Search results for: word vectors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1053

Search results for: word vectors

603 The Cultural and Semantic Danger of English Transparent Words Translated from English into Arabic

Authors: Abdullah Khuwaileh

Abstract:

While teaching and translating vocabulary is no longer a neglected area in ELT in general and in translation in particular, the psychology of its acquisition has been a neglected area. Our paper aims at exploring some of the learning and translating conditions under which vocabulary is acquired and translated properly. To achieve this objective, two teaching methods (experiments) were applied on 4 translators to measure their acquisition of a number of transparent vocabulary items. Some of these items were knowingly chosen from 'deceptively transparent words'. All the data, sample, etc., were taken from Jordan University of Science and Technology (JUST) and Yarmouk University, where the researcher is employed. The study showed that translators might translate transparent words inaccurately, particularly if these words are uncontextualised. It was also shown that the morphological structures of words may lead translators or even EFL learners to misinterpretations of meaning.

Keywords: english, transparent, word, processing, translation

Procedia PDF Downloads 70
602 A Graph-Based Retrieval Model for Passage Search

Authors: Junjie Zhong, Kai Hong, Lei Wang

Abstract:

Passage Retrieval (PR) plays an important role in many Natural Language Processing (NLP) tasks. Traditional efficient retrieval models relying on exact term-matching, such as TF-IDF or BM25, have nowadays been exceeded by pre-trained language models which match by semantics. Though they gain effectiveness, deep language models often require large memory as well as time cost. To tackle the trade-off between efficiency and effectiveness in PR, this paper proposes Graph Passage Retriever (GraphPR), a graph-based model inspired by the development of graph learning techniques. Different from existing works, GraphPR is end-to-end and integrates both term-matching information and semantics. GraphPR constructs a passage-level graph from BM25 retrieval results and trains a GCN-like model on the graph with graph-based objectives. Passages were regarded as nodes in the constructed graph and were embedded in dense vectors. PR can then be implemented using embeddings and a fast vector-similarity search. Experiments on a variety of real-world retrieval datasets show that the proposed model outperforms related models in several evaluation metrics (e.g., mean reciprocal rank, accuracy, F1-scores) while maintaining a relatively low query latency and memory usage.

Keywords: efficiency, effectiveness, graph learning, language model, passage retrieval, term-matching model

Procedia PDF Downloads 145
601 The Names of the Traditional Motif of Batik Solo

Authors: Annisa D. Febryandini

Abstract:

Batik is a unique cultural heritage that strongly linked with its community. As a product of current culture in Solo, Batik Solo not only has a specific design and color to represent the cultural identity, cultural values, and spirituality of the community, but also has some specific names given by its community which are not arbitrary. This qualitative research paper uses the primary data by interview method as well as the secondary data to support it. Based on the data, this paper concludes that the names consist of a word or words taken from a current name of things in Javanese language. They indicate the cultural meaning such as a specific event, a hope, and the social status of the people who use the motif. Different from the other research, this paper takes a look at the names of traditional motif of Batik Solo which analyzed linguistically to reveal the cultural meaning.

Keywords: traditional motif, Batik, solo, anthropological linguistics

Procedia PDF Downloads 275
600 Automatic Segmentation of the Clean Speech Signal

Authors: M. A. Ben Messaoud, A. Bouzid, N. Ellouze

Abstract:

Speech Segmentation is the measure of the change point detection for partitioning an input speech signal into regions each of which accords to only one speaker. In this paper, we apply two features based on multi-scale product (MP) of the clean speech, namely the spectral centroid of MP, and the zero crossings rate of MP. We focus on multi-scale product analysis as an important tool for segmentation extraction. The multi-scale product is based on making the product of the speech wavelet transform coefficients at three successive dyadic scales. We have evaluated our method on the Keele database. Experimental results show the effectiveness of our method presenting a good performance. It shows that the two simple features can find word boundaries, and extracted the segments of the clean speech.

Keywords: multiscale product, spectral centroid, speech segmentation, zero crossings rate

Procedia PDF Downloads 497
599 Nearest Neighbor Investigate Using R+ Tree

Authors: Rutuja Desai

Abstract:

Search engine is fundamentally a framework used to search the data which is pertinent to the client via WWW. Looking close-by spot identified with the keywords is an imperative concept in developing web advances. For such kind of searching, extent pursuit or closest neighbor is utilized. In range search the forecast is made whether the objects meet to query object. Nearest neighbor is the forecast of the focuses close to the query set by the client. Here, the nearest neighbor methodology is utilized where Data recovery R+ tree is utilized rather than IR2 tree. The disadvantages of IR2 tree is: The false hit number can surpass the limit and the mark in Information Retrieval R-tree must have Voice over IP bit for each one of a kind word in W set is recouped by Data recovery R+ tree. The inquiry is fundamentally subordinate upon the key words and the geometric directions.

Keywords: information retrieval, nearest neighbor search, keyword search, R+ tree

Procedia PDF Downloads 285
598 A Case Study on Quantitatively and Qualitatively Increasing Student Output by Using Available Word Processing Applications to Teach Reluctant Elementary School-Age Writers

Authors: Vivienne Cameron

Abstract:

Background: Between 2010 and 2017, teachers in a suburban public school district struggled to get students to consistently produce adequate writing samples as measured by the Pennsylvania state writing rubric for measuring focus, content, organization, style, and conventions. A common thread in all of the data was the need to develop stamina in the student writers. Method: All of the teachers used the traditional writing process model (prewrite, draft, revise, edit, final copy) during writing instruction. One teacher taught the writing process using word processing and incentivizing with publication instead of the traditional pencil/paper/grading method. Students did not have instruction in typing/keyboarding. The teacher submitted resulting student work to real-life contests, magazines, and publishers. Results: Students in the test group increased both the quantity and quality of their writing over a seven month period as measured by the Pennsylvania state writing rubric. Reluctant writers, as well as students with autism spectrum disorder, benefited from this approach. This outcome was repeated consistently over a five-year period. Interpretation: Removing the burden of pencil and paper allowed students to participate in the writing process more fully. Writing with pencil and paper is physically tiring. Students are discouraged when they submit a draft and are instructed to use the Add, Remove, Move, Substitute (ARMS) method to revise their papers. Each successive version becomes shorter. Allowing students to type their papers frees them to quickly and easily make changes. The result is longer writing pieces in shorter time frames, allowing the teacher to spend more time working on individual needs. With this additional time, the teacher can concentrate on teaching focus, content, organization, style, conventions, and audience. S/he also has a larger body of works from which to work on whole group instruction such as developing effective leads. The teacher submitted the resulting student work to contests, magazines, and publishers. Although time-consuming, the submission process was an invaluable lesson for teaching about audience and tone. All students in the test sample had work accepted for publication. Students became highly motivated to succeed when their work was accepted for publication. This motivation applied to special needs students, regular education students, and gifted students.

Keywords: elementary-age students, reluctant writers, teaching strategies, writing process

Procedia PDF Downloads 175
597 Information Theoretic Approach for Beamforming in Wireless Communications

Authors: Syed Khurram Mahmud, Athar Naveed, Shoaib Arif

Abstract:

Beamforming is a signal processing technique extensively utilized in wireless communications and radars for desired signal intensification and interference signal minimization through spatial selectivity. In this paper, we present a method for calculation of optimal weight vectors for smart antenna array, to achieve a directive pattern during transmission and selective reception in interference prone environment. In proposed scheme, Mutual Information (MI) extrema are evaluated through an energy constrained objective function, which is based on a-priori information of interference source and desired array factor. Signal to Interference plus Noise Ratio (SINR) performance is evaluated for both transmission and reception. In our scheme, MI is presented as an index to identify trade-off between information gain, SINR, illumination time and spatial selectivity in an energy constrained optimization problem. The employed method yields lesser computational complexity, which is presented through comparative analysis with conventional methods in vogue. MI based beamforming offers enhancement of signal integrity in degraded environment while reducing computational intricacy and correlating key performance indicators.

Keywords: beamforming, interference, mutual information, wireless communications

Procedia PDF Downloads 278
596 Analyzing the Construction of Collective Memories by History Movies/TV Programs: Case Study of Masters in the Forbidden City

Authors: Lulu Wang, Yongjun Xu, Xiaoyang Qiao

Abstract:

The Forbidden City is well known for being full of Chinese cultural and historical relics. However, the Masters in the Forbidden City, a documentary film, doesn’t just dwell on the stories of the past. Instead, it focuses on ordinary people—the restorers of the relics and antiquities, which has caught the sight of Chinese audiences. From this popular documentary film, a new way can be considered, that is to show the relics, antiquities and painting with a character of modern humanities by films and TV programs. Of course, it can’t just like a simple explanation from tour guides in museums. It should be a perfect combination of scenes, heritages, stories, storytellers and background music. All we want to do is trying to dig up the humanity behind the heritages and then create a virtual scene for the audience to have emotional resonance from the humanity. It is believed that there are two problems. One is that compared with the entertainment shows, why people prefer to see the boring restoration work. The other is that what the interaction is between those history documentary films, the heritages, the audiences and collective memory. This paper mainly used the methods of text analysis and data analysis. The audiences’ comment texts were collected from all kinds of popular video sites. Through analyzing those texts, there was a word cloud chart about people preferring to use what kind of words to comment the film. Then the usage rate of all comments words was calculated. After that, there was a Radar Chart to show the rank results. Eventually, each of them was given an emotional value classification according their comment tone and content. Based on the above analysis results, an interaction model among the audience, history films/TV programs and the collective memory can be summarized. According to the word cloud chart, people prefer to use such words to comment, including moving, history, love, family, celebrity, tone... From those emotional words, we can see Chinese audience felt so proud and shared the sense of Collective Identity, so they leave such comments: To our great motherland! Chinese traditional culture is really profound! It is found that in the construction of collective memory symbology, the films formed an imaginary system by organizing a ‘personalized audience’. The audience is not just a recipient of information, but a participant of the documentary films and a cooperator of collective memory. At the same time, it is believed that the traditional background music, the spectacular present scenes and the tone of the storytellers/hosts are also important, so it is suggested that the museums could try to cooperate with the producers of movie and TV program to create a vivid scene for the people. Maybe it’s a more artistic way for heritages to be open to all the world.

Keywords: audience, heritages, history movies, TV programs

Procedia PDF Downloads 161
595 E-Learning Approaches Based on Artificial Intelligence Techniques: A Survey

Authors: Nabila Daly, Hamdi Ellouzi, Hela Ltifi

Abstract:

In last year’s, several recent researches’ that focus on e-learning approaches having as goal to improve pedagogy and student’s academy level assessment. E-learning-related works have become an important research file nowadays due to several problems that make it impossible for students join classrooms, especially in last year’s. Among those problems, we note the current epidemic problems in the word case of Covid-19. For those reasons, several e-learning-related works based on Artificial Intelligence techniques are proposed to improve distant education targets. In the current paper, we will present a short survey of the most relevant e-learning based on Artificial Intelligence techniques giving birth to newly developed e-learning tools that rely on new technologies.

Keywords: artificial intelligence techniques, decision, e-learning, support system, survey

Procedia PDF Downloads 221
594 Morphology of Cartographic Words: A Perspective from Chinese Characters

Authors: Xinyu Gong, Zhilin Li, Xintao Liu

Abstract:

Maps are a means of communication. Cartographic language involves established theories of natural language for understanding maps. “Cartographic words’, or “map symbols”, are crucial elements of cartographic language. Personalized mapping is increasingly popular, with growing demands for customized map-making by the general public. Automated symbol-making and customization play a key role in personalized mapping. However, formal representations for the automated construction of map symbols are still lacking. In natural language, the process of word and sentence construction can be formalized. Through the analogy between natural language and graphical language, formal representations of natural language construction can be used as a reference for constructing cartographic language. We selected Chinese character structures (i.e., S

Keywords: personalized mapping, Chinese character, cartographic language, map symbols

Procedia PDF Downloads 172
593 Investigating the Pronunciation of '-S' and '-Ed' Suffixes in Yemeni English

Authors: Saif Bareq, Vivek Mirgane

Abstract:

The present paper seeks to explicate the pronunciation of the ‘-s’ and ‘-ed’ suffixes when applied in their relative places in word endings. It attempts to investigate the problems faced by Yemenis in the pronunciation of these suffixes in all occurrences and realizations. It discusses the realization of ‘s’ in the four areas of plural, 3rd person singular and genitive markers, and contraction of ‘has’ and ‘is’ as in he’s, it’s ..,etc. and shows how they are differently represented by three different sounds /s/, /z/ and /z/ based on the phonological structure of the words in which they occur. Similarly, it explains the realization of the ‘-ed’ suffix of the past and past participle marker and how it is realized differently by three sounds governed by the phonological structure of these words. Besides, it tries to shed some light on the English morphophonemic and phonological rules that govern the pronunciation of such troublesome endings. It is hypothesized that the absence of such phenomenon in the mother tongue pronunciation of these suffixes.

Keywords: Suffixes' Pronunciation, Phonological Structure, Phonological Rules, Morpho-Phonemics, Yemeni English

Procedia PDF Downloads 291
592 Residual Dipolar Couplings in NMR Spectroscopy Using Lanthanide Tags

Authors: Elias Akoury

Abstract:

Nuclear Magnetic Resonance (NMR) spectroscopy is an indispensable technique used in structure determination of small and macromolecules to study their physical properties, elucidation of characteristic interactions, dynamics and thermodynamic processes. Quantum mechanics defines the theoretical description of NMR spectroscopy and treatment of the dynamics of nuclear spin systems. The phenomenon of residual dipolar coupling (RDCs) has become a routine tool for accurate structure determination by providing global orientation information of magnetic dipole-dipole interaction vectors within a common reference frame. This offers accessibility of distance-independent angular information and insights to local relaxation. The measurement of RDCs requires an anisotropic orientation medium for the molecules to partially align along the magnetic field. This can be achieved by introduction of liquid crystals or attaching a paramagnetic center. Although anisotropic paramagnetic tags continue to mark achievements in the biomolecular NMR of large proteins, its application in small organic molecules remains unspread. Here, we propose a strategy for the synthesis of a lanthanide tag and the measurement of RDCs in organic molecules using paramagnetic lanthanide complexes.

Keywords: lanthanide tags, NMR spectroscopy, residual dipolar coupling, quantum mechanics of spin dynamics

Procedia PDF Downloads 187
591 Structures and Analytical Crucibles in Nigerian Indigenous Art Music

Authors: Albert Oluwole Uzodimma Authority

Abstract:

Nigeria is a diverse nation with a rich cultural heritage that has produced numerous art musicians and a vast range of art songs. The compositional styles, tonal rhythm, text rhythm, word painting, and text-tone relationship vary extensively from one dialect to another, indicating the need for standardized tools for the structural and analytical deconstruction of Nigerian indigenous art music. The purpose of this research is to examine the structures of Nigerian indigenous art music and outline some crucibles for analyzing it, by investigating how dialectical inflection influences the choice of text tone, scale mode, tonal rhythm, and the general ambiance of Nigerian art music. The research used a structured questionnaire to collect data from 50 musicologists, out of which 41 responded. The study's focus was on the works of two prominent twentieth-century composers, Stephen Olusoji, and Nwamara Alvan-Ikoku, titled "Oyigiyigi" and "O Chineke, Inozikwa omee," respectively. The data collected was presented in percentages using pie charts and tables. The study shows that in Nigerian Indigenous music, several aspects are to be considered for proper analysis, such as linguistic sensitivity, dialectical inflection influences text-tone relationship, text rhythm and tonal rhythm, which help to convey the proper meanings of messages in songs. It also highlights the lack of standardized rubrics for analysis, which necessitated the proposal of robust criteria for analyzing African music, known as Neo-Eclectic-Crucibles. Hinging on eclectic approach, this research makes significant contributions to music scholarship by addressing the need for standardized tools and crucibles for the structural and analytical deconstruction of Nigerian indigenous art music. It provides a template for further studies leading to standardized rubrics for analyzing African music. This research collected data through a structured questionnaire and analyzed it using pie charts and tables to present the findings accurately. The analysis focused on the respondents' perspectives on the research objectives and structural analysis of two indigenous music compositions by Olusoji and Nwamara. This research answers the questions on the structures and analytical crucibles used in Nigerian indigenous art music, how dialectical inflection influences text-tone relationship, scale mode, tonal rhythm, and the general ambiance of Nigerian art music. This paper demonstrates the need for standardized tools and crucibles for the structural and analytical deconstruction of Nigerian indigenous art music. It highlights several aspects that are crucial to analyzing Nigerian indigenous music and proposes the Neo-Eclectic-Crucibles criteria for analyzing African music. The contribution of this research to music scholarship is significant, providing a template for further studies and research in the field.

Keywords: art-music, crucibles, dialectical inflections, indigenous, text-tone, tonal rhythm, word-painting

Procedia PDF Downloads 99
590 Recognition of Cursive Arabic Handwritten Text Using Embedded Training Based on Hidden Markov Models (HMMs)

Authors: Rabi Mouhcine, Amrouch Mustapha, Mahani Zouhir, Mammass Driss

Abstract:

In this paper, we present a system for offline recognition cursive Arabic handwritten text based on Hidden Markov Models (HMMs). The system is analytical without explicit segmentation used embedded training to perform and enhance the character models. Extraction features preceded by baseline estimation are statistical and geometric to integrate both the peculiarities of the text and the pixel distribution characteristics in the word image. These features are modelled using hidden Markov models and trained by embedded training. The experiments on images of the benchmark IFN/ENIT database show that the proposed system improves recognition.

Keywords: recognition, handwriting, Arabic text, HMMs, embedded training

Procedia PDF Downloads 352
589 Personal Information Classification Based on Deep Learning in Automatic Form Filling System

Authors: Shunzuo Wu, Xudong Luo, Yuanxiu Liao

Abstract:

Recently, the rapid development of deep learning makes artificial intelligence (AI) penetrate into many fields, replacing manual work there. In particular, AI systems also become a research focus in the field of automatic office. To meet real needs in automatic officiating, in this paper we develop an automatic form filling system. Specifically, it uses two classical neural network models and several word embedding models to classify various relevant information elicited from the Internet. When training the neural network models, we use less noisy and balanced data for training. We conduct a series of experiments to test my systems and the results show that our system can achieve better classification results.

Keywords: artificial intelligence and office, NLP, deep learning, text classification

Procedia PDF Downloads 198
588 Rating the Importance of Customer Requirements for Green Product Using Analytic Hierarchy Process Methodology

Authors: Lara F. Horani, Shurong Tong

Abstract:

Identification of customer requirements and their preferences are the starting points in the process of product design. Most of design methodologies focus on traditional requirements. But in the previous decade, the green products and the environment requirements have increasingly attracted the attention with the constant increase in the level of consumer awareness towards environmental problems (such as green-house effect, global warming, pollution and energy crisis, and waste management). Determining the importance weights for the customer requirements is an essential and crucial process. This paper used the analytic hierarchy process (AHP) approach to evaluate and rate the customer requirements for green products. With respect to the ultimate goal of customer satisfaction, surveys are conducted using a five-point scale analysis. With the help of this scale, one can derive the weight vectors. This approach can improve the imprecise ranking of customer requirements inherited from studies based on the conventional AHP. Furthermore, the AHP with extent analysis is simple and easy to implement to prioritize customer requirements. The research is based on collected data through a questionnaire survey conducted over a sample of 160 people belonging to different age, marital status, education and income groups in order to identify the customer preferences for green product requirements.

Keywords: analytic hierarchy process (AHP), green product, customer requirements for green design, importance weights for the customer requirements

Procedia PDF Downloads 241
587 Study on the Incidence of Chikungunya Infection in Swat Region

Authors: Nasib Zaman, Maneesha Kour, Muhammad Rizwan, Fazal Akbar

Abstract:

Abstract: Chikungunya fever is a re-emerging rapidly spreading mosquito-borne disease cause by Aedes albopictus and Aedes aegypti mosquito vectors. Currently, it is affecting millions of people globally. Objective: This study's main objective was to find the incidence of chikungunya fever in the Swat region and the factors associated with the spread of this infection. Method: This study was carried out in different areas of Swat. Blood samples and data were collected from selected patients, and a questionnaire was filled for each patient. 3-5ml of the specimen was taken from the patient's vein and serum, or plasma was separated by centrifugation. Chikungunya tests were performed for IgG and IgM antibodies. The data was analyzed by SPSS and Graph Paid Prism 5. Results: A total of 169 patients were included in this study, out of which 103 (60.9%) having age less than 30 years were positive for chikungunya infection and 66 (39.1%) having more than 30 years were negative for this infection. Only 1 (0.6%) were positive for both IgG and IgM antibody. About 15 (8.9%) patients have diagnosed with positive IgG antibodies, and 25 (26.6%) patients were positive for IgM positive antibodies. The infection rate was significantly higher in males compared to females 71 (59.6%) vs. 14 (38%) P value=0.088, OR=1.7. Conclusion: This study concludes clinical knowledge and awareness that are necessary for a diagnosis of chikungunya infection properly. Therefore it is important to educate people for the eradication of this infection. Recommendation: This study also recommends investigating the other risk factors associated with this infection.

Keywords: Chikungunya, risk factor, Incidence, antibodies, mosquito

Procedia PDF Downloads 127
586 Laboratory Evaluation of Bacillus subtilis Bioactivity on Musca domestica (Linn) (Diptera: Muscidae) Larvae from Poultry Farms in South Western Nigeria

Authors: Funmilola O. Omoya

Abstract:

Muscid flies are known to be vectors of disease agents and species that annoy humans and domesticated animals. An example of these flies is Musca domestica (house fly) whose adult and immature stages occur in a variety of filthy organic substances including household garbage and animal manures. They contribute to microbial contamination of foods. It is therefore imperative to control these flies as a result of their role in Public health. The second and third instars of Musca domestica (Linn) were infected with varying cell loads of Bacillus subtilis in vitro for a period of 48 hours to evaluate its larvicidal activities. Mortality of the larvae increased with incubation period after treatment with the varying cell loads. Investigation revealed that the second instars larvae were more susceptible to treatment than the third instars treatments. Values obtained from the third instar group were significantly different (P0.05) from those obtained from the second instars group in all the treatments. Lethal concentration (LC50) at 24 hours for 2nd instars was 2.35 while LC50 at 48 hours was 4.31.This study revealed that Bacillus subtilis possess good larvicidal potential for use in the control of Musca domestica in poultry farms.

Keywords: Bacillus subtilis, Musca domestica, larvicidal activities, poultry farms

Procedia PDF Downloads 425
585 Impact of Electronic Guest Relationship Management (e-GRM) on Brand Loyalty: The Case of Croatian Hotels

Authors: Marina Laškarin, Vlado Galičić

Abstract:

Quick adoption of e-business and emerging influence of “Electronic Word of Mouth e-WOM” communication on guests made leading hotel brands successful examples of electronic guest relationship management. Main reasons behind such success are well established procedures in collection, analysis and usage of highly valuable data available on the Internet, generated through some form of e-GRM programme. E-GRM is more than just a technology solution. It’s a system which balance respective guest demands, hotel technological capabilities and organizational culture of employees, discharging the universal approach in guest relations “same for all”. The purpose of this research derives from the necessity of determining the importance of monitoring and applying e-WOM communication as one of the methods used in managing guest relations. This paper analyses and compares different hotelier’s opinions on e-WOM communication.

Keywords: brand loyalty, e-WOM communication, GRM programmes, organizational culture

Procedia PDF Downloads 289
584 The Audit Quality Effects on Reputation of the Certified Public Accountants in Thailand

Authors: Prateep Wajeetongratana

Abstract:

This research aims to study the audit quality that affected to the reputation of the certified public accountants in Thailand. The researcher defined the population for this research as a group of the certified public accountants in Thailand who are the member of the federation of accounting professions under the royal patronage of his majesty the king also disclose their information .The total sampling size is 325. The results showed the audit quality factor has influence to the reputation of the certified public accountants in Thailand by accuracy auditing, objectiveness auditing and clearness auditing .These factors show by y1 = 1.381 + .372x1.1 + .309x1.2 + .305x1.3 can be describe as professional standard strictly factor (Y.1.1) and the new clients raised from word of mount of old clients regularly factor (Y.1.2) by regression coefficient (R2) as.242, this shows that such variables could predict the audit quality variable as 24.2 percent.

Keywords: audit quality, certified public accountants in Thailand, reputation

Procedia PDF Downloads 257
583 Hardware Implementation on Field Programmable Gate Array of Two-Stage Algorithm for Rough Set Reduct Generation

Authors: Tomasz Grzes, Maciej Kopczynski, Jaroslaw Stepaniuk

Abstract:

The rough sets theory developed by Prof. Z. Pawlak is one of the tools that can be used in the intelligent systems for data analysis and processing. Banking, medicine, image recognition and security are among the possible fields of utilization. In all these fields, the amount of the collected data is increasing quickly, but with the increase of the data, the computation speed becomes the critical factor. Data reduction is one of the solutions to this problem. Removing the redundancy in the rough sets can be achieved with the reduct. A lot of algorithms of generating the reduct were developed, but most of them are only software implementations, therefore have many limitations. Microprocessor uses the fixed word length, consumes a lot of time for either fetching as well as processing of the instruction and data; consequently, the software based implementations are relatively slow. Hardware systems don’t have these limitations and can process the data faster than a software. Reduct is the subset of the decision attributes that provides the discernibility of the objects. For the given decision table there can be more than one reduct. Core is the set of all indispensable condition attributes. None of its elements can be removed without affecting the classification power of all condition attributes. Moreover, every reduct consists of all the attributes from the core. In this paper, the hardware implementation of the two-stage greedy algorithm to find the one reduct is presented. The decision table is used as an input. Output of the algorithm is the superreduct which is the reduct with some additional removable attributes. First stage of the algorithm is calculating the core using the discernibility matrix. Second stage is generating the superreduct by enriching the core with the most common attributes, i.e., attributes that are more frequent in the decision table. Described above algorithm has two disadvantages: i) generating the superreduct instead of reduct, ii) additional first stage may be unnecessary if the core is empty. But for the systems focused on the fast computation of the reduct the first disadvantage is not the key problem. The core calculation can be achieved with a combinational logic block, and thus add respectively little time to the whole process. Algorithm presented in this paper was implemented in Field Programmable Gate Array (FPGA) as a digital device consisting of blocks that process the data in a single step. Calculating the core is done by the comparators connected to the block called 'singleton detector', which detects if the input word contains only single 'one'. Calculating the number of occurrences of the attribute is performed in the combinational block made up of the cascade of the adders. The superreduct generation process is iterative and thus needs the sequential circuit for controlling the calculations. For the research purpose, the algorithm was also implemented in C language and run on a PC. The times of execution of the reduct calculation in a hardware and software were considered. Results show increase in the speed of data processing.

Keywords: data reduction, digital systems design, field programmable gate array (FPGA), reduct, rough set

Procedia PDF Downloads 218
582 The Destruction of Confucianism and Socialism in Chinese Popular Comedy Films

Authors: Shu Hui

Abstract:

Since 2010, the genre of comedy became predominant in film market in China. However, compared with the huge commercial success, these films received severe public criticism. These films are referred as trash (lan pian) by the public because of the fragment narrative, the non-professional photographing and advocating money warship. The paper aims to explain the contradictive phenomena between the higher box office and the lower mouth of word within hegemony theory. Four popular comedies that ranked top 20 in domestic revenue in the year the film released will be chosen to analyze their popularity in general. Differing from other popular films, these comedies’ popularity is generated from their disruptive pleasures instead of good stories or photographing. The destruction in Confucianism and socialism formulated the public consent or popularity, and caused the public criticism as well. Moreover, the happy-endings restore the normality at the superficial level.

Keywords: Confucianism, destruction, reconcilation, socialism

Procedia PDF Downloads 130
581 Comparison between Separable and Irreducible Goppa Code in McEliece Cryptosystem

Authors: Newroz Nooralddin Abdulrazaq, Thuraya Mahmood Qaradaghi

Abstract:

The McEliece cryptosystem is an asymmetric type of cryptography based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, and 101], but it is suffering from large public key matrix which leads to be difficult to be used practically. In this work Irreducible and Separable Goppa codes have been introduced. The Irreducible and Separable Goppa codes used are with flexible parameters and dynamic error vectors. A Comparison between Separable and Irreducible Goppa code in McEliece Cryptosystem has been done. For encryption stage, to get better result for comparison, two types of testing have been chosen; in the first one the random message is constant while the parameters of Goppa code have been changed. But for the second test, the parameters of Goppa code are constant (m=8 and t=10) while the random message have been changed. The results show that the time needed to calculate parity check matrix in separable are higher than the one for irreducible McEliece cryptosystem, which is considered expected results due to calculate extra parity check matrix in decryption process for g2(z) in separable type, and the time needed to execute error locator in decryption stage in separable type is better than the time needed to calculate it in irreducible type. The proposed implementation has been done by Visual studio C#.

Keywords: McEliece cryptosystem, Goppa code, separable, irreducible

Procedia PDF Downloads 264
580 Extracting Actions with Improved Part of Speech Tagging for Social Networking Texts

Authors: Yassine Jamoussi, Ameni Youssfi, Henda Ben Ghezala

Abstract:

With the growing interest in social networking, the interaction of social actors evolved to a source of knowledge in which it becomes possible to perform context aware-reasoning. The information extraction from social networking especially Twitter and Facebook is one of the problems in this area. To extract text from social networking, we need several lexical features and large scale word clustering. We attempt to expand existing tokenizer and to develop our own tagger in order to support the incorrect words currently in existence in Facebook and Twitter. Our goal in this work is to benefit from the lexical features developed for Twitter and online conversational text in previous works, and to develop an extraction model for constructing a huge knowledge based on actions

Keywords: social networking, information extraction, part-of-speech tagging, natural language processing

Procedia PDF Downloads 303
579 Transparency in Politics: Evaluation Rules and Principles

Authors: Stylianos Galoukas

Abstract:

since the eve of human societies, the need for survival and covering even the most basic needs such as hunting for food, led to the realization of the need for regulation between the personal and common interest. This led to the establishment of initially unwritten and later on, written rules which then became the Law. Transparency as a word has been used for more than 2.500 years. Born in ancient Greece around the 5th BC century and although it was not originally correlated to political or public administration acts, its enclosed principles and rules, were given even then, great attention. In today’s times of fake news and meta-politics, transparency has greatly correlated with the fight against corruption especially in the financially related matters. It is believed however that transparency, being a much wider than corruption meaning, has an even greater role to play than the corruption counterpart. It can be further used to unveil or examine the genuineness of the will towards the public interest, behind every public policy or political act. Therefore, herein the timeless and fundamental principles of institutional and public administration transparency are made clear as well as their application rules that can and ought to be used as evaluation criteria.

Keywords: evaluation citeria, policies, politics, principles, rules, transparency

Procedia PDF Downloads 197
578 Augmented Tourism: Definitions and Design Principles

Authors: Eric Hawkinson

Abstract:

After designing and implementing several iterations of implementations of augmented reality (AR) in tourism, this paper takes a deep look into design principles and implementation strategies of using AR at destination tourism settings. The study looks to define augmented tourism from past implementations as well as several cases, uses designed and implemented for tourism. The discussion leads to formation of frameworks and best practices for AR as well as virtual reality( VR) to be used in tourism settings. Some main affordances include guest autonomy, customized experiences, visitor data collection and increased electronic word-of-mouth generation for promotion purposes. Some challenges found include the need for high levels of technology infrastructure, low adoption rates or ‘buy-in’ rates, high levels of calibration and customization, and the need for maintenance and support services. Some suggestions are given as to how to leverage the affordances and meet the challenges of implementing AR for tourism.

Keywords: augmented tourism, augmented reality, eTourism, virtual tourism, tourism design

Procedia PDF Downloads 368
577 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 319
576 Defining Polysubstance Use in Adolescents: A Literary Review

Authors: Cailyn Green

Abstract:

This research investigated the lack of standardization that exists in the field of polysubstance use. This standardization has to do with a uniform way of defining when and if polysubstance is taking place. This research is important to the field of substance abuse as it makes future researchers aware of this lack of uniformity in a commonly used word in the field. By investigating, we make researchers aware of these discrepancies to encourage a uniform definition to be created and used. The methodology for this research was a literary review. This literature review consisted of four peer-reviewed and published journal articles in four different journals. These articles focused on adolescents and their polysubstance use. The research question asked what time frame was used to determine if a client's substance use can be classified as polysubstance use when they reported using two or more substances. The results identify that there is no uniform working definition of the time frame for polysubstance to take place.

Keywords: addiction, adolescence, literary review, polysubstance

Procedia PDF Downloads 85
575 Propellant Less Propulsion System Using Microwave Thrusters

Authors: D. Pradeep Mitra, Prafulla

Abstract:

Looking to the word propellant-less system it makes us to believe that it is an impossible one, but this paper demonstrates the use of microwaves to create a system which makes impossible to be possible, it means a propellant-less propulsion system using microwaves. In these thrusters, microwaves are radiated into a sealed parabolic cavity through a waveguide, which act on the surface of the cavity and follow the axis of the thrusters to produce thrust. The advantages of these thrusters are: (1) Producing thrust without propellant; without erosion, wear, and thermal stress from the hot exhaust gas; and at the same time increasing quality. (2) If the microwave output power is stable, the performance of thrusters is not affected by its working environment. This paper is demonstrated from general maxwell equations. These equations are used to create the mathematical model of the thrusters. These mathematical model helps us to calculate the Q factor and calculate the approximate thrust which would be generated in the system.

Keywords: propellant less, microwaves, parabolic wave guide, propulsion system

Procedia PDF Downloads 379
574 Design of a Recombinant Expression System for Bacterial Cellulose Production

Authors: Gizem Buldum, Alexander Bismarck, Athanasios Mantalaris

Abstract:

Cellulose is the most abundant biopolymer on earth and it is currently being utilised in a multitude of industrial applications. Over the last 30 years, attention has been paid to the bacterial cellulose (BC), since BC exhibits unique physical, chemical and mechanical properties when compared to plant-based cellulose, including high purity and biocompatibility. Although Acetobacter xylinum is the most efficient producer of BC, it’s long doubling time results in insufficient yields of the cellulose production. This limits widespread and continued use of BC. In this study, E. coli BL21 (DE3) or E. coli HMS cells are selected as host organisms for the expression of bacterial cellulose synthase operon (bcs) of A.xylinum. The expression system is created based on pET-Duet1 and pCDF plasmid vectors, which carry bcs operon. The results showed that all bcs genes were successfully transferred and expressed in E.coli strains. The expressions of bcs proteins were shown by SDS and Native page analyses. The functionality of the bcs operon was proved by congo red binding assay. The effect of culturing temperature and the inducer concentration (IPTG) on cell growth and plasmid stability were monitored. The percentage of plasmid harboring cells induced with 0.025 mM IPTG was obtained as 85% at 22˚C in the end of 10-hr culturing period. It was confirmed that the high output cellulose production machinery of A.xylinum can be transferred into other organisms.

Keywords: bacterial cellulose, biopolymer, recombinant expression system, production

Procedia PDF Downloads 399