Search results for: augmented reality technique
4373 Mathematical Model for Progressive Phase Distribution of Ku-band Reflectarray Antennas
Authors: M. Y. Ismail, M. Inam, A. F. M. Zain, N. Misran
Abstract:
Progressive phase distribution is an important consideration in reflect array antenna design which is required to form a planar wave in front of the reflect array aperture. This paper presents a detailed mathematical model in order to determine the required reflection phase values from individual element of a reflect array designed in Ku-band frequency range. The proposed technique of obtaining reflection phase can be applied for any geometrical design of elements and is independent of number of array elements. Moreover the model also deals with the solution of reflect array antenna design with both centre and off-set feed configurations. The theoretical modeling has also been implemented for reflect arrays constructed on 0.508 mm thickness of different dielectric substrates. The results show an increase in the slope of the phase curve from 4.61°/mm to 22.35°/mm by varying the material properties.Keywords: mathematical modeling, progressive phase distribution, reflect array antenna, reflection phase
Procedia PDF Downloads 3834372 Medical Neural Classifier Based on Improved Genetic Algorithm
Authors: Fadzil Ahmad, Noor Ashidi Mat Isa
Abstract:
This study introduces an improved genetic algorithm procedure that focuses search around near optimal solution corresponded to a group of elite chromosome. This is achieved through a novel crossover technique known as Segmented Multi Chromosome Crossover. It preserves the highly important information contained in a gene segment of elite chromosome and allows an offspring to carry information from gene segment of multiple chromosomes. In this way the algorithm has better possibility to effectively explore the solution space. The improved GA is applied for the automatic and simultaneous parameter optimization and feature selection of artificial neural network in pattern recognition of medical problem, the cancer and diabetes disease. The experimental result shows that the average classification accuracy of the cancer and diabetes dataset has improved by 0.1% and 0.3% respectively using the new algorithm.Keywords: genetic algorithm, artificial neural network, pattern clasification, classification accuracy
Procedia PDF Downloads 4744371 Low-Level Modeling for Optimal Train Routing and Scheduling in Busy Railway Stations
Authors: Quoc Khanh Dang, Thomas Bourdeaud’huy, Khaled Mesghouni, Armand Toguy´eni
Abstract:
This paper studies a train routing and scheduling problem for busy railway stations. Our objective is to allow trains to be routed in dense areas that are reaching saturation. Unlike traditional methods that allocate all resources to setup a route for a train and until the route is freed, our work focuses on the use of resources as trains progress through the railway node. This technique allows a larger number of trains to be routed simultaneously in a railway node and thus reduces their current saturation. To deal with this problem, this study proposes an abstract model and a mixed-integer linear programming formulation to solve it. The applicability of our method is illustrated on a didactic example.Keywords: busy railway stations, mixed-integer linear programming, offline railway station management, train platforming, train routing, train scheduling
Procedia PDF Downloads 2544370 Music and Movies: Story about a Suicide
Authors: Karen V. Lee
Abstract:
The background and significance of this study involves an autoethnographic story that shares research results about how music and movies influence the suicide of a new music teacher working in a public school. The performative narrative duet demonstrates how music and movies highlight social issues when the new teacher cannot cope with allegations surrounding professional issues. Both university advisors are drawn into deep reflection about the wider political issues that arise around the transition from the student-teacher internship process to the teaching career with the stark reality of teaching profession in the 21st century. This performance of story and music creates a transformative composition of reading, hearing, feeling while provoking visceral and emotional responses. Sometimes, young teachers are forced to take a leave of absence to reflect upon their practice with adolescents. In this extreme circumstance, the outcome was suicide. The qualitative research method involves an autoethnographic story as the author is methodologist, theoretician, and participant. Sub-themes surround film, music education and how movie resources have influenced his tragic misguided decision regarding social, emotional, physical, spiritual, and practical strategies to cope with the allegations. Major findings from this story demonstrate how lived experiences can resonate the importance of providing more education and resources to new teachers. The research provides substantive contribution, aesthetic merit, as the impact of movies and music influences the suicide. The reflexive account of storied sensory experiences situated in culture settings becomes a way to describe and seek verisimilitude by evoking lifelike and believable feelings from others. Sadly, the circumstance surrounding the story involving the allegations of a teacher sexually harassing a student is not uncommon in society. However, the young teacher never received counseling to cope with the allegations but instead was influenced by music and movies and opted for suicide. In conclusion, stories share the implications for film and media studies as music and movies can encourage a moral mission to empower individuals with despair and emotional impairment to embrace professional support to assist with emotional and legal challenges encountered in the field of teaching. It is from media studies that education and awareness surrounding suicide can disseminate information about the tragic outcome.Keywords: music, movies, suicide, narrative, autoethnography
Procedia PDF Downloads 2304369 Numerical Simulation and Experimental Study on Cable Damage Detection Using an MFL Technique
Authors: Jooyoung Park, Junkyeong Kim, Aoqi Zhang, Seunghee Park
Abstract:
Non-destructive testing on cable is in great demand due to safety accidents at sites where many equipments using cables are installed. In this paper, the quantitative change of the obtained signal was analyzed using a magnetic flux leakage (MFL) method. A two-dimensional simulation was conducted with a FEM model replicating real elevator cables. The simulation data were compared for three parameters (depth of defect, width of defect and inspection velocity). Then, an experiment on same conditions was carried out to verify the results of the simulation. Signals obtained from both the simulation and the experiment were transformed to characterize the properties of the damage. Throughout the results, a cable damage detection based on an MFL method was confirmed to be feasible. In further study, it is expected that the MFL signals of an entire specimen will be gained and visualized as well.Keywords: magnetic flux leakage (mfl), cable damage detection, non-destructive testing, numerical simulation
Procedia PDF Downloads 3834368 Prediction-Based Midterm Operation Planning for Energy Management of Exhibition Hall
Authors: Doseong Eom, Jeongmin Kim, Kwang Ryel Ryu
Abstract:
Large exhibition halls require a lot of energy to maintain comfortable atmosphere for the visitors viewing inside. One way of reducing the energy cost is to have thermal energy storage systems installed so that the thermal energy can be stored in the middle of night when the energy price is low and then used later when the price is high. To minimize the overall energy cost, however, we should be able to decide how much energy to save during which time period exactly. If we can foresee future energy load and the corresponding cost, we will be able to make such decisions reasonably. In this paper, we use machine learning technique to obtain models for predicting weather conditions and the number of visitors on hourly basis for the next day. Based on the energy load thus predicted, we build a cost-optimal daily operation plan for the thermal energy storage systems and cooling and heating facilities through simulation-based optimization.Keywords: building energy management, machine learning, operation planning, simulation-based optimization
Procedia PDF Downloads 3234367 Square Wave Anodic Stripping Voltammetry of Copper (II) at the Tetracarbonylmolybdenum(0) MWCNT Paste Electrode
Authors: Illyas Isa, Mohamad Idris Saidin, Mustaffa Ahmad, Norhayati Hashim
Abstract:
A highly selective and sensitive electrode for determination of trace amounts of Cu (II) using square wave anodic stripping voltammetry (SWASV) was proposed. The electrode was made of the paste of multiwall carbon nanotubes (MWCNT) and 2,6–diacetylpyridine-di-(1R)–(-)–fenchone diazine tetracarbonylmolybdenum(0) at 100:5 (w/w). Under optimal conditions the electrode showed a linear relationship with concentration in the range of 1.0 × 10–10 to 1.0 × 10– 6 M Cu (II) and limit of detection 8.0 × 10–11 M Cu (II). The relative standard deviation (n = 5) of response to 1.0 × 10–6 M Cu(II) was 0.036. The interferences of cations such as Ni(II), Mg(II), Cd(II), Co(II), Hg(II), and Zn(II) (in 10 and 100-folds concentration) are negligible except from Pb (II). Electrochemical impedance spectroscopy (EIS) showed that the charge transfer at the electrode-solution interface was favorable. Result of analysis of Cu(II) in several water samples agreed well with those obtained by inductively coupled plasma-optical emission spectrometry (ICP-OES). The proposed electrode was then recommended as an alternative to spectroscopic technique in analyzing Cu (II).Keywords: chemically modified electrode, Cu(II), Square wave anodic stripping voltammetry, tetracarbonylmolybdenum(0)
Procedia PDF Downloads 2624366 Auteur 3D Filmmaking: From Hitchcock’s Protrusion Technique to Godard’s Immersion Aesthetic
Authors: Delia Enyedi
Abstract:
Throughout film history, the regular return of 3D cinema has been discussed in connection to crises caused by the advent of television or the competition of the Internet. In addition, the three waves of stereoscopic 3D (from 1952 up to 1983) and its current digital version have been blamed for adding a challenging technical distraction to the viewing experience. By discussing the films Dial M for Murder (1954) and Goodbye to Language (2014), the paper aims to analyze the response of recognized auteurs to the use of 3D techniques in filmmaking. For Alfred Hitchcock, the solution to attaining perceptual immersion paradoxically resided in restraining the signature effect of 3D, namely protrusion. In Jean-Luc Godard’s vision, 3D techniques allowed him to explore perceptual absorption by means of depth of field, for which he had long advocated as being central to cinema. Thus, both directors contribute to the foundation of an auteur aesthetic in 3D filmmaking.Keywords: Alfred Hitchcock, authorship, 3D filmmaking, Jean-Luc Godard, perceptual absorption, perceptual immersion
Procedia PDF Downloads 2904365 Evaluation of Groundwater Quality and Its Suitability for Drinking and Agricultural Purposes Using Self-Organizing Maps
Authors: L. Belkhiri, L. Mouni, A. Tiri, T.S. Narany
Abstract:
In the present study, the self-organizing map (SOM) clustering technique was applied to identify homogeneous clusters of hydrochemical parameters in El Milia plain, Algeria, to assess the quality of groundwater for potable and agricultural purposes. The visualization of SOM-analysis indicated that 35 groundwater samples collected in the study area were classified into three clusters, which showed progressive increase in electrical conductivity from cluster one to cluster three. Samples belonging to cluster one are mostly located in the recharge zone showing hard fresh water type, however, water type gradually changed to hard-brackish type in the discharge zone, including clusters two and three. Ionic ratio studies indicated the role of carbonate rock dissolution in increases on groundwater hardness, especially in cluster one. However, evaporation and evapotranspiration are the main processes increasing salinity in cluster two and three.Keywords: groundwater quality, self-organizing maps, drinking water, irrigation water
Procedia PDF Downloads 2564364 Using Inertial Measurement Unit to Evaluate the Balance Ability of Hikers
Authors: Po-Chen Chen, Tsung-Han Yang, Zhi-Wei Zheng, Shih-Tsang Tang
Abstract:
Falls are the most common accidents during mountain hiking, especially in high-altitude environments with unstable terrain or adverse weather. Balance ability is a crucial factor in hiking, effectively ensuring hiking safety and reducing the risk of injuries. If balance ability can be assessed simply and effectively, hikers can identify their weaknesses and conduct targeted training to improve their balance ability, thereby reducing injury risks. With the widespread use of smartphones and their built-in inertial sensors, this project aims to develop a simple Inertial Measurement Unit (IMU) balance measurement technique based on smartphones. This will provide hikers with an easy-to-use, low-cost tool for assessing balance ability, monitoring training effects in real-time, and continuously tracking balance ability through uploading cloud data uploads, facilitating personal athletic performance.Keywords: balance, IMU, smartphone, wearable devices
Procedia PDF Downloads 384363 Two-Photon Ionization of Silver Clusters
Authors: V. Paployan, K. Madoyan, A. Melikyan, H. Minassian
Abstract:
Resonant two-photon ionization (TPI) is a valuable technique for the study of clusters due to its ultrahigh sensitivity. The comparison of the observed TPI spectra with results of calculations allows to deduce important information on the shape, rotational and vibrational temperatures of the clusters with high accuracy. In this communication we calculate the TPI cross-section for pump-probe scheme in Ag neutral cluster. The pump photon energy is chosen to be close to the surface plasmon (SP) energy of cluster in dielectric media. Since the interband transition energy in Ag exceeds the SP resonance energy, the main contribution into the TPI comes from the latter. The calculations are performed by separating the coordinates of electrons corresponding to the collective oscillations and the individual motion that allows to take into account the resonance contribution of excited SP oscillations. It is shown that the ionization cross section increases by two orders of magnitude if the energy of the pump photon matches the surface plasmon energy in the cluster.Keywords: resonance enhancement, silver clusters, surface plasmon, two-photon ionization
Procedia PDF Downloads 4274362 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions
Authors: Siddharth Krishnaswamy
Abstract:
Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.Keywords: analysis, food security indicators, response, resilience analysis
Procedia PDF Downloads 3314361 A Virtual Electrode through Summation of Time Offset Pulses
Authors: Isaac Cassar, Trevor Davis, Yi-Kai Lo, Wentai Liu
Abstract:
Retinal prostheses have been successful in eliciting visual responses in implanted subjects. As these prostheses progress, one of their major limitations is the need for increased resolution. As an alternative to increasing the number of electrodes, virtual electrodes may be used to increase the effective resolution of current electrode arrays. This paper presents a virtual electrode technique based upon time-offsets between stimuli. Two adjacent electrodes are stimulated with identical pulses with too short of pulse widths to activate a neuron, but one has a time offset of one pulse width. A virtual electrode of twice the pulse width was then shown to appear in the center, with a total width capable of activating a neuron. This can be used in retinal implants by stimulating electrodes with pulse widths short enough to not elicit responses in neurons, but with their combined pulse width adequate to activate a neuron in between them.Keywords: electrical stimulation, neuroprosthesis, retinal implant, retinal prosthesis, virtual electrode
Procedia PDF Downloads 3034360 Binarization and Recognition of Characters from Historical Degraded Documents
Authors: Bency Jacob, S.B. Waykar
Abstract:
Degradations in historical document images appear due to aging of the documents. It is very difficult to understand and retrieve text from badly degraded documents as there is variation between the document foreground and background. Thresholding of such document images either result in broken characters or detection of false texts. Numerous algorithms exist that can separate text and background efficiently in the textual regions of the document; but portions of background are mistaken as text in areas that hardly contain any text. This paper presents a way to overcome these problems by a robust binarization technique that recovers the text from a severely degraded document images and thereby increases the accuracy of optical character recognition systems. The proposed document recovery algorithm efficiently removes degradations from document images. Here we are using the ostus method ,local thresholding and global thresholding and after the binarization training and recognizing the characters in the degraded documents.Keywords: binarization, denoising, global thresholding, local thresholding, thresholding
Procedia PDF Downloads 3444359 A Service-Learning Experience in the Subject of Adult Nursing
Authors: Eva de Mingo-Fernández, Lourdes Rubio Rico, Carmen Ortega-Segura, Montserrat Querol-García, Raúl González-Jauregui
Abstract:
Today, one of the great challenges that the university faces is to get closer to society and transfer knowledge. The competency-based training approach favours a continuous interaction between practice and theory, which is why it is essential to establish real experiences with reflection and debate and to contrast them with personal and professional knowledge. Service-learning (SL) consists of an integration of academic learning with service in the community, which enables teachers to transfer knowledge with social value and students to be trained on the basis of experience of real needs and problems with the aim of solving them. SLE combines research, teaching, and social value knowledge transfer with the real social needs and problems of a community. Goal: The objective of this study was to design, implement, and evaluate a service-learning program in the subject of adult nursing for second-year nursing students. Methodology: After establishing collaboration with eight associations of people with different pathologies, the students were divided into eight groups, and each group was assigned an association. The groups were made up of 10-12 students. The associations willing to participate were for the following conditions: diabetes, multiple sclerosis, cancer, inflammatory bowel disease, fibromyalgia, heart, lung, and kidney diseases. The methodological design consisting of 5 activities was then applied. Three activities address personal and individual reflections, where the student initially describes what they think it is like to live with a certain disease. They then express their reflections resulting from an interview conducted by peers, in person or online, with a person living with this particular condition, and after sharing the results of their reflections with the rest of the group, they make an oral presentation in which they present their findings to the other students. This is followed by a service task in which the students collaborate in different activities of the association, and finally, a third individual reflection is carried out in which the students express their experience of collaboration. The evaluation of this activity is carried out by means of a rubric for both the reflections and the presentation. It should be noted that the oral presentation is evaluated both by the rest of the classmates and by the teachers. Results: The evaluation of the activity, given by the students, is 7.80/10, commenting that the experience is positive and brings them closer to the reality of the people and the area.Keywords: academic learning integration, knowledge transfer, service-learning, teaching methodology
Procedia PDF Downloads 674358 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher
Authors: M. F. Haroun, T. A. Gulliver
Abstract:
In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA
Procedia PDF Downloads 5064357 Comparative Methods for Speech Enhancement and the Effects on Text-Independent Speaker Identification Performance
Authors: R. Ajgou, S. Sbaa, S. Ghendir, A. Chemsa, A. Taleb-Ahmed
Abstract:
The speech enhancement algorithm is to improve speech quality. In this paper, we review some speech enhancement methods and we evaluated their performance based on Perceptual Evaluation of Speech Quality scores (PESQ, ITU-T P.862). All method was evaluated in presence of different kind of noise using TIMIT database and NOIZEUS noisy speech corpus.. The noise was taken from the AURORA database and includes suburban train noise, babble, car, exhibition hall, restaurant, street, airport and train station noise. Simulation results showed improved performance of speech enhancement for Tracking of non-stationary noise approach in comparison with various methods in terms of PESQ measure. Moreover, we have evaluated the effects of the speech enhancement technique on Speaker Identification system based on autoregressive (AR) model and Mel-frequency Cepstral coefficients (MFCC).Keywords: speech enhancement, pesq, speaker recognition, MFCC
Procedia PDF Downloads 4244356 Mechanistic Studies of Compacted and Sintered Rock Salt
Authors: Claudia H. Swanson, Jens Günster
Abstract:
This research addresses the densification via compaction and sintering of naturally occurring rock salt which was motivated by the fact that in a saline environment rock salt is thermodynamically stable and does show a mechanical behavior compatible to the surrounding host material. The sintering of rock salt powder compacts was systematically investigated using temperature and pressure as variables for the sinter process. The behavior of rock salt showed segregations of anhydrite, CaSO4 - the major impurity found in rock salt, to the grain boundaries between individual sodium chloride crystals. Powder compacts treated with lower pressures lost those anhydrite segregates over time while high pressure treated compacts remained with anhydrite segregates. The density reached in this study is 2.008 g cm-3 corresponding to a density of 92.5 % of the theoretical value. This high density is making the sintering a promising technique for rock salt as applications in underground appropriate environment.Keywords: rock salt, sinter, anhydrite, nuclear safety
Procedia PDF Downloads 4894355 Morphological Features Fusion for Identifying INBREAST-Database Masses Using Neural Networks and Support Vector Machines
Authors: Nadia el Atlas, Mohammed el Aroussi, Mohammed Wahbi
Abstract:
In this paper a novel technique of mass characterization based on robust features-fusion is presented. The proposed method consists of mainly four stages: (a) the first phase involves segmenting the masses using edge information’s. (b) The second phase is to calculate and fuse the most relevant morphological features. (c) The last phase is the classification step which allows us to classify the images into benign and malignant masses. In this step we have implemented Support Vectors Machines (SVM) and Artificial Neural Networks (ANN), which were evaluated with the following performance criteria: confusion matrix, accuracy, sensitivity, specificity, receiver operating characteristic ROC, and error histogram. The effectiveness of this new approach was evaluated by a recently developed database: INBREAST database. The fusion of the most appropriate morphological features provided very good results. The SVM gives accuracy to within 64.3%. Whereas the ANN classifier gives better results with an accuracy of 97.5%.Keywords: breast cancer, mammography, CAD system, features, fusion
Procedia PDF Downloads 5994354 Localization Mobile Beacon Using RSSI
Authors: Sallama Resen, Celal Öztürk
Abstract:
Distance estimation between tow nodes has wide scope of surveillance and tracking applications. This paper suggests a Bluetooth Low Energy (BLE) technology as a media for transceiver and receiver signal in small indoor areas. As an example, BLE communication technologies used in child safety domains. Local network is designed to detect child position in indoor school area consisting Mobile Beacons (MB), Access Points (AP) and Smart Phones (SP) where MBs stuck in children’s shoes as wearable sensors. This paper presents a technique that can detect mobile beacons’ position and help finding children’s location within dynamic environment. By means of bluetooth beacons that are attached to child’s shoes, the distance between the MB and teachers SP is estimated with an accuracy of less than one meter. From the simulation results, it is shown that high accuracy of position coordinates are achieved for multi-mobile beacons in different environments.Keywords: bluetooth low energy, child safety, mobile beacons, received signal strength
Procedia PDF Downloads 3464353 A Novel Method For Non-Invasive Diagnosis Of Hepatitis C Virus Using Electromagnetic Signal Detection: A Multicenter International Study
Authors: Gamal Shiha, Waleed Samir, Zahid Azam, Premashis Kar, Saeed Hamid, Shiv Sarin
Abstract:
A simple, rapid and non-invasive electromagnetic sensor (C-FAST device) was- patented; for diagnosis of HCV RNA. Aim: To test the validity of the device compared to standard HCV PCR. Subjects and Methods: The first phase was done as pilot in Egypt on 79 participants; the second phase was done in five centers: one center from Egypt, two centers from Pakistan and two centers from India (800, 92 and 113 subjects respectively). The third phase was done nationally as multicenter study on (1600) participants for ensuring its representativeness. Results: When compared to PCR technique, C-FAST device revealed sensitivity 95% to 100%, specificity 95.5% to 100%, PPV 89.5% to 100%, NPV 95% to 100% and positive likelihood ratios 21.8% to 38.5%. Conclusion: It is practical evidence that HCV nucleotides emit electromagnetic signals that can be used for its identification. As compared to PCR, C-FAST is an accurate, valid and non-invasive device.Keywords: C-FAST- a valid and reliable device, distant cellular interaction, electromagnetic signal detection, non-invasive diagnosis of HCV
Procedia PDF Downloads 4324352 Acceptability and Challenges Experienced by Homosexual Indigenous Peoples in Southern Palawan
Authors: Crisanto H. Ecaldre
Abstract:
Gender perception represents how an individual perceives the gender identity of a person. Since this is a subjective assessment, it paves the way to various social reactions, either in the form of acceptance or discrimination. Reports across the world show that lesbian, gay, bisexual, or transgender (LGBT) people often face discrimination, stigmatization, and targeted violence because of their sexual orientation or gender identity. However, the challenges faced by those who belong to both a sexual minority and a marginalized ethnic, religious, linguistic, or indigenous community are even more complex. Specifically, in Palaw’an community, members own those who identify themselves as gays or lesbians and use “bantut” to identify them. There was also the introduction of various scholarly works to facilitate dialogues that promote visibility and inclusivity across sectors in terms of gender preferences; however, there are still gaps that need to be addressed in terms of recognition and visibility. Though local research initiatives are slowly increasing in terms of numbers, culturally situating gender studies appropriately within the context of indigenous cultural communities is still lacking. Indigenous community-based discourses on gender or indigenizing gender discourses remain a challenge; hence, this study aimed to contribute to addressing these identified gaps. These research objectives were realized through a qualitative approach following an exploratory design. Findings revealed that the Palaw’an indigenous cultural community has an existing concept of homosexuality, which they termed “bantut.” This notion was culturally defined by the participants as (a) kaloob ng diwata; (b) a manifestation of physical inferiority; (c) hindi nakapag-asawa or hindi nagka-anak; and (d) based on the ascribed roles by the community. These were recognized and valued by the community. However, despite the recognition and visibility within the community, the outside people view them otherwise. The challenges experienced by the Palaw’an homosexuals are imposed by the people outside their community, and these include prejudice, discrimination, and double marginalization. Because of these struggles, they are forced to cope. They deal with these imposed limitations, biases, and burdens by non-Palaw’an through self-acceptance, strong self-perception, and the option to leave the community to seek a more open and progressive environment for LGBTs. While these are indications of their ‘resilience’ amidst difficult situations, this reality poses an important concern -how the recognition and visibility of indigenous homosexuals from the mainstream perspective can be attained.Keywords: gender preference, acceptability, challenge, recognition, visibility, coping
Procedia PDF Downloads 564351 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act
Authors: Maria Jędrzejczak, Patryk Pieniążek
Abstract:
The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.Keywords: data protection law, personal data, AI law, personal data breach
Procedia PDF Downloads 654350 Grouping and the Use of Drums in the Teaching of Word Stress at the Middle Basic: A Pragmatic Approach
Authors: Onwumere O. J.
Abstract:
The teaching of stress at any level of education could be a daunting task for the second language teacher because most times, they are bereft of the right approach to use in teaching it even at the fact is that, teaching it. But the fact is that teaching stress even at the middle basic could be interesting if the right approach is employed. To this end, the researcher was of the view that grouping could be a very good strategy to employ in order to sustain the interest of the learner and that the use at drums would be a good way to concretise the teaching of stress at this level. He was able to do this by discussing stress, grouping as a good technique, and the use of drums in teaching stress. To establish the fact that the use of drums would be very effective, four research questions contained in a questionnaire were structured. Three hundred (300) teachers of English in four tertiary institutions, three secondary schools and three primary schools in Nigeria were used. Based on the data analysis and findings, suggestions were given on how teachers and learners could use drums to make the teaching and learning of stress enjoyable for both teachers and learners at the middle basic of education.Keywords: concretise, grouping, right approach, second language
Procedia PDF Downloads 5454349 Optimization of Synergism Extraction of Toxic Metals (Lead, Copper) from Chlorides Solutions with Mixture of Cationic and Solvating Extractants
Authors: F. Hassaine-Sadi, S. Chelouaou
Abstract:
In recent years, environmental contamination by toxic metals such as Pb, Cu, Ni, Zn ... has become a worldwide crucial problem, particularly in some areas where the population depends on groundwater for drinking daily consumption. Thus, the sources of metal ions come from the metal manufacturing industry, fertilizers, batteries, paints, pigments and so on. Solvent extraction of metal ions has given an important role in the development of metal purification processes such as the synergistic extraction of some divalent cations metals ( M²⁺), the ions metals from various sources. This work consists of a water purification technique that involves the lead and copper systems: Pb²⁺, H₃O+, Cl⁻ and Cu²⁺, H₃O⁺, Cl⁻ for diluted solutions by a mixture of tri-n-octylphosphine oxide (TOPO) or Tri-n-butylphosphate(TBP) and di (2-ethyl hexyl) phosphoric acid (HDEHP) dissolved in kerosene. The study of the fundamental parameters influencing the extraction synergism: cation exchange/extraction solvent have been examined.Keywords: synergistic extraction, lead, copper, environment
Procedia PDF Downloads 4454348 Indoor Robot Positioning with Precise Correlation Computations over Walsh-Coded Lightwave Signal Sequences
Authors: Jen-Fa Huang, Yu-Wei Chiu, Jhe-Ren Cheng
Abstract:
Visible light communication (VLC) technique has become useful method via LED light blinking. Several issues on indoor mobile robot positioning with LED blinking are examined in the paper. In the transmitter, we control the transceivers blinking message. Orthogonal Walsh codes are adopted for such purpose on auto-correlation function (ACF) to detect signal sequences. In the robot receiver, we set the frame of time by 1 ns passing signal from the transceiver to the mobile robot. After going through many periods of time detecting the peak value of ACF in the mobile robot. Moreover, the transceiver transmits signal again immediately. By capturing three times of peak value, we can know the time difference of arrival (TDOA) between two peak value intervals and finally analyze the accuracy of the robot position.Keywords: Visible Light Communication, Auto-Correlation Function (ACF), peak value of ACF, Time difference of Arrival (TDOA)
Procedia PDF Downloads 3264347 Investigations on Microstructural and Raman Scattering Properties of B2O3 Doped Ba(Ti1-xZrx)O3 Nanoceramics
Authors: Keri̇m Emre Öksüz, Şaduman Şen, Uğur Şen
Abstract:
0.5 wt. % B2O3–doped Ba (Ti1-xZrx) O3, (x=0-0.4) lead-free nanoceramics were synthesized using the solid-state reaction method by adopting the ball milling technique. The influence of the substitution content on crystallographic structure, phase transition, microstructure and sintering behaviour of BT and BZT ceramics were investigated. XRD analysis at room temperature revealed a structural transformation from tetragonal to rhombohedral with enhancement of ZrO2 content in the barium titanate matrix. The scanning electron microscope (SEM) and energy-dispersive X-ray spectroscopy (EDS) were used to investigate microstructure and surface morphology of the sintered samples. The evolution of the Raman spectra was studied for various compositions, and the spectroscopic signature of the corresponding phase was determined. Scanning Electron Microscope (SEM) observations revealed enhanced microstructural uniformity and retarded grain growth with increasing Zr content.Keywords: BaTiO3, barium-titanate-zirconate, nanoceramics, raman spectroscopy
Procedia PDF Downloads 3424346 The Impact of Land Use Ex-Concession to the Environment in Dharmasraya District, West Sumatra Province, Indonesia
Authors: Yurike, Yonariza, Rudi Febriamansyah, Syafruddin Karimi
Abstract:
Forest is a natural resource that has an important function as a supporting element of human life. Forest degradation enormous impact on global warming is a reality we have experienced together, that disruption of ecosystems, extreme weather conditions, disruption of water management system watersheds and the threat of natural disasters as floods, landslides and droughts, even disruption food security. Dharmasraya is a district in the province of West Sumatra, which has an area of 92.150 ha of forest, which is largely a former production forest concessions (Forest Management Rights) which is supposed to be a secondary forest. This study answers about the impact of land use in the former concession area Dharmasraya on the environment. The methodology used is the household survey, key informants, and satellite data / GIS. From the results of the study, the former concession area in Dharmasraya experienced a reduction of forest cover over time significantly. Forest concessions should be secondary forests in Dharmasraya, now turned conversion to oil palm plantations. Population pressures and growing economic pressures, resulting in more intensive harvesting. As a result of these forest disturbances caused changes in forest functions. These changes put more emphasis towards economic function by ignoring social functions or ecological function. Society prefers to maximize their benefits today and pay less attention to the protection of natural resources. This causes global warming is increasing and this is not only felt by people around Dharmasraya but also the world. Land clearing by the community through a process in slash and burn. This fire was observed by NOAA satellites and recorded by the Forest Service of West Sumatra. This demonstrates the ability of trees felled trees to absorb carbon dioxide (CO2) to be lost, even with forest fires accounted for carbon dioxide emitted into the air, and this has an impact on global warming. In addition to the change of control of land into oil palm plantations water service has been poor, people began to trouble the water and oil palm plantations are located in the watershed caused the river dried up. Through the findings of this study is expected to contribute ideas to the policy makers to pay more attention to the former concession forest management as the prevention or reduction of global warming.Keywords: climate change, community, concession forests, environment
Procedia PDF Downloads 3284345 Robot Movement Using the Trust Region Policy Optimization
Authors: Romisaa Ali
Abstract:
The Policy Gradient approach is one of the deep reinforcement learning families that combines deep neural networks (DNN) with reinforcement learning RL to discover the optimum of the control problem through experience gained from the interaction between the robot and its surroundings. In contrast to earlier policy gradient algorithms, which were unable to handle these two types of error because of over-or under-estimation introduced by the deep neural network model, this article will discuss the state-of-the-art SOTA policy gradient technique, trust region policy optimization (TRPO), by applying this method in various environments compared to another policy gradient method, the Proximal Policy Optimization (PPO), to explain their robust optimization, using this SOTA to gather experience data during various training phases after observing the impact of hyper-parameters on neural network performance.Keywords: deep neural networks, deep reinforcement learning, proximal policy optimization, state-of-the-art, trust region policy optimization
Procedia PDF Downloads 1694344 Optimization Techniques for Microwave Structures
Authors: Malika Ourabia
Abstract:
A new and efficient method is presented for the analysis of arbitrarily shaped discontinuities. The discontinuities is characterized using a hybrid spectral/numerical technique. This structure presents an arbitrary number of ports, each one with different orientation and dimensions. This article presents a hybrid method based on multimode contour integral and mode matching techniques. The process is based on segmentation and dividing the structure into key building blocks. We use the multimode contour integral method to analyze the blocks including irregular shape discontinuities. Finally, the multimode scattering matrix of the whole structure can be found by cascading the blocks. Therefore, the new method is suitable for analysis of a wide range of waveguide problems. Therefore, the present approach can be applied easily to the analysis of any multiport junctions and cascade blocks. The accuracy of the method is validated comparing with results for several complex problems found in the literature. CPU times are also included to show the efficiency of the new method proposed.Keywords: segmentation, s parameters, simulation, optimization
Procedia PDF Downloads 528