Search results for: noisy forensic speaker verification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1108

Search results for: noisy forensic speaker verification

658 The Use of Hedging Devices in Studens’ Oral Presentation

Authors: Siti Navila

Abstract:

Hedging as a kind of pragmatic competence is an essential part in achieving the goal in communication, especially in academic discourse where the process of sharing knowledge among academic community takes place. Academic discourse demands an appropriateness and modesty of an author or speaker in stating arguments, to name but few, by considering the politeness, being cautious and tentative, and differentiating personal opinions and facts in which these aspects can be achieved through hedging. This study was conducted to find the hedging devices used by students as well as to analyze how they use them in their oral presentation. Some oral presentations from English Department students of the State University of Jakarta on their Academic Presentation course final test were recorded and explored formally and functionally. It was found that the most frequent hedging devices used by students were shields from all hedging devices that students commonly used when they showed suggestion, stated claims, showed opinion to provide possible but still valid answer, and offered the appropriate solution. The researcher suggests that hedging can be familiarized in learning, since potential conflicts that is likely to occur while delivering ideas in academic contexts such as disagreement, criticism, and personal judgment can be reduced with the use of hedging. It will also benefit students in achieving the academic competence with an ability to demonstrate their ideas appropriately and more acceptable in academic discourse.

Keywords: academic discourse, hedging, hedging devices, lexical hedges, Meyer classification

Procedia PDF Downloads 461
657 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 646
656 Validation of the Formal Model of Web Services Applications for Digital Reference Service of Library Information System

Authors: Zainab Magaji Musa, Nordin M. A. Rahman, Julaily Aida Jusoh

Abstract:

The web services applications for digital reference service (WSDRS) of LIS model is an informal model that claims to reduce the problems of digital reference services in libraries. It uses web services technology to provide efficient way of satisfying users’ needs in the reference section of libraries. The formal WSDRS model consists of the Z specifications of all the informal specifications of the model. This paper discusses the formal validation of the Z specifications of WSDRS model. The authors formally verify and thus validate the properties of the model using Z/EVES theorem prover.

Keywords: validation, verification, formal, theorem prover

Procedia PDF Downloads 517
655 To Individualisation of Subject, Donar, by Determination of Serological Markers from Obtain Biological Fluid at Crime Scene

Authors: Arun Kumar, Ravindra Pal Verma, Harsh Sharma, Shani Kumar

Abstract:

For the present study samples was collected from 20 donors with unknown blood group and secretor status had been determined from saliva by using biological fluid. ABO typing on the concentrated samples was successfully performed after 1 month of storage. Urine stained clothing samples are often submitted to forensic science laboratories for ABH blood group antigen determination. The serogenetic markers of semen stains submitted can be used to determine the origin of any of these samples. ABH blood group substances have previously been identified from urine. ABH blood group substance is low in urine in comparison with other body fluids.

Keywords: ABH blood group, crime scene, serological markers, body fluids and urine

Procedia PDF Downloads 588
654 Fuzzy Population-Based Meta-Heuristic Approaches for Attribute Reduction in Rough Set Theory

Authors: Mafarja Majdi, Salwani Abdullah, Najmeh S. Jaddi

Abstract:

One of the global combinatorial optimization problems in machine learning is feature selection. It concerned with removing the irrelevant, noisy, and redundant data, along with keeping the original meaning of the original data. Attribute reduction in rough set theory is an important feature selection method. Since attribute reduction is an NP-hard problem, it is necessary to investigate fast and effective approximate algorithms. In this paper, we proposed two feature selection mechanisms based on memetic algorithms (MAs) which combine the genetic algorithm with a fuzzy record to record travel algorithm and a fuzzy controlled great deluge algorithm to identify a good balance between local search and genetic search. In order to verify the proposed approaches, numerical experiments are carried out on thirteen datasets. The results show that the MAs approaches are efficient in solving attribute reduction problems when compared with other meta-heuristic approaches.

Keywords: rough set theory, attribute reduction, fuzzy logic, memetic algorithms, record to record algorithm, great deluge algorithm

Procedia PDF Downloads 456
653 Digital Material Characterization Using the Quantum Fourier Transform

Authors: Felix Givois, Nicolas R. Gauger, Matthias Kabel

Abstract:

The efficient digital material characterization is of great interest to many fields of application. It consists of the following three steps. First, a 3D reconstruction of 2D scans must be performed. Then, the resulting gray-value image of the material sample is enhanced by image processing methods. Finally, partial differential equations (PDE) are solved on the segmented image, and by averaging the resulting solutions fields, effective properties like stiffness or conductivity can be computed. Due to the high resolution of current CT images, the latter is typically performed with matrix-free solvers. Among them, a solver that uses the explicit formula of the Green-Eshelby operator in Fourier space has been proposed by Moulinec and Suquet. Its algorithmic, most complex part is the Fast Fourier Transformation (FFT). In our talk, we will discuss the potential quantum advantage that can be obtained by replacing the FFT with the Quantum Fourier Transformation (QFT). We will especially show that the data transfer for noisy intermediate-scale quantum (NISQ) devices can be improved by using appropriate boundary conditions for the PDE, which also allows using semi-classical versions of the QFT. In the end, we will compare the results of the QFT-based algorithm for simple geometries with the results of the FFT-based homogenization method.

Keywords: most likelihood amplitude estimation (MLQAE), numerical homogenization, quantum Fourier transformation (QFT), NISQ devises

Procedia PDF Downloads 79
652 Sociolinguistic Analysis of Campus Slang: The Case of Akwa Ibom State College of Education, Afaha Nsit, Nigeria

Authors: Charles Okon Effiong

Abstract:

This paper is a sociolinguistic analysis of the semantics of students’ slang in Akwa Ibom State College of Education, Afaha Nsit, Nigeria. The descriptive survey design was deployed for the study and data were collected from one hundred and fifty (150) students through a series of instruments such as questionnaire, interviews and observations. The questionnaire was administered randomly to levels 200, 300 and Extra Time students only. Interviews and observations were also conducted on the students. These categories of students were selected because they had spent a longer time in the college and were thought to be familiar with campus slang. A total of ninety two (92) slang expressions were taken from the questionnaire and out of this number, twenty six (26) slang expressions were peculiar to the college while sixty six (66) were those slang terms also used in the society. The study proves the notion that every speaker handles a variety of registers and tends to choose among them in accordance with the social situation in which he finds himself. The study shows campus slang as a sociolect which facilitates communication among the students in a different sense. The slang expressions are fully intelligible to the students and this unique and elaborate lexicon serves to achieve group identity among other social implications.

Keywords: communication, slang, social relationship, sociolinguistics

Procedia PDF Downloads 455
651 Digital Retinal Images: Background and Damaged Areas Segmentation

Authors: Eman A. Gani, Loay E. George, Faisel G. Mohammed, Kamal H. Sager

Abstract:

Digital retinal images are more appropriate for automatic screening of diabetic retinopathy systems. Unfortunately, a significant percentage of these images are poor quality that hinders further analysis due to many factors (such as patient movement, inadequate or non-uniform illumination, acquisition angle and retinal pigmentation). The retinal images of poor quality need to be enhanced before the extraction of features and abnormalities. So, the segmentation of retinal image is essential for this purpose, the segmentation is employed to smooth and strengthen image by separating the background and damaged areas from the overall image thus resulting in retinal image enhancement and less processing time. In this paper, methods for segmenting colored retinal image are proposed to improve the quality of retinal image diagnosis. The methods generate two segmentation masks; i.e., background segmentation mask for extracting the background area and poor quality mask for removing the noisy areas from the retinal image. The standard retinal image databases DIARETDB0, DIARETDB1, STARE, DRIVE and some images obtained from ophthalmologists have been used to test the validation of the proposed segmentation technique. Experimental results indicate the introduced methods are effective and can lead to high segmentation accuracy.

Keywords: retinal images, fundus images, diabetic retinopathy, background segmentation, damaged areas segmentation

Procedia PDF Downloads 404
650 Need of More Social Work Students to Work in Aging Fields

Authors: Mbita Mbao

Abstract:

Social work programs are grappling with changing students’ attitudes about working with older adults. Our study aimed to understand whether adding a guest speaker working in the field into weekly content would influence students’ attitudes about working with older adults. We conducted an exploratory study using a cross-sectional design with a pre and post-test to answer our question. Eighteen MSW students were enrolled in the ‘Social Work with Older Adults’ course, and 17 students completed the pre-posttests. Willingness to work with older adults was measured using the ‘Willingness to Work with Elderly People Scale (WEPS)’. Guest speakers were recruited from local area agencies on aging. A significant finding was a statistically significant (t= −3.31, p < .01) increase from pre- (M = 3.59, SD = 1.54) to post-test (M = 4.88, SD = 1.22) scores for the item, ‘My professors advise me to consider aged care career.’ In addition, there were statistically significant pre to post-test differences for all items of ‘Perceived Behavioral Control’ and ‘Intention toward working with older adults’ reflecting competence, training, skills, and capabilities to work with older adults, suggesting guest speakers may play a crucial role as influential sources to positively shape students’ attitudes and intentions toward working with older adults.

Keywords: guest speakers, workforce, aging, students

Procedia PDF Downloads 25
649 Evaluation of Features Extraction Algorithms for a Real-Time Isolated Word Recognition System

Authors: Tomyslav Sledevič, Artūras Serackis, Gintautas Tamulevičius, Dalius Navakauskas

Abstract:

This paper presents a comparative evaluation of features extraction algorithm for a real-time isolated word recognition system based on FPGA. The Mel-frequency cepstral, linear frequency cepstral, linear predictive and their cepstral coefficients were implemented in hardware/software design. The proposed system was investigated in the speaker-dependent mode for 100 different Lithuanian words. The robustness of features extraction algorithms was tested recognizing the speech records at different signals to noise rates. The experiments on clean records show highest accuracy for Mel-frequency cepstral and linear frequency cepstral coefficients. For records with 15 dB signal to noise rate the linear predictive cepstral coefficients give best result. The hard and soft part of the system is clocked on 50 MHz and 100 MHz accordingly. For the classification purpose, the pipelined dynamic time warping core was implemented. The proposed word recognition system satisfies the real-time requirements and is suitable for applications in embedded systems.

Keywords: isolated word recognition, features extraction, MFCC, LFCC, LPCC, LPC, FPGA, DTW

Procedia PDF Downloads 497
648 Evaluation and Selection of Construction Contractors by Polish Public Clients

Authors: Kozik Renata, Leśniak Agnieszka, Plebankiewicz Edyta

Abstract:

Contracting authorities in the public sector are obligated to apply the principles provided for in the Polish law for the evaluation and selection of contractors. To analyze the methods of contractors, applied in practice by public clients, the notices of contract award results for construction works were analyzed. The analysis shows that the procedure selected more and more often is open to competitive bidding, where the assessment of the competence of contractors is not very precise, as well as non-competitive bidding, i.e. single source procurement. The share of procurement procedures, where the only criterion is price, is increasing. The solution to the problems existing here might be the introduction of one of the forms of pre-selection of contractors. The article also briefly discusses verification systems for companies applying for public contracts used in EU countries.

Keywords: certification, contractors selection, open tendering, public investors

Procedia PDF Downloads 287
647 Pitch Processing in Autistic Mandarin-Speaking Children with Hypersensitivityand Hypo-Sensitivity: An Event-Related Potential Study

Authors: Kaiying Lai, Suiping Wang, Luodi Yu, Yang Zhang, Pengmin Qin

Abstract:

Abnormalities in auditory processing are one of the most commonly reported sensory processing impairments in children with Autism Spectrum Disorder (ASD). Tonal language speaker with autism has enhanced neural sensitivity to pitch changes in pure tone. However, not all children with ASD exhibit the same performance in pitch processing due to different auditory sensitivity. The current study aimed to examine auditory change detection in ASD with different auditory sensitivity. K-means clustering method was adopted to classify ASD participants into two groups according to the auditory processing scores of the Sensory Profile, 11 autism with hypersensitivity (mean age = 11.36 ; SD = 1.46) and 18 with hypo-sensitivity (mean age = 10.64; SD = 1.89) participated in a passive auditory oddball paradigm designed for eliciting mismatch negativity (MMN) under the pure tone condition. Results revealed that compared to hypersensitive autism, the children with hypo-sensitivity showed smaller MMN responses to pure tone stimuli. These results suggest that ASD with auditory hypersensitivity and hypo-sensitivity performed differently in processing pure tone, so neural responses to pure tone hold promise for predicting the auditory sensitivity of ASD and targeted treatment in children with ASD.

Keywords: ASD, sensory profile, pitch processing, mismatch negativity, MMN

Procedia PDF Downloads 393
646 Determination of Unknown Radionuclides Using High Purity Germanium Detectors

Authors: O. G. Onuk, L. S. Taura, C. M. Eze, S. M. Ngaram

Abstract:

The decay chain of radioactive elements in the laboratory and the verification of natural radioactivity of the human body was investigated using the High Purity Germanium (HPGe) detector. Properties of the HPGe detectors were also investigated. The efficiency and energy resolution of HPGe detector used in the laboratory was found to be excellent. The detector was calibrated three times so as to cover a wider energy range. Also the Centroid C of the detector was found to have a linear relationship with the energies of the known gamma-rays. Using the three calibrations of the detector, the energy of an unknown radionuclide was found to follow the decay chain of thorium-232 (232Th) and it was also found that an average adult has about 2.5g Potasium-40 (40K) in the body.

Keywords: detector, efficiency, energy, radionuclides, resolution

Procedia PDF Downloads 252
645 The Social Media, Reading Culture and Vocabulary Expansion: Three Universities from Northern Nigeria

Authors: Nasir Umar Abdullahi

Abstract:

The social media profoundly causes the reading culture to decline in Nigeria, where the English language is a second language (SL), a language of instruction (LI), as well as the target language (TL). This is because the university students have, over the years, failed to make extensive reading their closest companion, with much emphasis on reading the European novels, newspapers, magazines, etc., so as to learn language from its original or native speakers for linguistic competence. Instead, they squander the most part of their day and nocturnal hours, sending and receiving messages through social media. The end result is their vocabulary become stagnant or ebbs, and that they cannot acquire the Cox head’s 570 vocabulary, let alone the Nation’s 2000 vocabulary to use the language fluently in writing, reading, listening, and speaking and to further compete with the native speaker in varying degrees of language usages. Be that as it may, if the social media is a monster in worsening the decline in reading culture, which degenerates in the Northern part of the country in contradistinction to the Southern part, it boosts it as well, for aside the social media language, slangs, cliché, for instance, students improve their vocabulary power, and at the same time it allows the students to privately and leisurely put the language into use, by using practically some of the vocabulary they have acquired to chart, to comment, socialize to adjudge, etc. This is what this paper tries to explore in Umaru Musa Yar’adua University Al-qalam University and the Federal University Dutin-ma.

Keywords: social media, reading, vocabulary, universities

Procedia PDF Downloads 133
644 An Empirical Dynamic Fuel Cell Model Used for Power System Verification in Aerospace

Authors: Giuliano Raimondo, Jörg Wangemann, Peer Drechsel

Abstract:

In systems development involving Fuel Cells generators, it is important to have from an early stage of the project a dynamic model for the electrical behavior of the stack to be shared between involved development parties. It allows independent and early design and tests of fuel cell related power electronic. This paper presents an empirical Fuel Cell system model derived from characterization tests on a real system. Moreover, it is illustrated how the obtained model is used to build and validate a real-time Fuel Cell system emulator which is used for aerospace electrical integration testing activities.

Keywords: fuel cell, modelling, real time emulation, testing

Procedia PDF Downloads 337
643 Analysis of iPSC-Derived Dopaminergic Neuron Susceptibility to Influenza and Excitotoxicity in Non-Affective Psychosis

Authors: Jamileh Ahmed, Helena Hernandez, Gabriel De Erausquin

Abstract:

H1N1 virus susceptibility of iPSC-derived DA neurons from schizophrenia patients and controls will compared. C57/BL-6 fibroblasts were reprogrammed into iPSCs using a lenti-viral vector containing SOKM genes. Pluripotency verification with the AP assay and immunocytochemistry ensured iPSC presence. The experimental outcome of ISPCs from DA neuron differentiation will be discussed in the Results section. Fibroblasts from patients and controls will be reprogrammed into iPSCs using a sendai-virus vector containing SOKM. IPSCs will be characterized using the AP assay, immunocytochemistry and RT-PCR. IPSCs will then be differentiated into DA neurons. Gene methylation will be compared for both groups with custom-designed microarrays.

Keywords: schizophrenia, iPSCs, stem cells, neuroscience

Procedia PDF Downloads 429
642 Polite Request Strategies in Commuter Discourse in Xhosa

Authors: Mawande Dlali

Abstract:

This paper examines the request strategies in commuter discourse involving taxi drivers and passengers in Khayelitsha as well as the responses to these requests. The present study considers requests in commuter transport as face threatening acts (FTAs), hence the need for the commuter crew to strategically shape their communicative actions to achieve their overall discourse goal of getting passengers to perform actions that are in their own interest with minimum resistance or confrontation. The crew presents itself by using communicative devices that prompt the passengers to evaluate it positively as warm, friendly, and respectful. However, the passengers' responses to requests range from compliance to resistance depending on their interpretation of the speaker’s motive and the probable social consequences. Participant observation by the researcher was the main method of collecting examples of requests and responses to the requests. Unstructured interviews and informal discussions were made with randomly selected taxi drivers and commuters. The findings and explanations presented in this article revealed the predominance of polite requests as speech acts in taxi discourse in Khayelitsha. This research makes a contribution to the contemporary pragmatics study of African languages in urban context.

Keywords: face threatening acts, speech acts, request strategies, discourse

Procedia PDF Downloads 166
641 Hydroclean Smartbin Solution for Plastic Pollution Crisis

Authors: Anish Bhargava

Abstract:

By 2050, there will be more plastic than fish in our oceans. 51 trillion micro-plastics pollute our waters and contaminate the food on our plates, increasing the risk of tumours and diseases such as cancer. Our product is a solution to the ever-growing problem of plastic pollution. We call it the SmartBin. The SmartBin is a cylindrical device which will float just below the surface of the water, able to move with the aid of 4 water thrusters situated on the sides. As it floats, our SmartBin will suck water into itself and pump it out through the bottom. All waste is collected into a reusable filter including microplastics measuring down to 1.5mm. A speaker emitting sound at a frequency of 9 hertz ensures marine life stays away from the SmartBin. Featured along with our product is a smartphone app which will enable the user to designate an area for the SmartBin to cover on a satellite image. The SmartBin will then return to its start position near the shore, configured through the app. As global pressure to tackle water pollution continues to increase, environmental spending increases too. As our product provides an effective solution to this issue, we can seize the opportunity and scale our company. Our product is unparalleled. It can move at a high speed, covering a wide area rather than being restricted to one position. We target not only oceans and sea-shores, but also rivers, lakes, reservoirs and canals, as they are much easier to access and control.

Keywords: water, plastic, pollution, solution, hydroclean, smartbin, cleanup

Procedia PDF Downloads 206
640 Real Time Adaptive Obstacle Avoidance in Dynamic Environments with Different D-S

Authors: Mohammad Javad Mollakazemi, Farhad Asadi

Abstract:

In this paper a real-time obstacle avoidance approach for both autonomous and non-autonomous dynamical systems (DS) is presented. In this approach the original dynamics of the controller which allow us to determine safety margin can be modulated. Different common types of DS increase the robot’s reactiveness in the face of uncertainty in the localization of the obstacle especially when robot moves very fast in changeable complex environments. The method is validated by simulation and influence of different autonomous and non-autonomous DS such as important characteristics of limit cycles and unstable DS. Furthermore, the position of different obstacles in complex environment is explained. Finally, the verification of avoidance trajectories is described through different parameters such as safety factor.

Keywords: limit cycles, nonlinear dynamical system, real time obstacle avoidance, safety margin

Procedia PDF Downloads 444
639 The Use of Authentic Materials in the Chinese Language Classroom

Authors: Yiwen Jin, Jing Xiao, Pinfang Su

Abstract:

The idea of adapting authentic materials in language teaching is from the communicative method in the 1970s. Different from the language in language textbooks, authentic materials is not deliberately written, it is from the native speaker’s real life and contains real information, which can meet social needs. It could improve learners ' interest, create authentic context and improve learners ' communicative competence. Authentic materials play an important role in CFL(Chinese as a foreign language) classroom. Different types of authentic materials can be used in different ways during learning and teaching. Because of the COVID-19 pandemic,a lot of Chinese learners are learning Chinese without the real language environment. Although there are some well-written textbooks, there is a certain distance between textbook language materials and daily life. Learners cannot automatically fill this gap. That is why it is necessary to apply authentic materials as a supplement to the language textbook to create the real context. Chinese teachers around the world are working together, trying to integrate the resources and apply authentic materials through different approach. They apply authentic materials in the form of new textbooks, manuals, apps and short videos they collect and create to help Chinese learning and teaching. A review of previous research on authentic materials and the Chinese teachers’ attempt to adapt it in the classroom are offered in this manuscript.

Keywords: authentic materials, Chinese as a second language, developmental use of digital resources, materials development for language teaching

Procedia PDF Downloads 176
638 Inverse Heat Conduction Analysis of Cooling on Run-Out Tables

Authors: M. S. Gadala, Khaled Ahmed, Elasadig Mahdi

Abstract:

In this paper, we introduced a gradient-based inverse solver to obtain the missing boundary conditions based on the readings of internal thermocouples. The results show that the method is very sensitive to measurement errors, and becomes unstable when small time steps are used. The artificial neural networks are shown to be capable of capturing the whole thermal history on the run-out table, but are not very effective in restoring the detailed behavior of the boundary conditions. Also, they behave poorly in nonlinear cases and where the boundary condition profile is different. GA and PSO are more effective in finding a detailed representation of the time-varying boundary conditions, as well as in nonlinear cases. However, their convergence takes longer. A variation of the basic PSO, called CRPSO, showed the best performance among the three versions. Also, PSO proved to be effective in handling noisy data, especially when its performance parameters were tuned. An increase in the self-confidence parameter was also found to be effective, as it increased the global search capabilities of the algorithm. RPSO was the most effective variation in dealing with noise, closely followed by CRPSO. The latter variation is recommended for inverse heat conduction problems, as it combines the efficiency and effectiveness required by these problems.

Keywords: inverse analysis, function specification, neural net works, particle swarm, run-out table

Procedia PDF Downloads 241
637 Wheel Diameter and Width Influence in Variability of Brake Data Measurement at Ministry of Transport Facilities

Authors: Carolina Senabre, Sergio Valero, Emilio Velasco

Abstract:

The brake systems of vehicles are tested periodically by a “brake tester” at Ministry of Transport (MOT) stations. This tester measures the effectiveness of vehicle. This parameter is established by the International Committee of Vehicle Inspection (CITA). In this paper, we present an investigation of the influence of the tire size on the measurements of brake force on three MOT brake testers. We performed an analysis of the vehicle braking capacity test at MOT stations. The influence of varying wheel diameter and width on the measurement of braking at MOT stations has been analyzed. Thereby, the MOT brake tester as a verification system for a vehicle has been evaluated.

Keywords: brake tester, ministry of transport facilities, wheel diameter, efficiency

Procedia PDF Downloads 376
636 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 437
635 Facial Recognition of University Entrance Exam Candidates using FaceMatch Software in Iran

Authors: Mahshid Arabi

Abstract:

In recent years, remarkable advancements in the fields of artificial intelligence and machine learning have led to the development of facial recognition technologies. These technologies are now employed in a wide range of applications, including security, surveillance, healthcare, and education. In the field of education, the identification of university entrance exam candidates has been one of the fundamental challenges. Traditional methods such as using ID cards and handwritten signatures are not only inefficient and prone to fraud but also susceptible to errors. In this context, utilizing advanced technologies like facial recognition can be an effective and efficient solution to increase the accuracy and reliability of identity verification in entrance exams. This article examines the use of FaceMatch software for recognizing the faces of university entrance exam candidates in Iran. The main objective of this research is to evaluate the efficiency and accuracy of FaceMatch software in identifying university entrance exam candidates to prevent fraud and ensure the authenticity of individuals' identities. Additionally, this research investigates the advantages and challenges of using this technology in Iran's educational systems. This research was conducted using an experimental method and random sampling. In this study, 1000 university entrance exam candidates in Iran were selected as samples. The facial images of these candidates were processed and analyzed using FaceMatch software. The software's accuracy and efficiency were evaluated using various metrics, including accuracy rate, error rate, and processing time. The research results indicated that FaceMatch software could accurately identify candidates with a precision of 98.5%. The software's error rate was less than 1.5%, demonstrating its high efficiency in facial recognition. Additionally, the average processing time for each candidate's image was less than 2 seconds, indicating the software's high efficiency. Statistical evaluation of the results using precise statistical tests, including analysis of variance (ANOVA) and t-test, showed that the observed differences were significant, and the software's accuracy in identity verification is high. The findings of this research suggest that FaceMatch software can be effectively used as a tool for identifying university entrance exam candidates in Iran. This technology not only enhances security and prevents fraud but also simplifies and streamlines the exam administration process. However, challenges such as preserving candidates' privacy and the costs of implementation must also be considered. The use of facial recognition technology with FaceMatch software in Iran's educational systems can be an effective solution for preventing fraud and ensuring the authenticity of university entrance exam candidates' identities. Given the promising results of this research, it is recommended that this technology be more widely implemented and utilized in the country's educational systems.

Keywords: facial recognition, FaceMatch software, Iran, university entrance exam

Procedia PDF Downloads 49
634 The Analysis of TRACE/PARCS in the Simulation of Ultimate Response Guideline for Lungmen ABWR

Authors: J. R. Wang, W. Y. Li, H. T. Lin, B. H. Lee, C. Shih, S. W. Chen

Abstract:

In this research, the TRACE/PARCS model of Lungmen ABWR has been developed for verification of ultimate response guideline (URG) efficiency. This ultimate measure was named as DIVing plan, abbreviated from system depressurization, water injection and containment venting. The simulation initial condition is 100% rated power/100% rated core flow. This research focuses on the estimation of the time when the fuel might be damaged with no water injection by using TRACE/PARCS first. Then, the effect of the reactor core isolation system (RCIC), control depressurization and ac-independent water addition system (ACIWA), which can provide the injection with 950 gpm are also estimated for the station blackout (SBO) transient.

Keywords: ABWR, TRACE, safety analysis, PARCS

Procedia PDF Downloads 455
633 A Study on the Effectiveness of Translanguaging in EFL Classrooms: The Case of First-year Japanese University Students

Authors: Malainine Ebnou

Abstract:

This study investigates the effectiveness of using translanguaging techniques in EFL classrooms. The interest in this topic stems from the lack of research on the effectiveness of translanguaging techniques in foreign language learning, both domestically in Japan and globally, as research has focused on translanguaging from a teaching perspective but not much on it from a learning perspective. The main question that the study departs from is whether students’ use of translanguaging techniques can produce better learning outcomes when used at the university level. The sample population of the study is first-year Japanese university students. The study takes an experimental approach where translanguaging is introduced to one group, the experimental group, and withheld from another group, the control group. Both groups will then be assessed and compared to see if the use of translanguaging has had a positive impact on learning. The impact of the research could be in three ways: challenging the prevailing argument that using learners' mother tongue in the classroom is detrimental to the learning process, challenging native speaker-centered approaches in the EFL field, and arguing that translanguaging in EFL classrooms can produce more meaningful learning outcomes. If the effectiveness of translanguaging is confirmed, it will be possible to promote the use of translanguaging in English learning at Japanese universities and contribute to the improvement of students' English, and even lay the foundations for extending the use of translanguaging to people of other ages/nationalities and other languages in the future.

Keywords: translanguaging, EFL, language learning and teaching, applied linguistics

Procedia PDF Downloads 58
632 The Suffering Other and the Deserving Self; When Humanitarianism Intersects with Individualism and Neo-Liberalism

Authors: Irene Bruna Seu

Abstract:

This paper draws on a three-year research project investigating everyday moral reasoning in relation to donations and prosocial behaviour in the humanitarian context. The analysis focuses on the principle of deservingness by which members of the public decide who and under which conditions to help and illustrates how the speakers engage in ideological dilemmas. The paper focuses on the theme ‘Something for nothing’ to examine how the position of ‘deserving’ and the speaker’s rights and duties in relation to victims of humanitarian crises are negotiated. Discursive analyses of this dilemmatic storyline of deservingness illuminate the cultural and ideological resources buttressing this construction. They also illustrate how humanitarianism intersects and clashes with other ideologies and value systems. The presentation will focus on the role of Individualism underpinned by Neo-liberalism ideology. The data propose that neo-liberal ideology, which endorses self-gratification, materialistic and individualistic ethics play an important role in decisions regarding humanitarian helping. The paper argues for the need for psychological research to engage more actively with the dilemmatic nature of moral reasoning in the humanitarian context, and to contextualize decisions about giving and helping within the socio-cultural and ideological landscape in which the helpers operate.

Keywords: humanitarianism, individualism, ideological dilemmas, discourse, neo-liberalism, prosocial behaviour

Procedia PDF Downloads 215
631 Computer Aided Assembly Attributes Retrieval Methods for Automated Assembly Sequence Generation

Authors: M. V. A. Raju Bahubalendruni, Bibhuti Bhusan Biswal, B. B. V. L. Deepak

Abstract:

Achieving an appropriate assembly sequence needs deep verification for its physical feasibility. For this purpose, industrial engineers use several assembly predicates; namely, liaison, geometric feasibility, stability and mechanical feasibility. However, testing an assembly sequence for these predicates requires huge assembly information. Extracting such assembly information from an assembled product is a time consuming and highly skillful task with complex reasoning methods. In this paper, computer aided methods are proposed to extract all the necessary assembly information from computer aided design (CAD) environment in order to perform the assembly sequence planning efficiently. These methods use preliminary capabilities of three-dimensional solid modelling and assembly modelling methods used in CAD software considering equilibrium laws of physical bodies.

Keywords: assembly automation, assembly attributes, assembly, CAD

Procedia PDF Downloads 305
630 The Concept and Practice of Good Governance in the European Union

Authors: Robert Grzeszczak

Abstract:

The article deals with one of the most significant issues concerning the functioning of the public sector in the European Union. The objectives of good governance were formulated by the EU itself and also the Scholars in reaction to the discussion that started a decade ago and concerned the role of the government in 21st century, the future of integration processes and globalization challenges in Europe. Currently, the concept of good governance is mainly associated with the improvement of management of public policies in the European Union, concerning both domestic and EU policies. However, it goes beyond the issues of state capacity and effectiveness of management. Good governance relates also to societal participation in the public administration and verification of decisions made in public authorities’ (including public administration). Indirectly, the concept and practice of good governance are connected to societal legitimisation of public bodies in the European Union.

Keywords: good governance, government, European law, European Union

Procedia PDF Downloads 562
629 A Comparative Case Study on Teaching Romanian Language to Foreign Students: Swedes in Lund versus Arabs in Alba Iulia

Authors: Lucian Vasile Bagiu, Paraschiva Bagiu

Abstract:

The study is a contrastive essay on language acquisition and learning and follows the outcomes of teaching Romanian language to foreign students both at Lund University, Sweden (from 2014 to 2017) and at '1 Decembrie 1918' University in Alba Iulia, Romania (2017-2018). Having employed the same teaching methodology (on campus, same curricula) for the same level of study (beginners’ level: A1-A2), the essay focuses on the written exam at the end of the semester. The study argues on grammar exercises concerned with: the indefinite and the definite article; the conjugation of verbs in the present indicative; the possessive; verbs in the past tense; the subjunctive; the degrees of comparison for adjectives. Identifying similar errors when solving identical grammar exercises by different groups of foreign students is an opportunity to emphasize the major challenges any foreigner has to face and overcome when trying to acquire Romanian language. The conclusion draws attention to the complexity of the morphology of Romanian language in several key elements which may be insurmountable for a foreign speaker no matter if the language acquisition takes place in a foreign country or a Romanian university.

Keywords: Arab students, morphological errors, Romanian language, Swedish students, written exam

Procedia PDF Downloads 260