Search results for: multi-layer perception neural networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5697

Search results for: multi-layer perception neural networks

2367 Developed CNN Model with Various Input Scale Data Evaluation for Bearing Faults Prognostics

Authors: Anas H. Aljemely, Jianping Xuan

Abstract:

Rolling bearing fault diagnosis plays a pivotal issue in the rotating machinery of modern manufacturing. In this research, a raw vibration signal and improved deep learning method for bearing fault diagnosis are proposed. The multi-dimensional scales of raw vibration signals are selected for evaluation condition monitoring system, and the deep learning process has shown its effectiveness in fault diagnosis. In the proposed method, employing an Exponential linear unit (ELU) layer in a convolutional neural network (CNN) that conducts the identical function on positive data, an exponential nonlinearity on negative inputs, and a particular convolutional operation to extract valuable features. The identification results show the improved method has achieved the highest accuracy with a 100-dimensional scale and increase the training and testing speed.

Keywords: bearing fault prognostics, developed CNN model, multiple-scale evaluation, deep learning features

Procedia PDF Downloads 192
2366 The Sound of Getting Closer: A Phenomenological Research of the Senses of Proximity and Touch

Authors: Marcello Lussana

Abstract:

Closer is a wireless system developed by the “Design Research Lab” of the UdK Berlin that is able to detect the proximity and touch between two (or more) persons. We have been using this system for one performance and one installation: in both cases, the proximity and touch events of the two participants have been sonified using the software Supercollider. In this paper, we are going to focus on the actual experience of the participants involved, especially related to the awareness of their body, their level of proprioception and how they felt in their body and in connection with the other person. In order to give value to the lived experience of the participant, a phenomenological method described and developed by Professor Claire Petitmengin has been used. This strategy allowed the interviewees to become aware of their subjective experience, and describe it with great precision. This is essential in order to understand the actual state of consciousness of the users. Our aim is to research the senses of proprioception, touch, and proximity: as they all involve a pre-reflective state of consciousness, they are central for the understanding of human perception. The interviews revealed how this experience could improve and increase proprioception and awareness of your body.

Keywords: interactive sound, phenomenology, pre-reflective, proprioception, subjective experience

Procedia PDF Downloads 239
2365 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 168
2364 Partial M-Sequence Code Families Applied in Spectral Amplitude Coding Fiber-Optic Code-Division Multiple-Access Networks

Authors: Shin-Pin Tseng

Abstract:

Nowadays, numerous spectral amplitude coding (SAC) fiber-optic code-division-multiple-access (FO-CDMA) techniques were appealing due to their capable of providing moderate security and relieving the effects of multiuser interference (MUI). Nonetheless, the performance of the previous network is degraded due to fixed in-phase cross-correlation (IPCC) value. Based on the above problems, a new SAC FO-CDMA network using partial M-sequence (PMS) code is presented in this study. Because the proposed PMS code is originated from M-sequence code, the system using the PMS code could effectively suppress the effects of MUI. In addition, two-code keying (TCK) scheme can applied in the proposed SAC FO-CDMA network and enhance the whole network performance. According to the consideration of system flexibility, simple optical encoders/decoders (codecs) using fiber Bragg gratings (FBGs) were also developed. First, we constructed a diagram of the SAC FO-CDMA network, including (N/2-1) optical transmitters, (N/2-1) optical receivers, and one N×N star coupler for broadcasting transmitted optical signals to arrive at the input port of each optical receiver. Note that the parameter N for the PMS code was the code length. In addition, the proposed SAC network was using superluminescent diodes (SLDs) as light sources, which then can save a lot of system cost compared with the other FO-CDMA methods. For the design of each optical transmitter, it is composed of an SLD, one optical switch, and two optical encoders according to assigned PMS codewords. On the other hand, each optical receivers includes a 1 × 2 splitter, two optical decoders, and one balanced photodiode for mitigating the effect of MUI. In order to simplify the next analysis, the some assumptions were used. First, the unipolarized SLD has flat power spectral density (PSD). Second, the received optical power at the input port of each optical receiver is the same. Third, all photodiodes in the proposed network have the same electrical properties. Fourth, transmitting '1' and '0' has an equal probability. Subsequently, by taking the factors of phase‐induced intensity noise (PIIN) and thermal noise, the corresponding performance was displayed and compared with the performance of the previous SAC FO-CDMA networks. From the numerical result, it shows that the proposed network improved about 25% performance than that using other codes at BER=10-9. This is because the effect of PIIN was effectively mitigated and the received power was enhanced by two times. As a result, the SAC FO-CDMA network using PMS codes has an opportunity to apply in applications of the next-generation optical network.

Keywords: spectral amplitude coding, SAC, fiber-optic code-division multiple-access, FO-CDMA, partial M-sequence, PMS code, fiber Bragg grating, FBG

Procedia PDF Downloads 379
2363 Language Processing of Seniors with Alzheimer’s Disease: From the Perspective of Temporal Parameters

Authors: Lai Yi-Hsiu

Abstract:

The present paper aims to examine the language processing of Chinese-speaking seniors with Alzheimer’s disease (AD) from the perspective of temporal cues. Twenty healthy adults, 17 healthy seniors, and 13 seniors with AD in Taiwan participated in this study to tell stories based on two sets of pictures. Nine temporal cues were fetched and analyzed. Oral productions in Mandarin Chinese were compared and discussed to examine to what extent and in what way these three groups of participants performed with significant differences. Results indicated that the age effects were significant in filled pauses. The dementia effects were significant in mean duration of pauses, empty pauses, filled pauses, lexical pauses, normalized mean duration of filled pauses and lexical pauses. The findings reported in the current paper help characterize the nature of language processing in seniors with or without AD, and contribute to the interactions between the AD neural mechanism and their temporal parameters.

Keywords: language processing, Alzheimer’s disease, Mandarin Chinese, temporal cues

Procedia PDF Downloads 437
2362 Self-focused Language and the Reversive Impact of Depression in Negative Mood

Authors: Soheil Behdarvandirad

Abstract:

The relationship between depression and self-focused language has been well documented. The more depressed a person is, the more "I"s, "me"s, and "my"s they will use. The present study attempted to factor in the impact of mood and examine whether negative mood has self-focused impacts similar to those of depression. For this purpose, 160 Iranian native speakers of Farsi were divided into three experimental groups of negative, neutral, and positive groups. After completing the BDI-II inventory and depression measurement, they were presented with pretested mood stimuli (3 separate videos to induce the target moods). Finally, they were asked to write between 10 to 20 minutes about a topic that asked them to freely write about their state of life, how you feel about it and the reasons that had shaped their current life circumstances. While the significant correlation between depression and I-talk was observed, negative mood led to more we-talk in general and seemed to even push the participants away from self-rumination. It seems that it is an emotion-regulatory strategy that participants subconsciously adopt to distract themselves from the disturbing mood. However, negative mood intensified the self-focused language among depressed participants. Such results can be further studied by examining brain areas that are more involved in self-perception and particularly in precuneus.

Keywords: self-focused language, depression, mood, precuneus

Procedia PDF Downloads 71
2361 Create a Brand Value Assessment Model to Choosing a Cosmetic Brand in Tehran Combining DEMATEL Techniques and Multi-Stage ANFIS

Authors: Hamed Saremi, Suzan Taghavy, Seyed Mohammad Hanif Sanjari, Mostafa Kahali

Abstract:

One of the challenges in manufacturing and service companies to provide a product or service is recognized Brand to consumers in target markets. They provide most of their processes under the same capacity. But the constant threat of devastating internal and external resources to prevent a rise Brands and more companies are recognizing the stages are bankrupt. This paper has tried to identify and analyze effective indicators of brand equity and focuses on indicators and presents a model of intelligent create a model to prevent possible damage. In this study, the identified indicators of brand equity are based on literature study and according to expert opinions, set of indicators By techniques DEMATEL Then to used Multi-Step Adaptive Neural-Fuzzy Inference system (ANFIS) to design a multi-stage intelligent system for assessment of brand equity.

Keywords: brand, cosmetic product, ANFIS, DEMATEL

Procedia PDF Downloads 409
2360 The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link

Authors: Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito

Abstract:

Missile proliferation and global stability are intrinsically linked. Missile threats continually appear at the forefront of global security issues. North Korea’s recently demonstrated nuclear and intercontinental ballistic missile (ICBM) capabilities, for the first time since the Cold War, renewed public interest in strategic missile defense capabilities. To protect from limited ICBM attacks from so-called rogue actors, the United States developed the Ground-based Midcourse Defense (GMD) system. This study examines if the GMD missile defense shield has contributed to a safer world or triggered a new arms race. Based upon increased missile-related developments and the lack of adherence to international missile treaties, it is generally perceived that the GMD system is a destabilizing factor for global security. By examining the current state of arms control treaties as well as existing missile arsenals and ongoing efforts in technologies to overcome U.S. missile defenses, this study seeks to analyze the contribution of GMD to global stability. A thorough investigation cannot ignore that, through the establishment of this limited capability, the U.S. violated longstanding, successful weapons treaties and caused concern among states that possess ICBMs. GMD capability contributes to the perception that ICBM arsenals could become ineffective, creating an imbalance in favor of the United States, leading to increased global instability and tension. While blame for the deterioration of global stability and non-adherence to arms control treaties is often placed on U.S. missile defense, the facts do not necessarily support this view. The notion of a renewed arms race due to GMD is supported neither by current missile arsenals nor by the inevitable development of new and enhanced missile technology, to include multiple independently targeted reentry vehicles (MIRVs), maneuverable reentry vehicles (MaRVs), and hypersonic glide vehicles (HGVs). The methodology in this study encapsulates a period of time, pre- and post-GMD introduction, while analyzing international treaty adherence, missile counts and types, and research in new missile technologies. The decline in international treaty adherence, coupled with a measurable increase in the number and types of missiles or research in new missile technologies during the period after the introduction of GMD, could be perceived as a clear indicator of GMD contributing to global instability. However, research into improved technology (MIRV, MaRV and HGV) prior to GMD, as well as a decline of various global missile inventories and testing of systems during this same period, would seem to invalidate this theory. U.S. adversaries have exploited the perception of the U.S. missile defense shield as a destabilizing factor as a pretext to strengthen and modernize their militaries and justify their policies. As a result, it can be concluded that global stability has not significantly decreased due to GMD; but rather, the natural progression of technological and missile development would inherently include innovative and dynamic approaches to target engagement, deterrence, and national defense.

Keywords: arms control, arms race, global security, GMD, ICBM, missile defense, proliferation

Procedia PDF Downloads 136
2359 A Comprehensive Study of Camouflaged Object Detection Using Deep Learning

Authors: Khalak Bin Khair, Saqib Jahir, Mohammed Ibrahim, Fahad Bin, Debajyoti Karmaker

Abstract:

Object detection is a computer technology that deals with searching through digital images and videos for occurrences of semantic elements of a particular class. It is associated with image processing and computer vision. On top of object detection, we detect camouflage objects within an image using Deep Learning techniques. Deep learning may be a subset of machine learning that's essentially a three-layer neural network Over 6500 images that possess camouflage properties are gathered from various internet sources and divided into 4 categories to compare the result. Those images are labeled and then trained and tested using vgg16 architecture on the jupyter notebook using the TensorFlow platform. The architecture is further customized using Transfer Learning. Methods for transferring information from one or more of these source tasks to increase learning in a related target task are created through transfer learning. The purpose of this transfer of learning methodologies is to aid in the evolution of machine learning to the point where it is as efficient as human learning.

Keywords: deep learning, transfer learning, TensorFlow, camouflage, object detection, architecture, accuracy, model, VGG16

Procedia PDF Downloads 132
2358 Liquidity and Cash Management Practices of Owner-Managed Firms-A Case of South East, Nigeria

Authors: Ugbor Raphael Oluchukwu

Abstract:

The survey research design was adopted to examine whether liquidity and cash management practices of owner-managed firms in South East Nigeria influence their profitability, growth and survival. Four independent variables (accounting systems, working capital management, budgetary control, and managerial planning) were used in the evaluation which was restricted to eight small firms. Results indicate that one variable, working capital management alone dominate the liquidity perception of owner managers. As a result, owner managers find it difficult to meet maturing business obligations as growth sets in. The study also reveals that the four independent variables have significant impact on the profitability, growth and survival of owner managed firms. Owner managers are therefore advised to undertake regular entrepreneurship training in order to upgrade their liquidity and cash management knowledge and practices to enhance their overall performance.

Keywords: liquidity management, owner-managed firm, profitability, survival

Procedia PDF Downloads 422
2357 From E-Government to Cloud-Government Challenges of Jordanian Citizens' Acceptance for Public Services

Authors: Abeer Alkhwaldi, Mumtaz Kamala

Abstract:

On the inception of the third millennium, there is much evidence that cloud technologies have become the strategic trend for many governments not only developed countries (e.g., UK, Japan, and USA), but also developing countries (e.g. Malaysia and the Middle East region), who have launched cloud computing movements for enhanced standardization of IT resources, cost reduction, and more efficient public services. Therefore, cloud-based e-government services considered as one of the high priorities for government agencies in Jordan. Although of their phenomenal evolution, government cloud-services still suffering from the adoption challenges of e-government initiatives (e.g. technological, human-aspects, social, and financial) which need to be considered carefully by governments contemplating its implementation. This paper presents a pilot study to investigate the citizens' perception of the extent in which these challenges affect the acceptance and use of cloud computing in Jordanian public sector. Based on the data analysis collected using online survey some important challenges were identified. The results can help to guide successful acceptance of cloud-based e-government services in Jordan.

Keywords: challenges, cloud computing, e-government, acceptance, Jordan

Procedia PDF Downloads 425
2356 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 159
2355 Cellular Traffic Prediction through Multi-Layer Hybrid Network

Authors: Supriya H. S., Chandrakala B. M.

Abstract:

Deep learning based models have been recently successful adoption for network traffic prediction. However, training a deep learning model for various prediction tasks is considered one of the critical tasks due to various reasons. This research work develops Multi-Layer Hybrid Network (MLHN) for network traffic prediction and analysis; MLHN comprises the three distinctive networks for handling the different inputs for custom feature extraction. Furthermore, an optimized and efficient parameter-tuning algorithm is introduced to enhance parameter learning. MLHN is evaluated considering the “Big Data Challenge” dataset considering the Mean Absolute Error, Root Mean Square Error and R^2as metrics; furthermore, MLHN efficiency is proved through comparison with a state-of-art approach.

Keywords: MLHN, network traffic prediction

Procedia PDF Downloads 78
2354 Discouraged Borrowers: Evidence for Eurozone SMEs

Authors: Javier Sanchez Vidal, Ciarán Mac An Bhaird, Brian Lucey

Abstract:

This study examines the decision by firm owners not to apply for intermediated debt due to a perception that their application will be rejected. Based on a sample of SMEs in 9 European countries over the period 2009-2011, we examine potential explanatory factors for borrower discouragement, including firm, macroeconomic, regulatory and banking industry variables. Compared with firms that applied for bank loans, discouraged borrowers are smaller, younger, have declining turnover and an increasing debt/assets ratio. Perceived willingness of banks to lend rather than the company’s own credit history is more important to encourage applications. Perceptions of refusal are procyclical and may be self-perpetuating. Increased concentration in the banking sector reduces discouragement, indicating the importance of relationship banking. Transmission of macro effects through the banking system and economic environment may also lead to higher levels of discouragement. A good regulatory scheme is also advisable, either for the lenders or the borrowers (overall the good ones).

Keywords: entrepreneurial finance, discouraged borrowers, banking, financial crisis, eurozone

Procedia PDF Downloads 399
2353 Definition, Structure, and Core Functions of the State Image

Authors: Rosa Nurtazina, Yerkebulan Zhumashov, Maral Tomanova

Abstract:

Humanity is entering an era when 'virtual reality' as the image of the world created by the media with the help of the Internet does not match the reality in many respects, when new communication technologies create a fundamentally different and previously unknown 'global space'. According to these technologies, the state begins to change the basic technology of political communication of the state and society, the state and the state. Nowadays, image of the state becomes the most important tool and technology. Image is a purposefully created image granting political object (person, organization, country, etc.) certain social and political values and promoting more emotional perception. Political image of the state plays an important role in international relations. The success of the country's foreign policy, development of trade and economic relations with other countries depends on whether it is positive or negative. Foreign policy image has an impact on political processes taking place in the state: the negative image of the countries can be used by opposition forces as one of the arguments to criticize the government and its policies.

Keywords: image of the country, country's image classification, function of the country image, country's image components

Procedia PDF Downloads 423
2352 The Reality of Gender Equality in Universities Libraries: A Case of Pakistan

Authors: Qurat Ul Ain Saleem, Kanwal Ameen

Abstract:

The library and information science discipline is universally known as a feminist profession. It is considered a suitable field for females in Pakistan like a few other fields such as teaching and healthcare. It is also reflected through the uneven enrollment at graduate levels in library schools across the country as there are more females as compared to males. However, that uneven ratio does not really translate in the profession after passing out. There are more males in the professional as compared to females, as well as males can be seen on managerial and administrative posts majorly. A few females who joined the perception remain underrated and are hardly seen at managerial or administrative positions in the academic libraries. Therefore, this study was designed to highlight the perceptions of those females who have joined the profession to identify the issues related to equality faced by them as a professional. A qualitative research design based on a semi-structured interview was selected as an appropriate method to achieve the objectives of this study. Female librarians working in the higher education commission’s recognized public and private sector universities of Punjab, Pakistan, were selected as the population for this study. Female librarians shared that inequalities and discrimination based on face value, experience, communication, and relationship with the manager are common at their workplaces. They added that managers prefer male professionals to deal with delegation or presentations though we both can do that. Female professionals from the private sector believed that library managers make final hiring and selection decisions based on job duties and gender. However, the one with strong references will be preferred for the job. Also, private-sector employees suffered more prejudice due to the non-availability of proper patterns of promotions and increments. The government personnel said there is always a proper board/procedure for hiring and promotions; therefore, it is difficult for them to identify any inequality. Participants were dissatisfied with their managers for not allowing them to attend training and conferences. The majority of participants from the private sector said they wouldn't speak up to prejudice because they are afraid of losing their jobs and their voice is lost in a male-dominated society where males hold numerous authoritative positions and females are considered less competent. Nonetheless, the discrimination and inequalities affected the work motivation and enthusiasm of employees. Therefore, organizations should not discriminate against the staff in terms of facilities and benefits. The sample may not represent the true picture of gender equality in university libraries of Pakistan due to less number of participants and limited geographical boundaries. It is also assumed that some females may refrain from disclosing factual information or some may exaggerate the facts as a large number of participants requested to become part of the study. Equal opportunities should be offered to female library professionals to uplift and involve them to mitigate the perception of gender dominance. The organizations or immediate authorities should allow their staff to participate in training opportunities to learn modern practices to better serve the community.

Keywords: equality-workplace, libraries as workplace, female professionals, librarians-Pakistan

Procedia PDF Downloads 104
2351 Diversity in Hockey: Factors Affecting Minority Participants in Ice Hockey, An Ethnography of the BGSU Ice Arena

Authors: Abass Suara

Abstract:

Following careful observation of the Bowling Green State University Ice Hockey Arena, it became imperative to study the reason for low racial minority participation in the game of Hockey. Therefore, this research aims to better understand the factors affecting diversity in Hockey. it conducted semi-structured interviews with two unique participants: a former hockey player who is now a coach and administrator while the other is a racial minority student-athlete. Following a content narrative analysis of the data gathered from observations and interviews, three higher-order themes emerged: economic, social, and relationship factors. The administrator's perceptions of low diversity bear heavily on the sport's financial demands while he also harps on how the sport fosters stronger team relationships. The perception of the student-athlete does not differ except that he added racism as a significant factor to the less racial minority participation in Ice Hockey. So, as much as Hockey has proved to be a costly sport to play, society also needs to pay some attention to the other psychological warfare racial minorities battle that has nothing to do with financial capabilities.

Keywords: sport, ice hockey, diversity in sport, ethnography

Procedia PDF Downloads 47
2350 Overview of Constructed Wetlands System for Greywater Treatment: Challenges, Advantages, and Sustainable Analysis

Authors: Iga Maliga

Abstract:

As developing country, Indonesia, retreatment for greywater is an important factor that guaranteeing water sustainability? But, its still not familiar in Indonesian society. Because they still use their old habit for wasting the water without retreatment. Differently, with industry wastewater, effect of domestic wastewater is not directly looked with naked eyes. Domestic wastewater that not gets treatment directly can affect pollution in water body or river. Its affected by accumulation many pollutants that include on water. This paper is trying to analyze the challenges and advantages on greywater treatment system based on Constructed Wetlands (CWs) system in Bandung, one of the biggest cities in Indonesia. Aside that, this paper also is trying to analyze sustainability aspects. There is economic, social and of course environment with two methods. The first, study literature is used to see the advantages and challenges that faced by Indonesia when CWs are applied. Secondly, quantitative method is used to get the society perception about retreatment of greywater. Then, it will get a conclusion that this technique not only good in theoretically but also practically.

Keywords: greywater, constructed wetlands, advantages, challenges, Bandung, sustainability analysis

Procedia PDF Downloads 262
2349 Prosodic Characteristics of Post Traumatic Stress Disorder Induced Speech Changes

Authors: Jarek Krajewski, Andre Wittenborn, Martin Sauerland

Abstract:

This abstract describes a promising approach for estimating post-traumatic stress disorder (PTSD) based on prosodic speech characteristics. It illustrates the validity of this method by briefly discussing results from an Arabic refugee sample (N= 47, 32 m, 15 f). A well-established standardized self-report scale “Reaction of Adolescents to Traumatic Stress” (RATS) was used to determine the ground truth level of PTSD. The speech material was prompted by telling about autobiographical related sadness inducing experiences (sampling rate 16 kHz, 8 bit resolution). In order to investigate PTSD-induced speech changes, a self-developed set of 136 prosodic speech features was extracted from the .wav files. This set was adapted to capture traumatization related speech phenomena. An artificial neural network (ANN) machine learning model was applied to determine the PTSD level and reached a correlation of r = .37. These results indicate that our classifiers can achieve similar results to those seen in speech-based stress research.

Keywords: speech prosody, PTSD, machine learning, feature extraction

Procedia PDF Downloads 84
2348 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 454
2347 Modes of Seeing in Interactive Exhibitions: A Study on How Technology Can Affect the Viewer and Transform the Exhibition Spaces

Authors: Renata P. Lopes

Abstract:

The current art exhibit scenario presents a multitude of visualization features deployed in experiences that instigate a process of art production and design. The exhibition design through multimedia devices - from the audiovisual to the touch screen - has become a medium from which art can be understood and contemplated. Artistic practices articulated, during the modern period, the spectator's perception in the exhibition space, often challenging the architecture of museums and galleries. In turn, the museum institution seeks to respond to the challenge of welcoming the viewer whose experience is mediated by technological artifacts. When the beholder, together with the technology, interacts with the exhibition space, important displacements happen. In this work, we will analyze the migrations of the exhibition space to the digital environment through mobile devices triggered by the viewer. Based not on technological determinism, but on the conditions of the appearance of this spectator, this work is developed, with the aim of apprehending the way in which technology demarcates the differences between what the spectator was and what becomes in the contemporary atmosphere of the museums and galleries. These notions, we believe, will contribute to the formation of an exhibition design space in conformity with this participant.

Keywords: exhibition, museum, exhibition design, digital media

Procedia PDF Downloads 130
2346 An Application to Predict the Best Study Path for Information Technology Students in Learning Institutes

Authors: L. S. Chathurika

Abstract:

Early prediction of student performance is an important factor to be gained academic excellence. Whatever the study stream in secondary education, students lay the foundation for higher studies during the first year of their degree or diploma program in Sri Lanka. The information technology (IT) field has certain improvements in the education domain by selecting specialization areas to show the talents and skills of students. These specializations can be software engineering, network administration, database administration, multimedia design, etc. After completing the first-year, students attempt to select the best path by considering numerous factors. The purpose of this experiment is to predict the best study path using machine learning algorithms. Five classification algorithms: decision tree, support vector machine, artificial neural network, Naïve Bayes, and logistic regression are selected and tested. The support vector machine obtained the highest accuracy, 82.4%. Then affecting features are recognized to select the best study path.

Keywords: algorithm, classification, evaluation, features, testing, training

Procedia PDF Downloads 111
2345 The Temporal Dimension of Narratives: A Construct of Qualitative Time

Authors: Ani Thomas

Abstract:

Every narrative is a temporal construct. Every narrative creates a qualitative experience of time for the viewer. The paper argues for the concept of a qualified time that emerges from the interaction between the narrative and the audience. The paper also challenges the conventional understanding of narrative time as either story time, real time or discourse time. Looking at narratives through the medium of Cinema, the study examines how narratives create and manipulate duration or durée, the qualitative experience of time as theorized by Henri Bergson. The paper further analyzes how Cinema and, by extension, narratives are nothing but Durée and the filmmaker, the artist of durée, who shape and manipulate the perception and emotions of the viewer through the manipulation and construction of durée. The paper draws on cinematic works to look at the techniques to demonstrate how filmmakers use, for example, editing, sound, compositional and production narratives etc., to create various modes of durée that challenge, amplify or unsettle the viewer’s sense of time. Bringing together the Viewer’s durée and exploring its interaction with the narrative construct, the paper explores the emergence of the new qualitative time, the narrative durée, that defines the audience experience.

Keywords: cinema, time, bergson, duree

Procedia PDF Downloads 141
2344 A Survey on Linear Time Invariant Multivariable Positive Real Systems

Authors: Mojtaba Hakimi-Moghaddam

Abstract:

Positive realness as the most important property of driving point impedance of passive electrical networks appears in the control systems stability theory in 1960’s. There are three important subsets of positive real (PR) systems are introduced by researchers, that is, loos-less positive real (LLPR) systems, weakly strictly positive real (WSPR) systems and strictly positive real (SPR) systems. In this paper, definitions, properties, lemmas, and theorems related to family of positive real systems are summarized. Properties in both frequency domain and state space representation of system are explained. Also, several illustrative examples are presented.

Keywords: real rational matrix transfer functions, positive realness property, strictly positive realness property, Hermitian form asymptotic property, pole-zero properties

Procedia PDF Downloads 265
2343 A Succinct Method for Allocation of Reactive Power Loss in Deregulated Scenario

Authors: J. S. Savier

Abstract:

Real power is the component power which is converted into useful energy whereas reactive power is the component of power which cannot be converted to useful energy but it is required for the magnetization of various electrical machineries. If the reactive power is compensated at the consumer end, the need for reactive power flow from generators to the load can be avoided and hence the overall power loss can be reduced. In this scenario, this paper presents a succinct method called JSS method for allocation of reactive power losses to consumers connected to radial distribution networks in a deregulated environment. The proposed method has the advantage that no assumptions are made while deriving the reactive power loss allocation method.

Keywords: deregulation, reactive power loss allocation, radial distribution systems, succinct method

Procedia PDF Downloads 364
2342 Subspace Rotation Algorithm for Implementing Restricted Hopfield Network as an Auto-Associative Memory

Authors: Ci Lin, Tet Yeap, Iluju Kiringa

Abstract:

This paper introduces the subspace rotation algorithm (SRA) to train the Restricted Hopfield Network (RHN) as an auto-associative memory. Subspace rotation algorithm is a gradient-free subspace tracking approach based on the singular value decomposition (SVD). In comparison with Backpropagation Through Time (BPTT) on training RHN, it is observed that SRA could always converge to the optimal solution and BPTT could not achieve the same performance when the model becomes complex, and the number of patterns is large. The AUTS case study showed that the RHN model trained by SRA could achieve a better structure of attraction basin with larger radius(in general) than the Hopfield Network(HNN) model trained by Hebbian learning rule. Through learning 10000 patterns from MNIST dataset with RHN models with different number of hidden nodes, it is observed that an several components could be adjusted to achieve a balance between recovery accuracy and noise resistance.

Keywords: hopfield neural network, restricted hopfield network, subspace rotation algorithm, hebbian learning rule

Procedia PDF Downloads 108
2341 Efficient Layout-Aware Pretraining for Multimodal Form Understanding

Authors: Armineh Nourbakhsh, Sameena Shah, Carolyn Rose

Abstract:

Layout-aware language models have been used to create multimodal representations for documents that are in image form, achieving relatively high accuracy in document understanding tasks. However, the large number of parameters in the resulting models makes building and using them prohibitive without access to high-performing processing units with large memory capacity. We propose an alternative approach that can create efficient representations without the need for a neural visual backbone. This leads to an 80% reduction in the number of parameters compared to the smallest SOTA model, widely expanding applicability. In addition, our layout embeddings are pre-trained on spatial and visual cues alone and only fused with text embeddings in downstream tasks, which can facilitate applicability to low-resource of multi-lingual domains. Despite using 2.5% of training data, we show competitive performance on two form understanding tasks: semantic labeling and link prediction.

Keywords: layout understanding, form understanding, multimodal document understanding, bias-augmented attention

Procedia PDF Downloads 137
2340 Perceptions of Climate Change and Adaptation of Climate-Smart Technology by the Paddy Farmers: A Case Study of Kandy District in Sri Lanka

Authors: W. A. D. P. Wanigasundera, P. C. B. Alahakoon

Abstract:

Kandy district in Sri Lanka has small scale and rain-fed paddy farming, and highly vulnerable to climate change. In this study, the status of climate change was assessed using meteorological data and compared with the perceptions of paddy farming community. Factors affecting the adaptation to the climate smart farming were also assessed. Meteorological data for 33 years were collected and the changes over time compared with the perceptions of farmers. The temperature, rainfall and number of rainy days have increased in both locations. The onset of rains also has shifted. The perceptions of the majority of the farmers were in line with the actual changes. The knowledge and attitudes about the causes of climate change and adaptation were medium and related to level of adoption. Formulating effective communication strategies, and a collaborative approach involving state, private sector, civil society to make Sri Lankan agriculture ‘climate-smart’ is urgently needed.

Keywords: adaptation of climate-smart technology, climate change, perception, rain-fed paddy

Procedia PDF Downloads 320
2339 The Creative Unfolding of “Reduced Descriptive Structures” in Musical Cognition: Technical and Theoretical Insights Based on the OpenMusic and PWGL Long-Term Feedback

Authors: Jacopo Baboni Schilingi

Abstract:

We here describe the theoretical and philosophical understanding of a long term use and development of algorithmic computer-based tools applied to music composition. The findings of our research lead us to interrogate some specific processes and systems of communication engaged in the discovery of specific cultural artworks: artistic creation in the sono-musical domain. Our hypothesis is that the patterns of auditory learning cannot be only understood in terms of social transmission but would gain to be questioned in the way they rely on various ranges of acoustic stimuli modes of consciousness and how the different types of memories engaged in the percept-action expressive systems of our cultural communities also relies on these shadowy conscious entities we named “Reduced Descriptive Structures”.

Keywords: algorithmic sonic computation, corrected and self-correcting learning patterns in acoustic perception, morphological derivations in sensorial patterns, social unconscious modes of communication

Procedia PDF Downloads 146
2338 Environment and Water in the Conceptions of a Sustainable Architecture

Authors: Carlos H. Ferreira, Joana R. Pereira

Abstract:

In recent decades, calls for sustainable architecture based on environmental policies have been frequent. Despite a vast number of documents, technical procedures, and publications involving these themes, conceptions, and even architectural practice are often distanced from critical and methodological reflection on the relationship between environment and architecture. Among the various issues that we could consider in this relationship, we highlight in this article the relevance of water in the environment and in the architectural design. From documentary references and works carried out, we seek contributions to a better systematization and framing of water in architectural thinking. We distinguish, on the one hand, more conceptual issues that involve the environmental relationship of water, involving its cycle, relevance in the landscape, and infrastructural commitments. On the other hand, we highlight a more operative component, focusing on the place of water in the design process, from its perception in space-shape dimensions to more specific technical requirements that involve the interdisciplinary boundaries of architecture. In both approaches to water in architectural design, we seek to contribute to greater sensitivity and efficiency in the art of designing a more sustainable future.

Keywords: sustainability, environment, water, resilience design

Procedia PDF Downloads 122