Search results for: false consensus
451 A Model of Empowerment Evaluation of Knowledge Management in Private Banks Using Fuzzy Inference System
Authors: Nazanin Pilevari, Kamyar Mahmoodi
Abstract:
The purpose of this research is to provide a model based on fuzzy inference system for evaluating empowerment of Knowledge management. The first prototype of the research was developed based on the study of literature. In the next step, experts were provided with these models and after implementing consensus-based reform, the views of Fuzzy Delphi experts and techniques, components and Index research model were finalized. Culture, structure, IT and leadership were considered as dimensions of empowerment. Then, In order to collect and extract data for fuzzy inference system based on knowledge and Experience, the experts were interviewed. The values obtained from designed fuzzy inference system, made review and assessment of the organization's empowerment of Knowledge management possible. After the design and validation of systems to measure indexes ,empowerment of Knowledge management and inputs into fuzzy inference) in the AYANDEH Bank, a questionnaire was used. In the case of this bank, the system output indicates that the status of empowerment of Knowledge management, culture, organizational structure and leadership are at the moderate level and information technology empowerment are relatively high. Based on these results, the status of knowledge management empowerment in AYANDE Bank, was moderate. Eventually, some suggestions for improving the current situation of banks were provided. According to studies of research history, the use of powerful tools in Fuzzy Inference System for assessment of Knowledge management and knowledge management empowerment such an assessment in the field of banking, are the innovation of this Research.Keywords: knowledge management, knowledge management empowerment, fuzzy inference system, fuzzy Delphi
Procedia PDF Downloads 358450 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems
Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi
Abstract:
The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks
Procedia PDF Downloads 353449 The Ocean at the Center of Geopolitics: Between an Overflowing Land and an Under-Exploited Sea
Authors: Ana Maria De Azevedo
Abstract:
We are living a remarkable period, responsible for the thriving of the human population to unprecedented levels. Still, it is empirically obvious that sustaining such a huge population puts a tremendous pressure on our planet. Once Land resources grow scarcer, there is a mounting pressure to find alternatives to support basic human needs elsewhere. Occupying most of our planet, it’s therefore natural that, is not a so distant future, humankind look for such basic subsistence means at the Ocean. Thus, once the Ocean becomes essential to Human subsistence, it is predictable it's moving to the foreground of Geopolitics. Both future technologies and uses of the Ocean, as bidding for the exploration of its resources away from the natural territory of influence of a Country, are susceptible of raising the risk of conflict between traditional political adversaries and/or the dilemma of having to balance economic interests, with various security and defense concerns. Those empirical observations suggest the need to further research on this perspective shift of the main Geopolitical axis to the Ocean, the new sources of conflict that can result thereon, and how to address them. The author suggests a systematic analysis of this problematic, to attain a political and legal international consensus, namely on what concerns updating of the 'United Nations Convention on the Law of the Sea' of 10 December 1982, and/or its annexes. To proceed with the present research, the primary analysis was based on a quantitative observation, but reasoning thereon relied essentially on a qualitative process of prospective scenarios assessment.Keywords: marine resources, ocean geopolitics, security and defense, sustainable development
Procedia PDF Downloads 153448 Sequence Analysis and Structural Implications of Rotavirus Capsid Proteins
Authors: Nishal Parbhoo, John B. Dewar, Samantha Gildenhuys
Abstract:
Rotavirus is the major cause of severe gastroenteritis worldwide in children aged 5 and younger. Death rates are high particularly in developing countries. The mature rotavirus is a non-enveloped triple-layered nucleocapsid containing 11 double-stranded RNA segments. Here a global view on the sequence and structure of the three main capsid proteins, VP7, VP6, and VP2 is taken by generating a consensus sequence for each of these rotavirus proteins, for each species obtained from published data of representative rotavirus genotypes from across the world and across species. The degree of conservation between species was represented on homology models for each of the proteins. VP7 shows the highest level of variation with 14 - 45 amino acids showing conservation of less than 60%. These changes are localized to the outer surface which is exposed to antibodies alluding to a possible mechanism in evading the immune system. The middle layer, VP6 shows lower variability with only 14-32 sites having lower than 70% conservation. The inner structural layer made up of VP2 showed the lowest variability with only 1-16 sites having less than 70% conservation across species. The results correlate with proteins’ multiple structural roles. Although the nucleotide sequences vary due to an error-prone replication and lack of proofreading, the corresponding amino acid sequence of VP2, 6 and 7 remains conserved. Sequence conservation maintained for the virus results in stable protein structures, fit for function. This can be exploited in drug design, molecular studies and biotechnological applications.Keywords: amino acid sequence conservation, capsid protein, protein structure, vaccine candidate
Procedia PDF Downloads 289447 Studies on Phylogeny of Helicoverpa armigera Populations from North Western Himalaya Region with Help of Cytochromeoxidase I Sequence
Authors: R. M. Srivastava, Subbanna A.R.N.S, Md Abbas Ahmad, S. P.More, Shivashankar, B. Kalyanbabu
Abstract:
The similar morphology associated with high genetic variability poses problems in phylogenetic studies of Helicoverpa armigera (Hubner). To identify genetic variation of North Western Himalayan population’s, partial (Mid to terminal region) cytochrome c oxidase subunit I (COX-1) gene was amplified and sequenced for three populations collected from Pantnagar, Almora, and Chinyalisaur. The alignment of sequences with other two populations, Nagpur representing central India population and Anhui, China representing complete COX-1 sequence revealed unanimity in middle region with eleven single nucleotide polymorphisms (SNPs) in Nagpur populations. However, the consensus is missing when approaching towards terminal region, which is associated with 15 each SNPs and pair base substitutions in Chinyalisaur populations. In minimum evolution tree, all the five populations were majorly separated into two clades, one comprising of only Nagpur population and the other with rest. Amongst, North Western populations, Chinyalisaur one is promising by farming a separate clade. The pairwise genetic distance ranges from 0.025 to 0.192 with the maximum between H. armigera populations of Nagpur and Chinyalisaur. This genetic isolation of populations can be attributed to a key role of topological barriers of weather and mountain ranges and temporal barriers due to cropping patterns.Keywords: cytochrome c oxidase subunit I, northwestern Himalayan population, Helicoverpa armigera (Noctuidae: Lepidoptera), phylogenetic relationship, genetic variation
Procedia PDF Downloads 309446 Real-Time Pedestrian Detection Method Based on Improved YOLOv3
Authors: Jingting Luo, Yong Wang, Ying Wang
Abstract:
Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3
Procedia PDF Downloads 141445 When Worlds Collide: Clashes of Communication between Italian and Anglophone Cultures in Movies Set in Venice
Authors: Angela Fabris, Joerg Helbig
Abstract:
Our paper deals with feature films set in Venice which focus on the influence of Italian life style on anglophone characters. Usually, these films emphasize the different cultures and mentalities of Italian and British (or American) people. More often than not, these encounters result in a profound change of the anglophone characters' attitude towards romance and sensuality. A case in point is David Lean's Summer Madness (UK 1955). This film recounts the love affair between the American tourist Jane Hudson (Katherine Hepburn) and the Venetian antique shop owner Renato de Rossi (Rossano Brazzi). Jane is a spinster in her mid-forties who longs for love and romance. The chance arrives when she meets Renato who feels attracted to her. Jane's immediate reaction, however, is to reject Renato's advances. What follows is a struggle between the strict morality of a puritan upbringing and the irresitable charm of Mediterranean temptations. Similar conflicts can be found in many other movies. Apart from Summer Madness we will discuss Aldo Lado's Chi l'ha vista morire? (It 1972), Nicolas Roeg's Don't Look Now (UK/It 1973) and Paul Schrader's The Comfort of Strangers (It/UK/USA 1990). Our paper raises the question whether or not these and other films present false stereotypes and chlichés. The paper is part of our large-scale research project which explores the history of erotic cinema in Italy and England.Keywords: culture clash, erotic cinema, film, Venice
Procedia PDF Downloads 248444 Conceptualizing Place Attachment Affordance
Authors: Priya Narayanan
Abstract:
Despite several studies having been conducted on the highly subjective concept of place attachment in the last 60 years, there is a lack of consensus among researchers about how it can be measured empirically. Further, there is no available literature that discusses how a place can be manipulated via design and/or policy to allow people to feel/get attached to it, an aspect that seems to be the need of the hour in a world where a substantial population is living in shelter homes as war/climate/social refugees. Consequently, this paper draws from studies on place, affordance and attachment to conceptualize an objectively measurable entity in place attachment affordance by asking ‘whether and to what degree a place allows one to form attachment bonds with it’ rather than the generally asked ‘whether and to what degree one is/feels attached to a place’. Towards this, the place attachment affordance scale (PAAS) has been developed to not only quantitatively measure place attachment affordance but also act as a point of entry into a more in-depth analysis of both place policy and place properties. To illustrate the validity of the scale, the study uses PAAS to compare shelter homes for women in crisis with the homes they once lived in to glean the degree to which both places afford the formation of place attachment bonds to the residents. PAAS has also been used to compare shelter homes as places of short-/long-term residence for the residents and as places of work for the staff. Based on the results, it is suggested that place attachment and built environment researchers employ the PAAS as an objective measurement tool to better understand not only the presence or absence of attachment bonds with place but also the attributes of place that encourage or discourage the same. The study also briefly discusses the universality of the PAAS, although further fieldwork might be required to substantiate the same.Keywords: place attachment, affordance, shelter homes, home, scale, environmental psychology
Procedia PDF Downloads 26443 The Time-Frequency Domain Reflection Method for Aircraft Cable Defects Localization
Authors: Reza Rezaeipour Honarmandzad
Abstract:
This paper introduces an aircraft cable fault detection and location method in light of TFDR keeping in mind the end goal to recognize the intermittent faults adequately and to adapt to the serial and after-connector issues being hard to be distinguished in time domain reflection. In this strategy, the correlation function of reflected and reference signal is used to recognize and find the airplane fault as per the qualities of reflected and reference signal in time-frequency domain, so the hit rate of distinguishing and finding intermittent faults can be enhanced adequately. In the work process, the reflected signal is interfered by the noise and false caution happens frequently, so the threshold de-noising technique in light of wavelet decomposition is used to diminish the noise interference and lessen the shortcoming alert rate. At that point the time-frequency cross connection capacity of the reference signal and the reflected signal based on Wigner-Ville appropriation is figured so as to find the issue position. Finally, LabVIEW is connected to execute operation and control interface, the primary capacity of which is to connect and control MATLAB and LABSQL. Using the solid computing capacity and the bottomless capacity library of MATLAB, the signal processing turn to be effortlessly acknowledged, in addition LabVIEW help the framework to be more dependable and upgraded effectively.Keywords: aircraft cable, fault location, TFDR, LabVIEW
Procedia PDF Downloads 476442 Physics-Informed Machine Learning for Displacement Estimation in Solid Mechanics Problem
Authors: Feng Yang
Abstract:
Machine learning (ML), especially deep learning (DL), has been extensively applied to many applications in recently years and gained great success in solving different problems, including scientific problems. However, conventional ML/DL methodologies are purely data-driven which have the limitations, such as need of ample amount of labelled training data, lack of consistency to physical principles, and lack of generalizability to new problems/domains. Recently, there is a growing consensus that ML models need to further take advantage of prior knowledge to deal with these limitations. Physics-informed machine learning, aiming at integration of physics/domain knowledge into ML, has been recognized as an emerging area of research, especially in the recent 2 to 3 years. In this work, physics-informed ML, specifically physics-informed neural network (NN), is employed and implemented to estimate the displacements at x, y, z directions in a solid mechanics problem that is controlled by equilibrium equations with boundary conditions. By incorporating the physics (i.e. the equilibrium equations) into the learning process of NN, it is showed that the NN can be trained very efficiently with a small set of labelled training data. Experiments with different settings of the NN model and the amount of labelled training data were conducted, and the results show that very high accuracy can be achieved in fulfilling the equilibrium equations as well as in predicting the displacements, e.g. in setting the overall displacement of 0.1, a root mean square error (RMSE) of 2.09 × 10−4 was achieved.Keywords: deep learning, neural network, physics-informed machine learning, solid mechanics
Procedia PDF Downloads 149441 The Belt and Road Initiative in a Spiderweb of Conflicting Great Power Interests: A Geopolitical Analysis
Authors: Csaba Barnabas Horvath
Abstract:
The Belt and Road initiative of China is one that can change the face of Eurasia as we know it. Instead of four major, densely populated subcontinents defined by Mackinder (East Asia, Europe, the Indian Subcontinent, and the Middle East) isolated from each other by vast, sparsely populated and underdeveloped regions, it can at last start to function as a geographic whole, with a sophisticated infrastructure linking its different parts to each other. This initiative, however, happens not in a geopolitical vacuum, but in a space of conflicting great power interests. In Central Asia, the influence of China and Russia are in a setting of competition, where despite the cooperation between the two powers to a great degree, issues causing mutual mistrust emerge repeatedly. In Afghanistan, besides western military presence, even India’s efforts can be added to the picture. In Southeast Asia, a key region regarding the maritime Silk Road, India’s Act East policy meets with China’s Belt and Road, not always in consensus, not to mention US and Japanese interests in the region. The presentation aims to take an overview on how conflicting great power interests are likely to influence the outcome of the Belt and Road initiative. The findings show, that overall success of the Belt and Road Initiative may not be as smooth, as hoped by China, but at the same time, in a limited number of strategically important countries (such as Pakistan, Laos, and Cambodia), this setting is actually a factor favoring China, providing at least a selected number of reliable corridors, where the initiative is actually likely to be successful.Keywords: belt and road initiative, geostrategic corridors, geopolitics, great power rivalry
Procedia PDF Downloads 217440 Stress Hyperglycemia: A Predictor of Major Adverse Cardiac Events in Non-Diabetic Patients With Acute Heart Failure
Authors: Fahad Raj Khan, Suleman Khan
Abstract:
There is a lack of consensus about the predictive value of raised blood glucose levels in terms of major adverse cardiac events (MACEs) in non-diabetic patients admitted for acute decompensated heart failure. The purpose of this research was to examine the long-term prognosis of acute decompensated heart failure (ADHF) in non-diabetic persons who had increased blood glucose levels, i.e., stress hyperglycemia, at the time of their ADHF hospitalization. The research involved 650 non-diabetic patients. Based on their admission stress hyperglycemia, they were divided into two groups.ie with and without (SHGL). The two groups' one-year outcomes for major adverse cardiac events (MACEs) were compared, and key predictors of MACEs were discovered. For statistical analysis, the two-tailed Mann-Whitney U test, Fisher's exact test, and binary logistic regression analysis were utilized. SHGL was found in 353 (54.3%) individuals. It was more frequent in men than in women. About 27% of patients with SHGL had previously been admitted for ADHF. Almost 62% were hypertensive, whereas 14 % had CKD. MACEs were significantly predicted by SHGL, HTN, prior hospitalization for ADHF, CKD, and cardiogenic shock upon admission. SHGL at the time of ADHF admission, independent of DM status, may be a predictive indication of MACEs.Keywords: stress hyperglycemia, acute heart failure, major adverse cardiac events, MACEs
Procedia PDF Downloads 93439 The Influence of Superordinate Identity and Group Size on Group Decision Making through Discussion
Authors: Lin Peng, Jin Zhang, Yuanyuan Miao, Quanquan Zheng
Abstract:
Group discussion and group decision-making have long been a topic of research interest. Traditional research on group decision making typically focuses on the strategies or functional models of combining members’ preferences to reach an optimal consensus. In this research, we want to explore natural process group decision making through discussion and examine relevant, influential factors--common superordinate identity shared by group and size of the groups. We manipulated the social identity of the groups into either a shared superordinate identity or different subgroup identities. We also manipulated the size to make it either a big (6-8 person) group or small group (3-person group). Using experimental methods, we found members of a superordinate identity group tend to modify more of their own opinions through the discussion, compared to those only identifying with their subgroups. Besides, members of superordinate identity groups also formed stronger identification with group decision--the results of group discussion than their subgroup peers. We also found higher member modification in bigger groups compared to smaller groups. Evaluations of decisions before and after discussion as well as group decisions are strongly linked to group identity, as members of superordinate group feel more confident and satisfied with both the results and decision-making process. Members’ opinions are more similar and homogeneous in smaller groups compared to bigger groups. This research have many implications for further research and applied behaviors in organizations.Keywords: group decision making, group size, identification, modification, superordinate identity
Procedia PDF Downloads 303438 Revolutionary Violence and Echoes of the «Thou Shalt Not Kill» Debate: A Tragic Reading of the Class Conflict in Colombia
Authors: Jaime Otavo
Abstract:
Oscar del Barco, a former member of Los Montoneros, an Argentine guerrilla group of the 1970s, published a letter in 2004 that sparked a heated debate in his country about revolutionary violence. Del Barco, on the subject of «No matarás» (Thou shalt not kill) –as this debate was known– wrote to Sergio Schmucler, his addressee, the following: "There is no 'ideal' that justifies the death of a man. The founding principle of any community is 'Thou shalt not kill'. Thou shalt not kill the man because every man is sacred, and every man is all men".In this paper, the «No matarás» debate will be used to problematize two interconnected ideas that, in Colombia, underpinned the use of revolutionary violence by the guerrilla movements that emerged in the 1970s. On the one hand, an anthropological optimism; on the other, a theological scheme of converting violence into justice. Based on this, two arguments are put forward: 1) that revolutionary violence arose from an ethical-political certainty, namely: the confidence in being on the right side of history (because the violent ones were others), but 2) that its persistence over time made visible a tragic element, that is, that the bipolarity between victim and executioner, good and evil, or friend and foe that is inscribed in the class struggle is a false dilemma for in the context of revolutionary violence –as in the context of Greek tragedy–, no one ever has to make a decision, nor can he do so. For this reason, it is maintained that the fundamental aspect about guerrilla violence in Colombia is that it imposed itself as a violence of negativity which not only exceeded the capacity of the extreme left to control its revolutionary praxis but also exploited the link with the political subjectivation to which it aspired, the proletariat as the gravedigger of the bourgeoisie.Keywords: marxism, social movements, armed struggle, debate thou shalt not kill
Procedia PDF Downloads 76437 Highly Accurate Target Motion Compensation Using Entropy Function Minimization
Authors: Amin Aghatabar Roodbary, Mohammad Hassan Bastani
Abstract:
One of the defects of stepped frequency radar systems is their sensitivity to target motion. In such systems, target motion causes range cell shift, false peaks, Signal to Noise Ratio (SNR) reduction and range profile spreading because of power spectrum interference of each range cell in adjacent range cells which induces distortion in High Resolution Range Profile (HRRP) and disrupt target recognition process. Thus Target Motion Parameters (TMPs) effects compensation should be employed. In this paper, such a method for estimating TMPs (velocity and acceleration) and consequently eliminating or suppressing the unwanted effects on HRRP based on entropy minimization has been proposed. This method is carried out in two major steps: in the first step, a discrete search method has been utilized over the whole acceleration-velocity lattice network, in a specific interval seeking to find a less-accurate minimum point of the entropy function. Then in the second step, a 1-D search over velocity is done in locus of the minimum for several constant acceleration lines, in order to enhance the accuracy of the minimum point found in the first step. The provided simulation results demonstrate the effectiveness of the proposed method.Keywords: automatic target recognition (ATR), high resolution range profile (HRRP), motion compensation, stepped frequency waveform technique (SFW), target motion parameters (TMPs)
Procedia PDF Downloads 151436 Reviewing the Effect of Healing Design on Mental Health Establishments in the Context of India
Authors: Aratrika Sarkar, Jayita Guha Niyogi
Abstract:
This paper focuses on the application of general healing design theories to modulate them into case-specific and contextual design considerations. Existing literature focuses on the relationship between architecture and mental health. Primary case studies are selected in India to focus on the effect of a specific location on design considerations. They are qualitatively analysed to further contextualise the inferences from the literature study. An academic project is cited as an example to apply the learnings from the study and understand the influence of various parameters on the design process for further conclusion. Literature studies, case studies and hypothetical design applications helped in finding the different ways of achieving the similar goal of a sensitive approach toward mental health. Along with salutogenic parameters, category of establishment, age group, location of the site and user preference plays a crucial role in the design process. Design of mental health establishments, especially in India, has to involve transparency between stakeholders and users. Owing to different climatic zones and diverse sociocultural traditions, the approach toward healing should adapt accordingly. It should be an effort towards striking a balance between contradictory elements of healing design and resolving the dilemmas with sensitivity and consensus. Lastly, the design should not force a person towards communication or companionship but rather let the person realise that naturally through the healing process.Keywords: contextual healing design, deinstitutionalisation, Indian mental healthcare establishments, environmental psychology, salutogenesis, therapeutic design
Procedia PDF Downloads 107435 Feature Based Unsupervised Intrusion Detection
Authors: Deeman Yousif Mahmood, Mohammed Abdullah Hussein
Abstract:
The goal of a network-based intrusion detection system is to classify activities of network traffics into two major categories: normal and attack (intrusive) activities. Nowadays, data mining and machine learning plays an important role in many sciences; including intrusion detection system (IDS) using both supervised and unsupervised techniques. However, one of the essential steps of data mining is feature selection that helps in improving the efficiency, performance and prediction rate of proposed approach. This paper applies unsupervised K-means clustering algorithm with information gain (IG) for feature selection and reduction to build a network intrusion detection system. For our experimental analysis, we have used the new NSL-KDD dataset, which is a modified dataset for KDDCup 1999 intrusion detection benchmark dataset. With a split of 60.0% for the training set and the remainder for the testing set, a 2 class classifications have been implemented (Normal, Attack). Weka framework which is a java based open source software consists of a collection of machine learning algorithms for data mining tasks has been used in the testing process. The experimental results show that the proposed approach is very accurate with low false positive rate and high true positive rate and it takes less learning time in comparison with using the full features of the dataset with the same algorithm.Keywords: information gain (IG), intrusion detection system (IDS), k-means clustering, Weka
Procedia PDF Downloads 294434 Computational Identification of Signalling Pathways in Protein Interaction Networks
Authors: Angela U. Makolo, Temitayo A. Olagunju
Abstract:
The knowledge of signaling pathways is central to understanding the biological mechanisms of organisms since it has been identified that in eukaryotic organisms, the number of signaling pathways determines the number of ways the organism will react to external stimuli. Signaling pathways are studied using protein interaction networks constructed from protein-protein interaction data obtained using high throughput experimental procedures. However, these high throughput methods are known to produce very high rates of false positive and negative interactions. In order to construct a useful protein interaction network from this noisy data, computational methods are applied to validate the protein-protein interactions. In this study, a computational technique to identify signaling pathways from a protein interaction network constructed using validated protein-protein interaction data was designed. A weighted interaction graph of the Saccharomyces cerevisiae (Baker’s Yeast) organism using the proteins as the nodes and interactions between them as edges was constructed. The weights were obtained using Bayesian probabilistic network to estimate the posterior probability of interaction between two proteins given the gene expression measurement as biological evidence. Only interactions above a threshold were accepted for the network model. A pathway was formalized as a simple path in the interaction network from a starting protein and an ending protein of interest. We were able to identify some pathway segments, one of which is a segment of the pathway that signals the start of the process of meiosis in S. cerevisiae.Keywords: Bayesian networks, protein interaction networks, Saccharomyces cerevisiae, signalling pathways
Procedia PDF Downloads 540433 Reasonableness to Strengthen Citizen Participation in Mexican Anti-Corruption Policies
Authors: Amós García Montaño
Abstract:
In a democracy, a public policy must be developed within the regulatory framework and considering citizen participation in its planning, design, execution, and evaluation stages, necessary factors to have both legal support and sufficient legitimacy for its operation. However, the complexity and magnitude of certain public problems results in difficulties for the generation of consensus among society members, leading to unstable and unsuccessful scenarios for the exercise of the right to citizen participation and the generation of effective and efficient public policies. This is the case of public policies against corruption, an issue that in Mexico is difficult to define and generates conflicting opinions. To provide a possible solution to this delicate reality, this paper analyzes the principle of reasonableness as a tool for identifying the basic elements that guarantee a fundamental level of the exercise of the right to citizen participation in the fight against corruption, adopting elements of human rights indicator methodologies. In this sense, the relevance of having a legal framework that establishes obligations to incorporate proactive and transversal citizen participation in the matter is observed. It is also noted the need to monitor the operation of various citizen participation mechanisms in the decision-making processes of the institutions involved in the fight and prevention of corruption, which lead to an increase in the improvement of the perception of the citizen role as a relevant actor in this field. It is concluded that the principle of reasonableness is presented as a very useful tool for the identification of basic elements that facilitate the fulfillment of human rights commitments in the field of public policies.Keywords: anticorruption, public participation, public policies, reasonableness
Procedia PDF Downloads 82432 The Effects of Self-Efficacy on Challenge and Threat States
Authors: Nadine Sammy, Mark Wilson, Samuel Vine
Abstract:
The Theory of Challenge and Threat States in Athletes (TCTSA) states that self-efficacy is an antecedent of challenge and threat. These states result from conscious and unconscious evaluations of situational demands and personal resources and are represented by both cognitive and physiological markers. Challenge is considered a more adaptive stress response as it is associated with a more efficient cardiovascular profile, as well as better performance and attention effects compared with threat. Self-efficacy is proposed to influence challenge/threat because an individual’s belief that they have the skills necessary to execute the courses of action required to succeed contributes to a perception that they can cope with the demands of the situation. This study experimentally examined the effects of self-efficacy on cardiovascular responses (challenge and threat), demand and resource evaluations, performance and attention under pressurised conditions. Forty-five university students were randomly assigned to either a control (n=15), low self-efficacy (n=15) or high self-efficacy (n=15) group and completed baseline and pressurised golf putting tasks. Self-efficacy was manipulated using false feedback adapted from previous studies. Measures of self-efficacy, cardiovascular reactivity, demand and resource evaluations, task performance and attention were recorded. The high self-efficacy group displayed more favourable cardiovascular reactivity, indicative of a challenge state, compared with the low self-efficacy group. The former group also reported high resource evaluations, but no task performance or attention effects were detected. These findings demonstrate that levels of self-efficacy influence cardiovascular reactivity and perceptions of resources under pressurised conditions.Keywords: cardiovascular, challenge, performance, threat
Procedia PDF Downloads 231431 The Role of Glutamine-Rich Region of Candida Albicans Tec1p in Mediating Morphological Transition and Invasive Growth
Authors: W. Abu Rayyan, A. Singh, A. M. Al-Jaafreh, W. Abu Dayyih, M. Bustami, S. Salem, N. Seder, K. Schröppel
Abstract:
Hyphal growth and the transcriptional regulation to the host environment are key issues during the pathogenesis of C. albicans. Tec1p is the C. albicans homolog of a TEA transcription factor family, which share a conserved DNA-binding TEA domain in their N-terminal. In order to define a structure-function relationship of the C. albicans Tec1p protein, we constructed several mutations on the N terminal, C terminal or in the TEA binding domain itself by homologous recombination technology. The modifications in the open reading frame of TEC1 were tested for reconstitution of the morphogenetic development of the tec1/tec1 mutant strain CaAS12. Mutation in the TEA consensus sequence did not confer transition to hyphae whereas the reconstitution of the full-length Tec1p has reconstituted hyphal development. A deletion in one of glutamine-rich regions either in the Tec1p N-terminal or the C-terminal in regions of 53-212 or 637–744 aa, respectively, did not restore morphological development in mutant CaAS12 strain. Whereas, the reconstitution with Tec1p mutants other than the glutamate-rich region has restored the morphogenetic switch. Additionally, the deletion of the glutamine-rich region has attenuated the invasive growth and the heat shock resistance of C. albicans. In conclusion, we show that a glutamine-rich region of Tec1p is essential for the hyphal development and mediating adaptation to the host environment of C. albicans.Keywords: Candida albicans, morphogenetic development, TEA domain, hyphal formation, TEC1
Procedia PDF Downloads 144430 Face Recognition Using Body-Worn Camera: Dataset and Baseline Algorithms
Authors: Ali Almadan, Anoop Krishnan, Ajita Rattani
Abstract:
Facial recognition is a widely adopted technology in surveillance, border control, healthcare, banking services, and lately, in mobile user authentication with Apple introducing “Face ID” moniker with iPhone X. A lot of research has been conducted in the area of face recognition on datasets captured by surveillance cameras, DSLR, and mobile devices. Recently, face recognition technology has also been deployed on body-worn cameras to keep officers safe, enabling situational awareness and providing evidence for trial. However, limited academic research has been conducted on this topic so far, without the availability of any publicly available datasets with a sufficient sample size. This paper aims to advance research in the area of face recognition using body-worn cameras. To this aim, the contribution of this work is two-fold: (1) collection of a dataset consisting of a total of 136,939 facial images of 102 subjects captured using body-worn cameras in in-door and daylight conditions and (2) evaluation of various deep-learning architectures for face identification on the collected dataset. Experimental results suggest a maximum True Positive Rate(TPR) of 99.86% at False Positive Rate(FPR) of 0.000 obtained by SphereFace based deep learning architecture in daylight condition. The collected dataset and the baseline algorithms will promote further research and development. A downloadable link of the dataset and the algorithms is available by contacting the authors.Keywords: face recognition, body-worn cameras, deep learning, person identification
Procedia PDF Downloads 161429 Arboretum: Community Mixed Reality Nature Environment
Authors: Radek Richtr, Petr Paus
Abstract:
The connection to the primal environment, living and growing nature is disappearing for most of the residents in urban core areas nowadays. Most of the residents perceive scattered green mass like more technical objects than sentient living organisms. The Arboretum is a type of application from the 'serious games' genre -it is a research experiment masked as a gaming environment. In used virtual and augmented reality environments, every city district is represented by central objects; Pillars created as a result of resident’s consensus. Every player can furthermore plant and grow virtual organic seeds everywhere he wants. Seeds sprout, and their form is determined by both players’ choice and nearest pillar. Every house, private rooms, and even workspace get their new living virtual avatar-connected 'residents' growing from player-planted seeds. Every room or workspace is transformed into (calming) nature scene, reflecting in some way both players and community spirit and together create a vicinity environment. The conceptual design phase of the project is crucial and allows for the identification of the fundamental problems through abstraction. The project that centers on wide community usage needs a clear and accessible interface. Simultaneously the conceptual design allows early sharing of project ideas and creating public concern. The paper discusses the current conceptual model of an Arboretum project (which is part of a whole widespread project) and its validation.Keywords: augmented reality, conceptual design, mixed reality, social engineering
Procedia PDF Downloads 228428 Application of Biosensors in Forensic Analysis
Authors: Shirin jalili, Hadi Shirzad, Samaneh Nabavi, Somayeh Khanjani
Abstract:
Biosensors in forensic analysis are ideal biological tools that can be used for rapid and sensitive initial screening and testing to detect of suspicious components like biological and chemical agent in crime scenes. The wide use of different biomolecules such as proteins, nucleic acids, microorganisms, antibodies and enzymes makes it possible. These biosensors have great advantages such as rapidity, little sample manipulation and high sensitivity, also Because of their stability, specificity and low cost they have become a very important tool to Forensic analysis and detection of crime. In crime scenes different substances such as rape samples, Semen, saliva fingerprints and blood samples, act as a detecting elements for biosensors. On the other hand, successful fluid recovery via biosensor has the propensity to yield a highly valuable source of genetic material, which is important in finding the suspect. Although current biological fluid testing techniques are impaired for identification of body fluids. But these methods have disadvantages. For example if they are to be used simultaneously, Often give false positive result. These limitations can negatively result the output of a case through missed or misinterpreted evidence. The use of biosensor enable criminal researchers the highly sensitive and non-destructive detection of biological fluid through interaction with several fluid-endogenous and other biological and chemical contamination at the crime scene. For this reason, using of the biosensors for detecting the biological fluid found at the crime scenes which play an important role in identifying the suspect and solving the criminal.Keywords: biosensors, forensic analysis, biological fluid, crime detection
Procedia PDF Downloads 1115427 Fake News Detection for Korean News Using Machine Learning Techniques
Authors: Tae-Uk Yun, Pullip Chung, Kee-Young Kwahk, Hyunchul Ahn
Abstract:
Fake news is defined as the news articles that are intentionally and verifiably false, and could mislead readers. Spread of fake news may provoke anxiety, chaos, fear, or irrational decisions of the public. Thus, detecting fake news and preventing its spread has become very important issue in our society. However, due to the huge amount of fake news produced every day, it is almost impossible to identify it by a human. Under this context, researchers have tried to develop automated fake news detection using machine learning techniques over the past years. But, there have been no prior studies proposed an automated fake news detection method for Korean news to our best knowledge. In this study, we aim to detect Korean fake news using text mining and machine learning techniques. Our proposed method consists of two steps. In the first step, the news contents to be analyzed is convert to quantified values using various text mining techniques (topic modeling, TF-IDF, and so on). After that, in step 2, classifiers are trained using the values produced in step 1. As the classifiers, machine learning techniques such as logistic regression, backpropagation network, support vector machine, and deep neural network can be applied. To validate the effectiveness of the proposed method, we collected about 200 short Korean news from Seoul National University’s FactCheck. which provides with detailed analysis reports from 20 media outlets and links to source documents for each case. Using this dataset, we will identify which text features are important as well as which classifiers are effective in detecting Korean fake news.Keywords: fake news detection, Korean news, machine learning, text mining
Procedia PDF Downloads 275426 Ghanaian Men and the Performance of Masculinity: Negotiating Gender-Based Violence in Contemporary Ghana
Authors: Isaac Dery
Abstract:
Masculinity studies have gained much purchase globally in recent decades, especially the sense in which they have produced discursive space for interdisciplinary investigations. In the light of this, there is increasing consensus among commentators that different masculinities co-exist within a particular social space. There is also a growing recognition and awareness of the merits in examining the conceptual underpinnings of masculinity (especially hegemonic masculinity) its variously contested meanings, and values, and how it contributes to violent behaviours by men. The consequences of hegemonic masculinity and its violent and traumatic impacts on men and women have been evident. The emerging call to imagine more egalitarian and complex masculinities among men has been at the centre of various discussions on the fight against violence. Some theorists argue that this violence emanates from men’s drive to live up to impossible ideals of “masculinity.” Seeking to make the connections between masculinity and gender-based violence, this paper discusses the imperative and possibilities of engaging men/boys as key actors in the campaign against violence. It is worth re-examining the ways in which men’s embodiment and performance of dangerous masculinities contribute towards violence. This paper therefore argues that empowering men to understand the implications of certain behaviours is the key in an attempt to arrest violence and its traumatic cost. This paper is situated within the thesis that there is a relationship between men’s embodiment and performance of dominant forms of masculinities, on the one hand, and violence against women and other men, on the other. Based on research conducted in northern Ghana on domestic violence, it is the argument of this paper that in order to contain violence against women, conditions of gender construction need to be problematized in a manner that will transform fundamental understandings of gender relations in society.Keywords: violence against women, masculinities, Ghana, gender
Procedia PDF Downloads 497425 The Relationship Between Beauty Bloggers and the Consumption Patterns of Female Followers: A Case Study on Instagram Pages of Beauty Bloggers
Authors: Reyhane Abdollahi
Abstract:
The beauty of appearance has been important in people's lives since the beginning of history. In every era, beauty has had a specific meaning, and individuals have represented the standards of beauty during each period. According to statistics, the beauty industry has experienced significant economic growth in recent decades, with projections indicating it will reach $583 billion by 2027. The emergence of social media, backed by technological advancements, has created a suitable platform for various beauty brands to engage in economic activities. It can be said that today, beauty bloggers represent the beauty standards of society, actively engaging on social media platforms such as Instagram. Beauty bloggers promote cosmetic and skin care products in front of the camera in their ideal state, utilizing their skills. Instagram, with its limited two-way communication between users and influencers, has also created a suitable environment for advertising. The aim of this research is to study the relationship between beauty bloggers and the consumption patterns of female followers. This research was conducted through interviews with Ten women over the age of 20 who have followed these pages for three years or more, and the findings were analyzed using qualitative content analysis. According to the findings, beauty bloggers encourage women to purchase cosmetic products by creating a sense of identification through sharing their experiences. Beauty bloggers generate a false sense of need for consumption among their audience by promoting beauty products. The feeling of inadequacy, stemming from women's comparisons with bloggers who are always beautiful, leads women to try to imitate the consumption habits and appearance of these bloggers.Keywords: beauty blogger, instagram, beauty, consumption
Procedia PDF Downloads 8424 A Framework for Chinese Domain-Specific Distant Supervised Named Entity Recognition
Abstract:
The Knowledge Graphs have now become a new form of knowledge representation. However, there is no consensus in regard to a plausible and definition of entities and relationships in the domain-specific knowledge graph. Further, in conjunction with several limitations and deficiencies, various domain-specific entities and relationships recognition approaches are far from perfect. Specifically, named entity recognition in Chinese domain is a critical task for the natural language process applications. However, a bottleneck problem with Chinese named entity recognition in new domains is the lack of annotated data. To address this challenge, a domain distant supervised named entity recognition framework is proposed. The framework is divided into two stages: first, the distant supervised corpus is generated based on the entity linking model of graph attention neural network; secondly, the generated corpus is trained as the input of the distant supervised named entity recognition model to train to obtain named entities. The link model is verified in the ccks2019 entity link corpus, and the F1 value is 2% higher than that of the benchmark method. The re-pre-trained BERT language model is added to the benchmark method, and the results show that it is more suitable for distant supervised named entity recognition tasks. Finally, it is applied in the computer field, and the results show that this framework can obtain domain named entities.Keywords: distant named entity recognition, entity linking, knowledge graph, graph attention neural network
Procedia PDF Downloads 90423 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach
Authors: Bilal Zubair
Abstract:
In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.Keywords: counter-terrorism, terrorism, sectarianism, securitizing
Procedia PDF Downloads 297422 Senior Leadership Team Coaching in Action: Creating High-Performance Teams
Authors: Siqi Fang, Jingxi Hou
Abstract:
Positive psychology and coaching psychology share a number of fundamental assumptions and common themes. Blending positive psychology, mindfulness, and coaching psychology, our work in team coaching with leaders enhances both leadership and team effectiveness. Although individual coaching has proven to be effective, this article advocates the benefits of leadership coaching in team settings, because durable changes in leadership behaviors are more likely to occur. Does leadership team coaching really work? Does it help improve senior leadership team effectiveness and productivity? This action research study answers these questions by tracking the progress of three typical senior leadership teams consisting of 31 executives participating in a six-month team coaching program. Assessments (pre- and post), workshops, and feedback based on ego development theories and mindfulness were applied to upgrade the senior leadership teams’ transformational stages and reframe their organizational leadership cultures. Results suggest that the team effectiveness of the three leadership teams increased up to 43 percent according to post-survey feedback from superior, direct report, and peers. Discussion is offered to show that senior leadership team coaching help teams to achieve a consensus on common purposes, establish a foundation of trust, improve collective skills, and promote efficient operation. All factors translate into better team performance. Implications of the results for future executive development programs are discussed and specific recommendations are provided.Keywords: action research, ego development, mindfulness, senior leadership team coaching, team effectiveness, transformational stages
Procedia PDF Downloads 365