Search results for: critical features
8526 Using Reservoir Models for Monitoring Geothermal Surface Features
Authors: John P. O’Sullivan, Thomas M. P. Ratouis, Michael J. O’Sullivan
Abstract:
As the use of geothermal energy grows internationally more effort is required to monitor and protect areas with rare and important geothermal surface features. A number of approaches are presented for developing and calibrating numerical geothermal reservoir models that are capable of accurately representing geothermal surface features. The approaches are discussed in the context of cases studies of the Rotorua geothermal system and the Orakei-korako geothermal system, both of which contain important surface features. The results show that models are able to match the available field data accurately and hence can be used as valuable tools for predicting the future response of the systems to changes in use.Keywords: geothermal reservoir models, surface features, monitoring, TOUGH2
Procedia PDF Downloads 3838525 Alvaro Siza’s Design Strategy: An Insight into Critical Regionalism
Authors: Rahmatollah Amirjani
Abstract:
By the emergence of the debate over the failure of Regionalism in the late 1970s, Critical Regionalism was introduced as a different way to respond to the state of architecture in the post-war era. Critical Regionalism is most often understood as a discourse that not only mediates the language of modern architecture with the local cultures but also revives the relation between architecture and spectator as indexed by capitalism. Since the inception of Critical Regionalism, a large number of architectural practices have emerged around the globe; however, the work of the well-known Portuguese architect, Álvaro Siza, is considered as a unique case amongst works associated with the discourse of Critical Regionalism. This paper intends to respond to a number of questions, including; what are the origins of Critical Regionalism? How does Siza’s design strategy correspond to the thematic of Critical Regionalism? How does Siza recover the relation between object and subject in most of his projects? Using Siza’s housing project for the Malagueira district in Évora, Portugal, this article will attempt to answer these questions, and highlight Alvaro Siza’s design procedure which goes beyond the existing discourse of Critical Regionalism and contributes to our understanding of this practice.Keywords: Alvaro Siza, critical regionalism, Malagueira housing, placelessness
Procedia PDF Downloads 1548524 Myanmar Character Recognition Using Eight Direction Chain Code Frequency Features
Authors: Kyi Pyar Zaw, Zin Mar Kyu
Abstract:
Character recognition is the process of converting a text image file into editable and searchable text file. Feature Extraction is the heart of any character recognition system. The character recognition rate may be low or high depending on the extracted features. In the proposed paper, 25 features for one character are used in character recognition. Basically, there are three steps of character recognition such as character segmentation, feature extraction and classification. In segmentation step, horizontal cropping method is used for line segmentation and vertical cropping method is used for character segmentation. In the Feature extraction step, features are extracted in two ways. The first way is that the 8 features are extracted from the entire input character using eight direction chain code frequency extraction. The second way is that the input character is divided into 16 blocks. For each block, although 8 feature values are obtained through eight-direction chain code frequency extraction method, we define the sum of these 8 feature values as a feature for one block. Therefore, 16 features are extracted from that 16 blocks in the second way. We use the number of holes feature to cluster the similar characters. We can recognize the almost Myanmar common characters with various font sizes by using these features. All these 25 features are used in both training part and testing part. In the classification step, the characters are classified by matching the all features of input character with already trained features of characters.Keywords: chain code frequency, character recognition, feature extraction, features matching, segmentation
Procedia PDF Downloads 2948523 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods
Authors: Issa Qabaja, Fadi Thabtah
Abstract:
Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.Keywords: data mining, email classification, phishing, online security
Procedia PDF Downloads 4078522 Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution
Authors: Haiyan Wu, Ying Liu, Shaoyun Shi
Abstract:
Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets.Keywords: authorship attribution, attention mechanism, syntactic feature, feature extraction
Procedia PDF Downloads 1068521 Using New Machine Algorithms to Classify Iranian Musical Instruments According to Temporal, Spectral and Coefficient Features
Authors: Ronak Khosravi, Mahmood Abbasi Layegh, Siamak Haghipour, Avin Esmaili
Abstract:
In this paper, a study on classification of musical woodwind instruments using a small set of features selected from a broad range of extracted ones by the sequential forward selection method was carried out. Firstly, we extract 42 features for each record in the music database of 402 sound files belonging to five different groups of Flutes (end blown and internal duct), Single –reed, Double –reed (exposed and capped), Triple reed and Quadruple reed. Then, the sequential forward selection method is adopted to choose the best feature set in order to achieve very high classification accuracy. Two different classification techniques of support vector machines and relevance vector machines have been tested out and an accuracy of up to 96% can be achieved by using 21 time, frequency and coefficient features and relevance vector machine with the Gaussian kernel function.Keywords: coefficient features, relevance vector machines, spectral features, support vector machines, temporal features
Procedia PDF Downloads 2908520 Exploring Chess Game AI Features Application
Authors: Bashayer Almalki, Mayar Bajrai, Dana Mirah, Kholood Alghamdi, Hala Sanyour
Abstract:
This research aims to investigate the features of an AI chess app that are most preferred by users. A questionnaire was used as the methodology to gather responses from a varied group of participants. The questionnaire consisted of several questions related to the features of the AI chess app. The responses were analyzed using descriptive statistics and factor analysis. The findings indicate that the most preferred features of an AI chess app are the ability to play against the computer, the option to adjust the difficulty level, and the availability of tutorials and puzzles. The results of this research could be useful for developers of AI chess apps to enhance the user experience and satisfaction.Keywords: chess, game, application, computics
Procedia PDF Downloads 458519 Research on Perceptual Features of Couchsurfers on New Hospitality Tourism Platform Couchsurfing
Authors: Yuanxiang Miao
Abstract:
This paper aims to examine the perceptual features of couchsurfers on a new hospitality tourism platform, the free homestay website couchsurfing. As a local host, the author has accepted 61 couchsurfers in Kyoto, Japan, and attempted to figure out couchsurfers' characteristics on perception by hosting them. Moreover, the methodology of this research is mainly based on in-depth interviews, by talking with couchsurfers, observing their behaviors, doing questionnaires, etc. Five dominant perceptual features of couchsurfers were identified: (1) Trusting; (2) Meeting; (3) Sharing; (4) Reciprocity; (5) Worries. The value of this research lies in figuring out a deeper understanding of the perceptual features of couchsurfers, and the author indeed hosted and stayed with 61 couchsurfers from 30 countries and areas over one year. Lastly, the author offers practical suggestions for future research.Keywords: couchsurfing, depth interview, hospitality tourism, perceptual features
Procedia PDF Downloads 1228518 The Process of Critical Care Nursing Resilience in Workplace Adversity
Authors: Jennifer Jackson
Abstract:
Critical care nurses are at risk for burnout when confronted with sustained workplace adversity, which stems from a variety of social, structural, and environmental factors. Researchers have suggested that nurses can become resilient and overcome workplace adversity to achieve positive outcomes. The purpose of this study is to learn more about critical care nurses’ experiences with workplace adversity, and their process of becoming resilient. The research question will be: what is the process of critical care nursing resilience in workplace adversity? In-depth interviews with critical care nurses will provide the data to inductively generate the grounded theory. The resultant grounded theory will provide a framework to inform nurses and managers in developing interventions to support critical care nurses in their workplace. By enhancing nursing resilience, burnout may be avoided, and nurse satisfaction and overall quality of care may be improved.Keywords: nursing, resilience, burnout, critical care
Procedia PDF Downloads 4588517 The Latent Model of Linguistic Features in Korean College Students’ L2 Argumentative Writings: Syntactic Complexity, Lexical Complexity, and Fluency
Authors: Jiyoung Bae, Gyoomi Kim
Abstract:
This study explores a range of linguistic features used in Korean college students’ argumentative writings for the purpose of developing a model that identifies variables which predict writing proficiencies. This study investigated the latent variable structure of L2 linguistic features, including syntactic complexity, the lexical complexity, and fluency. One hundred forty-six university students in Korea participated in this study. The results of the study’s confirmatory factor analysis (CFA) showed that indicators of linguistic features from this study-provided a foundation for re-categorizing indicators found in extant research on L2 Korean writers depending on each latent variable of linguistic features. The CFA models indicated one measurement model of L2 syntactic complexity and L2 learners’ writing proficiency; these two latent factors were correlated with each other. Based on the overall findings of the study, integrated linguistic features of L2 writings suggested some pedagogical implications in L2 writing instructions.Keywords: linguistic features, syntactic complexity, lexical complexity, fluency
Procedia PDF Downloads 1448516 Development of Non-Intrusive Speech Evaluation Measure Using S-Transform and Light-Gbm
Authors: Tusar Kanti Dash, Ganapati Panda
Abstract:
The evaluation of speech quality and intelligence is critical to the overall effectiveness of the Speech Enhancement Algorithms. Several intrusive and non-intrusive measures are employed to calculate these parameters. Non-Intrusive Evaluation is most challenging as, very often, the reference clean speech data is not available. In this paper, a novel non-intrusive speech evaluation measure is proposed using audio features derived from the Stockwell transform. These features are used with the Light Gradient Boosting Machine for the effective prediction of speech quality and intelligibility. The proposed model is analyzed using noisy and reverberant speech from four databases, and the results are compared with the standard Intrusive Evaluation Measures. It is observed from the comparative analysis that the proposed model is performing better than the standard Non-Intrusive models.Keywords: non-Intrusive speech evaluation, S-transform, light GBM, speech quality, and intelligibility
Procedia PDF Downloads 2338515 Comparison between XGBoost, LightGBM and CatBoost Using a Home Credit Dataset
Authors: Essam Al Daoud
Abstract:
Gradient boosting methods have been proven to be a very important strategy. Many successful machine learning solutions were developed using the XGBoost and its derivatives. The aim of this study is to investigate and compare the efficiency of three gradient methods. Home credit dataset is used in this work which contains 219 features and 356251 records. However, new features are generated and several techniques are used to rank and select the best features. The implementation indicates that the LightGBM is faster and more accurate than CatBoost and XGBoost using variant number of features and records.Keywords: gradient boosting, XGBoost, LightGBM, CatBoost, home credit
Procedia PDF Downloads 1348514 Native Language Identification with Cross-Corpus Evaluation Using Social Media Data: ’Reddit’
Authors: Yasmeen Bassas, Sandra Kuebler, Allen Riddell
Abstract:
Native language identification is one of the growing subfields in natural language processing (NLP). The task of native language identification (NLI) is mainly concerned with predicting the native language of an author’s writing in a second language. In this paper, we investigate the performance of two types of features; content-based features vs. content independent features, when they are evaluated on a different corpus (using social media data “Reddit”). In this NLI task, the predefined models are trained on one corpus (TOEFL), and then the trained models are evaluated on different data using an external corpus (Reddit). Three classifiers are used in this task; the baseline, linear SVM, and logistic regression. Results show that content-based features are more accurate and robust than content independent ones when tested within the corpus and across corpus.Keywords: NLI, NLP, content-based features, content independent features, social media corpus, ML
Procedia PDF Downloads 1068513 Improving Students' Critical Thinking in Understanding Reading Material Through Bloom's Taxonomy Questioning Strategy in English for Specific Purposes (ESP) Class
Authors: M. Mayuasti, Hevriani Sevrika, Armilia Riza
Abstract:
This research deals in improving college students’ critical thinking at English for Specific Purposes Subject. The strategy that is applied is Bloom’s Critical Thinking Questioning Strategy. The positive side of this strategy is that the given questions are developed based on Bloom’s taxonomy level. It is an action research because the researcher uses own class in doing this research. The processes of this research have been done from April to Mei 2014. There are two cycles and each cycle consists of two meetings. After doing the research, it is gotten that Bloom’s Critical Thinking Questioning Strategy improves college students’ critical thinking. It helps the students to build and elaborate their ideas. Hence, it increases students’ reading comprehensionKeywords: critical thinking, blooms’ critical thinking questioning strategy, specific purposes class, English
Procedia PDF Downloads 5218512 Relativistic Effects of Rotation
Authors: Yin Rui, Yin Ming, Wang Yang
Abstract:
For a rotational reference frame of the theory of special relativity, the critical radius is defined as the distance from the axis to the point where the tangential velocity is equal to the speed of light, and the critical cylinder as the set of all points separated from the axis by this critical radius. Based on these terms, two relativistic effects of rotation are discovered: (i) the tangential velocity in the region of Outside Critical Cylinder (OCC) is not superluminal due to the existence of space-time exchange; (ii) some of the physical quantities of the rotational body have an opposite mathematic sign at OCC versus those at Inside Critical Cylinder (ICC), which is termed as the Critical Cylindrical Effect (CCE). The laboratory experiments demonstrate that the repulsive force exerted on an anion by electrons will change to an attractive force by the electrons in precession while the anion is at OCC of the precession. Thirty-six screenshots from four experimental videos are provided. Theoretical proofs for both space-time exchange and CCE are then presented. The CCEs of field force are also discussed.Keywords: critical radius, critical cylindrical effect, special relativity, space-time exchange
Procedia PDF Downloads 308511 Analysis of the Internal Mechanical Conditions in the Lower Limb Due to External Loads
Authors: Kent Salomonsson, Xuefang Zhao, Sara Kallin
Abstract:
Human soft tissue is loaded and deformed by any activity, an effect known as a stress-strain relationship, and is often described by a load and tissue elongation curve. Several advances have been made in the fields of biology and mechanics of soft human tissue. However, there is limited information available on in vivo tissue mechanical characteristics and behavior. Confident mechanical properties of human soft tissue cannot be extrapolated from e.g. animal testing. Thus, there is need for non invasive methods to analyze mechanical characteristics of soft human tissue. In the present study, the internal mechanical conditions of the lower limb, which is subject to an external load, is studied by use of the finite element method. A detailed finite element model of the lower limb is made possible by use of MRI scans. Skin, fat, bones, fascia and muscles are represented separately and the material properties for them are obtained from literature. Previous studies have been shown to address macroscopic deformation features, e.g. indentation depth, to a large extent. However, the detail in which the internal anatomical features have been modeled does not reveal the critical internal strains that may induce hypoxia and/or eventual tissue damage. The results of the present study reveals that lumped material models, i.e. averaging of the material properties for the different constituents, does not capture regions of critical strains in contrast to more detailed models.Keywords: FEM, tissue, indentation, properties
Procedia PDF Downloads 3388510 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine
Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour
Abstract:
Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.Keywords: decision tree, feature selection, intrusion detection system, support vector machine
Procedia PDF Downloads 2368509 Critical Thinking Index of College Students
Authors: Helen Frialde-Dupale
Abstract:
Critical thinking Index (CTI) of 150 third year college students from five State Colleges and Universities (SUCs) in Region I were determined. Only students with Grade Point Average (GPA) of at least 2.0 from four general classification of degree courses, namely: Education, Arts and Sciences, Engineering and Agriculture were included. Specific problem No.1 dealt with the profile variables, namely: age, sex, degree course, monthly family income, number of siblings, high school graduated from, grade point average, personality type, highest educational attainment of parents, and occupation of parents. Problem No. 2 determined the critical thinking index among the respondents. Problem No. 3 investigated whether or not there are significant differences in the critical thinking index among the respondents across the profile variables. While problem No.4 determined whether or not there are significant relationship between the critical thinking index and selected profile variables, namely: age, monthly family income, number of siblings, and grade point average of the respondents. Finally, on problem No. 5, the critical thinking instrument which obtained the lowest rates, were used as basis for outlining an intervention program for enhancing critical thinking index (CTI) of students. The following null hypotheses were tested at 0.05 level of significance: there are no significant differences in the critical thinking index of the third college students across the profile variables; there are no significant relationships between the critical thinking index of the respondents and selected variables, namely: age, monthly family income, number of siblings, and grade point average.Keywords: attitude as critical thinker, critical thinking applied, critical thinking index, self-perception as critical thinker
Procedia PDF Downloads 4928508 Preprocessing and Fusion of Multiple Representation of Finger Vein patterns using Conventional and Machine Learning techniques
Authors: Tomas Trainys, Algimantas Venckauskas
Abstract:
Application of biometric features to the cryptography for human identification and authentication is widely studied and promising area of the development of high-reliability cryptosystems. Biometric cryptosystems typically are designed for patterns recognition, which allows biometric data acquisition from an individual, extracts feature sets, compares the feature set against the set stored in the vault and gives a result of the comparison. Preprocessing and fusion of biometric data are the most important phases in generating a feature vector for key generation or authentication. Fusion of biometric features is critical for achieving a higher level of security and prevents from possible spoofing attacks. The paper focuses on the tasks of initial processing and fusion of multiple representations of finger vein modality patterns. These tasks are solved by applying conventional image preprocessing methods and machine learning techniques, Convolutional Neural Network (SVM) method for image segmentation and feature extraction. An article presents a method for generating sets of biometric features from a finger vein network using several instances of the same modality. Extracted features sets were fused at the feature level. The proposed method was tested and compared with the performance and accuracy results of other authors.Keywords: bio-cryptography, biometrics, cryptographic key generation, data fusion, information security, SVM, pattern recognition, finger vein method.
Procedia PDF Downloads 1218507 The Investigation on Pre-Service Teachers' Critical Thinking Dispositions in Terms of Several Variables
Authors: Cüneyit Akar, Mustafa Başaran, Ufuk Uluçınar
Abstract:
The purpose of this research is to examine the critical thinking dispositions of pre-service teachers in terms of several variables. In the line of this aim, we have investigated what their levels of critical thinking dispositions and whether there is any significant different in their critical thinking dispositions. Also, we have examined the relations between their critical thinking dispositions and their parents’ education statues, the number of their siblings, family income levels, and their religiosity level. 202 pre-service teachers who are studying at different departments at faculty of education at Uşak University participated in this research. In study, critical thinking dispositions scale by one of researchers was utilized and its validity and reliability was performed. The findings indicate that the level of their critical thinking dispositions was found to be .376 (arithmetic mean). On the other hand, we found that there is no significant difference in terms of their gender and the department at which they are studying. Furthermore, although there aren’t significant relationships between critical thinking dispositions and their mother education statues, their income levels, their religiosity levels and the number of their siblings; there is any significant positively at low level the relation between thinking dispositions and father educational statues. The findings obtained will be discussed together with literature and other research’ results.Keywords: preservice teachers, critical thinking dispositions, pedagogy, education
Procedia PDF Downloads 4598506 Task Distraction vs. Visual Enhancement: Which Is More Effective?
Authors: Huangmei Liu, Si Liu, Jia’nan Liu
Abstract:
The present experiment investigated and compared the effectiveness of two kinds of methods of attention control: Task distraction and visual enhancement. In the study, the effectiveness of task distractions to explicit features and of visual enhancement to implicit features of the same group of Chinese characters were compared based on their effect on the participants’ reaction time, subjective confidence rating, and verbal report. We found support that the visual enhancement on implicit features did overcome the contrary effect of training distraction and led to awareness of those implicit features, at least to some extent.Keywords: task distraction, visual enhancement, attention, awareness, learning
Procedia PDF Downloads 4098505 Security Features for Remote Healthcare System: A Feasibility Study
Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin
Abstract:
Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.Keywords: remote healthcare, IT security, security features, wireless sensor application
Procedia PDF Downloads 2758504 Identification Algorithm of Critical Interface, Modelling Perils on Critical Infrastructure Subjects
Authors: Jiří. J. Urbánek, Hana Malachová, Josef Krahulec, Jitka Johanidisová
Abstract:
The paper deals with crisis situations investigation and modelling within the organizations of critical infrastructure. Every crisis situation has an origin in the emergency event occurrence in the organizations of energetic critical infrastructure especially. Here, the emergency events can be both the expected events, then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping or the unexpected event (Black Swan effect) – without pre-prepared scenario, but it needs operational coping of crisis situations as well. The forms, characteristics, behaviour and utilization of crisis scenarios have various qualities, depending on real critical infrastructure organization prevention and training processes. An aim is always better organizational security and continuity obtainment. This paper objective is to find and investigate critical/ crisis zones and functions in critical situations models of critical infrastructure organization. The DYVELOP (Dynamic Vector Logistics of Processes) method is able to identify problematic critical zones and functions, displaying critical interfaces among actors of crisis situations on the DYVELOP maps named Blazons. Firstly, for realization of this ability is necessary to derive and create identification algorithm of critical interfaces. The locations of critical interfaces are the flags of crisis situation in real organization of critical infrastructure. Conclusive, the model of critical interface will be displayed at real organization of Czech energetic crisis infrastructure subject in Black Out peril environment. The Blazons need live power Point presentation for better comprehension of this paper mission.Keywords: algorithm, crisis, DYVELOP, infrastructure
Procedia PDF Downloads 3868503 A Feminist Critical Discourse Analysis of Selected Marvel Comics
Authors: Onaza Ajmal
Abstract:
The purpose of the study is to explore the power relations linguistically and visually with reference to the representation of gender, race, violence, and empowerment through male characters and female superheroes from the two selected Marvel comics, Ms. Marvel (2014) and Captain Marvel (2019-). The study also aims to elaborate on the different cultural backgrounds of female superheroes and their choices and behaviors concerning the male characters. Moreover, it also seeks to explore whether the female superheroes reassert or resists the established gender roles. Using the tenets of critical discourse analysis (CDA) and feminist critical discourse analysis (FCDA) by Lazar (2005), the study analyzed the power relations from a feminist viewpoint. The linguistic analysis of textual features such as ‘adjectives’, ‘lexical items’, ‘metaphors’, and ‘use of pronouns’, etc., found in the selected comics is carried out under the framework of CDA given by Fairclough (1989). Kress and van Leeuwen's model of reading images (2006) are used to analyze the visual images in this study. The findings of the study show that despite the empowering nature of female superheroes, the unequal power relations between male and female characters are established linguistically and visually, which further sustains and reinforces the racial and patriarchal gender ideologies in the selected comics. Moreover, it is recommended that the female representations in the feminist themes of empowerment with respect to the Pakistani female superheroes should also be explored for further research.Keywords: feminist critical discourse analysis, patriarchal gender ideology, power relations, superhero comics
Procedia PDF Downloads 1518502 Mood Recognition Using Indian Music
Authors: Vishwa Joshi
Abstract:
The study of mood recognition in the field of music has gained a lot of momentum in the recent years with machine learning and data mining techniques and many audio features contributing considerably to analyze and identify the relation of mood plus music. In this paper we consider the same idea forward and come up with making an effort to build a system for automatic recognition of mood underlying the audio song’s clips by mining their audio features and have evaluated several data classification algorithms in order to learn, train and test the model describing the moods of these audio songs and developed an open source framework. Before classification, Preprocessing and Feature Extraction phase is necessary for removing noise and gathering features respectively.Keywords: music, mood, features, classification
Procedia PDF Downloads 4768501 Empowering Minority Students Through the use of Critical Educational Technologies: Latinos in the United States
Authors: Oscar Guerra
Abstract:
Educational technologies have great potential as tools for student empowerment, particularly for members of a marginalized population such as immigrant Latino children in the American public education system. It is not merely a matter of access to the necessary technological devices; rather, it is development and implementation under a critical lens that may prompt a positive change.Keywords: education, critical technologies, minorities, higher education
Procedia PDF Downloads 2848500 Unfolding Simulations with the Use of Socratic Questioning Increases Critical Thinking in Nursing Students
Authors: Martha Hough RN
Abstract:
Background: New nursing graduates lack the critical thinking skills required to provide safe nursing care. Critical thinking is essential in providing safe, competent, and skillful nursing interventions. Educational institutions must provide a curriculum that improves nursing students' critical thinking abilities. In addition, the recent pandemic resulted in nursing students who previously received in-person clinical but now most clinical has been converted to remote learning, increasing the use of simulations. Unfolding medium and high-fidelity simulations and Socratic questioning are used in many simulations debriefing sessions. Methodology: Google Scholar was researched with the keywords: critical thinking of nursing students with unfolding simulation, which resulted in 22,000 articles; three were used. A second search was implemented with critical thinking of nursing students Socratic questioning, which resulted in two articles being used. Conclusion: Unfolding simulations increase nursing students' critical thinking, especially during the briefing (pre-briefing and debriefing) phases, where most learning occurs. In addition, the use of Socratic questions during the briefing phases motivates other questions, helps the student analyze and critique their thinking, and assists educators in probing students' thinking, which further increases critical thinking.Keywords: briefing, critical thinking, Socratic thinking, unfolding simulations
Procedia PDF Downloads 1558499 Systems Versioning: A Features-Based Meta-Modeling Approach
Authors: Ola A. Younis, Said Ghoul
Abstract:
Systems running these days are huge, complex and exist in many versions. Controlling these versions and tracking their changes became a very hard process as some versions are created using meaningless names or specifications. Many versions of a system are created with no clear difference between them. This leads to mismatching between a user’s request and the version he gets. In this paper, we present a system versions meta-modeling approach that produces versions based on system’s features. This model reduced the number of steps needed to configure a release and gave each version its unique specifications. This approach is applicable for systems that use features in its specification.Keywords: features, meta-modeling, semantic modeling, SPL, VCS, versioning
Procedia PDF Downloads 4168498 Evaluation of Critical State Behavior of Granular Soil in Confined Compression Tests
Authors: Rabia Chaudhry, Andrew Dawson
Abstract:
Identification of steady/critical state of coarse granular soil is challenging at conventional pressures. This study examines the drained and undrained triaxial tests for large strains on loose to dense, uniformly graded, Leighton Buzzard Fraction A sand. The triaxial tests are conducted under controlled test conditions. The comparison of soil behavior on shear strength characteristics at different effective stresses has been studied at the medium to large strains levels and the uniqueness of the critical state was discussed. The test results showed that there were two steady/critical state lines for drained and undrained conditions at confining pressures less than 1000 kPa. A critical state friction angle is not constant and the overall scatter in the steady/critical state line for the tested sand is ±0.01 in terms of void ratio at stress levels less than 1000 kPa.Keywords: critical state, stress strain behavior, fabric/structure, triaxial tests
Procedia PDF Downloads 3948497 The Spectral Power Amplification on the Regular Lattices
Authors: Kotbi Lakhdar, Hachi Mostefa
Abstract:
We show that a simple transformation between the regular lattices (the square, the triangular, and the honeycomb) belonging to the same dimensionality can explain in a natural way the universality of the critical exponents found in phase transitions and critical phenomena. It suffices that the Hamiltonian and the lattice present similar writing forms. In addition, it appears that if a property can be calculated for a given lattice then it can be extrapolated simply to any other lattice belonging to the same dimensionality. In this study, we have restricted ourselves on the spectral power amplification (SPA), we note that the SPA does not have an effect on the critical exponents but does have an effect by the criticality temperature of the lattice; the generalisation to other lattice could be shown according to the containment principle.Keywords: ising model, phase transitions, critical temperature, critical exponent, spectral power amplification
Procedia PDF Downloads 283