Search results for: incidental information processing
9433 Coordinated Community Response to Intimate Partner Violence on College Campuses
Authors: Robert D. Hanser, Gina M. Hanser
Abstract:
This paper provides an overview of Coordinated Community Response Teams (CCRT) to Intimate Partner Violence (IPV). The CCRT, as a partnership and collaborative effort between multiple agencies is highlighted. This paper is a legal analysis that showcases new legislation and legal requirements in the United States for investigating, processing, and reporting to acts of victimization have transformed the role of the university’s CCRT on campus, making its mission all the more important, both internal and external to the campus. As a specific example, discussion of the CCRT in Northeast Louisiana at the University of Louisiana at Monroe is provided as an example of involvement in this initiative, where federal grant funding has allowed a micro version of the region’s CCRT to be implemented on that campus. Simultaneously, university personnel also work with external agencies throughout the community in intimate partner violence response. Amidst this, the result is a genuine partnership between practitioners and researchers who work together to provide public awareness, prevention, first-responder, and intervention services in a comprehensive manner throughout Northeast Louisiana.Keywords: interperaonal violence, sexual assault, dating violence, campus violence
Procedia PDF Downloads 3099432 Operating System Support for Mobile Device Thermal Management and Performance Optimization in Augmented Reality Applications
Authors: Yasith Mindula Saipath Wickramasinghe
Abstract:
Augmented reality applications require a high processing power to load, render and live stream high-definition AR models and virtual scenes; it also requires device sensors to work excessively to coordinate with internal hardware, OS and give the expected outcome in advance features like object detection, real time tracking, as well as voice and text recognition. Excessive thermal generation due to these advanced functionalities has become a major research problem as it is unbearable for smaller mobile devices to manage such heat increment and battery drainage as it causes physical harm to the devices in the long term. Therefore, effective thermal management is one of the major requirements in Augmented Reality application development. As this paper discusses major causes for this issue, it also provides possible solutions in the means of operating system adaptations as well as further research on best coding practises to optimize the application performance that reduces thermal excessive thermal generation.Keywords: augmented reality, device thermal management, GPU, operating systems, device I/O, overheating
Procedia PDF Downloads 1189431 Public Environmental Investment Analysis of Japan
Authors: K. Y. Chen, H. Chua, C. W. Kan
Abstract:
Japan is a well-developed country but the environmental issues are still a hot issue. In this study, we will analyse how the environmental investment affects the sustainable development in Japan. This paper will first describe the environmental policy of Japan and the effort input by the Japan government. Then, we will collect the yearly environmental data and also information about the environmental investment. Based on the data collected, we try to figure out the relationship between environmental investment and sustainable development in Japan. In addition, we will analyse the SWOT of environmental investment in Japan. Based on the economic information collected, Japan established a sound material-cycle society through changes in business and life styles. A comprehensive legal system for this kind of society was established in Japan. In addition, other supporting measures, such as financial measures, utilization of economic instruments, implementation of research and promotion of education and science and technology, help Japan to cope with the recent environmental challenges. Japan’s excellent environmental technologies changed its socioeconomic system. They are at the highest global standards. This can be reflected by the number of patents registered in Japan which has been on the steady growth. Country by country comparison in the application for patents on environmental technologies also indicates that Japan ranks high in such areas as atmospheric pollution and water quality management, solid waste management and renewable energy. This is a result of the large expenditure invested on research and development.Keywords: Japan, environmental investment, sustainable development, analysis
Procedia PDF Downloads 2689430 Solving Weighted Number of Operation Plus Processing Time Due-Date Assignment, Weighted Scheduling and Process Planning Integration Problem Using Genetic and Simulated Annealing Search Methods
Authors: Halil Ibrahim Demir, Caner Erden, Mumtaz Ipek, Ozer Uygun
Abstract:
Traditionally, the three important manufacturing functions, which are process planning, scheduling and due-date assignment, are performed separately and sequentially. For couple of decades, hundreds of studies are done on integrated process planning and scheduling problems and numerous researches are performed on scheduling with due date assignment problem, but unfortunately the integration of these three important functions are not adequately addressed. Here, the integration of these three important functions is studied by using genetic, random-genetic hybrid, simulated annealing, random-simulated annealing hybrid and random search techniques. As well, the importance of the integration of these three functions and the power of meta-heuristics and of hybrid heuristics are studied.Keywords: process planning, weighted scheduling, weighted due-date assignment, genetic search, simulated annealing, hybrid meta-heuristics
Procedia PDF Downloads 4699429 Sentinel-2 Based Burn Area Severity Assessment Tool in Google Earth Engine
Authors: D. Madhushanka, Y. Liu, H. C. Fernando
Abstract:
Fires are one of the foremost factors of land surface disturbance in diverse ecosystems, causing soil erosion and land-cover changes and atmospheric effects affecting people's lives and properties. Generally, the severity of the fire is calculated as the Normalized Burn Ratio (NBR) index. This is performed manually by comparing two images obtained afterward. Then by using the bitemporal difference of the preprocessed satellite images, the dNBR is calculated. The burnt area is then classified as either unburnt (dNBR<0.1) or burnt (dNBR>= 0.1). Furthermore, Wildfire Severity Assessment (WSA) classifies burnt areas and unburnt areas using classification levels proposed by USGS and comprises seven classes. This procedure generates a burn severity report for the area chosen by the user manually. This study is carried out with the objective of producing an automated tool for the above-mentioned process, namely the World Wildfire Severity Assessment Tool (WWSAT). It is implemented in Google Earth Engine (GEE), which is a free cloud-computing platform for satellite data processing, with several data catalogs at different resolutions (notably Landsat, Sentinel-2, and MODIS) and planetary-scale analysis capabilities. Sentinel-2 MSI is chosen to obtain regular processes related to burnt area severity mapping using a medium spatial resolution sensor (15m). This tool uses machine learning classification techniques to identify burnt areas using NBR and to classify their severity over the user-selected extent and period automatically. Cloud coverage is one of the biggest concerns when fire severity mapping is performed. In WWSAT based on GEE, we present a fully automatic workflow to aggregate cloud-free Sentinel-2 images for both pre-fire and post-fire image compositing. The parallel processing capabilities and preloaded geospatial datasets of GEE facilitated the production of this tool. This tool consists of a Graphical User Interface (GUI) to make it user-friendly. The advantage of this tool is the ability to obtain burn area severity over a large extent and more extended temporal periods. Two case studies were carried out to demonstrate the performance of this tool. The Blue Mountain national park forest affected by the Australian fire season between 2019 and 2020 is used to describe the workflow of the WWSAT. This site detected more than 7809 km2, using Sentinel-2 data, giving an error below 6.5% when compared with the area detected on the field. Furthermore, 86.77% of the detected area was recognized as fully burnt out, of which high severity (17.29%), moderate-high severity (19.63%), moderate-low severity (22.35%), and low severity (27.51%). The Arapaho and Roosevelt National Forest Park, California, the USA, which is affected by the Cameron peak fire in 2020, is chosen for the second case study. It was found that around 983 km2 had burned out, of which high severity (2.73%), moderate-high severity (1.57%), moderate-low severity (1.18%), and low severity (5.45%). These spots also can be detected through the visual inspection made possible by cloud-free images generated by WWSAT. This tool is cost-effective in calculating the burnt area since satellite images are free and the cost of field surveys is avoided.Keywords: burnt area, burnt severity, fires, google earth engine (GEE), sentinel-2
Procedia PDF Downloads 2359428 “laws Drifting Off While Artificial Intelligence Thriving” – A Comparative Study with Special Reference to Computer Science and Information Technology
Authors: Amarendar Reddy Addula
Abstract:
Definition of Artificial Intelligence: Artificial intelligence is the simulation of mortal intelligence processes by machines, especially computer systems. Explicit operations of AI comprise expert systems, natural language processing, and speech recognition, and machine vision. Artificial Intelligence (AI) is an original medium for digital business, according to a new report by Gartner. The last 10 times represent an advance period in AI’s development, prodded by the confluence of factors, including the rise of big data, advancements in cipher structure, new machine literacy ways, the materialization of pall computing, and the vibrant open- source ecosystem. Influence of AI to a broader set of use cases and druggies and its gaining fashionability because it improves AI’s versatility, effectiveness, and rigidity. Edge AI will enable digital moments by employing AI for real- time analytics closer to data sources. Gartner predicts that by 2025, further than 50 of all data analysis by deep neural networks will do at the edge, over from lower than 10 in 2021. Responsible AI is a marquee term for making suitable business and ethical choices when espousing AI. It requires considering business and societal value, threat, trust, translucency, fairness, bias mitigation, explainability, responsibility, safety, sequestration, and nonsupervisory compliance. Responsible AI is ever more significant amidst growing nonsupervisory oversight, consumer prospects, and rising sustainability pretensions. Generative AI is the use of AI to induce new vestiges and produce innovative products. To date, generative AI sweats have concentrated on creating media content similar as photorealistic images of people and effects, but it can also be used for law generation, creating synthetic irregular data, and designing medicinals and accoutrements with specific parcels. AI is the subject of a wide- ranging debate in which there's a growing concern about its ethical and legal aspects. Constantly, the two are varied and nonplussed despite being different issues and areas of knowledge. The ethical debate raises two main problems the first, abstract, relates to the idea and content of ethics; the alternate, functional, and concerns its relationship with the law. Both set up models of social geste, but they're different in compass and nature. The juridical analysis is grounded on anon-formalistic scientific methodology. This means that it's essential to consider the nature and characteristics of the AI as a primary step to the description of its legal paradigm. In this regard, there are two main issues the relationship between artificial and mortal intelligence and the question of the unitary or different nature of the AI. From that theoretical and practical base, the study of the legal system is carried out by examining its foundations, the governance model, and the nonsupervisory bases. According to this analysis, throughout the work and in the conclusions, International Law is linked as the top legal frame for the regulation of AI.Keywords: artificial intelligence, ethics & human rights issues, laws, international laws
Procedia PDF Downloads 959427 Geophysical Methods and Machine Learning Algorithms for Stuck Pipe Prediction and Avoidance
Authors: Ammar Alali, Mahmoud Abughaban
Abstract:
Cost reduction and drilling optimization is the goal of many drilling operators. Historically, stuck pipe incidents were a major segment of non-productive time (NPT) associated costs. Traditionally, stuck pipe problems are part of the operations and solved post-sticking. However, the real key to savings and success is in predicting the stuck pipe incidents and avoiding the conditions leading to its occurrences. Previous attempts in stuck-pipe predictions have neglected the local geology of the problem. The proposed predictive tool utilizes geophysical data processing techniques and Machine Learning (ML) algorithms to predict drilling activities events in real-time using surface drilling data with minimum computational power. The method combines two types of analysis: (1) real-time prediction, and (2) cause analysis. Real-time prediction aggregates the input data, including historical drilling surface data, geological formation tops, and petrophysical data, from wells within the same field. The input data are then flattened per the geological formation and stacked per stuck-pipe incidents. The algorithm uses two physical methods (stacking and flattening) to filter any noise in the signature and create a robust pre-determined pilot that adheres to the local geology. Once the drilling operation starts, the Wellsite Information Transfer Standard Markup Language (WITSML) live surface data are fed into a matrix and aggregated in a similar frequency as the pre-determined signature. Then, the matrix is correlated with the pre-determined stuck-pipe signature for this field, in real-time. The correlation used is a machine learning Correlation-based Feature Selection (CFS) algorithm, which selects relevant features from the class and identifying redundant features. The correlation output is interpreted as a probability curve of stuck pipe incidents prediction in real-time. Once this probability passes a fixed-threshold defined by the user, the other component, cause analysis, alerts the user of the expected incident based on set pre-determined signatures. A set of recommendations will be provided to reduce the associated risk. The validation process involved feeding of historical drilling data as live-stream, mimicking actual drilling conditions, of an onshore oil field. Pre-determined signatures were created for three problematic geological formations in this field prior. Three wells were processed as case studies, and the stuck-pipe incidents were predicted successfully, with an accuracy of 76%. This accuracy of detection could have resulted in around 50% reduction in NPT, equivalent to 9% cost saving in comparison with offset wells. The prediction of stuck pipe problem requires a method to capture geological, geophysical and drilling data, and recognize the indicators of this issue at a field and geological formation level. This paper illustrates the efficiency and the robustness of the proposed cross-disciplinary approach in its ability to produce such signatures and predicting this NPT event.Keywords: drilling optimization, hazard prediction, machine learning, stuck pipe
Procedia PDF Downloads 2299426 Smart Services for Easy and Retrofittable Machine Data Collection
Authors: Till Gramberg, Erwin Gross, Christoph Birenbaum
Abstract:
This paper presents the approach of the Easy2IoT research project. Easy2IoT aims to enable companies in the prefabrication sheet metal and sheet metal processing industry to enter the Industrial Internet of Things (IIoT) with a low-threshold and cost-effective approach. It focuses on the development of physical hardware and software to easily capture machine activities from on a sawing machine, benefiting various stakeholders in the SME value chain, including machine operators, tool manufacturers and service providers. The methodological approach of Easy2IoT includes an in-depth requirements analysis and customer interviews with stakeholders along the value chain. Based on these insights, actions, requirements and potential solutions for smart services are derived. The focus is on providing actionable recommendations, competencies and easy integration through no-/low-code applications to facilitate implementation and connectivity within production networks. At the core of the project is a novel, non-invasive measurement and analysis system that can be easily deployed and made IIoT-ready. This system collects machine data without interfering with the machines themselves. It does this by non-invasively measuring the tension on a sawing machine. The collected data is then connected and analyzed using artificial intelligence (AI) to provide smart services through a platform-based application. Three Smart Services are being developed within Easy2IoT to provide immediate benefits to users: Wear part and product material condition monitoring and predictive maintenance for sawing processes. The non-invasive measurement system enables the monitoring of tool wear, such as saw blades, and the quality of consumables and materials. Service providers and machine operators can use this data to optimize maintenance and reduce downtime and material waste. Optimize Overall Equipment Effectiveness (OEE) by monitoring machine activity. The non-invasive system tracks machining times, setup times and downtime to identify opportunities for OEE improvement and reduce unplanned machine downtime. Estimate CO2 emissions for connected machines. CO2 emissions are calculated for the entire life of the machine and for individual production steps based on captured power consumption data. This information supports energy management and product development decisions. The key to Easy2IoT is its modular and easy-to-use design. The non-invasive measurement system is universally applicable and does not require specialized knowledge to install. The platform application allows easy integration of various smart services and provides a self-service portal for activation and management. Innovative business models will also be developed to promote the sustainable use of the collected machine activity data. The project addresses the digitalization gap between large enterprises and SME. Easy2IoT provides SME with a concrete toolkit for IIoT adoption, facilitating the digital transformation of smaller companies, e.g. through retrofitting of existing machines.Keywords: smart services, IIoT, IIoT-platform, industrie 4.0, big data
Procedia PDF Downloads 739425 Exploring Eating Disorders in Sport: Coaching Knowledge and the Effects of the Pandemic
Authors: Rebecca Quinlan
Abstract:
Background: The pandemic has caused a surge in eating disorders (ED). The prevalence of ED is higher in athletes than in the general population. It would therefore be expected that there will be a rise in ED among athletic populations. Coaches regularly work with athletes and should be in a position to identify signs of ED in their athletes. However, there is limited awareness of ED among coaches. Given the effects of the pandemic, it is crucial that coaches have the skills and knowledge to identify ED. This research will explore the effects of the pandemic on athletes, current knowledge of ED among coaches, and possible solutions for building back better from the pandemic. Methods: Freedom of Information requests were conducted, and a systematic review of the literature was undertaken regarding ED in sports and following the pandemic. Results: The systematic review of the literature showed that there had been a rise in ED in athletes due to the pandemic. Freedom of Information results revealed that ED is not covered in level 1 coaching courses. This lack of education has resulted in many coaches stating they feel unable to identify ED. Discussion: The increased prevalence of ED in athletes, coupled with the negative effects of the pandemic, highlight the need for action. Recommendations are provided, which include Level 1 coaching courses to include compulsory ED education, including signs and symptoms, what to do if an athlete has an ED, and resources/contacts. It is anticipated that the findings will be used to improve coaching knowledge of ED and support offered to athletes, with the overarching aim of building back better and faster from the pandemic.Keywords: eating disorders, sport, athletes, pandemic
Procedia PDF Downloads 1199424 Assessment of Nigerian Newspapers' Reportage of Violence against Children: Case Study of Daily Sun and Punch National Newspapers
Authors: Adline Nkwam-Uwaoma, Mishack Ndukwu
Abstract:
Traditionally, child rearing in Nigeria closely reflects the ‘spare the rod and spoil the child’ maxim and as such spanking, flogging, slapping, beating and even starving a child as a form of punishment for wrongdoing and as a method of behaviour modification are common. These are not necessarily considered as maltreatment or abuse of the child. Despite the adoption and implementation of the child rights act in Nigeria, violence against children seems to be on a steady increase. Stories of sexual molestation, rape, child labour, infliction of physical injuries and use of children for rituals by parents, guardians or other members of the society abound. Violence against children is considered as those acts by other persons especially adults that undermine and threaten the healthy life and existence of children or those that violet their rights as humans. In Nigeria newspapers are a major source of News, second only to radio and television in coverage, currency and content. National dailies are newspapers with daily publications and national spread or coverage. This study analysed the frequency, length, prominence level, direction and sources of information reported on violence against children in the selected national daily newspapers. It then provided information on the role of the newspapers in Nigeria in the fight against child violence and public awareness of the impact of violence against children on the development of the nation and the attempts to curtail such violence. The composite week sampling technique in which the four weeks of the month are reduced to one and a sample is randomly selected from each day of the week was used. As such 168 editions of Daily Sun and Punch newspapers published from January to December of 2016 were selected. Data were collected using code sheet and analyzed via content analysis. The result showed that the frequency of the newspapers’ reportage of violence against children in Nigeria was low. Again, it was found that the length or space given to reports on violence against children was inadequate, the direction of the few reports on violence against children was in favour of the course or fight against child violence, and these newspapers gave no prominence to reports on violence against children. Finally, it was found that a major source of News about violence against children was through journalism; government and individual sources provided only minimal information.Keywords: children, newspapers' reportage, Nigeria, violence
Procedia PDF Downloads 1559423 Autonomy Supportive Coaching to Achieve Health Literacy
Authors: E. Knisel, H. Rupprich, A. Heissel
Abstract:
Health Literacy is defined as the degree to which people have the capacity to obtain and understand information to make health decisions. Illustrated are three levels of health literacy: (1) Functional literacy refers to the transmission of information about e. g. physical activity and nutrition; (2) interactive literacy implies the development of personal and social skills to adopt health-related behaviour and (3) critical health literacy indicates advanced cognitive skills connected with personal empowerment to critically analyse health information, to define self-determined goals and taking action in various situations accordingly. The achievement of the third level refers to self-determination and autonomy which should be outcomes of exercise programs for overweight children as health-related behaviour change will occur and persist if it is autonomously motivated. Method: We adopted a quasi-experimental design with group (autonomy supportive coaching, control) and session (pre-test, intervention, post-test, and follow-up-test). Overweight and obese children and adolescents at the age of 8-14 years (N=40) received a 6-month (20 sessions) exercise program with autonomy supportive coaching implemented by the coaches and sandwiched between pre-test and post-test. All participants (N=92) completed the German version of the Basic Needs Satisfaction Scale Sport and Exercise. Additionally, we assessed the engagement in the exercise program by the MVPA (Moderate-to-Vigorous Physical Activity) and by the adherence and drop-out-rate. Results: Participants in the intervention group perceived their autonomy as moderate in the post-test and the follow-up-test. However, the psychological intervention failed to develop a high autonomy, as both groups show moderate perceived autonomy from the pre-test to the post-test. Participants in the intervention group were higher engaged in MVPA in the exercise program and they attend the program more regularly. Discussion: Young overweight and obese children and adolescents can acquire autonomy using autonomy supporting coaching. However, research identifying the extent they achieve critical health literacy is required to implement an autonomy-supportive coaching style into exercise programs for this target group.Keywords: autonomy support, coaching, health literacy, health promotion
Procedia PDF Downloads 4879422 Cognition in Context: Investigating the Impact of Persuasive Outcomes across Face-to-Face, Social Media and Virtual Reality Environments
Authors: Claire Tranter, Coral Dando
Abstract:
Gathering information from others is a fundamental goal for those concerned with investigating crime, and protecting national and international security. Persuading an individual to move from an opposing to converging viewpoint, and an understanding on the cognitive style behind this change can serve to increase understanding of traditional face-to-face interactions, as well as synthetic environments (SEs) often used for communication across varying geographical locations. SEs are growing in usage, and with this increase comes an increase in crime being undertaken online. Communication technologies can allow people to mask their real identities, supporting anonymous communication which can raise significant challenges for investigators when monitoring and managing these conversations inside SEs. To date, the psychological literature concerning how to maximise information-gain in SEs for real-world interviewing purposes is sparse, and as such this aspect of social cognition is not well understood. Here, we introduce an overview of a novel programme of PhD research which seeks to enhance understanding of cross-cultural and cross-gender communication in SEs for maximising information gain. Utilising a dyadic jury paradigm, participants interacted with a confederate who attempted to persuade them to the opposing verdict across three distinct environments: face-to-face, instant messaging, and a novel virtual reality environment utilising avatars. Participants discussed a criminal scenario, acting as a two-person (male; female) jury. Persuasion was manipulated by the confederate claiming an opposing viewpoint (guilty v. not guilty) to the naïve participants from the outset. Pre and post discussion data, and observational digital recordings (voice and video) of participant’ discussion performance was collected. Information regarding cognitive style was also collected to ascertain participants need for cognitive closure and biases towards jumping to conclusions. Findings revealed that individuals communicating via an avatar in a virtual reality environment reacted in a similar way, and thus equally persuasive, when compared to individuals communicating face-to-face. Anonymous instant messaging however created a resistance to persuasion in participants, with males showing a significant decline in persuasive outcomes compared to face to face. The findings reveal new insights particularly regarding the interplay of persuasion on gender and modality, with anonymous instant messaging enhancing resistance to persuasion attempts. This study illuminates how varying SE can support new theoretical and applied understandings of how judgments are formed and modified in response to advocacy.Keywords: applied cognition, persuasion, social media, virtual reality
Procedia PDF Downloads 1449421 MindFlow: A Collective Intelligence-Based System for Helping Stress Pattern Diagnosis
Authors: Andres Frederic
Abstract:
We present the MindFlow system supporting the detection and the diagnosis of stresses. The heart of the system is a knowledge synthesis engine allowing occupational health stakeholders (psychologists, occupational therapists and human resource managers) to formulate queries related to stress and responding to users requests by recommending a pattern of stress if one exists. The stress pattern diagnosis is based on expert knowledge stored in the MindFlow stress ontology including stress feature vector. The query processing may involve direct access to the MindFlow system by occupational health stakeholders, online communication between the MindFlow system and the MindFlow domain experts, or direct dialog between a occupational health stakeholder and a MindFlow domain expert. The MindFlow knowledge model is generic in the sense that it supports the needs of psychologists, occupational therapists and human resource managers. The system presented in this paper is currently under development as part of a Dutch-Japanese project and aims to assist organisation in the quick diagnosis of stress patterns.Keywords: occupational stress, stress management, physiological measurement, accident prevention
Procedia PDF Downloads 4309420 Face Recognition Using Eigen Faces Algorithm
Authors: Shweta Pinjarkar, Shrutika Yawale, Mayuri Patil, Reshma Adagale
Abstract:
Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this, demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application. Face recognition is the technique which can be applied to the wide variety of problems like image and film processing, human computer interaction, criminal identification etc. This has motivated researchers to develop computational models to identify the faces, which are easy and simple to implement. In this , demonstrates the face recognition system in android device using eigenface. The system can be used as the base for the development of the recognition of human identity. Test images and training images are taken directly with the camera in android device.The test results showed that the system produces high accuracy. The goal is to implement model for particular face and distinguish it with large number of stored faces. face recognition system detects the faces in picture taken by web camera or digital camera and these images then checked with training images dataset based on descriptive features. Further this algorithm can be extended to recognize the facial expressions of a person.recognition could be carried out under widely varying conditions like frontal view,scaled frontal view subjects with spectacles. The algorithm models the real time varying lightning conditions. The implemented system is able to perform real-time face detection, face recognition and can give feedback giving a window with the subject's info from database and sending an e-mail notification to interested institutions using android application.Keywords: face detection, face recognition, eigen faces, algorithm
Procedia PDF Downloads 3619419 CybeRisk Management in Banks: An Italian Case Study
Authors: E. Cenderelli, E. Bruno, G. Iacoviello, A. Lazzini
Abstract:
The financial sector is exposed to the risk of cyber-attacks like any other industrial sector. Furthermore, the topic of CybeRisk (cyber risk) has become particularly relevant given that Information Technology (IT) attacks have increased drastically in recent years, and cannot be stopped by single organizations requiring a response at international and national level. IT risk is never a matter purely for the IT manager, although he clearly plays a key role. A bank's risk management function requires a thorough understanding of the evolving risks as well as the tools and practical techniques available to address them. Upon the request of European and national legislation regarding CybeRisk in the financial system, banks are therefore called upon to strengthen the operational model for CybeRisk management. This will require an important change with a more intense collaboration with the structures that deal with information security for the development of an ad hoc system for the evaluation and control of this type of risk. The aim of the work is to propose a framework for the management and control of CybeRisk that will bridge the gap in the literature regarding the understanding and consideration of CybeRisk as an integral part of business management. The IT function has a strong relevance in the management of CybeRisk, which is perceived mainly as operational risk, but with a positive tendency on the part of risk management to the identification of CybeRisk assessment methods that are increasingly complete, quantitative and able to better describe the possible impacts on the business. The paper provides answers to the research questions: Is it possible to define a CybeRisk governance structure able to support the comparison between risk and security? How can the relationships between IT assets be integrated into a cyberisk assessment framework to guarantee a system of protection and risks control? From a methodological point of view, this research uses a case study approach. The choice of “Monte dei Paschi di Siena” was determined by the specific features of one of Italy’s biggest lenders. It is chosen to use an intensive research strategy: an in-depth study of reality. The case study methodology is an empirical approach to explore a complex and current phenomenon that develops over time. The use of cases has also the advantage of allowing the deepening of aspects concerning the "how" and "why" of contemporary events, on which the scholar has little control. The research bases on quantitative data and qualitative information obtained through semi-structured interviews of an open-ended nature and questionnaires to directors, members of the audit committee, risk, IT and compliance managers, and those responsible for internal audit function and anti-money laundering. The added value of the paper can be seen in the development of a framework based on a mapping of IT assets from which it is possible to identify their relationships for purposes of a more effective management and control of cyber risk.Keywords: bank, CybeRisk, information technology, risk management
Procedia PDF Downloads 2329418 RV-YOLOX: Object Detection on Inland Waterways Based on Optimized YOLOX Through Fusion of Vision and 3+1D Millimeter Wave Radar
Authors: Zixian Zhang, Shanliang Yao, Zile Huang, Zhaodong Wu, Xiaohui Zhu, Yong Yue, Jieming Ma
Abstract:
Unmanned Surface Vehicles (USVs) are valuable due to their ability to perform dangerous and time-consuming tasks on the water. Object detection tasks are significant in these applications. However, inherent challenges, such as the complex distribution of obstacles, reflections from shore structures, water surface fog, etc., hinder the performance of object detection of USVs. To address these problems, this paper provides a fusion method for USVs to effectively detect objects in the inland surface environment, utilizing vision sensors and 3+1D Millimeter-wave radar. MMW radar is complementary to vision sensors, providing robust environmental information. The radar 3D point cloud is transferred to 2D radar pseudo image to unify radar and vision information format by utilizing the point transformer. We propose a multi-source object detection network (RV-YOLOX )based on radar-vision fusion for inland waterways environment. The performance is evaluated on our self-recording waterways dataset. Compared with the YOLOX network, our fusion network significantly improves detection accuracy, especially for objects with bad light conditions.Keywords: inland waterways, YOLO, sensor fusion, self-attention
Procedia PDF Downloads 1249417 Assessment and Prediction of Vehicular Emissions in Commonwealth Avenue, Quezon City at Various Policy and Technology Scenarios Using Simple Interactive Model (SIM-Air)
Authors: Ria M. Caramoan, Analiza P. Rollon, Karl N. Vergel
Abstract:
The Simple Interactive Models for Better Air Quality (SIM-air) is an integrated approach model that allows the available information to support the integrated urban air quality management. This study utilized the vehicular air pollution information system module of SIM-air for the assessment of vehicular emissions in Commonwealth Avenue, Quezon City, Philippines. The main objective of the study is to assess and predict the contribution of different types of vehicles to the vehicular emissions in terms of PM₁₀, SOₓ, and NOₓ at different policy and technology scenarios. For the base year 2017, the results show vehicular emissions of 735.46 tons of PM₁₀, 108.90 tons of SOₓ, and 2,101.11 tons of NOₓ. Motorcycle is the major source of particulates contributing about 52% of the PM₁₀ emissions. Meanwhile, Public Utility Jeepneys contribute 27% of SOₓ emissions and private cars using gasoline contribute 39% of NOₓ emissions. Ambient air quality monitoring was also conducted in the study area for the standard parameters of PM₁₀, S0₂, and NO₂. Results show an average of 88.11 µg/Ncm, 47.41 µg/Ncm and 22.54 µg/Ncm for PM₁₀, N0₂, and SO₂, respectively, all were within the DENR National Ambient Air Quality Guideline Values. Future emissions of PM₁₀, NOₓ, and SOₓ are estimated at different scenarios. Results show that in the year 2030, PM₁₀ emissions will be increased by 186.2%. NOₓ emissions and SOₓ emissions will also be increased by 38.9% and 5.5%, without the implementation of the scenarios.Keywords: ambient air quality, emissions inventory, mobile air pollution, vehicular emissions
Procedia PDF Downloads 1389416 English and Information and Communication Technology: Zones of Exclusion in Education in Low-Income Countries
Authors: Ram A. Giri, Amna Bedri, Abdou Niane
Abstract:
Exclusion in education on the basis of language in multilingual contexts operates at multiple levels. Learners of diverse ethnolinguistic backgrounds are often expected to learn through English and are pushed further down the learning ladder if they also have to access education through Information and Communication Technology (ICT). The paper explores marginalized children’s lived experiences in accessing technology and English in four low-income countries in Africa and Asia. Based on the findings of the first phase of a multinational qualitative research study, we report on the factors or barriers that affect children’s access, opportunities and motivation for learning through technology and English. ICT and English - the language of ICT and education - can enhance learning and can even be essential. However, these two important keys to education can also function as barriers to accessing quality education, and therefore as zones of exclusion. This paper looks into how marginalized children (aged 13-15) engage in learning through ICT and English and to what extent the restrictive access and opportunities contribute to the widening of the already existing gap in education. By applying the conceptual frameworks of “access and accessibility of learning” and “zones of exclusion,” the paper elucidates how the barriers prevent children’s effective engagement with learning and addresses such questions as to how marginalized children access technology and English for learning; whether the children value English, and what their motivation and opportunity to learn it are. In addition, the paper will point out policy and pedagogic implications.Keywords: exclusion, inclusion, inclusive education, marginalization
Procedia PDF Downloads 2309415 The Use of YouTube and Its Relation to Changing the Kuwaiti Children’s Social Values from Parents’ Perspectives: Field Study
Authors: Laila Alkhayat
Abstract:
In this study, the researcher explored the positive and negative effects of children watching YouTube on changing social values from the perspective of parents in Kuwait. This study also explored whether any correlation exists between changed values from watching YouTube and the following variables: relationship with a child, social situation, school level, gender, and age. The researcher collected data from 286 questionnaires distributed randomly to parents in Kuwait. The results of the study show that parents face many disadvantages when dealing with children watching YouTube, such as children spending too much time in front of screens, inability to organize bedtime, and children’s social isolation. However, the researcher found some positives come from watching YouTube, such as learning new information, enabling children to search for new information, and introducing children to the culture of their society and other cultures around them. Moreover, this study found that boys are more likely to have negative viewing habits than girls. Given the results, this study shows that the biggest impact on social values from children watching YouTube is that they are preoccupied with watching YouTube and they waste time, which makes them feel disturbed, and this affects the value of time management and delays children’s sleeping times. This study concludes that watching YouTube simultaneously has negative and positive effects on changing social values, but it plays a negative role in changing social values of children from the parents’ perspective.Keywords: YouTube, children, social value, social media effects
Procedia PDF Downloads 1579414 The Healing 'Touch' of Music: A Neuro-Acoustics Approach to Understand Its Therapeutic Effect
Authors: Jagmeet S. Kanwal, Julia F. Langley
Abstract:
Music can heal the body, but a mechanistic understanding of this phenomenon is lacking. This study explores the effects of music presentation on neurologic and physiologic responses leading to metabolic changes in the human body. The mind and body co-exist in a corporeal entity and within this framework, sickness ensues when the mind-body balance goes awry. It is further hypothesized that music has the capacity to directly reset this balance. Two lines of inquiry taken together can provide a mechanistic understanding of this phenomenon 1) Empirical evidence for a sound-sensitive pressure sensor system in the body, and 2) The notion of a “healing center” within the brain that is activated by specific patterns of sounds. From an acoustics perspective, music is spatially distributed as pressure waves ranging from a few cm to several meters in wavelength. These waves interact and propagate in three-dimensions in unique ways, depending on the wavelength. Furthermore, music creates dynamically changing wave-fronts. Frequencies between 200 Hz and 1 kHz generate wavelengths that range from 5'6" to 1 foot. These dimensions are in the range of the body size of most people making it plausible that these pressure waves can geometrically interact with the body surface and create distinct patterns of pressure stimulation across the skin surface. For humans, short wavelength, high frequency (> 200 Hz) sounds are best received via cochlear receptors. For low frequency (< 200 Hz), long wavelength sound vibrations, however, the whole body may act as an ideal receiver. A vast array of highly sensitive pressure receptors (Pacinian corpuscles) is present just beneath the skin surface, as well as in the tendons, bones, several organs in the abdomen, and the sexual organs. Per the available empirical evidence, these receptors contribute to music perception by allowing the whole body to function as a sound receiver, and knowledge of how they function is essential to fully understanding the therapeutic effect of music. Neuroscientific studies have established that music stimulates the limbic system that can trigger states of anxiety, arousal, fear, and other emotions. These emotional states of brain activity play a crucial role in filtering top-down feedback from thoughts and bottom-up sensory inputs to the autonomic system, which automatically regulates bodily functions. Music likely exerts its pleasurable and healing effects by enhancing functional and effective connectivity and feedback mechanisms between brain regions that mediate reward, autonomic, and cognitive processing. Stimulation of pressure receptors under the skin by low-frequency music-induced sensations can activate multiple centers in the brain, including the amygdala, the cingulate cortex, and nucleus accumbens. Melodies in music in the low (< 600 Hz) frequency range may augment auditory inputs after convergence of the pressure-sensitive inputs from the vagus nerve onto emotive processing regions within the limbic system. The integration of music-generated auditory and somato-visceral inputs may lead to a synergistic input to the brain that promotes healing. Thus, music can literally heal humans through “touch” as it energizes the brain’s autonomic system for restoring homeostasis.Keywords: acoustics, brain, music healing, pressure receptors
Procedia PDF Downloads 1669413 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies
Authors: Widhi Hanantyo Suryadinata
Abstract:
Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China
Procedia PDF Downloads 709412 Detaching the ‘Criminal Justice Conveyor Belt’: Diversion as a Responsive Mechanism for Children in Kenya
Authors: Sarah Kinyanjui, Mahnaaz Mohamed
Abstract:
The child justice system in Kenya is organically departing from a managerial and retributive model to one that espouses restorative justice. Notably, the Children Act 2001, and the most recent, Children Act 2022, signalled an aspiration to facilitate meaningful interventions as opposed to ‘processing’ children through the justice system. In this vein, the Children Act 2022 formally recognises diversion and provides modalities for its implementation. This paper interrogates the diversion promise and reflects on the implementation of diversion as envisaged by the 2022 Act. Using restorative justice, labelling and differential association theories as well as the value of care lenses, the paper discusses diversion as a meaningful response to child offending. It further argues that while diversion presents a strong platform for the realisation of the restorative and rehabilitative ideals, in the absence of a well-planned, coordinated, and resourced framework, diversion may remain a mere alternative ‘conveyor belt’. Strategic multi-agency planning, capacity building and cooperation are highlighted as essential minimums for the realisation of the goals of diversion.Keywords: diversion for child offenders, restorative justice, responsive criminal justice system, children act 2022 kenya
Procedia PDF Downloads 699411 Electronic Health Record System: A Perspective to Improve the Value of Services Rendered to Patients in Healthcare Organization in Rwanda, Case of CHUB and Hopital De Nemba
Authors: Mugabe Nzarama Gabriel
Abstract:
In Rwanda, many healthcare organizations are still using a paper based patients’ data record system although it still present weaknesses to share health patients’ information across different services when necessary. In developed countries, the EHR has been put in place to revolutionize the paper based record system but still the EHR has some challenges related to privacy, security, or interoperability. The purpose of this research was to assess the existing patients’ data record system in healthcare sector in Rwanda, see what an EHR can improve to the system in place and assess the acceptance of EHR as system which is interoperable, very secure and interoperable and see whether stakeholders are ready to adopt the system. The case based methodology was used and TAM theoretical framework to design the questionnaire for the survey. A judgmental sample across two cases, CHUB and Hopital de Nemba, has been selected and SPSS has been used for descriptive statistics. After a qualitative analysis, the findings showed that the paper based record is useful, gives complete information about the patient, protects the privacy of patients but it is still less secure and less interoperable. The respondents shown that they are ready to use the proposed EHR System and want it secure, capable of enforcing the privacy but still they are not all ready for the interoperability. A conclusion has been formulated; recommendations and further research have been proposed.Keywords: EHR system, healthcare service, TAM, privacy, interoperability
Procedia PDF Downloads 2679410 The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject
Authors: Pimploi Tirastittam, Sawanath Treesathon, Amornrath Ongkawat
Abstract:
Learning Management System (LMS) is the system which uses to manage the learning in order to grouping the content and learning activity between the lecturer and learner including online examination and evaluation. Nowadays, it is the borderless learning era so the learning activities can be accessed from everywhere in the world and also anytime via the information technology and media. The learner can easily access to the knowledge so the different in time and distance is not a constraint for learning anymore. The learning pattern which was used in this research is the integration of the in-class learning and online learning via internet and will be able to monitor the progress by the Learning management system which will create the fast response and accessible learning process via the social media. In order to increase the capability and freedom of the learner, the system can show the current and history of the learning document, video conference and also has the chat room for the learner and lecturer to interact to each other. So the objectives of the “The Design and Applied of Learning Management System via Social Media on Internet: Case Study of Operating System for Business Subject” are to expand the opportunity of learning and to increase the efficiency of learning as well as increase the communication channel between lecturer and student. The data of this research was collect from 30 users of the system which are students who enroll in the subject. And the result of the research is in the “Very Good” which is conformed to the hypothesis.Keywords: Learning Management System, social media, Operating System, information technology
Procedia PDF Downloads 3569409 An Overview on Aluminum Matrix Composites: Liquid State Processing
Authors: S. P. Jordan, G. Christian, S. P. Jeffs
Abstract:
Modern composite materials are increasingly being chosen in replacement of heavier metallic material systems within many engineering fields including aerospace and automotive industries. The increasing push towards satisfying environmental targets are fuelling new material technologies and manufacturing processes. This paper will introduce materials and manufacturing processes using metal matrix composites along with manufacturing processes optimized at Alvant Ltd., based in Basingstoke in the UK which offers modern, cost effective, selectively reinforced composites for light-weighting applications within engineering. An overview and introduction into modern optimized manufacturing methods capable of producing viable replacements for heavier metallic and lower temperature capable polymer composites are offered. A review of the capabilities and future applications of this viable material is discussed to highlight the potential involved in further optimization of old manufacturing techniques, to fully realize the potential to lightweight material using cost-effective methods.Keywords: aluminium matrix composites, light-weighting, hybrid squeeze casting, strategically placed reinforcements
Procedia PDF Downloads 999408 Facility Layout Improvement: Based on Safety and Health at Work and Standards of Food Production Facility
Authors: Asifa Fitriani, Galih Prakoso
Abstract:
This study aims to improve the design layout of a Micro, Small and Medium Enterprises (SMEs) to minimize material handling and redesigning the layout of production facilities based on the safety and health and standards of food production facilities. Problems layout in the one of chip making industry mushrooms in Indonesia is cross movement between work stations, work accidents, and the standard of facilities that do not conform with the standards of the food industry. Improvement layout design using CORELAP and 5S method to give recommendation and implementation of occupational health and safety standards of food production facilities. From the analysis, improved layout using CORELAP provide a smaller displacement distance is 155.84 meters from the initial displacement distance of 335.9 meters, and providing a shorter processing time than the original 112.726 seconds to 102.831 seconds. 5S method also has recommended the completion of occupational health and safety issues as well as the standard means of food production by changing the working environment better.Keywords: Layout Design, Corelap, 5S
Procedia PDF Downloads 5339407 Strategic Mine Planning: A SWOT Analysis Applied to KOV Open Pit Mine in the Democratic Republic of Congo
Authors: Patrick May Mukonki
Abstract:
KOV pit (Kamoto Oliveira Virgule) is located 10 km from Kolwezi town, one of the mineral rich town in the Lualaba province of the Democratic Republic of Congo. The KOV pit is currently operating under the Katanga Mining Limited (KML), a Glencore-Gecamines (a State Owned Company) join venture. Recently, the mine optimization process provided a life of mine of approximately 10 years withnice pushbacks using the Datamine NPV Scheduler software. In previous KOV pit studies, we recently outlined the impact of the accuracy of the geological information on a long-term mine plan for a big copper mine such as KOV pit. The approach taken, discussed three main scenarios and outlined some weaknesses on the geological information side, and now, in this paper that we are going to develop here, we are going to highlight, as an overview, those weaknesses, strengths and opportunities, in a global SWOT analysis. The approach we are taking here is essentially descriptive in terms of steps taken to optimize KOV pit and, at every step, we categorized the challenges we faced to have a better tradeoff between what we called strengths and what we called weaknesses. The same logic is applied in terms of the opportunities and threats. The SWOT analysis conducted in this paper demonstrates that, despite a general poor ore body definition, and very rude ground water conditions, there is room for improvement for such high grade ore body.Keywords: mine planning, mine optimization, mine scheduling, SWOT analysis
Procedia PDF Downloads 2259406 Typical Emulsions as Probiotic Food Carrier: Effect of Cells Position on Its Viability
Authors: Mengfan Li, Filip Van Bockstaele, Wenyong Lou, Frank Devlighere
Abstract:
The development of probiotics-encapsulated emulsions that maintain the viability of probiotics during processing, storage and human gastrointestinal (GI) tract environment receives great scientific and commercial interest. In this study, typical W/O and O/W emulsions with and without oil gelation were used to encapsulate L. plantarum. The effects of emulsion types on the viability of L. plantarum during storage and GI tract were investigated. Besides, the position of L. plantarum in emulsion system and its number of viable cells when threating by adverse environment was correlated in order to figure out which type of emulsion is more suitable as food carrier for probiotics encapsulation and protection. As a result, probiotics tend to migrate from oil to water phase due to the natural hydrophilicity; however, it’s harmful for cells viability when surrounding by water for a long time. Oil gelation in emulsions is one of the promising strategies for inhibiting the cells mobility and decreasing the contact with adverse factors (e.g., water, exogenous enzymes and gastric acid), thus enhancing the number of viable cells that enough to exert its beneficial effects in host.Keywords: emulsion, gelation, encapsulation, probiotics
Procedia PDF Downloads 1099405 Electron Beam Processing of Ethylene-Propylene-Terpolymer-Based Rubber Mixtures
Authors: M. D. Stelescu, E. Manaila, G. Craciun, D. Ighigeanu
Abstract:
The goal of the paper is to present the results regarding the influence of the irradiation dose and amount of multifunctional monomer trimethylol-propane trimethacrylate (TMPT) on ethylene-propylene-diene terpolymer rubber (EPDM) mixtures irradiated in electron beam. Blends, molded on an electrically heated laboratory roller mill and compressed in an electrically heated hydraulic press, were irradiated using the ALID 7 of 5.5 MeV linear accelerator in the dose range of 22.6 kGy to 56.5 kGy in atmospheric conditions and at room temperature of 25 °C. The share of cross-linking and degradation reactions was evaluated by means of sol-gel analysis, cross-linking density measurements, FTIR studies and Charlesby-Pinner parameter (p0/q0) calculations. The blends containing different concentrations of TMPT (3 phr and 9 phr) and irradiated with doses in the mentioned range have present the increasing of gel content and cross-linking density. Modified and new bands in FTIR spectra have appeared, because of both cross-linking and chain scission reactions.Keywords: electron beam irradiation, EPDM rubber, crosslinking density, gel fraction
Procedia PDF Downloads 1559404 Friend or Foe: Decoding the Legal Challenges Posed by Artificial Intellegence in the Era of Intellectual Property
Authors: Latika Choudhary
Abstract:
“The potential benefits of Artificial Intelligence are huge, So are the dangers.” - Dave Water. Artificial intelligence is one of the facet of Information technology domain which despite several attempts does not have a clear definition or ambit. However it can be understood as technology to solve problems via automated decisions and predictions. Artificial intelligence is essentially an algorithm based technology which analyses the large amounts of data and then solves problems by detecting useful patterns. Owing to its automated feature it will not be wrong to say that humans & AI have more utility than humans alone or computers alone.1 For many decades AI experienced enthusiasm as well as setbacks, yet it has today become part and parcel of our everyday life, making it convenient or at times problematic. AI and related technology encompass Intellectual Property in multiple ways, the most important being AI technology for management of Intellectual Property, IP for protecting AI and IP as a hindrance to the transparency of AI systems. Thus the relationship between the two is of reciprocity as IP influences AI and vice versa. While AI is a recent concept, the IP laws for protection or even dealing with its challenges are relatively older, raising the need for revision to keep up with the pace of technological advancements. This paper will analyze the relationship between AI and IP to determine how beneficial or conflictual the same is, address how the old concepts of IP are being stretched to its maximum limits so as to accommodate the unwanted consequences of the Artificial Intelligence and propose ways to mitigate the situation so that AI becomes the friend it is and not turn into a potential foe it appears to be.Keywords: intellectual property rights, information technology, algorithm, artificial intelligence
Procedia PDF Downloads 87