Search results for: sexual and gender based violence (SGBV)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30341

Search results for: sexual and gender based violence (SGBV)

26591 Evolution of Nettlespurge Oil Mud for Drilling Mud System: A Comparative Study of Diesel Oil and Nettlespurge Oil as Oil-Based Drilling Mud

Authors: Harsh Agarwal, Pratikkumar Patel, Maharshi Pathak

Abstract:

Recently the low prices of Crude oil and increase in strict environmental regulations limit limits the use of diesel based muds as these muds are relatively costlier and toxic, as a result disposal of cuttings into the eco-system is a major issue faced by the drilling industries. To overcome these issues faced by the Oil Industry, an attempt has been made to develop oil-in-water emulsion mud system using nettlespurge oil. Nettlespurge oil could be easily available and its cost is around ₹30/litre which is about half the price of diesel in India. Oil-based mud (OBM) was formulated with Nettlespurge oil extracted from Nettlespurge seeds using the Soxhlet extraction method. The formulated nettlespurge oil mud properties were analysed with diesel oil mud properties. The compared properties were rheological properties, yield point and gel strength, and mud density and filtration loss properties, fluid loss and filter cake. The mud density measurement showed that nettlespurge OBM was slightly higher than diesel OBM with mud density values of 9.175 lb/gal and 8.5 lb/gal, respectively, at barite content of 70 g. Thus it has a higher lubricating property. Additionally, the filtration loss test results showed that nettlespurge mud fluid loss volumes, oil was 11 ml, compared to diesel oil mud volume of 15 ml. The filtration loss test indicated that the nettlespurge oil mud with filter cake thickness of 2.2 mm had a cake characteristic of thin and squashy while the diesel oil mud resulted in filter cake thickness of 2.7 mm with cake characteristic of tenacious, rubbery and resilient. The filtration loss test results showed that nettlespurge oil mud fluid loss volumes was much less than the diesel based oil mud. The filtration loss test indicated that the nettlespurge oil mud filter cake thickness less than the diesel oil mud filter cake thickness. So Low formation damage and the emulsion stability effect was analysed with this experiment. The nettlespurge oil-in-water mud system had lower coefficient of friction than the diesel oil based mud system. All the rheological properties have shown better results relative to the diesel based oil mud. Therefore, with all the above mentioned factors and with the data of the conducted experiment we could conclude that the Nettlespurge oil based mud is economically and well as eco-logically much more feasible than the worn out and shabby diesel-based oil mud in the Drilling Industry.

Keywords: economical feasible, ecological feasible, emulsion stability, nettle spurge oil, rheological properties, soxhlet extraction method

Procedia PDF Downloads 198
26590 Satellite-Based Drought Monitoring in Korea: Methodologies and Merits

Authors: Joo-Heon Lee, Seo-Yeon Park, Chanyang Sur, Ho-Won Jang

Abstract:

Satellite-based remote sensing technique has been widely used in the area of drought and environmental monitoring to overcome the weakness of in-situ based monitoring. There are many advantages of remote sensing for drought watch in terms of data accessibility, monitoring resolution and types of available hydro-meteorological data including environmental areas. This study was focused on the applicability of drought monitoring based on satellite imageries by applying to the historical drought events, which had a huge impact on meteorological, agricultural, and hydrological drought. Satellite-based drought indices, the Standardized Precipitation Index (SPI) using Tropical Rainfall Measuring Mission (TRMM) and Global Precipitation Mission (GPM); Vegetation Health Index (VHI) using MODIS based Land Surface Temperature (LST), and Normalized Difference Vegetation Index (NDVI); and Scaled Drought Condition Index (SDCI) were evaluated to assess its capability to analyze the complex topography of the Korean peninsula. While the VHI was accurate when capturing moderate drought conditions in agricultural drought-damaged areas, the SDCI was relatively well monitored in hydrological drought-damaged areas. In addition, this study found correlations among various drought indices and applicability using Receiver Operating Characteristic (ROC) method, which will expand our understanding of the relationships between hydro-meteorological variables and drought events at global scale. The results of this research are expected to assist decision makers in taking timely and appropriate action in order to save millions of lives in drought-damaged areas.

Keywords: drought monitoring, moderate resolution imaging spectroradiometer (MODIS), remote sensing, receiver operating characteristic (ROC)

Procedia PDF Downloads 323
26589 Design of Bayesian MDS Sampling Plan Based on the Process Capability Index

Authors: Davood Shishebori, Mohammad Saber Fallah Nezhad, Sina Seifi

Abstract:

In this paper, a variable multiple dependent state (MDS) sampling plan is developed based on the process capability index using Bayesian approach. The optimal parameters of the developed sampling plan with respect to constraints related to the risk of consumer and producer are presented. Two comparison studies have been done. First, the methods of double sampling model, sampling plan for resubmitted lots and repetitive group sampling (RGS) plan are elaborated and average sample numbers of the developed MDS plan and other classical methods are compared. A comparison study between the developed MDS plan based on Bayesian approach and the exact probability distribution is carried out.

Keywords: MDS sampling plan, RGS plan, sampling plan for resubmitted lots, process capability index (PCI), average sample number (ASN), Bayesian approach

Procedia PDF Downloads 295
26588 Real-Time Network Anomaly Detection Systems Based on Machine-Learning Algorithms

Authors: Zahra Ramezanpanah, Joachim Carvallo, Aurelien Rodriguez

Abstract:

This paper aims to detect anomalies in streaming data using machine learning algorithms. In this regard, we designed two separate pipelines and evaluated the effectiveness of each separately. The first pipeline, based on supervised machine learning methods, consists of two phases. In the first phase, we trained several supervised models using the UNSW-NB15 data-set. We measured the efficiency of each using different performance metrics and selected the best model for the second phase. At the beginning of the second phase, we first, using Argus Server, sniffed a local area network. Several types of attacks were simulated and then sent the sniffed data to a running algorithm at short intervals. This algorithm can display the results of each packet of received data in real-time using the trained model. The second pipeline presented in this paper is based on unsupervised algorithms, in which a Temporal Graph Network (TGN) is used to monitor a local network. The TGN is trained to predict the probability of future states of the network based on its past behavior. Our contribution in this section is introducing an indicator to identify anomalies from these predicted probabilities.

Keywords: temporal graph network, anomaly detection, cyber security, IDS

Procedia PDF Downloads 100
26587 Bioefficacy of Ocimum sanctum on Reproductive Performance of Red Cotton Bug, Dysdercus koenigii (Heteroptera: Pyrrhocoriedae)

Authors: Kamal Kumar Gupta, Sunil Kayesth

Abstract:

Dysdercus koenigii is serious pest of cotton and other malvaceous crop. Present research work aimed at ecofriendly approach for management of pest by plant extracts. The impact of Ocimum sanctum was studied on reproductive performance of Dysdercus koenigii. The hexane extract of Ocimum leaves was prepared by ‘cold extraction method’. The newly emerged fifth instar nymphs were exposed to the extract of concentrations ranging from 0.1% to 0.00625% by ‘thin film residual method’ for a period of 24h. Reproductive fitness of the adults emerged from the treated nymphs was evaluated by assessing their courtship behaviour, oviposition behaviour, and fertility. The studies indicated that treatment of Dysdercus with the hexane extract of Ocimum altered their courtship behaviour. Consequently, the treated males exhibited less sexual activity, performed fewer mounting attempts, increased time to mate and showed decreased percent successful mating. The females often rejected courting treated male by shaking the abdomen. Similarly, the treated females in many cases remained non-receptive to the courting male. Premature termination of mating in the mating pairs prior to insemination further decreased the mating success of the treated adults. Maximum abbreviation of courtship behaviour was observed in the experimental set up where both the males and the females were treated. Only females which mate successfully were observed for study of oviposition behaviour. The treated females laid lesser number of egg batches and eggs in their life span. The eggs laid by these females were fertile indicating insemination of the female. However, percent hatchability was lesser than control. The effects of hexane extract were dose dependent. Treatment with 0.1% and 0.05% extract altered courtship behaviour. Doses of concentrations less than 0.05% did not affect courtship behaviour but altered the oviposition behaviour and fertility. Significant reduction in the fecundity and fertility was observed in the treatments at concentration as low as 0.00625%. The GCMS analysis of the extract revealed a plethora of phytochemicals including juvenile hormone mimics, and the intermediates of juvenile hormone biosynthesis. Therefore, some of these compounds individually or synergistically impair reproductive behaviour of Dysdercus. Alteration of courtship behaviour and suppression of fecundity and fertility with the help of plant extracts has wide potentials in suppression of pest population and ‘integrated pest management’.

Keywords: courtship behaviour, Dysdercus koenigii, Ocimum sanctum, oviposition behaviour

Procedia PDF Downloads 259
26586 Collision Avoidance Based on Model Predictive Control for Nonlinear Octocopter Model

Authors: Doğan Yıldız, Aydan Müşerref Erkmen

Abstract:

The controller of the octocopter is mostly based on the PID controller. For complex maneuvers, PID controllers have limited performance capability like in collision avoidance. When an octocopter needs avoidance from an obstacle, it must instantly show an agile maneuver. Also, this kind of maneuver is affected severely by the nonlinear characteristic of octocopter. When these kinds of limitations are considered, the situation is highly challenging for the PID controller. In the proposed study, these challenges are tried to minimize by using the model predictive controller (MPC) for collision avoidance with a nonlinear octocopter model. The aim is to show that MPC-based collision avoidance has the capability to deal with fast varying conditions in case of obstacle detection and diminish the nonlinear effects of octocopter with varying disturbances.

Keywords: model predictive control, nonlinear octocopter model, collision avoidance, obstacle detection

Procedia PDF Downloads 187
26585 A Framework Based on Dempster-Shafer Theory of Evidence Algorithm for the Analysis of the TV-Viewers’ Behaviors

Authors: Hamdi Amroun, Yacine Benziani, Mehdi Ammi

Abstract:

In this paper, we propose an approach of detecting the behavior of the viewers of a TV program in a non-controlled environment. The experiment we propose is based on the use of three types of connected objects (smartphone, smart watch, and a connected remote control). 23 participants were observed while watching their TV programs during three phases: before, during and after watching a TV program. Their behaviors were detected using an approach based on The Dempster Shafer Theory (DST) in two phases. The first phase is to approximate dynamically the mass functions using an approach based on the correlation coefficient. The second phase is to calculate the approximate mass functions. To approximate the mass functions, two approaches have been tested: the first approach was to divide each features data space into cells; each one has a specific probability distribution over the behaviors. The probability distributions were computed statistically (estimated by empirical distribution). The second approach was to predict the TV-viewing behaviors through the use of classifiers algorithms and add uncertainty to the prediction based on the uncertainty of the model. Results showed that mixing the fusion rule with the computation of the initial approximate mass functions using a classifier led to an overall of 96%, 95% and 96% success rate for the first, second and third TV-viewing phase respectively. The results were also compared to those found in the literature. This study aims to anticipate certain actions in order to maintain the attention of TV viewers towards the proposed TV programs with usual connected objects, taking into account the various uncertainties that can be generated.

Keywords: Iot, TV-viewing behaviors identification, automatic classification, unconstrained environment

Procedia PDF Downloads 226
26584 Artificial Intelligence Methods for Returns Expectations in Financial Markets

Authors: Yosra Mefteh Rekik, Younes Boujelbene

Abstract:

We introduce in this paper a new conceptual model representing the stock market dynamics. This model is essentially based on cognitive behavior of the intelligence investors. In order to validate our model, we build an artificial stock market simulation based on agent-oriented methodologies. The proposed simulator is composed of market supervisor agent essentially responsible for executing transactions via an order book and various kinds of investor agents depending to their profile. The purpose of this simulation is to understand the influence of psychological character of an investor and its neighborhood on its decision-making and their impact on the market in terms of price fluctuations. Therefore, the difficulty of the prediction is due to several features: the complexity, the non-linearity and the dynamism of the financial market system, as well as the investor psychology. The Artificial Neural Networks learning mechanism take on the role of traders, who from their futures return expectations and place orders based on their expectations. The results of intensive analysis indicate that the existence of agents having heterogeneous beliefs and preferences has provided a better understanding of price dynamics in the financial market.

Keywords: artificial intelligence methods, artificial stock market, behavioral modeling, multi-agent based simulation

Procedia PDF Downloads 440
26583 The Role of Health Beliefs in Predicting and Explaining Risky Health Behaviours within Cystic Fibrosis

Authors: Rebecca Keyte, Helen Egan, Michail Mantzios

Abstract:

It is well acknowledged that ongoing adherence is a major concern within CF. However recently literature has indicated that non-adherence should not be viewed just in terms of medical regimens. There are other damaging behaviours that some chronically ill patients engage in which can be viewed as a form of non-adherence, such as risky behaviours. Risky behaviours are a major concern within CF, as they can have adverse health effects on patients regardless of patients adherence to medical regimens. The risky behaviours this research is predominantly focusing on are smoking, excessive alcohol consumption, illicit drug use and risky sexual behaviour. This research investigates patient’s beliefs about their CF and the impact their CF has upon their life, exploring rationales for why some patients engage in risky behaviours. This research utilises qualitative semi-structured interviews taking an interpretive perspective. Twenty-four adult participants have been recruited (16 male, age range 19–66 yrs) from two UK regional CF centres, with a median FEV1 61.77% predicted. Participants were recruited via clinician guidance, with 13 participants identified by clinicians as partaking in risky behaviours. However, during the interviews 17 participants were identified as partaking in risky behaviours, illustrating that not all patients offer full disclosure of engagement in such behaviours to their clinicians. Preliminary findings illustrate a variety of reasons as to why some CF patients engage in risky behaviours, with many participants stating that one challenge in terms of living with CF is accepting their illness. Disclosure of illness was also an issue, the desire to be seen as ‘normal’ was important to many. It is often possible for CF patients to hide their illness as they do not always appear to be unwell. However, literature indicates a desire for normalcy can be accompanied with the engagement of normalised risky behaviours, enabling patients to retaliate against their illness identity. There was also evidence of a life-orientated perspective amongst participants, with some reporting that their desire for fun and enjoyment was the reason for why they were engaging in risky behaviours. Some participants did not acknowledge the impact their risky behaviours could have upon their CF, and others rationalised their continuation with the behaviours by suggesting that they were in fact beneficial to their health. There was an apparent lack of knowledge around the implications of risky behaviours, with participants indicating that they had not been informed of such potential consequences by their clinicians. Given the adverse health effects of risky behaviours within CF, more effective health promotion measures are needed to both reduce and more importantly prevent these behaviours. Due to the initiation of risky behaviours within the CF population commonly occurring during adolescence, the researcher now proposes to conduct semi-structured interviews with paediatric patients to investigate their awareness and beliefs towards risky behaviours. Overall, this research will highlight reasons why some CF patients engage in risky behaviours, in order to inform interventions aimed to prevent the initiation in risky behaviours by increasing patient awareness.

Keywords: cystic fibrosis, health beliefs, preliminary findings, risky health behaviours

Procedia PDF Downloads 288
26582 Hand Gestures Based Emotion Identification Using Flex Sensors

Authors: S. Ali, R. Yunus, A. Arif, Y. Ayaz, M. Baber Sial, R. Asif, N. Naseer, M. Jawad Khan

Abstract:

In this study, we have proposed a gesture to emotion recognition method using flex sensors mounted on metacarpophalangeal joints. The flex sensors are fixed in a wearable glove. The data from the glove are sent to PC using Wi-Fi. Four gestures: finger pointing, thumbs up, fist open and fist close are performed by five subjects. Each gesture is categorized into sad, happy, and excited class based on the velocity and acceleration of the hand gesture. Seventeen inspectors observed the emotions and hand gestures of the five subjects. The emotional state based on the investigators assessment and acquired movement speed data is compared. Overall, we achieved 77% accurate results. Therefore, the proposed design can be used for emotional state detection applications.

Keywords: emotion identification, emotion models, gesture recognition, user perception

Procedia PDF Downloads 281
26581 Resilience among Children with and without Hearing Loss: A Comparative Study in Pakistan

Authors: Bushra Akram, Amina Tariq

Abstract:

Objective: This cross-sectional descriptive study aimed to compare the level of resilience among children with and without hearing loss. Methodology: In this descriptive cross sectional study total 500 children (with hearing loss = 250 and without hearing loss = 250) were recruited conveniently. Children with hearing loss were recruited from the special schools whereas children without hearing loss were selected from regular schools located in cities of Gujrat and Jhelum of Pakistan. Respondents’ age ranged from 9-14 years. Resiliency scale named RSCA (Resiliency Scales for children and adolescents) developed by Sandra Prince Embury (2006) was used. RSCA consist of three core theoretical areas: MAS (Sense of Mastery Scale), REL (Sense of Relatedness Scale) and REA (Emotional Reactivity Scale). Results: Findings indicated that there was a significant difference in the resilience level of participants with and without hearing loss. The mean comparison showed that the children with hearing loss showed lower scores on MAS (X̅ = 43.32, SD = 7.55) as well as on REL (X̅ = 49.96, SD = 7.65) as compared to their counterparts on MAS (X̅ = 53.96, SD = 9.90, t= -7.31***) and on REL (X̅ = 68.43, SD = 14.57,t= -10.18***). However children with hearing loss showed higher scores on REA (X̅ = 42.12, SD = 5.84) as compared to hearing participants (X̅ = 28.84, SD = 13.97, t = -8.20***). The findings revealed no significance difference in the resilience level of hearing and deaf children on the basis of their gender and age. Research Outcomes and Future Scope: Children with hearing loss showed a lower level of resilience, therefore, needs a program to develop resilience for better social-emotional adjustment and enhancement of their psychological well-being. In the end, the researcher gave recommendations for future research.

Keywords: children with hearing loss, psychological Wellbeing, resiliency scales for children and adolescents, resilience

Procedia PDF Downloads 179
26580 Power and Representation in Female Autobiographies

Authors: Shafag Dadashova

Abstract:

The study discusses relativity of perception and interpretation of power, its interdependence with conformity level of an individual. It describes an autobiography as a form of epiphany. It is suggested that life-writing helps the author analyze the past and define the borders of his personal power and sources of empowerment. As all life-writings deal with behaviors, values, attitudes, relationships and emotions, their investigation requires qualitative methods to understand social norms, gender roles, religion, and their role in empowerment and disempowerment of the author. The study consists of two parts. The first part is theoretical and interrogates the notion of personal power and how writing the own life can bring to conscious empowerment. The second part presents two autobiographies by female authors from two different Muslim cultures who negotiate between the larger nationalist agenda and their own personal concerns. These autobiographies (Tehmina Durrani, Pakistani author ‘My Feudal Lord’, Banine, Azerbaijani writer 'Caucasian days' and 'Parisian days') are the end of their authors’ long silence, their revolt against the conventional norms, their decision to have an agency to confess and protest. These autobiographies are the authors’ attempts to break the established matrix of perceptions, imposed norms, and gain power to build the real picture of their identity. The study sums up with the conclusion that in spite of very similar motifs of female authors to get empowered through self-analysis, different cultures and time create specific subjectivities associated with particular historical events and geographical location.

Keywords: conformity level, empowerment, female autobiography, self-identity

Procedia PDF Downloads 253
26579 Developing Reading Methods of Industrial Education Students at King Mongkut’s Institute of Technology Ladkrabang

Authors: Rattana Sangchan, Pattaraporn Thampradit

Abstract:

Teaching students to use a variety of reading methods in developing reading is essential for Thai university students. However, there haven’t been a lot of studies concerned about developing reading methods that are used by Thai students in the industrial education field. Therefore, this study was carried out not only to investigate the developing reading methods of Industrial Education students at King Mongkut’s Institute of Technology Ladkrabang, but also to determine if the developing reading strategies differ among the students’ reading abilities and differ gender: male and female. The research instrument used in collecting the data consisted of fourteen statements which include either metacognitive strategies, cognitive strategies or social / affective strategies. Results of this study revealed that students could develop their reading methods in moderate level (mean=3.13). Furthermore, high reading ability students had different levels of using reading methods to develop their reading from those of mid reading ability students. In addition, high reading ability students could use either metacognitive reading methods or cognitive reading methods to develop their reading much better than mid reading ability students. Interestingly, male students could develop their reading methods in great levels while female students could develop their reading methods only in moderate level. Last but not least, male students could use either metacognitive reading methods or cognitive reading methods to develop their reading much better than female students. Thus, the results of this study could indicate that most students need to apply much more reading strategies to develop their reading. At the same time, suggestions on how to motivate and train their students to apply much more appropriate effective reading strategies to better comprehend their reading were also provided.

Keywords: developing reading methods, industrial education, reading abilities, reading method classification

Procedia PDF Downloads 284
26578 Double Gaussian Distribution of Nonhomogeneous Barrier Height in Metal/n-type GaN Schottky Contacts

Authors: M. Mamor

Abstract:

GaN-based compounds have attracted much interest in the fabrication of high-power, high speed and high-frequency electronic devices. Other examples of GaN-based applications are blue and ultraviolet (UV) light-emitting diodes (LEDs). All these devices require high-quality ohmic and Schottky contacts. Gaining an understanding of the electrical characteristics of metal/GaN contacts is of fundamental and technological importance for developing GaN-based devices. In this work, the barrier characteristics of Pt and Pd Schottky contacts on n-type GaN were studied using temperature-dependent forward current-voltage (I-V) measurements over a wide temperature range 80–400 K. Our results show that the barrier height and ideality factor, extracted from the forward I-V characteristics based on thermionic emission (TE) model, exhibit an abnormal dependence with temperature; i.e., by increasing temperature, the barrier height increases whereas the ideality factor decreases. This abnormal behavior has been explained based on the TE model by considering the presence of double Gaussian distribution (GD) of nonhomogeneous barrier height at the metal/GaN interface. However, in the high-temperature range (160-400 K), the extracted value for the effective Richardson constant A* based on the barrier inhomogeneity (BHi) model is found in fair agreement with the theoretically predicted value of about 26.9 A.cm-2 K-2 for n-type GaN. This result indicates that in this temperature range, the conduction current transport is dominated by the thermionic emission mode. On the other hand, in the lower temperature range (80-160 K), the corresponding effective Richardson constant value according to the BHi model is lower than the theoretical value, suggesting the presence of other current transport, such as tunneling-assisted mode at lower temperatures.

Keywords: Schottky diodes, inhomogeneous barrier height, GaN semiconductors, Schottky barrier heights

Procedia PDF Downloads 53
26577 Optimal Trajectories for Highly Automated Driving

Authors: Christian Rathgeber, Franz Winkler, Xiaoyu Kang, Steffen Müller

Abstract:

In this contribution two approaches for calculating optimal trajectories for highly automated vehicles are presented and compared. The first one is based on a non-linear vehicle model, used for evaluation. The second one is based on a simplified model and can be implemented on a current ECU. In usual driving situations both approaches show very similar results.

Keywords: trajectory planning, direct method, indirect method, highly automated driving

Procedia PDF Downloads 526
26576 Determination of Cohesive Zone Model’s Parameters Based On the Uniaxial Stress-Strain Curve

Authors: Y. J. Wang, C. Q. Ru

Abstract:

A key issue of cohesive zone models is how to determine the cohesive zone model (CZM) parameters based on real material test data. In this paper, uniaxial nominal stress-strain curve (SS curve) is used to determine two key parameters of a cohesive zone model: the maximum traction and the area under the curve of traction-separation law (TSL). To this end, the true SS curve is obtained based on the nominal SS curve, and the relationship between the nominal SS curve and TSL is derived based on an assumption that the stress for cracking should be the same in both CZM and the real material. In particular, the true SS curve after necking is derived from the nominal SS curve by taking the average of the power law extrapolation and the linear extrapolation, and a damage factor is introduced to offset the true stress reduction caused by the voids generated at the necking zone. The maximum traction of the TSL is equal to the maximum true stress calculated based on the damage factor at the end of hardening. In addition, a simple specimen is simulated by Abaqus/Standard to calculate the critical J-integral, and the fracture energy calculated by the critical J-integral represents the stored strain energy in the necking zone calculated by the true SS curve. Finally, the CZM parameters obtained by the present method are compared to those used in a previous related work for a simulation of the drop-weight tear test.

Keywords: dynamic fracture, cohesive zone model, traction-separation law, stress-strain curve, J-integral

Procedia PDF Downloads 508
26575 Human Performance Evaluating of Advanced Cardiac Life Support Procedure Using Fault Tree and Bayesian Network

Authors: Shokoufeh Abrisham, Seyed Mahmoud Hossieni, Elham Pishbin

Abstract:

In this paper, a hybrid method based on the fault tree analysis (FTA) and Bayesian networks (BNs) are employed to evaluate the team performance quality of advanced cardiac life support (ACLS) procedures in emergency department. According to American Heart Association (AHA) guidelines, a category relying on staff action leading to clinical incidents and also some discussions with emergency medicine experts, a fault tree model for ACLS procedure is obtained based on the human performance. The obtained FTA model is converted into BNs, and some different scenarios are defined to demonstrate the efficiency and flexibility of the presented model of BNs. Also, a sensitivity analysis is conducted to indicate the effects of team leader presence and uncertainty knowledge of experts on the quality of ACLS. The proposed model based on BNs shows that how the results of risk analysis can be closed to reality comparing to the obtained results based on only FTA in medical procedures.

Keywords: advanced cardiac life support, fault tree analysis, Bayesian belief networks, numan performance, healthcare systems

Procedia PDF Downloads 144
26574 A Corpus-Based Study on the Styles of Three Translators

Authors: Wang Yunhong

Abstract:

The present paper is preoccupied with the different styles of three translators in their translating a Chinese classical novel Shuihu Zhuan. Based on a parallel corpus, it adopts a target-oriented approach to look into whether and what stylistic differences and shifts the three translations have revealed. The findings show that the three translators demonstrate different styles concerning their word choices and sentence preferences, which implies that identification of recurrent textual patterns may be a basic step for investigating the style of a translator.

Keywords: corpus, lexical choices, sentence characteristics, style

Procedia PDF Downloads 260
26573 Automatic Multi-Label Image Annotation System Guided by Firefly Algorithm and Bayesian Method

Authors: Saad M. Darwish, Mohamed A. El-Iskandarani, Guitar M. Shawkat

Abstract:

Nowadays, the amount of available multimedia data is continuously on the rise. The need to find a required image for an ordinary user is a challenging task. Content based image retrieval (CBIR) computes relevance based on the visual similarity of low-level image features such as color, textures, etc. However, there is a gap between low-level visual features and semantic meanings required by applications. The typical method of bridging the semantic gap is through the automatic image annotation (AIA) that extracts semantic features using machine learning techniques. In this paper, a multi-label image annotation system guided by Firefly and Bayesian method is proposed. Firstly, images are segmented using the maximum variance intra cluster and Firefly algorithm, which is a swarm-based approach with high convergence speed, less computation rate and search for the optimal multiple threshold. Feature extraction techniques based on color features and region properties are applied to obtain the representative features. After that, the images are annotated using translation model based on the Net Bayes system, which is efficient for multi-label learning with high precision and less complexity. Experiments are performed using Corel Database. The results show that the proposed system is better than traditional ones for automatic image annotation and retrieval.

Keywords: feature extraction, feature selection, image annotation, classification

Procedia PDF Downloads 583
26572 Optimization Based Extreme Learning Machine for Watermarking of an Image in DWT Domain

Authors: RAM PAL SINGH, VIKASH CHAUDHARY, MONIKA VERMA

Abstract:

In this paper, we proposed the implementation of optimization based Extreme Learning Machine (ELM) for watermarking of B-channel of color image in discrete wavelet transform (DWT) domain. ELM, a regularization algorithm, works based on generalized single-hidden-layer feed-forward neural networks (SLFNs). However, hidden layer parameters, generally called feature mapping in context of ELM need not to be tuned every time. This paper shows the embedding and extraction processes of watermark with the help of ELM and results are compared with already used machine learning models for watermarking.Here, a cover image is divide into suitable numbers of non-overlapping blocks of required size and DWT is applied to each block to be transformed in low frequency sub-band domain. Basically, ELM gives a unified leaning platform with a feature mapping, that is, mapping between hidden layer and output layer of SLFNs, is tried for watermark embedding and extraction purpose in a cover image. Although ELM has widespread application right from binary classification, multiclass classification to regression and function estimation etc. Unlike SVM based algorithm which achieve suboptimal solution with high computational complexity, ELM can provide better generalization performance results with very small complexity. Efficacy of optimization method based ELM algorithm is measured by using quantitative and qualitative parameters on a watermarked image even though image is subjected to different types of geometrical and conventional attacks.

Keywords: BER, DWT, extreme leaning machine (ELM), PSNR

Procedia PDF Downloads 307
26571 Control of Grid Connected PMSG-Based Wind Turbine System with Back-To-Back Converter Topology Using Resonant Controller

Authors: Fekkak Bouazza, Menaa Mohamed, Loukriz Abdelhamid, Krim Mohamed L.

Abstract:

This paper presents modeling and control strategy for the grid connected wind turbine system based on Permanent Magnet Synchronous Generator (PMSG). The considered system is based on back-to-back converter topology. The Grid Side Converter (GSC) achieves the DC bus voltage control and unity power factor. The Machine Side Converter (MSC) assures the PMSG speed control. The PMSG is used as a variable speed generator and connected directly to the turbine without gearbox. The pitch angle control is not either considered in this study. Further, Optimal Tip Speed Ratio (OTSR) based MPPT control strategy is used to ensure the most energy efficiency whatever the wind speed variations. A filter (L) is put between the GSC and the grid to reduce current ripple and to improve the injected power quality. The proposed grid connected wind system is built under MATLAB/Simulink environment. The simulation results show the feasibility of the proposed topology and performance of its control strategies.

Keywords: wind, grid, PMSG, MPPT, OTSR

Procedia PDF Downloads 355
26570 The Design of Intelligent Passenger Organization System for Metro Stations Based on Anylogic

Authors: Cheng Zeng, Xia Luo

Abstract:

Passenger organization has always been an essential part of China's metro operation and management. Facing the massive passenger flow, stations need to improve their intelligence and automation degree by an appropriate integrated system. Based on the existing integrated supervisory control system (ISCS) and simulation software (Anylogic), this paper designs an intelligent passenger organization system (IPOS) for metro stations. Its primary function includes passenger information acquisition, data processing and computing, visualization management, decision recommendations, and decision response based on interlocking equipment. For this purpose, the logical structure and intelligent algorithms employed are particularly devised. Besides, the structure diagram of information acquisition and application module, the application of Anylogic, the case library's function process are all given by this research. Based on the secondary development of Anylogic and existing technologies like video recognition, the IPOS is supposed to improve the response speed and address capacity in the face of emergent passenger flow of metro stations.

Keywords: anylogic software, decision-making support system, intellectualization, ISCS, passenger organization

Procedia PDF Downloads 171
26569 The Experience of Community-based Tourism in Yunguilla, Ecuador and Its Social-Cultural Impact

Authors: York Neudel

Abstract:

The phenomenon of tourism has been considered as tool to overcome cultural frontiers, to comprehend the other and to cope with mutual mistrust and suspicion. Well, that has been a myth, at least when it comes to mass-tourism. Other approaches, like community-based tourism, still are based on the idea of embracing the other in order to help or to understand the cultural difference. In 1997, two American NGOs incentivized a tourism-project in a community in the highlands of Ecuador, in order to protect the cloud forest from destructive exploitation of its own inhabitants. Nineteen years after that, I analyze in this investigation the interactions between the Ecuadorian hosts in the mestizo-community of Yunguilla and the foreign tourist in the quest for “authentic life” in the Ecuadorian cloud forest. As a sort of “contemporary pilgrim” the traveller tries to find authenticity in other times and places far away from their everyday life in Europe or North America. Therefore, tourists are guided by stereotypes and expectations that are produced by the touristic industry. The host, on the other hand, has to negotiate this pre-established imaginary. That generates a kind of theatre-play with front- and backstage in organic gardens, little fabrics and even private housing, since this alternative project offers to share the private space of the host with the tourist in the setting the community-based tourism. In order to protect their privacy, the community creates new hybrid spaces that oscillate between front- and backstages that culminates in a game of hide and seek – a phenomenon that promises interesting frictions for an anthropological case-study.

Keywords: Tourism, Authenticity, Community-based tourism, Ecuador, Yunguilla

Procedia PDF Downloads 280
26568 Study on Construction of 3D Topography by UAV-Based Images

Authors: Yun-Yao Chi, Chieh-Kai Tsai, Dai-Ling Li

Abstract:

In this paper, a method of fast 3D topography modeling using the high-resolution camera images is studied based on the characteristics of Unmanned Aerial Vehicle (UAV) system for low altitude aerial photogrammetry and the need of three dimensional (3D) urban landscape modeling. Firstly, the existing high-resolution digital camera with special design of overlap images is designed by reconstructing and analyzing the auto-flying paths of UAVs, which improves the self-calibration function to achieve the high precision imaging by software, and further increased the resolution of the imaging system. Secondly, several-angle images including vertical images and oblique images gotten by the UAV system are used for the detail measure of urban land surfaces and the texture extraction. Finally, the aerial photography and 3D topography construction are both developed in campus of Chang-Jung University and in Guerin district area in Tainan, Taiwan, provide authentication model for construction of 3D topography based on combined UAV-based camera images from system. The results demonstrated that the UAV system for low altitude aerial photogrammetry can be used in the construction of 3D topography production, and the technology solution in this paper offers a new, fast, and technical plan for the 3D expression of the city landscape, fine modeling and visualization.

Keywords: 3D, topography, UAV, images

Procedia PDF Downloads 300
26567 Development of a Few-View Computed Tomographic Reconstruction Algorithm Using Multi-Directional Total Variation

Authors: Chia Jui Hsieh, Jyh Cheng Chen, Chih Wei Kuo, Ruei Teng Wang, Woei Chyn Chu

Abstract:

Compressed sensing (CS) based computed tomographic (CT) reconstruction algorithm utilizes total variation (TV) to transform CT image into sparse domain and minimizes L1-norm of sparse image for reconstruction. Different from the traditional CS based reconstruction which only calculates x-coordinate and y-coordinate TV to transform CT images into sparse domain, we propose a multi-directional TV to transform tomographic image into sparse domain for low-dose reconstruction. Our method considers all possible directions of TV calculations around a pixel, so the sparse transform for CS based reconstruction is more accurate. In 2D CT reconstruction, we use eight-directional TV to transform CT image into sparse domain. Furthermore, we also use 26-directional TV for 3D reconstruction. This multi-directional sparse transform method makes CS based reconstruction algorithm more powerful to reduce noise and increase image quality. To validate and evaluate the performance of this multi-directional sparse transform method, we use both Shepp-Logan phantom and a head phantom as the targets for reconstruction with the corresponding simulated sparse projection data (angular sampling interval is 5 deg and 6 deg, respectively). From the results, the multi-directional TV method can reconstruct images with relatively less artifacts compared with traditional CS based reconstruction algorithm which only calculates x-coordinate and y-coordinate TV. We also choose RMSE, PSNR, UQI to be the parameters for quantitative analysis. From the results of quantitative analysis, no matter which parameter is calculated, the multi-directional TV method, which we proposed, is better.

Keywords: compressed sensing (CS), low-dose CT reconstruction, total variation (TV), multi-directional gradient operator

Procedia PDF Downloads 254
26566 Improved Hash Value Based Stream CipherUsing Delayed Feedback with Carry Shift Register

Authors: K. K. Soundra Pandian, Bhupendra Gupta

Abstract:

In the modern era, as the application data’s are massive and complex, it needs to be secured from the adversary attack. In this context, a non-recursive key based integrated spritz stream cipher with the circulant hash function using delayed feedback with carry shift register (d-FCSR) is proposed in this paper. The novelty of this proposed stream cipher algorithm is to engender the improved keystream using d-FCSR. The proposed algorithm is coded using Verilog HDL to produce dynamic binary key stream and implemented on commercially available FPGA device Virtex 5 xc5vlx110t-2ff1136. The implementation of stream cipher using d-FCSR on the FPGA device operates at a maximum frequency of 60.62 MHz. It achieved the data throughput of 492 Mbps and improved in terms of efficiency (throughput/area) compared to existing techniques. This paper also briefs the cryptanalysis of proposed circulant hash value based spritz stream cipher using d-FCSR is against the adversary attack on a hardware platform for the hardware based cryptography applications.

Keywords: cryptography, circulant function, field programmable gated array, hash value, spritz stream cipher

Procedia PDF Downloads 245
26565 A Constrained Neural Network Based Variable Neighborhood Search for the Multi-Objective Dynamic Flexible Job Shop Scheduling Problems

Authors: Aydin Teymourifar, Gurkan Ozturk, Ozan Bahadir

Abstract:

In this paper, a new neural network based variable neighborhood search is proposed for the multi-objective dynamic, flexible job shop scheduling problems. The neural network controls the problems' constraints to prevent infeasible solutions, while the Variable Neighborhood Search (VNS) applies moves, based on the critical block concept to improve the solutions. Two approaches are used for managing the constraints, in the first approach, infeasible solutions are modified according to the constraints, after the moves application, while in the second one, infeasible moves are prevented. Several neighborhood structures from the literature with some modifications, also new structures are used in the VNS. The suggested neighborhoods are more systematically defined and easy to implement. Comparison is done based on a multi-objective flexible job shop scheduling problem that is dynamic because of the jobs different release time and machines breakdowns. The results show that the presented method has better performance than the compared VNSs selected from the literature.

Keywords: constrained optimization, neural network, variable neighborhood search, flexible job shop scheduling, dynamic multi-objective optimization

Procedia PDF Downloads 339
26564 The Determinants of Female Participation to the Labour Force in Turkey

Authors: Zeynep Karacor, Rahime Hulya Ozturk

Abstract:

Located in developing countries but with the successful performance in recent years have shown in emerging economies , the labor factor has undoubtedly an important place in Turkish economy. The theorists have emphasized the importance of labor and human capital factors for many years. The importance of human capital is emerging in the process of determining the labor force participation rate. It is relatively easy to employ qualified labor force but employment of unskilled labor is particularly difficult. Another factor affecting the gender differences are employment opportunities in the labor force. In our country, the employment conditions of men and women differ. Factors causing these differentials are inherent job requirements, the social structure of society, women's point of view, working hours, working conditions. Crisis in our country in recent years have significantly affect the labor force participation rates. In particular, women's labor force participation rates have shown a decrease in crisis.In crisis female laborforce leave their job and go their home. It is the sole provider of social perception of men so in crisis period it is considered that woman lost their job. In the first part of this study the current situation in the world of female participation in the labor force in Turkey will examine. In the second part of the study literature will be examined. In the third and last part of the study factors of determinants of female labor force participation rate analysis will done by Granger Causality Analysis.

Keywords: female labour force, employment, labor force, Turkey

Procedia PDF Downloads 282
26563 Community Perceptions and Attitudes Regarding Wildlife Crime in South Africa

Authors: Louiza C. Duncker, Duarte Gonçalves

Abstract:

Wildlife crime is a complex problem with many interconnected facets, which are generally responded to in parts or fragments in efforts to “break down” the complexity into manageable components. However, fragmentation increases complexity as coherence and cooperation become diluted. A whole-of-society approach has been developed towards finding a common goal and integrated approach to preventing wildlife crime. As part of this development, research was conducted in rural communities adjacent to conservation areas in South Africa to define and comprehend the challenges faced by them, and to understand their perceptions of wildlife crime. The results of the research showed that the perceptions of community members varied - most were in favor of conservation and of protecting rhinos, only if they derive adequate benefit from it. Regardless of gender, income level, education level, or access to services, conservation was perceived to be good and bad by the same people. Even though people in the communities are poor, a willingness to stop rhino poaching does exist amongst them, but their perception of parks not caring about people triggered an attitude of not being willing to stop, prevent or report poaching. Understanding the nuances, the history, the interests and values of community members, and the drivers behind poaching mind-sets (intrinsic or driven by transnational organized crime) is imperative to create sustainable and resilient communities on multiple levels that make a substantial positive impact on people’s lives, but also conserve wildlife for posterity.

Keywords: community perceptions, conservation, rhino poaching, whole-of-society approach, wildlife crime

Procedia PDF Downloads 229
26562 Gamification Teacher Professional Development: Engaging Language Learners in STEMS through Game-Based Learning

Authors: Karen Guerrero

Abstract:

Kindergarten-12th grade teachers engaged in teacher professional development (PD) on game-based learning techniques and strategies to support teaching STEMSS (STEM + Social Studies with an emphasis on geography across the curriculum) to language learners. Ten effective strategies have supported teaching content and language in tandem. To provide exiting teacher PD on summer and spring breaks, gamification has integrated these strategies to engage linguistically diverse student populations to provide informal language practice while students engage in the content. Teachers brought a STEMSS lesson to the PD, engaged in a wide variety of games (dice, cards, board, physical, digital, etc.), critiqued the games based on gaming elements, then developed, brainstormed, presented, piloted, and published their game-based STEMSS lessons to share with their colleagues. Pre and post-surveys and focus groups were conducted to demonstrate an increase in knowledge, skills, and self-efficacy in using gamification to teach content in the classroom. Provide an engaging strategy (gamification) to support teaching content and language to linguistically diverse students in the K-12 classroom. Game-based learning supports informal language practice while developing academic vocabulary utilized in the game elements/content focus, building both content knowledge through play and language development through practice. The study also investigated teacher's increase in knowledge, skills, and self-efficacy in using games to teach language learners. Mixed methods were used to investigate knowledge, skills, and self-efficacy prior to and after the gamification teacher training (pre/post) and to understand the content and application of developing and utilizing game-based learning to teach. This study will contribute to the body of knowledge in applying game-based learning theories to the K-12 classroom to support English learners in developing English skills and STEMSS content knowledge.

Keywords: gamification, teacher professional development, STEM, English learners, game-based learning

Procedia PDF Downloads 83