specific optimization grey zone, which requires tailored intervention and enhanced user’s commitment. In the view of the future adoption of more stringent energy-efficiency targets in the context of hot-humid tropical climates, this study aims to define the energy optimization grey zone by assessing the energy-efficiency limit in the state-of-the-art typical mid- and high-rise full AC office buildings, through the integration of currently available technologies. Energy models of two code-compliant generic office-building typologies were developed as a baseline, a 20-storey ‘high-rise’ and a 7-storey ‘mid-rise’. Design iterations carried out on the energy models with advanced market ready technologies in lighting, envelope, plug load management and ACMV systems and controls, lead to a representative energy model of the current maximum technical potential. The simulations showed that ZEB targets could be achieved in fully AC buildings under an average of seven floors only by compromising on energy-intense facilities (as full AC, unlimited power-supply, standard user behaviour, etc.). This paper argues that drastic changes must be made in tropical buildings to span the energy optimization grey zone and achieve zero energy. Fully air-conditioned areas must be rethought, while smart technologies must be integrated with an aggressive involvement and motivation of the users to synchronize with the new system’s energy savings goal.

Keywords: energy simulation, office building, tropical climate, zero energy buildings

Procedia PDF Downloads 177
11538 Steel Bridge Coating Inspection Using Image Processing with Neural Network Approach

Authors: Ahmed Elbeheri, Tarek Zayed

Abstract:

Steel bridges deterioration has been one of the problems in North America for the last years. Steel bridges deterioration mainly attributed to the difficult weather conditions. Steel bridges suffer fatigue cracks and corrosion, which necessitate immediate inspection. Visual inspection is the most common technique for steel bridges inspection, but it depends on the inspector experience, conditions, and work environment. So many Non-destructive Evaluation (NDE) models have been developed use Non-destructive technologies to be more accurate, reliable and non-human dependent. Non-destructive techniques such as The Eddy Current Method, The Radiographic Method (RT), Ultra-Sonic Method (UT), Infra-red thermography and Laser technology have been used. Digital Image processing will be used for Corrosion detection as an Alternative for visual inspection. Different models had used grey-level and colored digital image for processing. However, color image proved to be better as it uses the color of the rust to distinguish it from the different backgrounds. The detection of the rust is an important process as it’s the first warning for the corrosion and a sign of coating erosion. To decide which is the steel element to be repainted and how urgent it is the percentage of rust should be calculated. In this paper, an image processing approach will be developed to detect corrosion and its severity. Two models were developed 1st to detect rust and 2nd to detect rust percentage.

Keywords: steel bridge, bridge inspection, steel corrosion, image processing

Procedia PDF Downloads 298
11537 Overview of Research Contexts about XR Technologies in Architectural Practice

Authors: Adeline Stals

Abstract:

The transformation of architectural design practices has been underway for almost forty years due to the development and democratization of computer technology. New and more efficient tools are constantly being proposed to architects, amplifying a technological wave that sometimes stimulates them, sometimes overwhelms them, depending essentially on their digital culture and the context (socio-economic, structural, organizational) in which they work on a daily basis. Our focus is on VR, AR, and MR technologies dedicated to architecture. The commercialization of affordable headsets like the Oculus Rift, the HTC Vive or more low-tech like the Google CardBoard, makes it more accessible to benefit from these technologies. In that regard, researchers report the growing interest of these tools for architects, given the new perspectives they open up in terms of workflow, representation, collaboration, and client’s involvement. However, studies rarely mention the consequences of the sample studied on results. Our research provides an overview of VR, AR, and MR researches among a corpus of papers selected from conferences and journals. A closer look at the sample of these research projects highlights the necessity to take into consideration the context of studies in order to develop tools truly dedicated to the real practices of specific architect profiles. This literature review formalizes milestones for future challenges to address. The methodology applied is based on a systematic review of two sources of publications. The first one is the Cumincad database, which regroups publications from conferences exclusively about digital in architecture. Additionally, the second part of the corpus is based on journal publications. Journals have been selected considering their ranking on Scimago. Among the journals in the predefined category ‘architecture’ and in Quartile 1 for 2018 (last update when consulted), we have retained the ones related to the architectural design process: Design Studies, CoDesign, Architectural Science Review, Frontiers of Architectural Research and Archnet-IJAR. Beside those journals, IJAC, not classified in the ‘architecture’ category, is selected by the author for its adequacy with architecture and computing. For all requests, the search terms were ‘virtual reality’, ‘augmented reality’, and ‘mixed reality’ in title and/or keywords for papers published between 2015 and 2019 (included). This frame time is defined considering the fast evolution of these technologies in the past few years. Accordingly, the systematic review covers 202 publications. The literature review on studies about XR technologies establishes the state of the art of the current situation. It highlights that studies are mostly based on experimental contexts with controlled conditions (pedagogical, e.g.) or on practices established in large architectural offices of international renown. However, few studies focus on the strategies and practices developed by offices of smaller size, which represent the largest part of the market. Indeed, a European survey studying the architectural profession in Europe in 2018 reveals that 99% of offices are composed of less than ten people, and 71% of only one person. The study also showed that the number of medium-sized offices is continuously decreasing in favour of smaller structures. In doing so, a frontier seems to remain between the worlds of research and practice, especially for the majority of small architectural practices having a modest use of technology. This paper constitutes a reference for the next step of the research and for further worldwide researches by facilitating their contextualization.

Keywords: architectural design, literature review, SME, XR technologies

Procedia PDF Downloads 105
11536 A Comparative Analysis of Hyper-Parameters Using Neural Networks for E-Mail Spam Detection

Authors: Syed Mahbubuz Zaman, A. B. M. Abrar Haque, Mehedi Hassan Nayeem, Misbah Uddin Sagor

Abstract:

Everyday e-mails are being used by millions of people as an effective form of communication over the Internet. Although e-mails allow high-speed communication, there is a constant threat known as spam. Spam e-mail is often called junk e-mails which are unsolicited and sent in bulk. These unsolicited emails cause security concerns among internet users because they are being exposed to inappropriate content. There is no guaranteed way to stop spammers who use static filters as they are bypassed very easily. In this paper, a smart system is proposed that will be using neural networks to approach spam in a different way, and meanwhile, this will also detect the most relevant features that will help to design the spam filter. Also, a comparison of different parameters for different neural network models has been shown to determine which model works best within suitable parameters.

Keywords: long short-term memory, bidirectional long short-term memory, gated recurrent unit, natural language processing, natural language processing

Procedia PDF Downloads 198
11535 Angiogenic, Cytoprotective, and Immunosuppressive Properties of Human Amnion and Chorion-Derived Mesenchymal Stem Cells

Authors: Kenichi Yamahara, Makiko Ohshima, Shunsuke Ohnishi, Hidetoshi Tsuda, Akihiko Taguchi, Toshihiro Soma, Hiroyasu Ogawa, Jun Yoshimatsu, Tomoaki Ikeda

Abstract:

We have previously reported the therapeutic potential of rat fetal membrane(FM)-derived mesenchymal stem cells (MSCs) using various rat models including hindlimb ischemia, autoimmune myocarditis, glomerulonephritis, renal ischemia-reperfusion injury, and myocardial infarction. In this study, 1) we isolated and characterized MSCs from human amnion and chorion; 2) we examined their differences in the expression profile of growth factors and cytokines; and 3) we investigated the therapeutic potential and difference of these MSCs using murine hindlimb ischemia and acute graft-versus-host disease (GVHD) models. Isolated MSCs from both amnion and chorion layers of FM showed similar morphological appearance, multipotency, and cell-surface antigen expression. Conditioned media obtained from amnion- and chorion-derived MSCs inhibited cell death caused by serum starvation or hypoxia in endothelial cells and cardiomyocytes. Amnion and chorion MSCs secreted significant amounts of angiogenic factors including HGF, IGF-1, VEGF, and bFGF, although differences in the cellular expression profile of these soluble factors were observed. Transplantation of human amnion or chorion MSCs significantly increased blood flow and capillary density in a murine hindlimb ischemia model. In addition, compared to human chorion MSCs, human amnion MSCs markedly reduced T-lymphocyte proliferation with the enhanced secretion of PGE2, and improved the pathological situation of a mouse model of GVHD disease. Our results highlight that human amnionand chorion-derived MSCs, which showed differences in their soluble factor secretion and angiogenic/immuno-suppressive function, could be ideal cell sources for regenerative medicine.

Keywords: amnion, chorion, fetal membrane, mesenchymal stem cells

Procedia PDF Downloads 410
11534 Reinventing Education Systems: Towards an Approach Based on Universal Values and Digital Technologies

Authors: Ilyes Athimni, Mouna Bouzazi, Mongi Boulehmi, Ahmed Ferchichi

Abstract:

The principles of good governance, universal values, and digitization are among the tools to fight corruption and improve the quality of service delivery. In recent years, these tools have become one of the most controversial topics in the field of education and a concern of many international organizations and institutions against the problem of corruption. Corruption in the education sector, particularly in higher education, has negative impacts on the quality of education systems and on the quality of administrative or educational services. Currently, the health crisis due to the spread of the COVID-19 pandemic reveals the difficulties encountered by education systems in most countries of the world. Due to the poor governance of these systems, many educational institutions were unable to continue working remotely. To respond to these problems encountered by most education systems in many countries of the world, our initiative is to propose a methodology to reinvent education systems based on global values and digital technologies. This methodology includes a work strategy for educational institutions, whether in the provision of administrative services or in the teaching method, based on information and communication technologies (ICTs), intelligence artificial, and intelligent agents. In addition, we will propose a supervisory law that will be implemented and monitored by intelligent agents to improve accountability, transparency, and accountability in educational institutions. On the other hand, we will implement and evaluate a field experience by applying the proposed methodology in the operation of an educational institution and comparing it to the traditional methodology through the results of teaching an educational program. With these specifications, we can reinvent quality education systems. We also expect the results of our proposal to play an important role at local, regional, and international levels in motivating governments of countries around the world to change their university governance policies.

Keywords: artificial intelligence, corruption in education, distance learning, education systems, ICTs, intelligent agents, good governance

Procedia PDF Downloads 205
11533 Distinct Antiviral Pathway for ZFP36-Like Family Members Against Flavivirus Infection

Authors: Ren-Jye Lin, Li-Hsiung Lin, Bing-Cheng Liu, Ching-Len Liao

Abstract:

The human zinc finger protein 36-like protein family, containing zinc finger protein 36-like 1 (ZFP36L1) and zinc finger protein 36-like 2 (ZFP36L2), belongs to CCCH-type zinc-finger protein identified as an RNA-binding protein that participates in controlling posttranscriptional regulation via RNA decay pathways. Recently, we demonstrated that human ZFP36L1 showed potent antiviral activity against flavivirus Infection by both 5´-3´ XRN1 and 3´-5´RNA-exosome RNA decay pathways (Journal of Virology 2022 Jan 12;96(1): e0166521). However, another zinc finger protein 36-like protein member, ZFP36L2, in the host defense response against flaviviruses has yet to be addressed. Here, we also demonstrate that ZFP36L2 functions as a host innate defender against flaviviruses, including Japanese encephalitis virus (JEV) and dengue virus (DENV). Overexpression of ZFP36L2 reduced JEV and DENV infection, and ZFP36L2 knockdown significantly promoted viral replication. Distinct from the antiviral mechanism of ZFP36L1, ZFP36L2 inhibits flavivirus infection by only a 5´-3´ XRN1-mediated RNA decay pathway but not the 3´-5´RNA-exosome RNA decay pathway. Human ZFP36L1 and ZFP36L2 can restrict flavivirus replication by directly binding and destabilizing viral RNA. Thus, for the first time, human zinc finger protein 36-like family members, ZFP36L1 and ZFP36L2, are identified as host antiviral factors that can bind and degrade flavivirus viral RNA by diverse antiviral mechanisms.

Keywords: ZFP36L1, ZFP36L2, 5'-3' exonuclease XRN1, antiviral mechansim

Procedia PDF Downloads 66
11532 Finding the Longest Common Subsequence in Normal DNA and Disease Affected Human DNA Using Self Organizing Map

Authors: G. Tamilpavai, C. Vishnuppriya

Abstract:

Bioinformatics is an active research area which combines biological matter as well as computer science research. The longest common subsequence (LCSS) is one of the major challenges in various bioinformatics applications. The computation of the LCSS plays a vital role in biomedicine and also it is an essential task in DNA sequence analysis in genetics. It includes wide range of disease diagnosing steps. The objective of this proposed system is to find the longest common subsequence which presents in a normal and various disease affected human DNA sequence using Self Organizing Map (SOM) and LCSS. The human DNA sequence is collected from National Center for Biotechnology Information (NCBI) database. Initially, the human DNA sequence is separated as k-mer using k-mer separation rule. Mean and median values are calculated from each separated k-mer. These calculated values are fed as input to the Self Organizing Map for the purpose of clustering. Then obtained clusters are given to the Longest Common Sub Sequence (LCSS) algorithm for finding common subsequence which presents in every clusters. It returns nx(n-1)/2 subsequence for each cluster where n is number of k-mer in a specific cluster. Experimental outcomes of this proposed system produce the possible number of longest common subsequence of normal and disease affected DNA data. Thus the proposed system will be a good initiative aid for finding disease causing sequence. Finally, performance analysis is carried out for different DNA sequences. The obtained values show that the retrieval of LCSS is done in a shorter time than the existing system.

Keywords: clustering, k-mers, longest common subsequence, SOM

Procedia PDF Downloads 260
11531 Interlanguage Pragmatics Instruction: Evidence from EFL Teachers

Authors: Asma Ben Abdallah

Abstract:

Interlanguage Pragmatics (ILP) Instruction has brought a lot of enlightenment for Foreign Language Teaching and has secured itself a deserved position in SLA research. In the Tunisian context, ILP instruction remains less explored for academics and educational practitioners. In our experience as teachers, both at secondary school and at university levels, the instruction and assessment of pragmatics seem to be contentious. This paper firstly introduces the theoretical models of Interlanguage pragmatics Instruction and focuses on their implications for foreign language teaching. This study builds on the work of Ben Abdallah (2015) that investigated the effects of pragmatic Instruction on Tunisian EFL Learners where pragmatic Instruction has been approached from the perspective of students and their learning strategies. The data for the present study, however, come from Tunisian EFL teachers by investigating their pragmatics practices and their perceptions of pragmatic instruction. The findings indicated that EFL teachers have pragmatic awareness; yet, their reflections revealed that their awareness was mostly on theoretical pragmatic knowledge, and not explicitly brought into practical pragmatic applications. The paper concludes by promoting pragmatics instruction with the suggestion that EFL teachers should teach pragmatics in class.

Keywords: interlanguage pragmatics theory, pragmatics, pragmatic instruction, SLA

Procedia PDF Downloads 271
11530 Altasreef: Automated System of Quran Verbs for Urdu Language

Authors: Haq Nawaz, Muhammad Amjad Iqbal, Kamran Malik

Abstract:

"Altasreef" is an automated system available for Web and Android users which provide facility to the users to learn the Quran verbs. It provides the facility to the users to practice the learned material and also provide facility of exams of Arabic verbs variation focusing on Quran text. Arabic is a highly inflectional language. Almost all of its words connect to roots of three, four or five letters which approach the meaning of all their inflectional forms. In Arabic, a verb is formed by inserting the consonants into one of a set of verb patterns. Suffixes and prefixes are then added to generate the meaning of number, person, and gender. The active/passive voice and perfective aspect and other patterns are than generated. This application is designed for learners of Quranic Arabic who already have learn basics of Arabic conjugation. Application also provides the facility of translation of generated patterns. These translations are generated with the help of rule-based approach to give 100% results to the learners.

Keywords: NLP, Quran, Computational Linguistics, E Learning

Procedia PDF Downloads 160
11529 Developing an Intelligent Table Tennis Ball Machine with Human Play Simulation for Technical Training

Authors: Chen-Chi An, Jun-Yi He, Cheng-Han Hsieh, Chen-Ching Ting

Abstract:

This research has successfully developed an intelligent table tennis ball machine with human play simulate all situations of human play to take the service. It is well known; an excellent ball machine can help the table tennis coach to provide more efficient teaching, also give players the good technical training and entertainment. An excellent ball machine should be able to service all balls based on human play simulation due to the conventional competitions are today all taken place for people. In this work, two counter-rotating wheels are used to service the balls, where changing the absolute rotating speeds of the two wheels and the differences of rotating speeds between the two wheels can adjust the struck forces and the rotating speeds of the ball. The relationships between the absolute rotating speed of the two wheels and the struck forces of the ball as well as the differences rotating speeds between the two wheels and the rotating speeds of the ball are experimentally determined for technical development. The outlet speed, the ejected distance, and the rotating speed of the ball were measured by changing the absolute rotating speeds of the two wheels in terms of a series of differences in rotating speed between the two wheels for calibration of the ball machine; where the outlet speed and the ejected distance of the ball were further converted to the struck forces of the ball. In process, the balls serviced by the intelligent ball machine were based on the received calibration curves with help of the computer. Experiments technically used photosensitive devices to detect the outlet and rotating speed of the ball. Finally, this research developed some teaching programs for technical training using three ball machines and received more efficient training.

Keywords: table tennis, ball machine, human play simulation, counter-rotating wheels

Procedia PDF Downloads 418
11528 Shaping Lexical Concept of 'Mage' through Image Schemas in Dragon Age 'Origins'

Authors: Dean Raiyasmi, Elvi Citraresmana, Sutiono Mahdi

Abstract:

Language shapes the human mind and its concept toward things. Using image schemas, in nowadays technology, even AI (artificial intelligence) can concept things in response to their creator negativity or positivity. This is reflected inside one of the most selling game around the world in 2012 called Dragon Age Origins. The AI in form of NPC (Non-Playable Character) inside the game reflects on the creator of the game on negativity or positivity toward the lexical concept of mage. Through image schemas, shaping the lexical concept of mage deemed possible and proved the negativity or positivity creator of the game toward mage. This research analyses the cognitive-semantic process of image schema and shaping the concept of ‘mage’ by describing kinds of image schemas exist in the Dragon Age Origin Game. This research is also aimed to analyse kinds of image schemas and describing the image schemas which shaping the concept of ‘mage’ itself. The methodology used in this research is qualitative where participative observation is employed with five stages and documentation. The results shows that there are four image schemas exist in the game and those image schemas shaping the lexical concept of ‘mage’.

Keywords: cognitive semantic, image-schema, conceptual metaphor, video game

Procedia PDF Downloads 433
11527 In silico Analysis towards Identification of Host-Microbe Interactions for Inflammatory Bowel Disease Linked to Reactive Arthritis

Authors: Anukriti Verma, Bhawna Rathi, Shivani Sharda

Abstract:

Reactive Arthritis (ReA) is a disorder that causes inflammation in joints due to certain infections at distant sites in the body. ReA begins with stiffness, pain, and inflammation in these areas especially the ankles, knees, and hips. It gradually causes several complications such as conjunctivitis in the eyes, skin lesions in hand, feet and nails and ulcers in the mouth. Nowadays the diagnosis of ReA is based upon a differential diagnosis pattern. The parameters for differentiating ReA from other similar disorders include physical examination, history of the patient and a high index of suspicion. There are no standard lab tests or markers available for ReA hence the early diagnosis of ReA becomes difficult and the chronicity of disease increases with time. It is reported that enteric disorders such as Inflammatory Bowel Disease (IBD) that is inflammation in gastrointestinal tract namely Crohn’s Disease (CD) and Ulcerative Colitis (UC) are reported to be linked with ReA. Several microorganisms are found such as Campylobacter, Salmonella, Shigella and Yersinia causing IBD leading to ReA. The aim of our study was to perform the in-silico analysis in order to find interactions between microorganisms and human host causing IBD leading to ReA. A systems biology approach for metabolic network reconstruction and simulation was used to find the essential genes of the reported microorganisms. Interactomics study was used to find the interactions between the pathogen genes and human host. Genes such as nhaA (pathogen), dpyD (human), nagK (human) and kynU (human) were obtained that were analysed further using the functional, pathway and network analysis. These genes can be used as putative drug targets and biomarkers in future for early diagnosis, prevention, and treatment of IBD leading to ReA.

Keywords: drug targets, inflammatory bowel disease, reactive arthritis, systems biology

Procedia PDF Downloads 271