Search results for: True and False Cognates
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1146

Search results for: True and False Cognates

846 Teaching in the Post Truth Era: A Narrative Analysis of Modern Anti-Scientific Discourses in the Classroom

Authors: Jason T. Hilton

Abstract:

The ‘post-truth era’ is marked by a shift toward a period in which objective facts are less influential in shaping public opinion than appeals to emotion and personal belief. Applying narrative analysis techniques to current public discourses in education that run counter to scientific findings, it becomes possible to identify weakness in modern pedagogy and suggest ways to counter false narratives in the classroom. Results of this study indicate that a failure to engage with popular narratives lessens teachers’ ability to be convincing in the classroom, even when presenting information supported by scientific evidence. This study seeks to empower teachers by illustrating the influence of story within the post-truth era and the ways in which narrative and rhetorical elements take hold in social media contexts. Equipped with this knowledge, teachers can create a shift in pedagogy, away from transmission of knowledge toward the crafting of powerful narratives, built upon evidence, and connected to the lives of modern learners.

Keywords: 21st century learner, critical pedagogy, culture, narrative, post-truth era, social media

Procedia PDF Downloads 269
845 Rethinking Literary Language: A Philsophicus-Logico Approach. The Novel ‘’ Sympathizer ‘’ as a Case Study

Authors: Oublal Ali

Abstract:

Due scholarly attention given to Ludwig Wittgenstein since the appearance of Tractatus is resulted from revolutionary shift he has made in the conception of language. True, his first and foremost concern was to solve the issue of language philosophers failed to recognize. Not only Tracturain’s approach to language that argues for philosophers failure of understanding the logic of language, but also his later conception which is developed in philosophical investigations and the reminder of all his remarks. On such a basis, it is claimed that Wittgenstein’s theory of language should not be confined to the language within philosophical streams with this premise we therefore propose to analytically read one of the literary propositions in the sympathizer as linguistic corpus. Our investigation of the literary proposition weaves us into claiming that Wittgenstein’s language games -later philosophy- is apposite to the analysis of literary works thanks to the shift Wittgenstein has made from demarcated use of language to the multiplicity and non-uniformity of its use.

Keywords: language, context, use, language games, literary propositions

Procedia PDF Downloads 142
844 Master Di-Chiao: A Great Practitioner of Earth Store Bodhisattva's Compassion

Authors: Mei-Hsia Dai

Abstract:

Venerable Master Di-Chiao has been devoted all her life practicing the Earth Store Bodhisattva’s spirit and is one of the greatest masters in modern Buddhism. All Buddha and Bodhisattvas pay great respect to the Earth Store Bodhisattva because He vowed that He would not become Buddha until the hell is empty, and He would only achieve Bodhi until all sentient beings have been saved. The aim of this study is to investigate Venerable Master Di-Chiao, who actualizes the Buddha’s teaching and practices the Earth Store Bodhisattva’s compassion and apply them to help people. In fact, she has integrated her learning to teach people how to eliminate their karmic suffering with her close attention and full effort, even though she would be hurt all over or she had to sacrifice her own life. This qualitative research gathers data in terms of a field study, including an interview with Venerable Master Di-Chiao, a book about the Master and three books about true stories of people saved by the Master, and about 300 online feedbacks from her disciples and followers explaining how they were helped by the Master through their difficulties, together with a year-long observation at the Dharma services held in Taipei Di-Zang Temple. This article is divided into four parts: The first part depicts Master Di-Chiao’s original intent of being a nun and her three-step-one-bow pilgrimage experience around Taiwan. Part two illustrates the invitation of the Master’s being the Abbess of Tsiang-Te Temple, which was designated by Bodhisattva Avalokitesvara in a manager’s dream of the temple, and many unexpected difficulties ahead of the cultivation in the Master’s Buddha Path. In addition to maintenance of Tsiang-Te Temple, the third part will discuss the purpose of founding Taipei Di-Zang Temple, in which the Master always tries her best with various methods to cultivate good seeds for her disciples and followers and watches out for their karma and does her utmost effort to help them overcome it. The final part will briefly explain the Three Buddhalization: Buddhist wedding, Buddhist prenatal education and Buddhist family, which the Master has been advocating and considers them the essence of constructing a harmonious society and having a meaningful and enlightening life. Extraordinary results of practicing the Three Buddhalization will be given. Findings show that Master’s Di-Chiao’s actualization of Buddha’s teaching and Bodhisattva’s compassion is incredibly amazing and powerful, and she has helped countless people to conquer their difficulties and purify their evil habits. With the Master’s assistance and their hardworking and faith to the Master’s teaching, some of her disciples and followers have gone to the Maitreya Inside Realm, where the future Buddha has resided, and continue their cultivation. True stories will be presented to illuminate the incredibility of the Master’s compassion, her brevity and perseverance in the course of the Buddhahood. Venerable Master Di-Chiao is the embodiment of the Earth Store Bodhisattva for her disciples and followers.

Keywords: compassion, the Earth Store Bodhisattva, three Buddhalization, venerable Master Di-Chiao

Procedia PDF Downloads 138
843 Islamic Architecture and the Challenges against It

Authors: Mohammad Torabiyan, Kazem Mosawi Nejad

Abstract:

Today architecture has become as a powerful media for introducing cultures to the world, which in turn brings about a change in the global insight, power gaining, investment and development. Islamic architecture is based on the language of Koran and shows the depth and richness of Islam through spiritual soul. This is in a way that belief in monotheism and faith in Islamic teachings are manifested as Islam's aesthetic thought in Islamic architecture. Unfortunately, Islamic architecture has been damaged a lot due to lack of necessary information and also successive wars which have overtaken the Muslims as well as the dominance of colonizing counties. Islamic architecture is rooted in the history, culture and civilization of Muslims but its deficiencies and shortcomings should be removed through systematizing the Islamic architecture researchers. Islamic countries should act in a way that the art of Islamic architecture shows its true place in different architecture eras and makes everybody aware that Islamic architecture has a historical root and is connected eternally to the genuineness, religious art and culture of Muslims and civilization.

Keywords: art, culture, civilization, Islamic architecture, Muslims

Procedia PDF Downloads 529
842 Investigation of Diseases and Enemies of Bees of Breeding Apis mellifera intermissa (Buttel-Reepen, 1906)

Authors: S. Zenia, L. Bitta, O. Bouhamam, H. Brines, M. Boudriaa, F. Haddadj, F. Marniche, A. Milla, H. Saadi, A. Smai

Abstract:

The bee Apis mellifera intermissa is a major social insect, in addition to its honey production, it is a pillar of our biodiversity. Several living organisms can come into contact with it: bacteria, viruses, protozoa, fungi, mites, and insects. In Algeria, many beekeepers have reported unusual mortality of local bees, loss of foragers and significant losses of their livestock. Despite the presence of a varied honey-bearing flora and a favourable Mediterranean climate, honey production remains low. This phenomenon can be attributed to the excess winter mortality, but also to the increasing difficulties that beekeepers face in maintaining healthy bee colonies, particularly bee diseases and their transmission facilitated by trade and beekeeping practices. Our survey is based on a questionnaire composed of several parts. The results obtained show that the disease that most affects bees according to beekeepers is varroa mite with 93% followed by fungi with 26%. The most replied enemy of bees is the false ringworm with 73%, followed by the bee-eater with 63%. Our goal is to determine the causes of this low production in two areas: Bejaia and Tizi-Ouzou.

Keywords: diseases, Apis mellifera L., varroa, European foulbrood

Procedia PDF Downloads 163
841 Comparison of the Effectiveness of Tree Algorithms in Classification of Spongy Tissue Texture

Authors: Roza Dzierzak, Waldemar Wojcik, Piotr Kacejko

Abstract:

Analysis of the texture of medical images consists of determining the parameters and characteristics of the examined tissue. The main goal is to assign the analyzed area to one of two basic groups: as a healthy tissue or a tissue with pathological changes. The CT images of the thoracic lumbar spine from 15 healthy patients and 15 with confirmed osteoporosis were used for the analysis. As a result, 120 samples with dimensions of 50x50 pixels were obtained. The set of features has been obtained based on the histogram, gradient, run-length matrix, co-occurrence matrix, autoregressive model, and Haar wavelet. As a result of the image analysis, 290 descriptors of textural features were obtained. The dimension of the space of features was reduced by the use of three selection methods: Fisher coefficient (FC), mutual information (MI), minimization of the classification error probability and average correlation coefficients between the chosen features minimization of classification error probability (POE) and average correlation coefficients (ACC). Each of them returned ten features occupying the initial place in the ranking devised according to its own coefficient. As a result of the Fisher coefficient and mutual information selections, the same features arranged in a different order were obtained. In both rankings, the 50% percentile (Perc.50%) was found in the first place. The next selected features come from the co-occurrence matrix. The sets of features selected in the selection process were evaluated using six classification tree methods. These were: decision stump (DS), Hoeffding tree (HT), logistic model trees (LMT), random forest (RF), random tree (RT) and reduced error pruning tree (REPT). In order to assess the accuracy of classifiers, the following parameters were used: overall classification accuracy (ACC), true positive rate (TPR, classification sensitivity), true negative rate (TNR, classification specificity), positive predictive value (PPV) and negative predictive value (NPV). Taking into account the classification results, it should be stated that the best results were obtained for the Hoeffding tree and logistic model trees classifiers, using the set of features selected by the POE + ACC method. In the case of the Hoeffding tree classifier, the highest values of three parameters were obtained: ACC = 90%, TPR = 93.3% and PPV = 93.3%. Additionally, the values of the other two parameters, i.e., TNR = 86.7% and NPV = 86.6% were close to the maximum values obtained for the LMT classifier. In the case of logistic model trees classifier, the same ACC value was obtained ACC=90% and the highest values for TNR=88.3% and NPV= 88.3%. The values of the other two parameters remained at a level close to the highest TPR = 91.7% and PPV = 91.6%. The results obtained in the experiment show that the use of classification trees is an effective method of classification of texture features. This allows identifying the conditions of the spongy tissue for healthy cases and those with the porosis.

Keywords: classification, feature selection, texture analysis, tree algorithms

Procedia PDF Downloads 180
840 A Research on Inference from Multiple Distance Variables in Hedonic Regression Focus on Three Variables

Authors: Yan Wang, Yasushi Asami, Yukio Sadahiro

Abstract:

In urban context, urban nodes such as amenity or hazard will certainly affect house price, while classic hedonic analysis will employ distance variables measured from each urban nodes. However, effects from distances to facilities on house prices generally do not represent the true price of the property. Distance variables measured on the same surface are suffering a problem called multicollinearity, which is usually presented as magnitude variance and mean value in regression, errors caused by instability. In this paper, we provided a theoretical framework to identify and gather the data with less bias, and also provided specific sampling method on locating the sample region to avoid the spatial multicollinerity problem in three distance variable’s case.

Keywords: hedonic regression, urban node, distance variables, multicollinerity, collinearity

Procedia PDF Downloads 465
839 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 330
838 The Evloution of LGBTQ Right in the U. S.: The Vaugries of Presidential Leadership and Followership

Authors: Michael A. Genovese

Abstract:

The struggle for LGBTQ rights in the United States began in Greenwich Village, New York, in 1967, when police tried to break up a gathering of mostly gay men who were partying at the Stonewall Bar in NYC. As unlikely as it may sound, this “riot” proved to be consequential in raising the political consciousness of gay men in America. From that point on, gays engaged in a political battle to achieve the rights to which they were entitled. This essay examines changes in popular opinion regarding LGBTQ rights from the late 1960s through the Trump administration, and examines the role public pressure played on presidential politics. For most of this period, presidents “followed” public opinion. This was true even during the administration of Barack Obama when gay Americans finally achieved some clearly spelled out rights (e.g. same-sex marriage). The findings of this paper call into question certain assumptions about presidential leadership, and underline the power of public opinion in shaping policy.

Keywords: presidential leadership, gay rights, LGBTQ, popular opinion

Procedia PDF Downloads 88
837 History, Challenges and Solutions for Social Work Education and Recognition in Vietnam

Authors: Thuy Bui Anh, Ngan Nguyen Thi Thanh

Abstract:

Currently, social work in Vietnam is entering the first step in the development process to become a true profession with a strong position in society. However, Spirit of helping and sharing of social work has already existed in the daily life of Vietnamese people for a very long time, becoming a precious heritage passed down from ancestors to the next generations while expanding the territory, building and defending for the country. Following the stream of history, charity work in Vietnam has gradually transformed itself towards a more professional work, especially in the last 2 decades. Accordingly, more than 50 universities and educational institutions in Vietnam have been licensed to train social work, ensuring a stronger foundation on human resources working in this field. Despite the strong growth, social work profession, social work education and the recognition of the role of the social workers still need to be fueled to develop, responded to the increasing demand of Vietnam society.

Keywords: education, history, recognition, social work, Vietnam

Procedia PDF Downloads 321
836 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 332
835 Effect of Viscosity in Void Structure with Interacting Variable Charge Dust Grains

Authors: Nebbat El Amine

Abstract:

The void is a dust free region inside the dust cloud in the plasma. It is found that the dust grain charge variation lead to the extension of the void. Moreover, for bigger dust grains, it is seen that the wave-like structure recedes when charge variation is dealt with. Furthermore, as the grain-grain distance is inversely proportional to density, the grain-grain interaction gets more important for a denser dust population and is to be included in momentum equation. For the result indicate above, the plasma is considered non viscous. But in fact, it’s not always true. Some authors measured experimentally the viscosity of this background and found that the viscosity of dusty plasma increase with background gas pressure. In this paper, we tack account the viscosity of the fluid, and we compare the result with that found in the recent work.

Keywords: voids, dusty plasmas, variable charge, viscosity

Procedia PDF Downloads 89
834 TNF-Kinoid® in Autoimmune Diseases

Authors: Yahia Massinissa, Melakhessou Med Akram, Mezahdia Mehdi, Marref Salah Eddine

Abstract:

Cytokines are natural proteins which act as true intercellular communication signals in immune and inflammatory responses. Reverse signaling pathways that activate cytokines help to regulate different functions at the target cell, causing its activation, its proliferation, the differentiation, its survival or death. It was shown that malfunctioning of the cytokine regulation, particularly over-expression, contributes to the onset and development of certain serious diseases such as chronic rheumatoid arthritis, Crohn's disease, psoriasis, lupus. The action mode of Kinoid® technology is based on the principle vaccine: The patient's immune system is activated so that it neutralizes itself and the factor responsible for the disease. When applied specifically to autoimmune diseases, therapeutic vaccination allows the body to neutralize cytokines (proteins) overproduced through a highly targeted stimulation of the immune system.

Keywords: cytokines, Kinoid tech, auto-immune diseases, vaccination

Procedia PDF Downloads 337
833 Machine Learning Invariants to Detect Anomalies in Secure Water Treatment

Authors: Jonathan Heng, Yoong Cheah Huei

Abstract:

A strategic model that does not trigger any false alarms to detect anomalies in Secure Water Treatment (SWaT) test bed is presented. This model uses machine learning invariants formulated from streamlining the general form of Auto-Regressive models with eXogenous input. A creative generalized CUSUM algorithm to integrate the invariants and the detection strategy technique is successfully developed and tested in the SWaT Programmable Logic Controllers (PLCs). Three steps to fine-tune parameters, b and τ in the generalized algorithm are stated and an example used to demonstrate the tuning process is discussed. This approach can swiftly and effectively detect various scopes of cyber-attacks such as multiple points single stage and multiple points multiple stages in SWaT. This technique can be applied in water treatment plants and other cyber physical systems like power and gas plants too.

Keywords: machine learning invariants, generalized CUSUM algorithm with invariants and detection strategy, scope of cyber attacks, strategic model, tuning parameters

Procedia PDF Downloads 181
832 Trapped in Hegemonic Binaries: Performing the Body

Authors: Bitopi Dutta

Abstract:

This paper attempts to understand the constructs of binaries while taking into account the politics of the body. It delves into how these constructs get fashioned and recreated while performing the same across normative and non-normative discourses. While it may be almost mundane and commonplace to see the performance of body within binary constructs across the normative discourses, this is to a great extent also true for those queer discourses that have challenged the conventional/normative. With a queer feminist perspective, the paper challenges this performativity while simultaneously engaging with the subtle nuances of blurring the borders of gender markers. The problem with this polarization within binary constructs is that there remains a tendency to reinstate patriarchy within queerness. To substantiate this argument further, the paper will draw from narratives and accounts of identities with alternate sexualities and genders. The paper concludes with problematising this hegemony within queer discourses locating the question of acceptance and visibility of fluidities.

Keywords: binary, body, gender, identity, performativity, queer

Procedia PDF Downloads 291
831 A Dynamic Ensemble Learning Approach for Online Anomaly Detection in Alibaba Datacenters

Authors: Wanyi Zhu, Xia Ming, Huafeng Wang, Junda Chen, Lu Liu, Jiangwei Jiang, Guohua Liu

Abstract:

Anomaly detection is a first and imperative step needed to respond to unexpected problems and to assure high performance and security in large data center management. This paper presents an online anomaly detection system through an innovative approach of ensemble machine learning and adaptive differentiation algorithms, and applies them to performance data collected from a continuous monitoring system for multi-tier web applications running in Alibaba data centers. We evaluate the effectiveness and efficiency of this algorithm with production traffic data and compare with the traditional anomaly detection approaches such as a static threshold and other deviation-based detection techniques. The experiment results show that our algorithm correctly identifies the unexpected performance variances of any running application, with an acceptable false positive rate. This proposed approach has already been deployed in real-time production environments to enhance the efficiency and stability in daily data center operations.

Keywords: Alibaba data centers, anomaly detection, big data computation, dynamic ensemble learning

Procedia PDF Downloads 202
830 Flood Monitoring in the Vietnamese Mekong Delta Using Sentinel-1 SAR with Global Flood Mapper

Authors: Ahmed S. Afifi, Ahmed Magdy

Abstract:

Satellite monitoring is an essential tool to study, understand, and map large-scale environmental changes that affect humans, climate, and biodiversity. The Sentinel-1 Synthetic Aperture Radar (SAR) instrument provides a high collection of data in all-weather, short revisit time, and high spatial resolution that can be used effectively in flood management. Floods occur when an overflow of water submerges dry land that requires to be distinguished from flooded areas. In this study, we use global flood mapper (GFM), a new google earth engine application that allows users to quickly map floods using Sentinel-1 SAR. The GFM enables the users to adjust manually the flood map parameters, e.g., the threshold for Z-value for VV and VH bands and the elevation and slope mask threshold. The composite R:G:B image results by coupling the bands of Sentinel-1 (VH:VV:VH) reduces false classification to a large extent compared to using one separate band (e.g., VH polarization band). The flood mapping algorithm in the GFM and the Otsu thresholding are compared with Sentinel-2 optical data. And the results show that the GFM algorithm can overcome the misclassification of a flooded area in An Giang, Vietnam.

Keywords: SAR backscattering, Sentinel-1, flood mapping, disaster

Procedia PDF Downloads 106
829 Women Characters in Pakistani Films: A Critical Evaluation

Authors: Ali Arshad

Abstract:

The study examines the depiction of women characters in Urdu and Punjabi films. It is a critical evaluation of forty-eight Pakistani films. It explores the characters of women portrays in Urdu and Punjabi film of Pakistan. Using content analysis as methodology with feminist research that helps to investigate the phenomena and supports the study. Finding of the study shows that women characters in Urdu and Punjabi films are not the reflection of true Pakistani women rather this picture represents a negative image of Pakistani women in viewers mind. These characters don’t address the women’s issues nor do they present the solutions to these problems faced by Pakistani women. The characters of Pakistani women are not free from male prejudice, and these films do not portray the social and political role perform by actual Pakistani women. The analysis shows that the characters of women in Urdu and Punjabi films are based on the assumptions.

Keywords: women, Pakistani, film, characters

Procedia PDF Downloads 303
828 Fluorometric Aptasensor: Evaluation of Stability and Comparison to Standard Enzyme-Linked Immunosorbent Assay

Authors: J. Carlos Kuri, Varun Vij, Raymond J. Turner, Orly Yadid-Pecht

Abstract:

Celiac disease (CD) is an immune system disorder that is triggered by ingesting gluten. As a gluten-free (GF) diet has become a concern of many people for health reasons, a gold standard had to be nominated. Enzyme-linked immunosorbent assay (ELISA) has taken the seat of this role. However, multiple limitations were discovered, and with that, the desire for an alternative method now exists. Nucleic acid-based aptamers have become of great interest due to their selectivity, specificity, simplicity, and rapid-testing advantages. However, fluorescence-based aptasensors have been tagged as unstable, but lifespan details are rarely stated. In this work, the lifespan stability of a fluorescence-based aptasensor is shown over an 8-week-long study displaying the accuracy of the sensor and false negatives. This study follows 22 different samples, including GF and gluten-rich (GR) and soy sauce products, off-the-shelf products, and reference material from laboratories, giving a total of 836 tests. The analysis shows an accuracy of correctly classifying GF and GR products of 96.30% and 100%, respectively when the protocol is augmented with molecular sieves. The overall accuracy remains around 94% within the first four weeks and then decays to 63%.

Keywords: aptasensor, PEG, rGO, FAM, RM, ELISA

Procedia PDF Downloads 124
827 Congenital Positional Anomaly of Descending Colon and Sigmoid Colon: Its Embryological Basis and Clinical Implications

Authors: Dhivyalakshmi Gnanasekaran, Sonali Adole Prasante, Raveendranath Veeramamani, H. Y. Suma

Abstract:

A rare case of intestinal malrotation with midline descending colon and right sided sigmoid colon was observed in an adult male cadaver aged around 55 years during routine dissection. The descending colon began from the splenic flexure and gradually descended downwards to occupy the midline position and turned to the right side to be continued as sigmoid colon at the level of the fifth lumbar vertebra. In the right iliac fossa some part of loop of sigmoid colon displaced into the right lumbar region before entering into the true pelvis to continue as rectum. This anomalous descending and sigmoid colon was supplied by varying branching pattern of inferior mesenteric artery. It is extremely important to consider this embryological anomaly before any interventional diagnostic procedures like colonoscopy and to enhance the safety of colonic surgery.

Keywords: sigmoid colon, descending colon, hindgut, malrotation

Procedia PDF Downloads 251
826 Immune Activity of Roman Hens as Influenced by the Feed Formulated with Germinated Paddy Rice

Authors: Wirot Likittrakulwong, Pisit Poolprasert, Tossaporn Incharoen

Abstract:

Germinated paddy rice (GPR) has the potential to be used as a feed ingredient. However, their properties have not been fully investigated. This paper examined the nutrient digestibility and the relationship to immune activity in Roman hens fed with GPR. It was found that true and apparent metabolizable energy (ME) values of GPR were 3.20 and 3.28 kcal/g air dry, respectively. GPR exhibited high content of phytonutrients, especially GABA. GPR showed similar protein profiles in comparison to non-germinated paddy rice. For immune activity, the feed with GPR enhanced the immune activity of Roman hens under high stocking density stress as evidenced by the activity of superoxide dismutase (SOD) and lysozyme activity. In this study, GPR is proved to be a good source of functional ingredient for chicken feed.

Keywords: germinated paddy rice, nutrient digestibility, immune activity, functional property

Procedia PDF Downloads 163
825 A Calibration Method for Temperature Distribution Measurement of Thermochromic Liquid Crystal Based on Mathematical Morphology of Hue Image

Authors: Risti Suryantari, Flaviana

Abstract:

The aim of this research is to design calibration method of Thermochromic Liquid Crystal for temperature distribution measurement based on mathematical morphology of hue image A glass of water is placed on the surface of sample TLC R25C5W at certain temperature. We use scanner for image acquisition. The true images in RGB format is converted to HSV (hue, saturation, value) by taking of hue without saturation and value. Then the hue images is processed based on mathematical morphology using Matlab2013a software to get better images. There are differences on the final images after processing at each temperature variation based on visualization observation and the statistic value. The value of maximum and mean increase with rising temperature. It could be parameter to identify the temperature of the human body surface like hand or foot surface.

Keywords: thermochromic liquid crystal, TLC, mathematical morphology, hue image

Procedia PDF Downloads 475
824 The Impact of COVID-19 Pandemic on Educators in South Africa: Self-Efficacy and Anxiety

Authors: Mostert Jacques, Gulseven Osman, Williams Courtney

Abstract:

The Covid-19 pandemic caused unparalleled disruption in the lives of the majority of the world. This included school closures and introduction of Online Learning. In this article we investigated the impact of distance learning on the self-efficacy and anxiety levels experienced by educators in South Africa. We surveyed 60 respondents from Independent Schools using a Likert Scale rating of 0 to 4. The results suggested that despite experiencing moderate anxiety, educators showed a sense of high self-efficacy during distance learning. This was specifically true for those with underlying health concerns. There was no significant difference between how the different genders experienced anxiety and self-efficacy. Further research into the impact on learners’ anxiety levels during distance learning will provide policymakers and educators with a better understanding of how the use of technology is influencing the effectiveness of teaching, learning, and assessment.

Keywords: COVID-19, education, self-efficacy, anxiety

Procedia PDF Downloads 205
823 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 471
822 Metamorphic Computer Virus Classification Using Hidden Markov Model

Authors: Babak Bashari Rad

Abstract:

A metamorphic computer virus uses different code transformation techniques to mutate its body in duplicated instances. Characteristics and function of new instances are mostly similar to their parents, but they cannot be easily detected by the majority of antivirus in market, as they depend on string signature-based detection techniques. The purpose of this research is to propose a Hidden Markov Model for classification of metamorphic viruses in executable files. In the proposed solution, portable executable files are inspected to extract the instructions opcodes needed for the examination of code. A Hidden Markov Model trained on portable executable files is employed to classify the metamorphic viruses of the same family. The proposed model is able to generate and recognize common statistical features of mutated code. The model has been evaluated by examining the model on a test data set. The performance of the model has been practically tested and evaluated based on False Positive Rate, Detection Rate and Overall Accuracy. The result showed an acceptable performance with high average of 99.7% Detection Rate.

Keywords: malware classification, computer virus classification, metamorphic virus, metamorphic malware, Hidden Markov Model

Procedia PDF Downloads 315
821 “The Unbearable Lightness of Being” Book as an Interdisciplinary Study Basis for Students’ Learning Process about Love and Politics at Old Communist Czechoslovakia

Authors: Clarissa Valença Travassos da Silva

Abstract:

In this article, it is intended to study the book “The unbearable Lightness of Being” by the Czech Republican writer Milan Kundera. The main objective is to be an interdisciplinary study basis for students in the world about love and politics at old communist Czechoslovakia. Love is presented by discussing the relationship between Tomas and Tereza and the discovery of true love. Furthermore, it is debated the Russian invasion in Czechoslovakia and the outcomes of it for the personages, all this related to the contradiction of lightness and heaviness in life. For the production of this didactic material, the researcher based her work on the original book, “The Unbearable Lightness of Being” by Kundera, Milan Kundera’s interviews, Friedrich Nietzche, Zygmunt Bauman and George Orwell, among Brazilian and international articles on the issue.

Keywords: lightness, heaviness, Russia, Czechoslovakia, love

Procedia PDF Downloads 400
820 Relaxor Ferroelectric Lead-Free Na₀.₅₂K₀.₄₄Li₀.₀₄Nb₀.₈₄Ta₀.₁₀Sb₀.₀₆O₃ Ceramic: Giant Electromechanical Response with Intrinsic Polarization and Resistive Leakage Analyses

Authors: Abid Hussain, Binay Kumar

Abstract:

Environment-friendly lead-free Na₀.₅₂K₀.₄₄Li₀.₀₄Nb₀.₈₄Ta₀.₁₀Sb₀.₀₆O₃ (NKLNTS) ceramic was synthesized by solid-state reaction method in search of a potential candidate to replace lead-based ceramics such as PbZrO₃-PbTiO₃ (PZT), Pb(Mg₁/₃Nb₂/₃)O₃-PbTiO₃ (PMN-PT) etc., for various applications. The ceramic was calcined at temperature 850 ᵒC and sintered at 1090 ᵒC. The powder X-Ray Diffraction (XRD) pattern revealed the formation of pure perovskite phase having tetragonal symmetry with space group P4mm of the synthesized ceramic. The surface morphology of the ceramic was studied using Field Emission Scanning Electron Microscopy (FESEM) technique. The well-defined grains with homogeneous microstructure were observed. The average grain size was found to be ~ 0.6 µm. A very large value of piezoelectric charge coefficient (d₃₃ ~ 754 pm/V) was obtained for the synthesized ceramic which indicated its potential for use in transducers and actuators. In dielectric measurements, a high value of ferroelectric to paraelectric phase transition temperature (Tm~305 ᵒC), a high value of maximum dielectric permittivity ~ 2110 (at 1 kHz) and a very small value of dielectric loss ( < 0.6) were obtained which suggested the utility of NKLNTS ceramic in high-temperature ferroelectric devices. Also, the degree of diffuseness (γ) was found to be 1.61 which confirmed a relaxor ferroelectric behavior in NKLNTS ceramic. P-E hysteresis loop was traced and the value of spontaneous polarization was found to be ~11μC/cm² at room temperature. The pyroelectric coefficient was obtained to be very high (p ∼ 1870 μCm⁻² ᵒC⁻¹) for the present case indicating its applicability in pyroelectric detector applications including fire and burglar alarms, infrared imaging, etc. NKLNTS ceramic showed fatigue free behavior over 107 switching cycles. Remanent hysteresis task was performed to determine the true-remanent (or intrinsic) polarization of NKLNTS ceramic by eliminating non-switchable components which showed that a major portion (83.10 %) of the remanent polarization (Pr) is switchable in the sample which makes NKLNTS ceramic a suitable material for memory switching devices applications. Time-Dependent Compensated (TDC) hysteresis task was carried out which revealed resistive leakage free nature of the ceramic. The performance of NKLNTS ceramic was found to be superior to many lead based piezoceramics and hence can effectively replace them for use in piezoelectric, pyroelectric and long duration ferroelectric applications.

Keywords: dielectric properties, ferroelectric properties , lead free ceramic, piezoelectric property, solid state reaction, true-remanent polarization

Procedia PDF Downloads 136
819 Case Study Analysis for Driver's Company in the Transport Sector with the Help of Data Mining

Authors: Diana Katherine Gonzalez Galindo, David Rolando Suarez Mora

Abstract:

With this study, we used data mining as a new alternative of the solution to evaluate the comments of the customers in order to find a pattern that helps us to determine some behaviors to reduce the deactivation of the partners of the LEVEL app. In one of the greatest business created in the last times, the partners are being affected due to an internal process that compensates the customer for a bad experience, but these comments could be false towards the driver, that’s why we made an investigation to collect information to restructure this process, many partners have been disassociated due to this internal process and many of them refuse the comments given by the customer. The main methodology used in this case study is the observation, we recollect information in real time what gave us the opportunity to see the most common issues to get the most accurate solution. With this new process helped by data mining, we could get a prediction based on the behaviors of the customer and some basic data recollected such as the age, the gender, and others; this could help us in future to improve another process. This investigation gives more opportunities to the partner to keep his account active even if the customer writes a message through the app. The term is trying to avoid a recession of drivers in the future offering improving in the processes, at the same time we are in search of stablishing a strategy which benefits both the app’s managers and the associated driver.

Keywords: agent, driver, deactivation, rider

Procedia PDF Downloads 281
818 Parallels Between Indian Art Music and Western Art Music: The Suppression of the Notion of the 'Melody'

Authors: Kedarnath Awati

Abstract:

Some parallels between Indian Art Music and Western Art Music, such as the identity of the basic heptatonic scale structure, are quite obvious and need no further discussion. Other parallels are far less obvious, and it is one of them that the author is interested in. Specifically, the author would like to make a serious claim that in both types of music, there is an unspoken dependence on melody. Yes, it is true that the techniques that the two systems use for elaboration are very, very different: Western music uses the techniques of harmony, counterpoint, orchestration and motivic variation, while the Indian systems, both the Hindustani and the Carnatic traditions use the technique of raagdaari. The reason that this point is barely spoken about is that both in the West as well as in India, artists tend to think of melody as something elementary or as something 'given'. The Indian musicians would much rather dwell upon this or that meend or taan or other technical device, while the West thinks that melody is passé and would rather discuss the merits and demerits of spectralism and perhaps serialism. The author would like to explore this theme further in his paper.

Keywords: Indian art music, Western art music, melody, raagdaari, motivic variation.

Procedia PDF Downloads 64
817 Optimizing Machine Learning Algorithms for Defect Characterization and Elimination in Liquids Manufacturing

Authors: Tolulope Aremu

Abstract:

The key process steps to produce liquid detergent products will introduce potential defects, such as formulation, mixing, filling, and packaging, which might compromise product quality, consumer safety, and operational efficiency. Real-time identification and characterization of such defects are of prime importance for maintaining high standards and reducing waste and costs. Usually, defect detection is performed by human inspection or rule-based systems, which is very time-consuming, inconsistent, and error-prone. The present study overcomes these limitations in dealing with optimization in defect characterization within the process for making liquid detergents using Machine Learning algorithms. Performance testing of various machine learning models was carried out: Support Vector Machine, Decision Trees, Random Forest, and Convolutional Neural Network on defect detection and classification of those defects like wrong viscosity, color deviations, improper filling of a bottle, packaging anomalies. These algorithms have significantly benefited from a variety of optimization techniques, including hyperparameter tuning and ensemble learning, in order to greatly improve detection accuracy while minimizing false positives. Equipped with a rich dataset of defect types and production parameters consisting of more than 100,000 samples, our study further includes information from real-time sensor data, imaging technologies, and historic production records. The results are that optimized machine learning models significantly improve defect detection compared to traditional methods. Take, for instance, the CNNs, which run at 98% and 96% accuracy in detecting packaging anomaly detection and bottle filling inconsistency, respectively, by fine-tuning the model with real-time imaging data, through which there was a reduction in false positives of about 30%. The optimized SVM model on detecting formulation defects gave 94% in viscosity variation detection and color variation. These values of performance metrics correspond to a giant leap in defect detection accuracy compared to the usual 80% level achieved up to now by rule-based systems. Moreover, this optimization with models can hasten defect characterization, allowing for detection time to be below 15 seconds from an average of 3 minutes using manual inspections with real-time processing of data. With this, the reduction in time will be combined with a 25% reduction in production downtime because of proactive defect identification, which can save millions annually in recall and rework costs. Integrating real-time machine learning-driven monitoring drives predictive maintenance and corrective measures for a 20% improvement in overall production efficiency. Therefore, the optimization of machine learning algorithms in defect characterization optimum scalability and efficiency for liquid detergent companies gives improved operational performance to higher levels of product quality. In general, this method could be conducted in several industries within the Fast moving consumer Goods industry, which would lead to an improved quality control process.

Keywords: liquid detergent manufacturing, defect detection, machine learning, support vector machines, convolutional neural networks, defect characterization, predictive maintenance, quality control, fast-moving consumer goods

Procedia PDF Downloads 21