Search results for: institutional robustness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1712

Search results for: institutional robustness

1322 Human Activities Recognition Based on Expert System

Authors: Malika Yaici, Soraya Aloui, Sara Semchaoui

Abstract:

Recognition of human activities from sensor data is an active research area, and the main objective is to obtain a high recognition rate. In this work, we propose a recognition system based on expert systems. The proposed system makes the recognition based on the objects, object states, and gestures, taking into account the context (the location of the objects and of the person performing the activity, the duration of the elementary actions, and the activity). This work focuses on complex activities which are decomposed into simple easy to recognize activities. The proposed method can be applied to any type of activity. The simulation results show the robustness of our system and its speed of decision.

Keywords: human activity recognition, ubiquitous computing, context-awareness, expert system

Procedia PDF Downloads 139
1321 Closing the Assessment Loop: Case Study in Improving Outcomes for Online College Students during Pandemic

Authors: Arlene Caney, Linda Fellag

Abstract:

To counter the adverse effect of Covid-19 on college student success, two faculty members at a US community college have used web-based assessment data to improve curricula and, thus, student outcomes. This case study exemplifies how “closing the loop” by analyzing outcome assessments in real time can improve student learning for academically underprepared students struggling during the pandemic. The purpose of the study was to develop ways to mitigate the negative impact of Covid-19 on student success of underprepared college students. Using the Assessment, Evaluation, Feedback and Intervention System (AEFIS) and other assessment tools provided by the college’s Office of Institutional Research, an English professor and a Music professor collected data in skill areas related to their curricula over four semesters, gaining insight into specific course sections and learners’ performance across different Covid-driven course formats—face-to-face, hybrid, synchronous, and asynchronous. Real-time data collection allowed faculty to shorten and close the assessment loop, and prompted faculty to enhance their curricula with engaging material, student-centered activities, and a variety of tech tools. Frequent communication, individualized study, constructive criticism, and encouragement were among other measures taken to enhance teaching and learning. As a result, even while student success rates were declining college-wide, student outcomes in these faculty members’ asynchronous and synchronous online classes improved or remained comparable to student outcomes in hybrid and face-to-face sections. These practices have demonstrated that even high-risk students who enter college with remedial level language and mathematics skills, interrupted education, work and family responsibilities, and language and cultural diversity can maintain positive outcomes in college across semesters, even during the pandemic.

Keywords: AEFIS, assessment, distance education, institutional research center

Procedia PDF Downloads 87
1320 Cessna Citation X Business Aircraft Stability Analysis Using Linear Fractional Representation LFRs Model

Authors: Yamina Boughari, Ruxandra Mihaela Botez, Florian Theel, Georges Ghazi

Abstract:

Clearance of flight control laws of a civil aircraft is a long and expensive process in the Aerospace industry. Thousands of flight combinations in terms of speeds, altitudes, gross weights, centers of gravity and angles of attack have to be investigated, and proved to be safe. Nonetheless, in this method, a worst flight condition can be easily missed, and its missing would lead to a critical situation. Definitively, it would be impossible to analyze a model because of the infinite number of cases contained within its flight envelope, that might require more time, and therefore more design cost. Therefore, in industry, the technique of the flight envelope mesh is commonly used. For each point of the flight envelope, the simulation of the associated model ensures the satisfaction or not of specifications. In order to perform fast, comprehensive and effective analysis, other varying parameters models were developed by incorporating variations, or uncertainties in the nominal models, known as Linear Fractional Representation LFR models; these LFR models were able to describe the aircraft dynamics by taking into account uncertainties over the flight envelope. In this paper, the LFRs models are developed using the speeds and altitudes as varying parameters; The LFR models were built using several flying conditions expressed in terms of speeds and altitudes. The use of such a method has gained a great interest by the aeronautical companies that have seen a promising future in the modeling, and particularly in the design and certification of control laws. In this research paper, we will focus on the Cessna Citation X open loop stability analysis. The data are provided by a Research Aircraft Flight Simulator of Level D, that corresponds to the highest level flight dynamics certification; this simulator was developed by CAE Inc. and its development was based on the requirements of research at the LARCASE laboratory. The acquisition of these data was used to develop a linear model of the airplane in its longitudinal and lateral motions, and was further used to create the LFR’s models for 12 XCG /weights conditions, and thus the whole flight envelope using a friendly Graphical User Interface developed during this study. Then, the LFR’s models are analyzed using Interval Analysis method based upon Lyapunov function, and also the ‘stability and robustness analysis’ toolbox. The results were presented under the form of graphs, thus they have offered good readability, and were easily exploitable. The weakness of this method stays in a relatively long calculation, equal to about four hours for the entire flight envelope.

Keywords: flight control clearance, LFR, stability analysis, robustness analysis

Procedia PDF Downloads 352
1319 Validating the Contract between Microservices

Authors: Parveen Banu Ansari, Venkatraman Chinnappan, Paramasivam Shankar

Abstract:

Contract testing plays a pivotal role in the current landscape of microservices architecture. Testing microservices at the initial stages of development helps to identify and rectify issues before they escalate to higher levels, such as UI testing. By validating microservices through contract testing, you ensure the integration quality of APIs, enhancing the overall reliability and performance of the application. Contract testing, being a collaborative effort between testers and developers, ensures that the microservices adhere to the specified contracts or agreements. This proactive approach significantly reduces defects, streamlines the development process, and contributes to the overall efficiency and robustness of the application. In the dynamic and fast-paced world of digital applications, where microservices are the building blocks, embracing contract testing is indeed a strategic move for ensuring the quality and reliability of the entire system.

Keywords: validation, testing, contract, agreement, microservices

Procedia PDF Downloads 57
1318 Cognitive Footprints: Analytical and Predictive Paradigm for Digital Learning

Authors: Marina Vicario, Amadeo Argüelles, Pilar Gómez, Carlos Hernández

Abstract:

In this paper, the Computer Research Network of the National Polytechnic Institute of Mexico proposes a paradigmatic model for the inference of cognitive patterns in digital learning systems. This model leads to metadata architecture useful for analysis and prediction in online learning systems; especially on MOOc's architectures. The model is in the design phase and expects to be tested through an institutional of courses project which is going to develop for the MOOc.

Keywords: cognitive footprints, learning analytics, predictive learning, digital learning, educational computing, educational informatics

Procedia PDF Downloads 477
1317 Preparation of Protective Coating Film on Metal Alloy

Authors: Rana Th. A. Al-rubaye

Abstract:

A novel chromium-free protective coating films based on a zeolite coating was growing onto a FeCrAlloy metal using in –situ hydrothermal method. The zeolite film was obtained using in-situ crystallization process that is capable of coating large surfaces with complex shape and in confined spaces has been developed. The zeolite coating offers an advantage of a high mechanical stability and thermal stability. The physico-chemical properties were investigated using X-ray diffraction (XRD), Electron microscopy (SEM), Energy Dispersive X–ray analysis (EDX) and Thermogravimetric Analysis (TGA). The transition from oxide-on-alloy wires to hydrothermally synthesised uniformly zeolite coated surfaces was followed using SEM and XRD. In addition, the robustness of the prepared coating was confirmed by subjecting these to thermal cycling (ambient to 550°C).

Keywords: fecralloy, zsm-5 zeolite, zeolite coatings, hydrothermal method

Procedia PDF Downloads 395
1316 Robust Noisy Speech Identification Using Frame Classifier Derived Features

Authors: Punnoose A. K.

Abstract:

This paper presents an approach for identifying noisy speech recording using a multi-layer perception (MLP) trained to predict phonemes from acoustic features. Characteristics of the MLP posteriors are explored for clean speech and noisy speech at the frame level. Appropriate density functions are used to fit the softmax probability of the clean and noisy speech. A function that takes into account the ratio of the softmax probability density of noisy speech to clean speech is formulated. These phoneme independent scoring is weighted using a phoneme-specific weightage to make the scoring more robust. Simple thresholding is used to identify the noisy speech recording from the clean speech recordings. The approach is benchmarked on standard databases, with a focus on precision.

Keywords: noisy speech identification, speech pre-processing, noise robustness, feature engineering

Procedia PDF Downloads 127
1315 Dynamic Economic Load Dispatch Using Quadratic Programming: Application to Algerian Electrical Network

Authors: A. Graa, I. Ziane, F. Benhamida, S. Souag

Abstract:

This paper presents a comparative analysis study of an efficient and reliable quadratic programming (QP) to solve economic load dispatch (ELD) problem with considering transmission losses in a power system. The proposed QP method takes care of different unit and system constraints to find optimal solution. To validate the effectiveness of the proposed QP solution, simulations have been performed using Algerian test system. Results obtained with the QP method have been compared with other existing relevant approaches available in literatures. Experimental results show a proficiency of the QP method over other existing techniques in terms of robustness and its optimal search.

Keywords: economic dispatch, quadratic programming, Algerian network, dynamic load

Procedia PDF Downloads 565
1314 Vision Based People Tracking System

Authors: Boukerch Haroun, Luo Qing Sheng, Li Hua Shi, Boukraa Sebti

Abstract:

In this paper we present the design and the implementation of a target tracking system where the target is set to be a moving person in a video sequence. The system can be applied easily as a vision system for mobile robot. The system is composed of two major parts the first is the detection of the person in the video frame using the SVM learning machine based on the “HOG” descriptors. The second part is the tracking of a moving person it’s done by using a combination of the Kalman filter and a modified version of the Camshift tracking algorithm by adding the target motion feature to the color feature, the experimental results had shown that the new algorithm had overcame the traditional Camshift algorithm in robustness and in case of occlusion.

Keywords: camshift algorithm, computer vision, Kalman filter, object tracking

Procedia PDF Downloads 446
1313 Service-Based Application Adaptation Strategies: A Survey

Authors: Sahba Paktinat, Afshin Salajeghe, Mir Ali Seyyedi, Yousef Rastegari

Abstract:

Service Oriented Architecture (SOA) allows modeling of dynamic interaction between incongruous providers, which enables governing the development of complex applications. However, implementation of SOA comes with some challenges, including its adaptability and robustness. Dynamism is inherent to the nature of service-based applications and of their running environment. These factors lead to necessity for dynamic adaptation. In this paper, we try to describe basics and main structure of SOA adaptation process with a conceptual view to this issue. In this survey, we will review the relevant adaptation approaches. This paper allows studying how different approaches deal with service oriented architecture adaptation life-cycle and provides basic guidelines for their analysis, evaluation and comparison.

Keywords: context-aware, dynamic adaptation, quality of services, service oriented architecture, service based application

Procedia PDF Downloads 454
1312 Synchrony between Genetic Repressilators in Sister Cells in Different Temperatures

Authors: Jerome G. Chandraseelan, Samuel M. D. Oliveira, Antti Häkkinen, Sofia Startceva, Andre S. Ribeiro

Abstract:

We used live E. coli containing synthetic genetic oscillators to study how the degree of synchrony between the genetic circuits of sister cells changes with temperature. We found that both the mean and the variability of the degree of synchrony between the fluorescence signals from sister cells are affected by temperature. Also, while most pairs of sister cells were found to be highly synchronous in each condition, the number of asynchronous pairs increased with increasing temperature, which was found to be due to disruptions in the oscillations. Finally we provide evidence that these disruptions tend to affect multiple generations as opposed to individual cells. These findings provide insight in how to design more robust synthetic circuits and in how cell division can affect their dynamics.

Keywords: repressilator, robustness, synchrony, synthetic biology

Procedia PDF Downloads 483
1311 Internal and External Validity in Experimental Economics

Authors: Helena Chytilova, Robin Maialeh

Abstract:

Experimental economics is subject to criticism with regards to frequently discussed trade-off between internal and external validity requirements, which seems to be critically flawed. Incompatibility of trade-off condition and condition of internal validity as a prerequisite for external validity is presented. In addition, the imprecise concept of artificiality found to be rather improving external validity, seems to strengthen illusory status of external versus internal validity tension. Internal validity will be further analysed with regards to Duhem-Quine problem, where unpredictability argument is significantly weakened trough application of inductivism within the illustrative hypothetical-deductive model. Discussion outlined above partially weakens critical arguments related to robustness of results in experimental economics, if perfectly controlled experimental environment is secured.

Keywords: Duhem-Quine problem, external validity, inductivism, internal validity

Procedia PDF Downloads 283
1310 The Ethical Imperative of Corporate Social Responsibility Practice and Disclosure by Firms in Nigeria Delta Swamplands: A Qualitative Analysis

Authors: Augustar Omoze Ehighalua, Itotenaan Henry Ogiri

Abstract:

As a mono-product economy, Nigeria relies largely on oil revenues for its foreign exchange earnings and the exploration activities of firms operating in the Niger Delta region have left in its wake tales of environmental degradation, poverty and misery. This, no doubt, have created corporate social responsibility issues in the region. The focus of this research is the critical evaluation of the ethical response to Corporate Social Responsibility (CSR) practice by firms operating in Nigeria Delta Swamplands. While CSR is becoming more popular in developed society with effective practice guidelines and reporting benchmark, there is a relatively low level of awareness and selective applicability of existing international guidelines to effectively support CSR practice in Nigeria. This study, haven identified the lack of CSR institutional framework attempts to develop an ethically-driven CSR transparency benchmark laced within a regulatory framework based on international best practices. The research adopts a qualitative methodology and makes use of primary data collected through semi-structured interviews conducted across the six core states of the Niger Delta Region. More importantly, the study adopts an inductive, interpretivist philosophical paradigm that reveal deep phenomenological insights into what local communities, civil society and government officials consider as good ethical benchmark for responsible CSR practice by organizations. The institutional theory provides for the main theoretical foundation, complemented by the stakeholder and legitimacy theories. The Nvivo software was used to analyze the data collected. This study shows that ethical responsibility is lacking in CSR practice by firms in the Niger Delta Region of Nigeria. Furthermore, findings of the study indicate key issues of environmental, health and safety, human rights, and labour as fundamental in developing an effective CSR practice guideline for Nigeria. The study has implications for public policy formulation as well as managerial perspective.

Keywords: corporate social responsibility, CSR, ethics, firms, Niger-Delta Swampland, Nigeria

Procedia PDF Downloads 106
1309 Role of Artificial Intelligence in Nano Proteomics

Authors: Mehrnaz Mostafavi

Abstract:

Recent advances in single-molecule protein identification (ID) and quantification techniques are poised to revolutionize proteomics, enabling researchers to delve into single-cell proteomics and identify low-abundance proteins crucial for biomedical and clinical research. This paper introduces a different approach to single-molecule protein ID and quantification using tri-color amino acid tags and a plasmonic nanopore device. A comprehensive simulator incorporating various physical phenomena was designed to predict and model the device's behavior under diverse experimental conditions, providing insights into its feasibility and limitations. The study employs a whole-proteome single-molecule identification algorithm based on convolutional neural networks, achieving high accuracies (>90%), particularly in challenging conditions (95–97%). To address potential challenges in clinical samples, where post-translational modifications affecting labeling efficiency, the paper evaluates protein identification accuracy under partial labeling conditions. Solid-state nanopores, capable of processing tens of individual proteins per second, are explored as a platform for this method. Unlike techniques relying solely on ion-current measurements, this approach enables parallel readout using high-density nanopore arrays and multi-pixel single-photon sensors. Convolutional neural networks contribute to the method's versatility and robustness, simplifying calibration procedures and potentially allowing protein ID based on partial reads. The study also discusses the efficacy of the approach in real experimental conditions, resolving functionally similar proteins. The theoretical analysis, protein labeler program, finite difference time domain calculation of plasmonic fields, and simulation of nanopore-based optical sensing are detailed in the methods section. The study anticipates further exploration of temporal distributions of protein translocation dwell-times and the impact on convolutional neural network identification accuracy. Overall, the research presents a promising avenue for advancing single-molecule protein identification and quantification with broad applications in proteomics research. The contributions made in methodology, accuracy, robustness, and technological exploration collectively position this work at the forefront of transformative developments in the field.

Keywords: nano proteomics, nanopore-based optical sensing, deep learning, artificial intelligence

Procedia PDF Downloads 95
1308 Socio Economic Deprivation, Institutional Outlay and the Intent of Mobile Snatching and Street Assaults in Pakistan

Authors: Asad Salahuddin

Abstract:

Crime rates seem to be severely augmenting over the past several years in Pakistan which has perpetuated concerns as to what, when and how this upsurge will be eradicated. State institutions are posed to be in utmost perplexity, given the enormity of worsening law and order situation, compelling government on the flip side to expend more resources in strengthening institutions to confront crime, whereas, the economy has been confronted with massive energy crisis, mass unemployment and considerable inflation which has rendered most of the people into articulate apprehension as to how to satisfy basic necessities. A framework to investigate the variability in the rising street crimes, as affected by social and institutional outcomes, has been established using a cross-sectional study. Questionnaire, entailing 7 sections incorporating numerous patterns of behavior and history of involvement in different crimes for potential street criminals was observed as data collection instrument. In order to specifically explicate the intent of street crimes on micro level, various motivational and de-motivational factors that stimulate people to resort to street crimes were scrutinized. Intent of mobile snatching and intent of street assault as potential dependent variables were examined using numerous variables that influence the occurrence and intent of these crimes using ordered probit along with ordered logit and tobit as competing models. Model Estimates asserts that intent of mobile snatching has been significantly enhanced owing to perceived judicial inefficiency and lower ability of police reforms to operate effectively, which signifies the inefficiency of institutions that are entitled to deliver justice and maintaining law and order respectively. Whereas, intent of street assaults, as an outcome, affirms that people with lack of self-stability and severe childhood punishments were more tempted to be involved in violent acts. Hence, it is imperative for government to render better resources in form of training, equipment and improved salaries to police and judiciary in order to enhance their abilities and potential to curb inflating crime.

Keywords: deprivation, street assault, self control, police reform

Procedia PDF Downloads 427
1307 Motivators and Barriers to High-Tech Entrepreneurship in the Israeli-Arab Community

Authors: Vered Holzmann, Ramzi Halabi

Abstract:

The current research investigates motivators and barriers to high-tech entrepreneurship in the Israeli-Arab Community. With the aim to exploit the capacity of Israel as a 'start-up nation', we identify the most important aspects to promote integration of Israeli-Arab entrepreneurs in high-tech startups and business companies, thus impact the socio-economic status of the Arab community in Israel. We reviewed the literature on the role of high-tech and entrepreneurship in the Israeli economy, the profile of the Israeli-Arab community with regard to education and employability, and the characteristics of minority entrepreneurship to understand entrepreneurs' intentions, their incentives to choose the entrepreneurial route on one hand and the obstacles that they face on the other hand. Based on the literature review, we conducted an integrated study that included a survey among 73 Israeli-Arabs involved in high-tech entrepreneurship and 16 semi-structured interviews with Israeli-Arab and Jewish entrepreneurs and leaders in the high-tech industry. We analyzed the data to explore personal and social motivating factors to entrepreneurship as well as educational and socio-economical barriers for entrepreneurship. Three major elements were found to be the most influential on Arab high-tech entrepreneurship in Israel: education, financial resources, and strategic-institutional support. The relationship between education and employability that is well-known with regard to general education, requires two additional aspects in the field of high-tech entrepreneurship: education of technology and engineering, and education of business and entrepreneurship. The study findings reveal that the main motivation factors for entrepreneurship are development of creative ideas and improvement of the socio-economic status, while financial-related factors and lack of institutional and governmental support are perceived as impediments to entrepreneurial activities. Financing difficulties are mainly derived from discriminating financial environment and lack of professional networking. The relationship between entrepreneurship and economic growth seems to be clear and simple; thus it is a national interest to encourage entrepreneurship among the Arab community, and especially high-tech entrepreneurship which has a significant role in the economic growth of Israel.

Keywords: high-tech industry, innovation management, Israeli-Arab community, minority entrepreneurship, motivating factors and barriers

Procedia PDF Downloads 218
1306 Feasibility Study of Distributed Lightless Intersection Control with Level 1 Autonomous Vehicles

Authors: Bo Yang, Christopher Monterola

Abstract:

Urban intersection control without the use of the traffic light has the potential to vastly improve the efficiency of the urban traffic flow. For most proposals in the literature, such lightless intersection control depends on the mass market commercialization of highly intelligent autonomous vehicles (AV), which limits the prospects of near future implementation. We present an efficient lightless intersection traffic control scheme that only requires Level 1 AV as defined by NHTSA. The technological barriers of such lightless intersection control are thus very low. Our algorithm can also accommodate a mixture of AVs and conventional vehicles. We also carry out large scale numerical analysis to illustrate the feasibility, safety and robustness, comfort level, and control efficiency of our intersection control scheme.

Keywords: intersection control, autonomous vehicles, traffic modelling, intelligent transport system

Procedia PDF Downloads 455
1305 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 371
1304 Time-Domain Simulations of the Coupled Dynamics of Surface Riding Wave Energy Converter

Authors: Chungkuk Jin, Moo-Hyun Kim, HeonYong Kang

Abstract:

A surface riding (SR) wave energy converter (WEC) is designed and its feasibility and performance are numerically simulated by the author-developed floater-mooring-magnet-electromagnetics fully-coupled dynamic analysis computer program. The biggest advantage of the SR-WEC is that the performance is equally effective even in low sea states and its structural robustness is greatly improved by simply riding along the wave surface compared to other existing WECs. By the numerical simulations and actuator testing, it is clearly demonstrated that the concept works and through the optimization process, its efficiency can be improved.

Keywords: computer simulation, electromagnetics fully-coupled dynamics, floater-mooring-magnet, optimization, performance evaluation, surface riding, WEC

Procedia PDF Downloads 145
1303 An Investigation into the Social Determinants of Crowdfunding Effectiveness in developing, non-Western contexts: Some Evidence from Thailand

Authors: Khin Thi Htun, James Jain, Tim Andrews

Abstract:

This study examines the under-researched phenomenon of crowdfunding use and effectiveness in developing non-western markets. More precisely, using an institutional theoretical lens, the research explores the attitudes, motivations, and practice surrounding the initiation, development, and receipt of crowdfunding campaignsin a business context symptomatic of widely dissimilar regulatory, normative cognitive institutional ‘pillars’ to those studied – and utilized in practice - to date. As, in essence, a form of alternative finance, crowdfunding is used primarily to fund a wide range of projects through the securement of small amounts of money from a large pool of investors/participants. Being tied almost inextricably to e-commerce channels, the practice of crowdfunding typically sources its means and communicates the purpose of each venture mainly, though not exclusively, online. The wide range of projects supported to date span social entrepreneurship, community benefits initiatives, creative and artistic endeavors, assistance to disadvantaged social cohorts, and small business start-ups. Adopting a longitudinal, comparative approach, the study reported here embodies an investigation centered on six case start-up campaigns within the Thai societal context, covering a range of fundings calls and cause choices. Data was sourced from a variety of respondents using semi-structured interviews, observation (direct and participant), and company information. Results suggest that the motives and effectiveness of crowdfunding campaigns differ significantly in non-western consumer contexts from the norms that have evolved to date in mature Western contexts(particularly the US and UK). Specifically, whereas data on the different regulatory pressures showed relatively insignificant variation, the results regarding cognitive and, especially, normative dissimilarities between the Thai and US/UK institutional profiles surfaced potentially important differences with far-reaching implications. Particular issuesto emerge from our data concerned consumer motivation in terms of support and engagement with different types of campaigns. This was found to stem from social norms symptomatic of ‘collectivist’ and ‘relations based/particularist’ cultural assistance behavior, in turn, linked to deeply-held societal values regarding interpersonal network (‘in group’) reciprocity. This research serves to refine and extend the limited body of knowledge to date on crowdfunding by exploring the phenomenon in a non-western, non-developed country contextswhere social norms and values differ. This was achieved through uncovering and explicating the effects of cultural dissimilarity on motivation, decision-making, construed ethics, and general engagement with crowdfunding ideas. Implications for theory into e-marketing and cross-cultural marketing, as well as for practitioners seeking to develop effective crowdfunding campaigns in a Southeast Asian cultural environment, are discussed to conclude the paper.

Keywords: crowdfunding, national culture, e-marketing, cross-cultural business

Procedia PDF Downloads 158
1302 Promoting Public Participation in the Digital Memory Project: Experience from My Peking Memory Project(MPMP)

Authors: Xiaoshuang Jia, Huiling Feng, Li Niu, Wei Hai

Abstract:

Led by Humanistic Beijing Studies Center in Renmin University of China, My Peking Memory Project(MPMP) is a long-time digital memory project under guarantee of public participation to enable the cultural and intellectual memory of Beijing to be collected, organized, preserved and promoted for discovery and research. Taking digital memory as a new way, MPMP is an important part of Peking Memory Project(PMP) which is aimed at using digital technologies to protect and (re)present the cultural heritage in Beijing. The key outcome of MPMP is the co-building of a total digital collection of knowledge assets about Beijing. Institutional memories are central to Beijing’s collection and consist of the official published documentary content of Beijing. These have already fall under the archival collection purview. The advances in information and communication technology and the knowledge form social memory theory have allowed us to collect more comprehensively beyond institutional collections. It is now possible to engage citizens on a large scale to collect private memories through crowdsourcing in digital formats. Private memories go beyond official published content to include personal narratives, some of which are just in people’s minds until they are captured by MPMP. One aim of MPMP is to engage individuals, communities, groups or institutions who have formed memories and content about Beijing, and would like to contribute them. The project hopes to build a culture of remembering and it believes ‘Every Memory Matters’. Digital memory contribution was achieved through the development of the MPMP. In reducing barriers to digital contribution and promoting high public Participation, MPMP has taken explored the harvesting of transcribe service for digital ingestion, mobile platform and some off-line activities like holding social forum. MPMP has also cooperated with the ‘Implementation Plan of Support Plan for Growth of Talents in Renmin University of China’ to get manpower and intellectual support. After six months of operation, now MPMP have more than 2000 memories added and 7 Special Memory Collections now online. The work of MPMP has ultimately helped to highlight the important role in safeguarding the documentary heritage and intellectual memory of Beijing.

Keywords: digital memory, public participation, MPMP, cultural heritage, collection

Procedia PDF Downloads 169
1301 Reliability Evidence of the Child Behavior Checklist (CBCL) Based on a Chinese Sample

Authors: Zhidong Zhang, Zhi-Chao Zhang, Georgiana Duarte

Abstract:

The Chinese version of the Child Behavior Checklist (CBCL) is the one of the Achenbach systems of empirically based assessment (ASEBA) scales, by which behavioral and emotional problems of early adolescents were examined. In order to further understand the robustness of the scale, its reliability has been examined. CBCL consists of 8 problems to measure internalizing, externalizing and social problems. In internalizing problem, there are Anxious, Withdrawn and Somatic Complaints. In this study, as an example, we only examined the anxious aspect which consisted of 13 questions. Cronbach alpha and factor analysis methods were used to examine the reliability of the scale. The result indicated that Cronbach alpha value was above 0.80.

Keywords: anxious/depressed problems, ASEBA, CBCL, Cronbach Alpha, reliability

Procedia PDF Downloads 463
1300 A Mathematical Model of Power System State Estimation for Power Flow Solution

Authors: F. Benhamida, A. Graa, L. Benameur, I. Ziane

Abstract:

The state estimation of the electrical power system operation state is very important for supervising task. With the nonlinearity of the AC power flow model, the state estimation problem (SEP) is a nonlinear mathematical problem with many local optima. This paper treat the mathematical model for the SEP and the monitoring of the nonlinear systems of great dimensions with an application on power electrical system, the modelling, the analysis and state estimation synthesis in order to supervise the power system behavior. in fact, it is very difficult, to see impossible, (for reasons of accessibility, techniques and/or of cost) to measure the excessive number of the variables of state in a large-sized system. It is thus important to develop software sensors being able to produce a reliable estimate of the variables necessary for the diagnosis and also for the control.

Keywords: power system, state estimation, robustness, observability

Procedia PDF Downloads 523
1299 Lie Symmetry Treatment for Pricing Options with Transactions Costs under the Fractional Black-Scholes Model

Authors: B. F. Nteumagne, E. Pindza, E. Mare

Abstract:

We apply Lie symmetries analysis to price and hedge options in the fractional Brownian framework. The reputation of Lie groups is well spread in the area of Mathematical sciences and lately, in Finance. In the presence of transactions costs and under fractional Brownian motions, analytical solutions become difficult to obtain. Lie symmetries analysis allows us to simplify the problem and obtain new analytical solution. In this paper, we investigate the use of symmetries to reduce the partial differential equation obtained and obtain the analytical solution. We then proposed a hedging procedure and calibration technique for these types of options, and test the model on real market data. We show the robustness of our methodology by its application to the pricing of digital options.

Keywords: fractional brownian model, symmetry, transaction cost, option pricing

Procedia PDF Downloads 399
1298 Developing an AI-Driven Application for Real-Time Emotion Recognition from Human Vocal Patterns

Authors: Sayor Ajfar Aaron, Mushfiqur Rahman, Sajjat Hossain Abir, Ashif Newaz

Abstract:

This study delves into the development of an artificial intelligence application designed for real-time emotion recognition from human vocal patterns. Utilizing advanced machine learning algorithms, including deep learning and neural networks, the paper highlights both the technical challenges and potential opportunities in accurately interpreting emotional cues from speech. Key findings demonstrate the critical role of diverse training datasets and the impact of ambient noise on recognition accuracy, offering insights into future directions for improving robustness and applicability in real-world scenarios.

Keywords: artificial intelligence, convolutional neural network, emotion recognition, vocal patterns

Procedia PDF Downloads 52
1297 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 475
1296 Interdisciplinary Expressive Artistic Activities within Prevention of Crisis Situations and Pathological Strains in Educational Facilities of Juvenile Detention Centres

Authors: Marie Bajnarová

Abstract:

The core part of the research project is represented by taking a perspective on the role of an educator in Juvenile Institutional Centres. In accordance with the research questions, the research explores impact of the environment, situations, practices, attitudes, values and also experience of the respondents. Art activities minimize risky behaviours and contribute to a healthy lifestyle. They also help children and adolescents with conduct disorders develop positive social behaviour, psychosocial skills and cope with difficult life situations.

Keywords: Juvenile Detention Centres, drawing, conduct disorders, art therapy

Procedia PDF Downloads 284
1295 Modeling and Control of a 4DoF Robotic Assistive Device for Hand Rehabilitation

Authors: Christopher Spiewak, M. R. Islam, Mohammad Arifur Rahaman, Mohammad H. Rahman, Roger Smith, Maarouf Saad

Abstract:

For those who have lost the ability to move their hand, going through repetitious motions with the assistance of a therapist is the main method of recovery. We have been developed a robotic assistive device to rehabilitate the hand motions in place of the traditional therapy. The developed assistive device (RAD-HR) is comprised of four degrees of freedom enabling basic movements, hand function, and assists in supporting the hand during rehabilitation. We used a nonlinear computed torque control technique to control the RAD-HR. The accuracy of the controller was evaluated in simulations (MATLAB/Simulink environment). To see the robustness of the controller external disturbance as modelling uncertainty (±10% of joint torques) were added in each joints.

Keywords: biorobotics, rehabilitation, robotic assistive device, exoskeleton, nonlinear control

Procedia PDF Downloads 479
1294 Facilitating Career Development of Women in Science, Technology, Engineering, Mathematics and Medicine: Towards Increasing Understanding, Participation, Progression and Retention through an Intersectionality Perspective

Authors: Maria Tsouroufli, Andrea Mondokova, Subashini Suresh

Abstract:

Background: The under-representation of women and consequent failure to fulfil their potential contribution to Science, Technology, Engineering, Maths, and Medicine (STEMM) subjects in the UK is an issue that the Higher Education sector is being encouraged to address. Focus: The aim of this research is to investigate the barriers, facilitators, and incentives that influence diverse groups of women who have embarked upon a related career in STEMM subjects. The project will address a number of interconnected research questions: 1. How do participants perceive the barriers, facilitators and incentives for women in terms of research, teaching and management/leadership at each stage of their development towards forging a career in STEMM? 2. How might gender intersect with ethnicity, pregnancy/maternity and academic grade in the career experiences of women in STEMM? 3. How do participants perceive the example of female role models in emulating them as a career model? 4. How do successful females in STEMM see themselves as role models and what strategies do they employ to promote their careers? 5. How does institutional culture manifest itself as a barrier or facilitator for women in STEMM subjects in the institution? Methodology and Theoretical framework: A mixed-methodology will be employed in a case study of one university. The study will draw on extant quantitative data for context and involve conducting a qualitative inquiry to discover the perceptions of staff and students around the key concepts under study (career progression, sense of belonging and tenure, role-models, personal satisfaction, perceived gender in/equality, institutional culture). The analysis will be informed by an intersectionality framework, feminist and gender theory, and organisational psychology and human resource management perspectives. Implications: Preliminary findings will be collected in 2017. Conclusions will be drawn and used to inform recruitment and retention, and the development and implementation of initiatives to enhance the experiences and outcomes of women working and studying in STEMM subjects in Higher Education.

Keywords: under-representation, women, STEMM subjects, intersectionality

Procedia PDF Downloads 284
1293 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 474