Search results for: noisy forensic speaker verification
598 Evaluation of the Relations between Childhood Trauma and Dissociative Experiences, Self-Perception, and Early Maladaptive Schemes in Sexual Assault Convicts
Authors: Safak Akdemir
Abstract:
The main purpose of this research is to evaluate the relationships between childhood traumas and dissociative experiences, self-perceptions and early maladaptive schemas in male convicts convicted of sexual assault crimes in prison. In our study, male convicts in prison for the crime of sexual assault constitute the experimental group, and the participants matched with this experimental group in terms of education, age and gender constitute the control group. The experimental group of the research consists of 189 male individuals who are convicted in the Ministry of Justice, General Directorate of Prisons, Istanbul/Maltepe L Type Closed Prison. The control group of this study consists of 147 adult males matched with the experimental group in terms of age, gender and education parameters. A total of 336 adult male individuals are included in the sample of this study. 46% of the experimental group were convicted of only sexual assault, 54% of them were convicted of both sexual assault and murder, injury and drug crimes. Total of five data collection tools, namely the Personal Information Form created by S. A. & E. O., Childhood Trauma Questionnaire (CTQ), the Dissociative Experiences Scale (DES), the Rosenberg Self-Esteem Scale (RSES), and the Young Schema Questionnaire-Short Form (YSQ-SF3), were completed. DES cut-off score of 99 (52.39%) of 189 convicts in the experimental group and 12 (8.17%) of 147 people in the control group was found to be 30 and above, and this result indicates the presence of pathological dissociative experiences. 180 (95.23%) of the sexual assault convicts in the experimental group had at least one childhood trauma, 154 (81.48%) were emotional neglect, 140 (74.07%) were emotional abuse, 121 (64.02%) were physical neglect, 91 (4814%) physical abuse and 70 (37.03%) sexual abuse. 168 (88.88%) of the experimental group reported multiple type of trauma and 12 (6.34%) reported single type of trauma. While the childhood traumas, isolation, abandonment and emotional deprivation schema levels of the convicts with a DES cut-off score of 30 and above are higher than the convicts with a DES cut-off score of 30 and above, their self-esteem is lower than this group. Experimental group while childhood traumas, dissociative experiences and early maladaptive schemas are higher than the control group, their self-esteem levels are lower. Dissociative experiences, abandonment and emotional deprivation early maladaptive schemas are more common in convicts aged between 18-30 years compared to convicts aged 31 and over. In addition, dissociative experiences and early maladaptive schemas of male convicts who reported physical and sexual abuse were higher than those who did not report physical and sexual abuse, while their self-esteem was at a lower level. As a result, in terms of psychotraumatology and clinical forensic psychology, dissociative disorders developed under the influence of chronic childhood traumas, with clinical interviews and psychometric measurements to be made in terms of forensic psychiatry; it is of fundamental importance to evaluate it in terms of neurosis-psychosis distinction, disability retirement, custody, malpractice, criminal and legal capacity criteria.Keywords: crime, sexual assault, criminology, rape crimes, dissocitative disorders, maladative schemas
Procedia PDF Downloads 72597 Study on Acoustic Source Detection Performance Improvement of Microphone Array Installed on Drones Using Blind Source Separation
Authors: Youngsun Moon, Yeong-Ju Go, Jong-Soo Choi
Abstract:
Most drones that currently have surveillance/reconnaissance missions are basically equipped with optical equipment, but we also need to use a microphone array to estimate the location of the acoustic source. This can provide additional information in the absence of optical equipment. The purpose of this study is to estimate Direction of Arrival (DOA) based on Time Difference of Arrival (TDOA) estimation of the acoustic source in the drone. The problem is that it is impossible to measure the clear target acoustic source because of the drone noise. To overcome this problem is to separate the drone noise and the target acoustic source using Blind Source Separation(BSS) based on Independent Component Analysis(ICA). ICA can be performed assuming that the drone noise and target acoustic source are independent and each signal has non-gaussianity. For maximized non-gaussianity each signal, we use Negentropy and Kurtosis based on probability theory. As a result, we can improve TDOA estimation and DOA estimation of the target source in the noisy environment. We simulated the performance of the DOA algorithm applying BSS algorithm, and demonstrated the simulation through experiment at the anechoic wind tunnel.Keywords: aeroacoustics, acoustic source detection, time difference of arrival, direction of arrival, blind source separation, independent component analysis, drone
Procedia PDF Downloads 164596 Damage Assessment and Repair for Older Brick Buildings
Authors: Tim D. Sass
Abstract:
The experience of engineers and architects practicing today is typically limited to current building code requirements and modern construction methods and materials. However, many cities have a mix of new and old buildings with many buildings constructed over one hundred years ago when building codes and construction methods were much different. When a brick building sustains damage, a structural engineer is often hired to determine the cause of damage as well as determine the necessary repairs. Forensic studies of dozens of brick buildings shows an appreciation of historical building methods and materials is needed to correctly identify the cause of damage and design an appropriate repair. Damage on an older, brick building can be mistakenly attributed to storms or seismic events when the real source of the damage is deficient original construction. Assessing and remediating damaged brickwork on older brick buildings requires an understanding of the original construction, an understanding of older repair methods, and, an understanding of current building code requirements.Keywords: brick, damage, deterioration, facade
Procedia PDF Downloads 228595 Calculation of Stress Intensity Factors in Rotating Disks Containing 3D Semi-Elliptical Cracks
Authors: Mahdi Fakoor, Seyed Mohammad Navid Ghoreishi
Abstract:
Initiation and propagation of cracks may cause catastrophic failures in rotating disks, and hence determination of fracture parameter in rotating disks under the different working condition is very important issue. In this paper, a comprehensive study of stress intensity factors in rotating disks containing 3D semi-elliptical cracks under the different working condition is investigated. In this regard, after verification of modeling and analytical procedure, the effects of mechanical properties, rotational velocity, and orientation of cracks on Stress Intensity Factors (SIF) in rotating disks under centrifugal loading are investigated. Also, the effects of using composite patch in reduction of SIF in rotating disks are studied. By that way, the effects of patching design variables like mechanical properties, thickness, and ply angle are investigated individually.Keywords: stress intensity factor, semi-elliptical crack, rotating disk, finite element analysis (FEA)
Procedia PDF Downloads 367594 Information and Cooperativity in Fiction: The Pragmatics of David Baboulene’s “Knowledge Gaps”
Authors: Cara DiGirolamo
Abstract:
In his 2017 Ph.D. thesis, script doctor David Baboulene presented a theory of fiction in which differences in the knowledge states between participants in a literary experience, including reader, author, and characters, create many story elements, among them suspense, expectations, subtext, theme, metaphor, and allegory. This theory can be adjusted and modeled by incorporating a formal pragmatic approach that understands narrative as a speech act with a conversational function. This approach requires both the Speaker and the Listener to be understood as participants in the discourse. It also uses theories of cooperativity and the QUD to identify the existence of implicit questions. This approach predicts that what an effective literary narrative must do: provide a conversational context early in the story so the reader can engage with the text as a conversational participant. In addition, this model incorporates schema theory. Schema theory is a cognitive model for learning and processing information about the world and transforming it into functional knowledge. Using this approach can extend the QUD model. Instead of describing conversation as a form of information gathering restricted to question-answer sets, the QUD can include knowledge modeling and understanding as a possible outcome of a conversation. With this model, Baboulene’s “Knowledge Gaps” can provide real insight into storytelling as a conversational move, and extend the QUD to be able to simply and effectively apply to a more diverse set of conversational interactions and also to narrative texts.Keywords: literature, speech acts, QUD, literary theory
Procedia PDF Downloads 19593 The Need for Educational Psychology in Teacher Education for Sustainable Transformation and Security in Nigeria
Authors: Kaltume Kabir Sharrif
Abstract:
Teacher education is the bedrock of educational growth and development of any nation. With development in education all human problems can be overcome. Educational Psychology, on the other hand, is in a strategic position for any programme in teacher education to be successful hence other aspects of societal issues. In other words, no teacher education can be of any help in ensuring transformation and security without adequate study in Educational Psychology. Without adequate knowledge and skills in Educational Psychology the teacher may not function effectively in the course of discharging his duty. It is in view of this, that the paper discusses some aspects of Educational Psychology that are of paramount importance in teacher education for sustainable transformation and security of Nigeria. Some recommendations were offered on the role educational psychology play in resolving security challenges facing the country. These include enriching educational psychology with topics from forensic psychology that will provide the teacher the skills of fighting crime in the school, Behavioural Science Unit should be established in each school to monitor the behavior of students, among others.Keywords: transformation, security challenges, teacher education, educational psychology
Procedia PDF Downloads 509592 Automatic Early Breast Cancer Segmentation Enhancement by Image Analysis and Hough Transform
Authors: David Jurado, Carlos Ávila
Abstract:
Detection of early signs of breast cancer development is crucial to quickly diagnose the disease and to define adequate treatment to increase the survival probability of the patient. Computer Aided Detection systems (CADs), along with modern data techniques such as Machine Learning (ML) and Neural Networks (NN), have shown an overall improvement in digital mammography cancer diagnosis, reducing the false positive and false negative rates becoming important tools for the diagnostic evaluations performed by specialized radiologists. However, ML and NN-based algorithms rely on datasets that might bring issues to the segmentation tasks. In the present work, an automatic segmentation and detection algorithm is described. This algorithm uses image processing techniques along with the Hough transform to automatically identify microcalcifications that are highly correlated with breast cancer development in the early stages. Along with image processing, automatic segmentation of high-contrast objects is done using edge extraction and circle Hough transform. This provides the geometrical features needed for an automatic mask design which extracts statistical features of the regions of interest. The results shown in this study prove the potential of this tool for further diagnostics and classification of mammographic images due to the low sensitivity to noisy images and low contrast mammographies.Keywords: breast cancer, segmentation, X-ray imaging, hough transform, image analysis
Procedia PDF Downloads 84591 Immersing Socio-Affective Instruction within the Constructs of the Academic Curriculum: A Study of Gifted and Talented Programs
Authors: R. Granger-Ellis, R. B. Speaker, Jr., P. J. Austin
Abstract:
This research study examined more than 340 gifted and talented students enrolled in various gifted and talented programs in a large southeastern United States metropolitan area (creative arts, urban charters, suburban public schools) for socio-affective psychological development and whether a particular curriculum encouraged developmental growth. This study focused on students receiving distinctive gifted and talented curricula (creative arts, arts-integrated, and academic acceleration) and analyzed for (1) socio-affective development levels and (2) whether a particular curriculum encouraged developmental growth. Research questions guiding the study: (1) How do academically and artistically gifted 10th and 11th grade students perform on psychological scales of social and emotional intelligence? (2) Do adolescents receiving distinctive gifted and talented curriculum differ in their socio-affective developmental profiles? Students’ performances on psychometric scales were compared over time and by curriculum type. Over the first semester of the academic year, participants took pre- and post-tests assessing socio-affective intelligence (BarOn EQ-I: YV). Differences in growth on these psychological scales (individuals and programs) were examined. Program artifacts provided insight for curriculum correlation.Keywords: gifted and talented curriculum, social and emotional development, moral development, socio-affective curriculum
Procedia PDF Downloads 371590 Suitability Verification of Cellulose Nanowhisker as a Scaffold for Bone Tissue Engineering
Authors: Moon Hee Jung, Dae Seung Kim, Sang-Myung Jung, Gwang Heum Yoon, Hoo Cheol Lee, Hwa Sung Shin
Abstract:
Scaffolds are an important part to support growth and differentiation of osteoblast for regeneration of injured bone in bone tissue engineering. We utilized tunicate cellulose nanowhisker (CNW) as scaffold and developed complex system that can enhance differentiation of osteoblast by applying mechanical stimulation. CNW, a crystal form of cellulose, has high stiffness with a large surface area and is useful as a biomedical material due to its biodegradability and biocompatibility. In this study, CNW was obtained from tunicate extraction and was confirmed for its adhesion, differentiation, growth of osteoblast without cytotoxicity. In addition, osteoblast was successfully differentiated under mechanical stimulation, followed by calcium dependent signaling. In conclusion, we verified suitability of CNW as scaffold and possibility of bone substitutes.Keywords: osteoblast, cellulose nanowhisker, CNW, mechanical stimulation, bone tissue engineering, bone substitute
Procedia PDF Downloads 367589 Prioritization of Mutation Test Generation with Centrality Measure
Authors: Supachai Supmak, Yachai Limpiyakorn
Abstract:
Mutation testing can be applied for the quality assessment of test cases. Prioritization of mutation test generation has been a critical element of the industry practice that would contribute to the evaluation of test cases. The industry generally delivers the product under the condition of time to the market and thus, inevitably sacrifices software testing tasks, even though many test cases are required for software verification. This paper presents an approach of applying a social network centrality measure, PageRank, to prioritize mutation test generation. The source code with the highest values of PageRank will be focused first when developing their test cases as these modules are vulnerable to defects or anomalies which may cause the consequent defects in many other associated modules. Moreover, the approach would help identify the reducible test cases in the test suite, still maintaining the same criteria as the original number of test cases.Keywords: software testing, mutation test, network centrality measure, test case prioritization
Procedia PDF Downloads 113588 Cataphora in English and Chinese Conversation: A Corpus-based Contrastive Study
Authors: Jun Gao
Abstract:
This paper combines the corpus-based and contrastive approaches, seeking to provide a systematic account of cataphora in English and Chinese natural conversations. Based on spoken corpus data, the first part of the paper examines a range of characteristics of cataphora in the two languages, including frequency of occurrence, patterns, and syntactic features. On the basis of this exploration, cataphora in the two languages are contrasted in a structured way. The analysis shows that English and Chinese share a similar distribution of cataphora in natural conversations in terms of frequency of occurrence, with repeat identification cataphora higher than first mention cataphora and intra-sentential cataphora much higher than inter-sentential cataphora. In terms of patterns, three types are identified in English, i.e. P+N, Ø+N, and it+Clause, while in Chinese, two types are identified, i.e., P+N and Ø+N. English and Chinese are similar in terms of syntactic features, i.e., cataphor and postcedent in the intra-sentential cataphora mainly occur in the initial subject position of the same clause, with postcedent immediately followed or delayed, and cataphor and postcedent are mostly in adjacent sentences in inter-sentential cataphora. In the second part of the paper, the motivations of cataphora are investigated. It is found that cataphora is primarily motivated by the speaker and hearer’s different knowledge states with regard to the referent. Other factors are also involved, such as interference, word search, and the tension between the principles of Economy and Clarity.Keywords: cataphora, contrastive study, motivation, pattern, syntactic features
Procedia PDF Downloads 82587 Verification of the Effect of the Hazard-Perception Training Tool for Drivers Ported from a Tablet Device to a Smartphone
Authors: K. Shimazaki, M. Mishina, A. Fujii
Abstract:
In a previous study, we developed a hazard-perception training tool for drivers using a tablet device and verified its effectiveness. Accident movies recorded by drive recorders were separated into scenes before and after the collision. The scene before the collision is presented to the driver. The driver then touches the screen to point out where he/she feels danger. After the screen is touched, the tool presents the collision scene and tells the driver if what he/she pointed out is correct. Various effects were observed such as this tool increased the discovery rate of collision targets and reduced the reaction time. In this study, we optimized this tool for the smartphone and verified its effectiveness. Verifying in the same way as in the previous study on tablet devices clarified that the same effect can be obtained on the smartphone screen.Keywords: hazard perception, smartphone, tablet devices, driver education
Procedia PDF Downloads 218586 Analytical Study on the Shape of T-Type Girder Modular Bridge Connection by Using Parametric
Authors: Jongho Park, Jinwoong Choi, Sungnam Hong, Seung-Kyung Kye, Sun-Kyu Park
Abstract:
Recently, to cope with the rapidly changing construction trend because of aging infrastructures, modular bridge technology has been studied actively. Modular bridge is easily constructed by assembling standardized precast structure members in the field. It will be possible to construct rapidly and reduce construction cost efficiently. However, the shape examination of the transverse connection of T-type girder newly developed between the segmented modules is not performed. Therefore, the investigation of the connection shape is needed. In this study, shape of the modular T-girder bridge transverse connection was analyzed by finite element model that was verified in study which was verification of model for transverse connection using Abaqus. Connection angle was chosen as the parameter. The result of analyses showed that optimal value of angle is 130 degree.Keywords: modular bridge, optimal transverse shape, parameter, FEM
Procedia PDF Downloads 651585 Development of the Independent Building Permit System to Improve Productivity and Quality Service
Authors: Hartomo Soewardi, Bachtiar Jouhari
Abstract:
Ineffectiveness and inefficiency of the building permit process in Indonesia still becomes a major problems for people to apply. Long time of service, the complicated administration process, and an expensive fees are a process that causing a dissatisfaction and discomfort for applicant. Therefore, it is critical to improve the quality of service of building permit system. Objectives of this research is to develop a better process of the system to improve productivity and quality service. Lean six sigma concept by using DMAIC procedures was used to analyze the existing system. Moreover, improvement of the system was conducted by using the Axiomatic Design method. Verification test was done to test the hypothesis of the proposed system design. Result of this research shows that proposed system can produce increasing 61.8% of efficiency on service time, and more effective and easier.Keywords: axiomatic design, bbuilding permit system, DMAIC, Lean Six Sigma
Procedia PDF Downloads 330584 Information Management Approach in the Prediction of Acute Appendicitis
Authors: Ahmad Shahin, Walid Moudani, Ali Bekraki
Abstract:
This research aims at presenting a predictive data mining model to handle an accurate diagnosis of acute appendicitis with patients for the purpose of maximizing the health service quality, minimizing morbidity/mortality, and reducing cost. However, acute appendicitis is the most common disease which requires timely accurate diagnosis and needs surgical intervention. Although the treatment of acute appendicitis is simple and straightforward, its diagnosis is still difficult because no single sign, symptom, laboratory or image examination accurately confirms the diagnosis of acute appendicitis in all cases. This contributes in increasing morbidity and negative appendectomy. In this study, the authors propose to generate an accurate model in prediction of patients with acute appendicitis which is based, firstly, on the segmentation technique associated to ABC algorithm to segment the patients; secondly, on applying fuzzy logic to process the massive volume of heterogeneous and noisy data (age, sex, fever, white blood cell, neutrophilia, CRP, urine, ultrasound, CT, appendectomy, etc.) in order to express knowledge and analyze the relationships among data in a comprehensive manner; and thirdly, on applying dynamic programming technique to reduce the number of data attributes. The proposed model is evaluated based on a set of benchmark techniques and even on a set of benchmark classification problems of osteoporosis, diabetes and heart obtained from the UCI data and other data sources.Keywords: healthcare management, acute appendicitis, data mining, classification, decision tree
Procedia PDF Downloads 352583 H.264 Video Privacy Protection Method Using Regions of Interest Encryption
Authors: Taekyun Doo, Cheongmin Ji, Manpyo Hong
Abstract:
Like a closed-circuit television (CCTV), video surveillance system is widely placed for gathering video from unspecified people to prevent crime, surveillance, or many other purposes. However, abuse of CCTV brings about concerns of personal privacy invasions. In this paper, we propose an encryption method to protect personal privacy system in H.264 compressed video bitstream with encrypting only regions of interest (ROI). There is no need to change the existing video surveillance system. In addition, encrypting ROI in compressed video bitstream is a challenging work due to spatial and temporal drift errors. For this reason, we propose a novel drift mitigation method when ROI is encrypted. The proposed method was implemented by using JM reference software based on the H.264 compressed videos, and experimental results show the verification of our proposed methods and its effectiveness.Keywords: H.264/AVC, video encryption, privacy protection, post compression, region of interest
Procedia PDF Downloads 340582 Global Direct Search Optimization of a Tuned Liquid Column Damper Subject to Stochastic Load
Authors: Mansour H. Alkmim, Adriano T. Fabro, Marcus V. G. De Morais
Abstract:
In this paper, a global direct search optimization algorithm to reduce vibration of a tuned liquid column damper (TLCD), a class of passive structural control device, is presented. The objective is to find optimized parameters for the TLCD under stochastic load from different wind power spectral density. A verification is made considering the analytical solution of an undamped primary system under white noise excitation. Finally, a numerical example considering a simplified wind turbine model is given to illustrate the efficacy of the TLCD. Results from the random vibration analysis are shown for four types of random excitation wind model where the response PSDs obtained showed good vibration attenuation.Keywords: generalized pattern search, parameter optimization, random vibration analysis, vibration suppression
Procedia PDF Downloads 276581 Automatic Adult Age Estimation Using Deep Learning of the ResNeXt Model Based on CT Reconstruction Images of the Costal Cartilage
Authors: Ting Lu, Ya-Ru Diao, Fei Fan, Ye Xue, Lei Shi, Xian-e Tang, Meng-jun Zhan, Zhen-hua Deng
Abstract:
Accurate adult age estimation (AAE) is a significant and challenging task in forensic and archeology fields. Attempts have been made to explore optimal adult age metrics, and the rib is considered a potential age marker. The traditional way is to extract age-related features designed by experts from macroscopic or radiological images followed by classification or regression analysis. Those results still have not met the high-level requirements for practice, and the limitation of using feature design and manual extraction methods is loss of information since the features are likely not designed explicitly for extracting information relevant to age. Deep learning (DL) has recently garnered much interest in imaging learning and computer vision. It enables learning features that are important without a prior bias or hypothesis and could be supportive of AAE. This study aimed to develop DL models for AAE based on CT images and compare their performance to the manual visual scoring method. Chest CT data were reconstructed using volume rendering (VR). Retrospective data of 2500 patients aged 20.00-69.99 years were obtained between December 2019 and September 2021. Five-fold cross-validation was performed, and datasets were randomly split into training and validation sets in a 4:1 ratio for each fold. Before feeding the inputs into networks, all images were augmented with random rotation and vertical flip, normalized, and resized to 224×224 pixels. ResNeXt was chosen as the DL baseline due to its advantages of higher efficiency and accuracy in image classification. Mean absolute error (MAE) was the primary parameter. Independent data from 100 patients acquired between March and April 2022 were used as a test set. The manual method completely followed the prior study, which reported the lowest MAEs (5.31 in males and 6.72 in females) among similar studies. CT data and VR images were used. The radiation density of the first costal cartilage was recorded using CT data on the workstation. The osseous and calcified projections of the 1 to 7 costal cartilages were scored based on VR images using an eight-stage staging technique. According to the results of the prior study, the optimal models were the decision tree regression model in males and the stepwise multiple linear regression equation in females. Predicted ages of the test set were calculated separately using different models by sex. A total of 2600 patients (training and validation sets, mean age=45.19 years±14.20 [SD]; test set, mean age=46.57±9.66) were evaluated in this study. Of ResNeXt model training, MAEs were obtained with 3.95 in males and 3.65 in females. Based on the test set, DL achieved MAEs of 4.05 in males and 4.54 in females, which were far better than the MAEs of 8.90 and 6.42 respectively, for the manual method. Those results showed that the DL of the ResNeXt model outperformed the manual method in AAE based on CT reconstruction of the costal cartilage and the developed system may be a supportive tool for AAE.Keywords: forensic anthropology, age determination by the skeleton, costal cartilage, CT, deep learning
Procedia PDF Downloads 74580 Measurements of Flow Mixing Behaviors Using a Wire-Mesh Sensor in a Wire-Wrapped 37-Pin Rod Assembly
Authors: Hyungmo Kim, Hwang Bae, Seok-Kyu Chang, Dong Won Lee, Yung Joo Ko, Sun Rock Choi, Hae Seob Choi, Hyeon Seok Woo, Dong-Jin Euh, Hyeong-Yeon Lee
Abstract:
Flow mixing characteristics in the wire-wrapped 37-pin rod bundle were measured by using a wire-mesh sensing system for a sodium-cooled fast reactor (SFR). The subchannel flow mixing in SFR core subchannels was an essential characteristic for verification of a core thermal design and safety analysis. A dedicated test facility including the wire-mesh sensor system and tracing liquid injection system was developed, and the conductivity fields at the end of 37-pin rod bundle were visualized in several different flow conditions. These experimental results represented the reasonable agreements with the results of CFD, and the uncertainty of the mixing experiments has been conducted to evaluate the experimental results.Keywords: core thermal design, flow mixing, a wire-mesh sensor, a wire-wrap effect
Procedia PDF Downloads 631579 A Case Study: Remediation of Abandoned Mines for Residential Development
Authors: Issa S. Oweis, Gary Gartenberg, Luma J. Oweis
Abstract:
The site for a residential apartment building overlies an abandoned iron mine in granitic gneiss in northern New Jersey. The mine stope is about 137 m (450 long) and dipping over 344m (800 feet) at 450 to 500. As the building footprint straddles, the mine site needed remediation. The remediation scheme consisted of compaction grouting a minimum 10 m (30 ft.) depth of the mine stope in rock to establish a buttress for the hanging wall and allow support of the building foundation. The rock strength parameters (friction and cohesion) were established based on Hoek Geologic Strength Index (GSI). The derived strength parameters were used in the wedge analysis to simulate rock cave-in. It was concluded that a cave-in would be unlikely. Verification holes confirmed the effectiveness of grouting. Although post grouting micro gravity survey depicted a few anomalies, no anomalies were found to exist by further drilling and excavation.Keywords: grout, stope, rock, properties
Procedia PDF Downloads 331578 Speech Enhancement Using Wavelet Coefficients Masking with Local Binary Patterns
Authors: Christian Arcos, Marley Vellasco, Abraham Alcaim
Abstract:
In this paper, we present a wavelet coefficients masking based on Local Binary Patterns (WLBP) approach to enhance the temporal spectra of the wavelet coefficients for speech enhancement. This technique exploits the wavelet denoising scheme, which splits the degraded speech into pyramidal subband components and extracts frequency information without losing temporal information. Speech enhancement in each high-frequency subband is performed by binary labels through the local binary pattern masking that encodes the ratio between the original value of each coefficient and the values of the neighbour coefficients. This approach enhances the high-frequency spectra of the wavelet transform instead of eliminating them through a threshold. A comparative analysis is carried out with conventional speech enhancement algorithms, demonstrating that the proposed technique achieves significant improvements in terms of PESQ, an international recommendation of objective measure for estimating subjective speech quality. Informal listening tests also show that the proposed method in an acoustic context improves the quality of speech, avoiding the annoying musical noise present in other speech enhancement techniques. Experimental results obtained with a DNN based speech recognizer in noisy environments corroborate the superiority of the proposed scheme in the robust speech recognition scenario.Keywords: binary labels, local binary patterns, mask, wavelet coefficients, speech enhancement, speech recognition
Procedia PDF Downloads 230577 Rapid Method for the Determination of Acid Dyes by Capillary Electrophoresis
Authors: Can Hu, Huixia Shi, Hongcheng Mei, Jun Zhu, Hongling Guo
Abstract:
Textile fibers are important trace evidence and frequently encountered in criminal investigations. A significant aspect of fiber evidence examination is the determination of fiber dyes. Although several instrumental methods have been developed for dyes detection, the analysis speed is not fast enough yet. A rapid dye analysis method is still needed to further improve the efficiency of case handling. Capillary electrophoresis has the advantages of high separation speed and high separation efficiency and is an ideal method for the rapid analysis of fiber dyes. In this paper, acid dyes used for protein fiber dyeing were determined by a developed short-end injection capillary electrophoresis technique. Five acid red dyes with similar structures were successfully baseline separated within 5 min. The separation reproducibility is fairly good for the relative standard deviation of retention time is 0.51%. The established method is rapid and accurate which has great potential to be applied in forensic setting.Keywords: acid dyes, capillary electrophoresis, fiber evidence, rapid determination
Procedia PDF Downloads 147576 The Translational Fandom of Marvel Cinematic Universe in the Outlier of Chinese Television Culture
Authors: Xiao Yao
Abstract:
The escalating tech innovation in new media culture is liberating audiences from passive consumption to more productive and critical engagement with the legacy and streaming television media. However, how fan translation is furthering the reception and interpretation of global screen stories remains the outlier of television studies. This paper will showcase the fan-based cross-cultural engagement with the Marvel Cinematic Universe (MCU) in China. This is to highlight: 1) the ways marginal audiences (Chinese MCU fans) seek to sync with the recent telecinematic expansion of MCU; 2) the forensic and interpretative works done by Chinese MCU fans who persistently seek to amplify the pleasure of MCU content in their media contexts; 3) the crucial but largely unacknowledged cultural value generated by Chinese MCU fandom in the outlier of contemporary Chinese TV culture. Taken together, this study aims to further explore the notion of “translational fandom” and integrate its theorisation into the present research in television culture.Keywords: Chinese MCU fans, cross-cultural engagement, Loki, television media, translational fandom
Procedia PDF Downloads 129575 Usability and Biometric Authentication of Electronic Voting System
Authors: Nighat Ayub, Masood Ahmad
Abstract:
In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.Keywords: e-voting, security, usability, authentication
Procedia PDF Downloads 394574 Denoising Transient Electromagnetic Data
Authors: Lingerew Nebere Kassie, Ping-Yu Chang, Hsin-Hua Huang, , Chaw-Son Chen
Abstract:
Transient electromagnetic (TEM) data plays a crucial role in hydrogeological and environmental applications, providing valuable insights into geological structures and resistivity variations. However, the presence of noise often hinders the interpretation and reliability of these data. Our study addresses this issue by utilizing a FASTSNAP system for the TEM survey, which operates at different modes (low, medium, and high) with continuous adjustments to discretization, gain, and current. We employ a denoising approach that processes the raw data obtained from each acquisition mode to improve signal quality and enhance data reliability. We use a signal-averaging technique for each mode, increasing the signal-to-noise ratio. Additionally, we utilize wavelet transform to suppress noise further while preserving the integrity of the underlying signals. This approach significantly improves the data quality, notably suppressing severe noise at late times. The resulting denoised data exhibits a substantially improved signal-to-noise ratio, leading to increased accuracy in parameter estimation. By effectively denoising TEM data, our study contributes to a more reliable interpretation and analysis of underground structures. Moreover, the proposed denoising approach can be seamlessly integrated into existing ground-based TEM data processing workflows, facilitating the extraction of meaningful information from noisy measurements and enhancing the overall quality and reliability of the acquired data.Keywords: data quality, signal averaging, transient electromagnetic, wavelet transform
Procedia PDF Downloads 86573 A Generic Metamodel for Dependability Analysis
Authors: Moomen Chaari, Wolfgang Ecker, Thomas Kruse, Bogdan-Andrei Tabacaru
Abstract:
In our daily life, we frequently interact with complex systems which facilitate our mobility, enhance our access to information, and sometimes help us recover from illnesses or diseases. The reliance on these systems is motivated by the established evaluation and assessment procedures which are performed during the different phases of the design and manufacturing flow. Such procedures are aimed to qualify the system’s delivered services with respect to their availability, reliability, safety, and other properties generally referred to as dependability attributes. In this paper, we propose a metamodel based generic characterization of dependability concepts and describe an automation methodology to customize this characterization to different standards and contexts. When integrated in concrete design and verification environments, the proposed methodology promotes the reuse of already available dependability assessment tools and reduces the costs and the efforts required to create consistent and efficient artefacts for fault injection or error simulation.Keywords: dependability analysis, model-driven development, metamodeling, code generation
Procedia PDF Downloads 487572 Effect of Stiffeners on the Behavior of Slender Built up Steel I-Beams
Authors: M. E. Abou-Hashem El Dib, M. K. Swailem, M. M. Metwally, A. I. El Awady
Abstract:
This paper presents the effect of stiffeners on the behavior of slender steel I-beams. Nonlinear three dimensional finite element models are developed to represent the stiffened steel I-beams. The well established finite element (ANSYS 13.0) program is used to simulate the geometric and material nonlinear nature of the problem. Verification is achieved by comparing the obtained numerical results with the results of previous published experimental work. The parameters considered in the analysis are the horizontal stiffener's position and the horizontal stiffener's dimensions as well as the number of vertical stiffeners. The studied dimensions of the horizontal stiffeners include the stiffener width, the stiffener thickness and the stiffener length. The results of the achieved numerical parametric study for slender steel I-beams show the significant effect of stiffeners on the beam behavior and its failure load.Keywords: beams, local buckling, slender, stiffener, thin walled section
Procedia PDF Downloads 279571 Virtualization of Biomass Colonization: Potential of Application in Precision Medicine
Authors: Maria Valeria De Bonis, Gianpaolo Ruocco
Abstract:
Nowadays, computational modeling is paving new design and verification ways in a number of industrial sectors. The technology is ripe to challenge some case in the Bioengineering and Medicine frameworks: for example, looking at the strategical and ethical importance of oncology research, efforts should be made to yield new and powerful resources to tumor knowledge and understanding. With these driving motivations, we approach this gigantic problem by using some standard engineering tools such as the mathematics behind the biomass transfer. We present here some bacterial colonization studies in complex structures. As strong analogies hold with some tumor proliferation, we extend our study to a benchmark case of solid tumor. By means of a commercial software, we model biomass and energy evolution in arbitrary media. The approach will be useful to cast virtualization cases of cancer growth in human organs, while augmented reality tools will be used to yield for a realistic aid to informed decision in treatment and surgery.Keywords: bacteria, simulation, tumor, precision medicine
Procedia PDF Downloads 335570 Investigations on the Fatigue Behavior of Welded Details with Imperfections
Authors: Helen Bartsch, Markus Feldmann
Abstract:
The dimensioning of steel structures subject to fatigue loads, such as wind turbines, bridges, masts and towers, crane runways and weirs or components in crane construction, is often dominated by fatigue verification. The fatigue details defined by the welded connections, such as butt or cruciform joints, longitudinal welds, welded-on or welded-in stiffeners, etc., are decisive. In Europe, the verification is usually carried out according to EN 1993-1-9 on a nominal stress basis. The basis is the detailed catalog, which specifies the fatigue strength of the various weld and construction details according to fatigue classes. Until now, a relation between fatigue classes and weld imperfection sizes is not included. Quality levels for imperfections in fusion-welded joints in steel, nickel, titanium and their alloys are regulated in EN ISO 5817, which, however, doesn’t contain direct correlations to fatigue resistances. The question arises whether some imperfections might be tolerable to a certain extent since they may be present in the test data used for detail classifications dating back decades ago. Although current standardization requires proof of satisfying limits of imperfection sizes, it would also be possible to tolerate welds with certain irregularities if these can be reliably quantified by non-destructive testing. Fabricators would be prepared to undertake carefully and sustained weld inspection in view of the significant economic consequences of such unfavorable fatigue classes. This paper presents investigations on the fatigue behavior of common welded details containing imperfections. In contrast to the common nominal stress concept, local fatigue concepts were used to consider the true stress increase, i.e., local stresses at the weld toe and root. The actual shape of a weld comprising imperfections, e.g., gaps or undercuts, can be incorporated into the fatigue evaluation, usually on a numerical basis. With the help of the effective notch stress concept, the fatigue resistance of detailed local weld shapes is assessed. Validated numerical models serve to investigate notch factors of fatigue details with different geometries. By utilizing parametrized ABAQUS routines, detailed numerical studies have been performed. Depending on the shape and size of different weld irregularities, fatigue classes can be defined. As well load-carrying welded details, such as the cruciform joint, as non-load carrying welded details, e.g., welded-on or welded-in stiffeners, are regarded. The investigated imperfections include, among others, undercuts, excessive convexity, incorrect weld toe, excessive asymmetry and insufficient or excessive throat thickness. Comparisons of the impact of different imperfections on the different types of fatigue details are made. Moreover, the influence of a combination of crucial weld imperfections on the fatigue resistance is analyzed. With regard to the trend of increasing efficiency in steel construction, the overall aim of the investigations is to include a more economical differentiation of fatigue details with regard to tolerance sizes. In the long term, the harmonization of design standards, execution standards and regulations of weld imperfections is intended.Keywords: effective notch stress, fatigue, fatigue design, weld imperfections
Procedia PDF Downloads 261569 Subject, Language, and Representation: Snyder's Poetics of Emptiness
Authors: Son Hyesook
Abstract:
This project explores the possibility of poetics of emptiness in the poetry of Gary Snyder, one of the most experimental American poets, interpreting his works as an expression of his Buddhist concept, emptiness. This philosophical term demonstrates the lack of intrinsic nature in all phenomena and the absence of an independent, perduring self. Snyder’s poetics of emptiness locates the extralinguistic reality, emptiness, within the contingent nexus of language itself instead of transcending or discarding it. Language, therefore, plays an important role in his poetry, a medium intentionally applied to the carrying out of this Buddhist telos. Snyder’s poetry is characterized by strangeness and disruptiveness of language as is often the case with Asian Zen discourses. The elision of a lyric ‘I’ and transitive verbs, for example, is his grammatic attempt to represent the illusory nature of the self. He replaces the solitary speaker with sparely modified, concrete but generic images to prevent any anthropocentric understanding of the world and to demonstrate human enactment into a harmonious interplay with other elements of life as a part of a vast web of interconnections, where everything is interrelated to every other thing. In many of his poems, Snyder employs grammatical and structural ellipses and paratactical construction to avoid a facile discursive relation and to help the reader illogically imagine the inexpressible, the void. Through various uses of typographical and semantical space, his poetry forces the reader to experience the ‘thought-pause’ and intuitively perceive things-as-they-are. Snyder enacts in his Poetics an alternative to postmodern perspectives on the subject, language, and representation, and revitalizes their skeptical look at any account of human agency and the possibility of language.Keywords: subject, language, representation, poetics of emptiness
Procedia PDF Downloads 198