Search results for: Eric Fang
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 429

Search results for: Eric Fang

399 A Study on the Acquisition of Chinese Classifiers by Vietnamese Learners

Authors: Quoc Hung Le Pham

Abstract:

In the field of language study, classifier is an interesting research feature. In the world’s languages, some languages have classifier system, some do not. Mandarin Chinese and Vietnamese languages are a rich classifier system, however, because of the language system, the cognitive, cultural differences, so that the syntactic structure of classifier of them also dissimilar. When using Mandarin Chinese classifiers must collocate with nouns or verbs, in the lexical category it is not like nouns or verbs, belong to the open class. But some scholars believe that Mandarin Chinese measure words are similar to English and other Indo European languages. The word hanging on the structure and word formation (suffix), is a closed class. Compared to other languages, such as Chinese, Vietnamese, Thai and other Asian languages are still belonging to the classifier language’s second type, this type of language is classifier, it is in the majority of quantity must exist, and following deictic, anaphoric or quantity appearing together, not separation between its modified noun, also known as numeral classifier language. Main syntactic structure of Chinese classifiers are as follows: ‘quantity+measure+noun’, ‘pronoun+measure+noun’, ‘pronoun+quantity+measure+noun’, ‘prefix+quantity+measure +noun’, ‘quantity +adjective + measure +noun’, ‘ quantity (above 10 whole number), + duo (多)measure +noun’, ‘ quantity (around 10) + measure + duo (多) +noun’. Main syntactic structure of Vietnamese classifiers are: ‘quantity+measure+noun’, ‘ measure+noun+pronoun’, ‘quantity+measure+noun+pronoun’, ‘measure+noun+prefix+ quantity’, ‘quantity+measure+noun+adjective', ‘duo (多) +quanlity+measure+noun’, ‘quantity+measure+adjective+pronoun (quantity word could not be 1)’, ‘measure+adjective+pronoun’, ‘measure+pronoun’. In daily life, classifiers are commonly used, if Chinese learners failed to standardize this using catergory, because the negative impact might occur on their verbal communication. The richness of the Chinese classifier system contributes to the complexity in the study of the system by foreign learners, especially in the inter language of Vietnamese learners. As above mentioned, Vietnamese language also has a rich system of classifiers, however, the basic structure order of two languages are similar but both still have differences. These similarities and dissimilarities between Chinese and Vietnamese classifier systems contribute significantly to the common errors made by Vietnamese students while they acquire Chinese, which are distinct from the errors made by students from the other language background. This article from a comparative perspective of language, has an orientation towards Chinese and Vietnamese languages commonly used in classifiers semantics and structural form two aspects. This comparative study aims to identity Vietnamese students while learning Chinese classifiers may face some negative transference of mother language, beside that through the analysis of the classifiers questionnaire, find out the causes and patterns of the errors they made. As the preliminary analysis shows, Vietnamese students while learning Chinese classifiers made some errors such as: overuse classifier ‘ge’(个); misuse the other classifiers ‘*yi zhang ri ji’(yi pian ri ji), ‘*yi zuo fang zi’(yi jian fang zi), ‘*si zhang jin pai’(si mei jin pai); homonym words ‘dui, shuang, fu, tao’ (对、双、副、套), ‘ke, li’ (颗、粒).

Keywords: acquisition, classifiers, negative transfer, Vietnamse learners

Procedia PDF Downloads 440
398 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 435
397 What Affects Donation Amount and Behavior Upon Disasters

Authors: Rubi Yang, Kuisheng Yuan, Fang Gu

Abstract:

Disasters are a recurring phenomenon, and their impact on people is huge. Understanding people's donation behavior after disasters is of great economic value. However, people's donation behavior is affected by many factors, such as the specific type of disaster, the donor's personal background, etc. Our research is to control and investigate whether people prefer to donate to natural disasters or man-made disasters. We will use both qualitative and quantitative methods to study people's donation behavior, divide disasters into two categories and set up the same disaster scenario, only the factors that lead to the disaster are different. Our results show that under the same disaster scenario, people are more willing to donate to disasters caused by natural factors. Collectivists are more willing to donate than individualists, but in the face of man-made disasters, individualists are more willing to donate than collectivists

Keywords: disaster, behavioral economics, prosocial behavior, consumer behavior, consumer psychology

Procedia PDF Downloads 11
396 3rd Generation Modular Execution: A Global Breakthrough in Modular Facility Construction System

Authors: Sean Bryner S. Rey, Eric Tanjutco

Abstract:

Modular execution strategies are performed to address the various challenges of any projects and are implemented on each project phase that covers Engineering, Procurement, Fabrication and Construction. It was until the recent years that the intent to surpass mechanical modularization approach were conceptualized to give solution to much greater demands of project components such as site location and adverse weather condition, material sourcing, construction schedule, safety risks and overall plot layout and allocation. The intent of this paper is to introduce the 3rd Generation Modular Execution with an overview of its advantages on project execution and will give emphasis on Engineering, Construction, Operation and Maintenance. Most importantly, the paper will present the key differentiator of 3rd Gen modular execution against other conventional project execution and the merits it bears for the industry.

Keywords: 3rd generation modular, process block, construction, operation & maintenance

Procedia PDF Downloads 457
395 Texture-Based Image Forensics from Video Frame

Authors: Li Zhou, Yanmei Fang

Abstract:

With current technology, images and videos can be obtained more easily than ever. It is so easy to manipulate these digital multimedia information when obtained, and that the content or source of the image and video could be easily tampered. In this paper, we propose to identify the image and video frame by the texture-based approach, e.g. Markov Transition Probability (MTP), which is in space domain, DCT domain and DWT domain, respectively. In the experiment, image and video frame database is constructed, and is used to train and test the classifier Support Vector Machine (SVM). Experiment results show that the texture-based approach has good performance. In order to verify the experiment result, and testify the universality and robustness of algorithm, we build a random testing dataset, the random testing result is in keeping with above experiment.

Keywords: multimedia forensics, video frame, LBP, MTP, SVM

Procedia PDF Downloads 415
394 Formal Verification for Ethereum Smart Contract Using Coq

Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song

Abstract:

The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.

Keywords: smart contract, formal verification, Ethereum, Coq

Procedia PDF Downloads 663
393 Strategies of Spatial Optimization for Open Space in the Old-Age Friendly City: An Investigation of the Behavior of the Elderly in Xicheng Square in Hangzhou

Authors: Yunxiang Fang

Abstract:

With the aging trend continuing to accelerate, open space is important for the daily life of the elderly, and its old-age friendliness is worthy of attention. Based on behavioral observation and literature research, this paper studies the behavior of the elderly in urban open space. Through the investigation, classification and quantitative analysis of the activity types, time characteristics and spatial behavior order of the elderly in Xicheng Square in Hangzhou, it summarizes the square space suitable for the psychological needs, physiology and activity needs of the elderly, combined with the basis of literature research. Finally, the suggestions for the improvement of the old-age friendship of Xicheng Square are put forward, from the aspects of microclimate, safety and accessibility, space richness and service facility quality.

Keywords: behavior characteristics, old-age friendliness, open space, square

Procedia PDF Downloads 160
392 Concentration of D-Pinitol from Carob Kibble Using Submerged Fermentation by Saccharomyces cerevisiae

Authors: Thi Huong Vu, Vijay Jayasena, Zhongxiang Fang, Gary Dykes

Abstract:

D-pinitol (3-O-methyl ether of D-chiro-inosito) has been known to have health benefits for diabetic patients. Carob kibble has received attention due to the presence of high value D-pinitol and polyphenol antioxidants. D-pinitol was concentrated from carob kibble using submerged fermentation with Saccharomyces cerevisiae. Total carbohydrates and D-pinitol were determined by the phenol-sulphuric acid method and HPLC, respectively. The content of D-pinitol increased from approximately 43 to 70 mg/g dry weight after fermentation. The yeast consumed over 70% of total carbohydrates in carob kibble without any negative effect on D-pinitol content. A range of substrate medium pH’s from 5.0 – 7.0 had no significant effect on the removal of carbohydrates and D-pinitol. This method may provide a practical solution for production of D-pinitol from carob in a cost effective manner.

Keywords: carob kibble, d-pinitol, saccharomyces cerevisiae, submerged fermentation, total carbohydrates

Procedia PDF Downloads 305
391 Method of Cluster Based Cross-Domain Knowledge Acquisition for Biologically Inspired Design

Authors: Shen Jian, Hu Jie, Ma Jin, Peng Ying Hong, Fang Yi, Liu Wen Hai

Abstract:

Biologically inspired design inspires inventions and new technologies in the field of engineering by mimicking functions, principles, and structures in the biological domain. To deal with the obstacles of cross-domain knowledge acquisition in the existing biologically inspired design process, functional semantic clustering based on functional feature semantic correlation and environmental constraint clustering composition based on environmental characteristic constraining adaptability are proposed. A knowledge cell clustering algorithm and the corresponding prototype system is developed. Finally, the effectiveness of the method is verified by the visual prosthetic device design.

Keywords: knowledge clustering, knowledge acquisition, knowledge based engineering, knowledge cell, biologically inspired design

Procedia PDF Downloads 418
390 Analysis of the Influence of Support Failure on the Dynamic Effect of Bridge Structure

Authors: Sun Fan, Wu Xiaoguang, Fang Miaomiao, Wei Chi

Abstract:

The degree of damage to the support is simulated by finite element software, and its influence on the static and dynamic effects of the bridge structure is analyzed. Four working conditions are selected for the study of bearing damage impact: the bearing is intact (condition 1), the bearing damage coefficient is 0.8 (condition 2), the bearing damage coefficient is 0.6 (condition 3), and the bearing damage coefficient is 0.4 (Working Condition 4). The effect value of the bridge structure under each working condition is calculated, and the simple-supported girder bridge and continuous girder bridge with typical spans are taken as examples to analyze the overall change of the bridge structure after the bearing completely fails.

Keywords: bridge bearing damage, dynamic response, finite element analysis, load conditions

Procedia PDF Downloads 218
389 Bridgeless Boost Power Factor Correction Rectifier with Hold-Up Time Extension Circuit

Authors: Chih-Chiang Hua, Yi-Hsiung Fang, Yuan-Jhen Siao

Abstract:

A bridgeless boost (BLB) power factor correction (PFC) rectifier with hold-up time extension circuit is proposed in this paper. A full bridge rectifier is widely used in the front end of the ac/dc converter. Since the shortcomings of the full bridge rectifier, the bridgeless rectifier is developed. A BLB rectifier topology is utilized with the hold-up time extension circuit. Unlike the traditional hold-up time extension circuit, the proposed extension scheme uses fewer active switches to achieve a longer hold-up time. Simulation results are presented to verify the converter performance.

Keywords: bridgeless boost (BLB), boost converter, power factor correction (PFC), hold-up time

Procedia PDF Downloads 400
388 Heart-Rate Resistance Electrocardiogram Identification Based on Slope-Oriented Neural Networks

Authors: Tsu-Wang Shen, Shan-Chun Chang, Chih-Hsien Wang, Te-Chao Fang

Abstract:

For electrocardiogram (ECG) biometrics system, it is a tedious process to pre-install user’s high-intensity heart rate (HR) templates in ECG biometric systems. Based on only resting enrollment templates, it is a challenge to identify human by using ECG with the high-intensity HR caused from exercises and stress. This research provides a heartbeat segment method with slope-oriented neural networks against the ECG morphology changes due to high intensity HRs. The method has overall system accuracy at 97.73% which includes six levels of HR intensities. A cumulative match characteristic curve is also used to compare with other traditional ECG biometric methods.

Keywords: high-intensity heart rate, heart rate resistant, ECG human identification, decision based artificial neural network

Procedia PDF Downloads 416
387 The Influence of Noise on Aerial Image Semantic Segmentation

Authors: Pengchao Wei, Xiangzhong Fang

Abstract:

Noise is ubiquitous in this world. Denoising is an essential technology, especially in image semantic segmentation, where noises are generally categorized into two main types i.e. feature noise and label noise. The main focus of this paper is aiming at modeling label noise, investigating the behaviors of different types of label noise on image semantic segmentation tasks using K-Nearest-Neighbor and Convolutional Neural Network classifier. The performance without label noise and with is evaluated and illustrated in this paper. In addition to that, the influence of feature noise on the image semantic segmentation task is researched as well and a feature noise reduction method is applied to mitigate its influence in the learning procedure.

Keywords: convolutional neural network, denoising, feature noise, image semantic segmentation, k-nearest-neighbor, label noise

Procedia PDF Downloads 203
386 Augmented Tourism: Definitions and Design Principles

Authors: Eric Hawkinson

Abstract:

After designing and implementing several iterations of implementations of augmented reality (AR) in tourism, this paper takes a deep look into design principles and implementation strategies of using AR at destination tourism settings. The study looks to define augmented tourism from past implementations as well as several cases, uses designed and implemented for tourism. The discussion leads to formation of frameworks and best practices for AR as well as virtual reality( VR) to be used in tourism settings. Some main affordances include guest autonomy, customized experiences, visitor data collection and increased electronic word-of-mouth generation for promotion purposes. Some challenges found include the need for high levels of technology infrastructure, low adoption rates or ‘buy-in’ rates, high levels of calibration and customization, and the need for maintenance and support services. Some suggestions are given as to how to leverage the affordances and meet the challenges of implementing AR for tourism.

Keywords: augmented tourism, augmented reality, eTourism, virtual tourism, tourism design

Procedia PDF Downloads 359
385 Finding the Reaction Constant between Humic Acid and Aluminum Ion by Fluorescence Quenching Effect

Authors: Wen Po Cheng, Chen Zhao Feng, Ruey Fang Yu, Lin Jia Jun, Lin Ji Ye, Chen Yuan Wei

Abstract:

Humic acid was used as the removal target for evaluating the coagulation efficiency in this study. When the coagulant ions mix with a humic acid solution, a Fluorescence quenching effect may be observed conditionally. This effect can be described by Stern-Volmer linear equation which can be used for quantifying the quenching value (Kq) of the Fluorescence quenching effect. In addition, a Complex-Formation Titration (CFT) theory was conducted and the result was used to explain the electron-neutralization capability of the coagulant (AlCl₃) at different pH. The results indicated that when pH of the ACl₃ solution was between 6 and 8, fluorescence quenching effect obviously occurred. The maximum Kq value was found to be 102,524 at pH 6. It means that the higher the Kq value is, the better complex reaction between a humic acid and aluminum salts will be. Through the Kq value study, the optimum pH can be quantified when the humic acid solution is coagulated with aluminum ions.

Keywords: humic acid, fluorescence quenching effect, complex reaction, titration

Procedia PDF Downloads 567
384 Cryptocurrencies: Business Students’ Awareness and Universities’ Adoption Readiness and Compatibility of Use Considering the Mediation of Attitudes

Authors: Eric S. Parilla, Marc Edward Abadilla

Abstract:

The study aims to determine the effect of awareness of business students towards cryptocurrencies and the readiness of universities and colleges to accept cryptocurrencies as a medium of exchange, considering the mediation of business students’ attitudes. The research used partial least squares structural equation modeling (PLS-SEM) and deployed a questionnaire attuned to the awareness and attitudes of business students towards cryptocurrencies and readiness and compatibility of use in universities and colleges in Ilocos Norte. The output of the investigation revealed that awareness of business students is not correlated to the readiness of universities and colleges, which means that even though students understand cryptocurrencies, it is not an assurance that universities and colleges are ready to accept them as the medium of exchange. The study proposes that training and seminars for business students and professionals should be conducted to expand understanding and acceptance of cryptocurrencies.

Keywords: cryptocurrencies, awareness, readiness, attitudes

Procedia PDF Downloads 202
383 The Digital Divide: Examining the Use and Access to E-Health Based Technologies by Millennials and Older Adults

Authors: Delana Theiventhiran, Wally J. Bartfay

Abstract:

Background and Significance: As the Internet is becoming the epitome of modern communications, there are many pragmatic reasons why the digital divide matters in terms of accessing and using E-health based technologies. With the rise of technology usage globally, those in the older adult generation may not be as familiar and comfortable with technology usage and are thus put at a disadvantage compared to other generations such as millennials when examining and using E-health based platforms and technology. Currently, little is known about how older adults and millennials access and use e-health based technologies. Methods: A systemic review of the literature was undertaken employing the following three databases: (i) PubMed, (ii) ERIC, and (iii) CINAHL; employing the search term 'digital divide and generations' to identify potential articles. To extract required data from the studies, a data abstraction tool was created to obtain the following information: (a) author, (b) year of publication, (c) sample size, (d) country of origin, (e) design/methods, (f) major findings/outcomes obtained. Inclusion criteria included publication dates between the years of Jan 2009 to Aug 2018, written in the English language, target populations of older adults aged 65 and above and millennials, and peer reviewed quantitative studies only. Major Findings: PubMed provided 505 potential articles, where 23 of those articles met the inclusion criteria. Specifically, ERIC provided 53 potential articles, where no articles met criteria following data extraction. CINAHL provided 14 potential articles, where eight articles met criteria following data extraction. Conclusion: Practically speaking, identifying how newer E-health based technologies can be integrated into society and identifying why there is a gap with digital technology will help reduce the impact on generations and individuals who are not as familiar with technology and Internet usage. The largest concern of all is how to prepare older adults for new and emerging E-health technologies. Currently, there is a dearth of literature in this area because it is a newer area of research and little is known about it. The benefits and consequences of technology being integrated into daily living are being investigated as a newer area of research. Several of the articles (N=11) indicated that age is one of the larger factors contributing to the digital divide. Similarly, many of the examined articles (N=5) identify that privacy concerns were one of the main deterrents of technology usage for elderly individuals aged 65 and above. The older adult generation feels that privacy is one of the major concerns, especially in regards to how data is collected, used and possibly sold to third party groups by various websites. Additionally, access to technology, the Internet, and infrastructure also plays a large part in the way that individuals are able to receive and use information. Lastly, a change in the way that healthcare is currently used, received and distributed would also help attribute to the change to ensure that no generation is left behind in a technologically advanced society.

Keywords: digital divide, e-health, millennials, older adults

Procedia PDF Downloads 159
382 The Molecular Bases of Δβ T-Cell Mediated Antigen Recognition

Authors: Eric Chabrol, Sidonia B.G. Eckle, Renate de Boer, James McCluskey, Jamie Rossjohn, Mirjam H.M. Heemskerk, Stephanie Gras

Abstract:

αβ and γδ T-cells are disparate T-cell lineages that, via their use of either αβ or γδ T-cell antigen receptors (TCRs) respectively, can respond to distinct antigens. Here we characterise a new population of human T-cells, term δβ T-cells, that express TCRs comprising a TCR-δ variable gene fused to a Joining-α/Constant-α domain, paired with an array of TCR-β chains. We characterised the cellular, functional, biophysical and structural characteristic feature of this new T-cells population that reveal some new insight into TCR diversity. We provide molecular bases of how δβ T-cells can recognise viral peptide presented by Human Leukocyte Antigen (HLA) molecule. Our findings highlight how components from αβ and γδTCR gene loci can recombine to confer antigen specificity thus expanding our understanding of T-cell biology and TCR diversity.

Keywords: new delta-beta TCR, HLA, viral peptide, structural immunology

Procedia PDF Downloads 414
381 The Research of 'Rope Coiling' Effect in Near-Field Electrospinning

Authors: Feiyu Fang, Han Wang, Xin Chen, Jun Zeng, Feng Liang, Peixuan Wu

Abstract:

The 'rope coiling' effect is a normal instability phenomenon widespread exists in viscous fluid, elastic rods and polymeric fibers owing to compressive stress when they fall into a moving belt. Near-field electro-spinning is the modified electro-spinning technique has the ability to direct write micro fibers. In this research, we study the “rope coiling” effect in near-field electro-spinning. By changing the distance between nozzle and collector or the speed ratio between the charge jet speed and the platform moving speed, we obtain a pile of different models coils including the meandering, alternating and coiling patterns. Therefore, this instability can be used to direct write micro structured fibers with a one-step process.

Keywords: rope coiling effects, near-field electrospinning, direct write, micro structure

Procedia PDF Downloads 338
380 Variable-Fidelity Surrogate Modelling with Kriging

Authors: Selvakumar Ulaganathan, Ivo Couckuyt, Francesco Ferranti, Tom Dhaene, Eric Laermans

Abstract:

Variable-fidelity surrogate modelling offers an efficient way to approximate function data available in multiple degrees of accuracy each with varying computational cost. In this paper, a Kriging-based variable-fidelity surrogate modelling approach is introduced to approximate such deterministic data. Initially, individual Kriging surrogate models, which are enhanced with gradient data of different degrees of accuracy, are constructed. Then these Gradient enhanced Kriging surrogate models are strategically coupled using a recursive CoKriging formulation to provide an accurate surrogate model for the highest fidelity data. While, intuitively, gradient data is useful to enhance the accuracy of surrogate models, the primary motivation behind this work is to investigate if it is also worthwhile incorporating gradient data of varying degrees of accuracy.

Keywords: Kriging, CoKriging, Surrogate modelling, Variable- fidelity modelling, Gradients

Procedia PDF Downloads 541
379 Improving Internal Efficiency of Local Universities and Colleges: Asseessing the Impact of the 085 Project in Shanghai

Authors: Qing Hui Wang, You Lin Fang, Min Chen

Abstract:

In 2003 the percentage of students in Shanghai taking part in tertiary education reached 53% of the age cohort, which is at the universal level according to Trow's typology. This achievement led to a conscientious effort by the government to improve internal efficiency of local universities and colleges through a series of programs, the most important of which is the 085 Project. This paper considers the effects of the 085 Project- the 5 initiatives launched in 2008 on increasing the investment to improve institutional overall visibilities, teaching excellence, knowledge innovation, faculty development as well as internationalization. Using the approach of ERC (a theory of equality, reciprocity, and competition) model, it was found that the initiatives helped the lower tier universities and colleges make full play in the aspects of strategic planning and identifying themselves. It was also found that the rate of growth of social resources for universities as a whole increased more quickly after the implementation of the 085 Project.

Keywords: 085 Project, impact, internal efficiency, local universities and colleges

Procedia PDF Downloads 455
378 Teachers’ and Students’ Reactions to a Guided Reading Program Designed by a Teachers’ Professional Learning Community

Authors: Yea-Mei Leou, Shiu-Hsung Huang, T. C. Shen, Chin-Ya Fang

Abstract:

The purposes of this study were to explore how to establish a professional learning community for English teachers at a junior high school, and to explore how teachers and students think about the guided reading program. The participants were three experienced English teachers and their ESL seventh-grade students from three classes in a junior high school. Leveled picture books and worksheets were used in the program. Questionnaires and interviews were used for gathering information. The findings were as follows: First, most students enjoyed this guided reading program. Second, the teachers thought the guided reading program was helpful to students’ learning and the discussions in the professional learning community refreshed their ideas, but the preparation for the teaching was time-consuming. Suggestions based on the findings were provided.

Keywords: ESL students, guided reading, leveled books, professional learning community

Procedia PDF Downloads 363
377 Saliency Detection Using a Background Probability Model

Authors: Junling Li, Fang Meng, Yichun Zhang

Abstract:

Image saliency detection has been long studied, while several challenging problems are still unsolved, such as detecting saliency inaccurately in complex scenes or suppressing salient objects in the image borders. In this paper, we propose a new saliency detection algorithm in order to solving these problems. We represent the image as a graph with superixels as nodes. By considering appearance similarity between the boundary and the background, the proposed method chooses non-saliency boundary nodes as background priors to construct the background probability model. The probability that each node belongs to the model is computed, which measures its similarity with backgrounds. Thus we can calculate saliency by the transformed probability as a metric. We compare our algorithm with ten-state-of-the-art salient detection methods on the public database. Experimental results show that our simple and effective approach can attack those challenging problems that had been baffling in image saliency detection.

Keywords: visual saliency, background probability, boundary knowledge, background priors

Procedia PDF Downloads 416
376 A Control Model for the Dismantling of Industrial Plants

Authors: Florian Mach, Eric Hund, Malte Stonis

Abstract:

The dismantling of disused industrial facilities such as nuclear power plants or refineries is an enormous challenge for the planning and control of the logistic processes. Existing control models do not meet the requirements for a proper dismantling of industrial plants. Therefore, the paper presents an approach for the control of dismantling and post-processing processes (e.g. decontamination) in plant decommissioning. In contrast to existing approaches, the dismantling sequence and depth are selected depending on the capacity utilization of required post-processing processes by also considering individual characteristics of respective dismantling tasks (e.g. decontamination success rate, uncertainties regarding the process times). The results can be used in the dismantling of industrial plants (e.g. nuclear power plants) to reduce dismantling time and costs by avoiding bottlenecks such as capacity constraints.

Keywords: dismantling management, logistics planning and control models, nuclear power plant dismantling, reverse logistics

Procedia PDF Downloads 291
375 Effects of Self-Disclosure and Transparency on Conversational Agents in a Healthcare-Related Decision Support System

Authors: Luca Martignoni, Joseph Nserat, Eric Arand, Marvin Braun

Abstract:

The increasing application of conversational agents in healthcare and the demand for applications that enable patients to take informed decisions is changing the way patients access healthcare and take decisions. Promising results related to the acceptance of CAs in healthcare have been accomplished. In that regard, understanding how to design CAs in a way that patients trust their recommendations and decisions constitutes an important area of research. Our study examines self-disclosure and transparency as drivers of trust to enhance the medical assistance of CAs for patients. Accordingly, we examined the effects of self-disclosure and transparency on patients trust and service satisfaction by conducting an online experiment with 136 participants. Our results show that the expression of both self-disclosure and conversational agents transparency leads to an increased perception of trust but does not necessarily improve the service satisfaction. Therefore, developers should implement self-disclosure and transparency to create a trustworthy environment.

Keywords: conversational agent, transparency, self-disclosure, healthcare

Procedia PDF Downloads 122
374 Through 7S Model to Promote the Service Innovation Management

Authors: Cheng Fang Hsu

Abstract:

Call center is the core of building customer relationship management system. Under the strong competitive stress, it becomes a new profiting challenge for a successful enterprise. Call center is a department not only to provide customer service but also to bring business profit. This is the qualitative case study in Taiwan bank service industry which goes on deeper exploration, and analysis by business interviews and industrial analysis. This study starts from the establishment, development, and management after the reforming of the case call center. Through SWOT analysis, and industrial analysis, this study adopted 7S model to explain how the call center reforms from service oriented to profit oriented and from cost management to profit management. The results indicated how service innovation management promotes call center to be operated as a market profit competition center. The recommendations are indicated to support the call center on marketing profit by service innovation management.

Keywords: call center, 7S model, service innovation management, bioinformatics

Procedia PDF Downloads 471
373 Exploration of Competitive Athletes’ Superstition in Taiwan: “Miracle” and “Coincidence”

Authors: Shieh Shiow-Fang

Abstract:

Superstitious thoughts or actions often occur during athletic competitions. Often "superstitious rituals" have a positive impact on the performance of competitive athletes. Athletes affirm the many psychological benefits of religious beliefs mostly in a positive way. Method: By snowball sampling, we recruited 10 experienced competitive athletes as participants. We used in-person and online one-to-one in-depth interviews to collect their experiences about sports superstition. The total interview time was 795 minutes. We analyzed the raw data with the grounded theory processes suggested by Strauss and Corbin (1990). Results: The factors affecting athlete performance are ritual beliefs, taboo awareness, learning norms, and spontaneous attribution behaviors. Conclusion: We concluded that sports superstition reflects several psychological implications. The analysis results of this paper can provide another research perspective for the future study of sports superstition behavior.

Keywords: superstition, taboo awarences, competitive athlete, learning norms

Procedia PDF Downloads 67
372 The Determinants of Senior Students, Behavioral Intention on the Blended E-Learning for the Ceramics Teaching Course at the Active Aging University

Authors: Horng-Jyh Chen, Yi-Fang Chen, Chien-Liang Lin

Abstract:

In this paper, the authors try to investigate the determinants of behavioral intention of the blended e-learning course for senior students at the Active Ageing University in Taiwan. Due to lower proficiency in the use of computers and less experience on learning styles of the blended e-learning course for senior students will be expected quite different from those for most young students. After more than five weeks course for two years the questionnaire survey is executed to collect data for statistical analysis in order to understand the determinants of the behavioral intention for senior students. The object of this study is at one of the Active Ageing University in Taiwan total of 84 senior students in the blended e-learning for the ceramics teaching course. The research results show that only the perceived usefulness of the blended e-learning course has significant positive relationship with the behavioral intention.

Keywords: Active Aging University, blended e-learning, ceramics teaching course, behavioral intention

Procedia PDF Downloads 399
371 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 349
370 Simulation Study on Spacecraft Surface Charging Induced by Jovian Plasma Environment with Particle in Cell Method

Authors: Meihua Fang, Yipan Guo, Tao Fei, Pengyu Tian

Abstract:

Space plasma caused spacecraft surface charging is the major space environment hazard. Particle in cell (PIC) method can be used to simulate the interaction between space plasma and spacecraft. It was proved that surface charging level of spacecraft in Jupiter’s orbits was high for its’ electron-heavy plasma environment. In this paper, Jovian plasma environment is modeled and surface charging analysis is carried out by PIC based software Spacecraft Plasma Interaction System (SPIS). The results show that the spacecraft charging potentials exceed 1000V at 2Rj, 15Rj and 25Rj polar orbits in the dark side at worst case plasma model. Furthermore, the simulation results indicate that the large Jovian magnetic field increases the surface charging level for secondary electron gyration.

Keywords: Jupiter, PIC, space plasma, surface charging

Procedia PDF Downloads 138