Search results for: Bayes’ rule
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 910

Search results for: Bayes’ rule

310 I Don’t Want to Have to Wait: A Study Into the Origins of Rule Violations at Rail Pedestrian Level Crossings

Authors: James Freeman, Andry Rakotonirainy

Abstract:

Train pedestrian collisions are common and are the most likely to result in severe injuries and fatalities when compared to other types of rail crossing accidents. However, there is limited research that has focused on understanding the reasons why some pedestrians’ break level crossings rules, which limits the development of effective countermeasures. As a result, this study undertook a deeper exploration into the origins of risky pedestrian behaviour through structured interviews. A total of 40 pedestrians who admitted to either intentionally breaking crossing rules or making crossing errors participated in an in-depth telephone interview. Qualitative analysis was undertaken via thematic analysis that revealed participants were more likely to report deliberately breaking rules (rather than make errors), particular after the train had passed the crossing as compared to before it arrives. Predominant reasons for such behaviours were identified to be: calculated risk taking, impatience, poor knowledge of rules and low likelihood of detection. The findings have direct implications for the development of effective countermeasures to improve crossing safety (and managing risk) such as increasing surveillance and transit officer presence, as well as installing appropriate barriers that either deter or incapacitate pedestrians from violating crossing rules. This paper will further outline the study findings in regards to the development of countermeasures as well as provide direction for future research efforts in this area.

Keywords: crossings, mistakes, risk, violations

Procedia PDF Downloads 415
309 Mobile Application to Generate Automate Plan for Tourist in The South and West of Saudi Arabia, Saferk

Authors: Hanan M. Alghamdi, Kholud E. Alsalami, Manal I. Alshaikhi, Nouf M. Alsalami, Sara A. Awad, Ruqaya A. Alrabei

Abstract:

Tourism in Saudi Arabia is one of the emerging sectors with rapid growth. The Kingdom of Saudi Arabia is characterized by its wonderful and historical areas, which constitute important cultural and tourist landmarks. These landmarks attract the attention of the government of Saudi Arabia; hence the improvement of the tourism sector becomes one of the important axes of Saudi Arabia's vision 2030. There is a need to enhance the tourist experience by facilitating the tourism process for visitors to the Kingdom of Saudi Arabia. This project aims to design an application to serve domestic tourists and visitors from outside the Kingdom of Saudi Arabia. This application will contain an automated tourist generate plan service by sentiment analysis of comments in Google Map using Lexicon for method Rule-based approach. There are thirteen regions in the kingdom of Saudi Arabia. The regions supported in this application will be Makkah and Asir regions. According to the output of the sentiment analysis, the application will recommend restaurants and cafes, activities (parks, museums) and shopping (shopping centers) in the generated plan. After that, the system will show the user a drop-down list of “Mega-events in Saudi Arabia” containing a link to the site of events in the Kingdom of Saudi Arabia. and “important information for you” public decency regulations.

Keywords: tourist automated plan, sentiment analysis, comments in google map, tourism in Saudi Arabia

Procedia PDF Downloads 143
308 Learner's Difficulties Acquiring English: The Case of Native Speakers of Rio de La Plata Spanish Towards Justifying the Need for Corpora

Authors: Maria Zinnia Bardas Hoffmann

Abstract:

Contrastive Analysis (CA) is the systematic comparison between two languages. It stems from the notion that errors are caused by interference of the L1 system in the acquisition process of an L2. CA represents a useful tool to understand the nature of learning and acquisition. Also, this particular method promises a path to un-derstand the nature of underlying cognitive processes, even when other factors such as intrinsic motivation and teaching strategies were found to best explain student’s problems in acquisition. CA study is justified not only from the need to get a deeper understanding of the nature of SLA, but as an invaluable source to provide clues, at a cognitive level, for those general processes involved in rule formation and abstract thought. It is relevant for cross disciplinary studies and the fields of Computational Thought, Natural Language processing, Applied Linguistics, Cognitive Linguistics and Math Theory. That being said, this paper intends to address here as well its own set of constraints and limitations. Finally, this paper: (a) aims at identifying some of the difficulties students may find in their learning process due to the nature of their specific variety of L1, Rio de la Plata Spanish (RPS), (b) represents an attempt to discuss the necessity for specific models to approach CA.

Keywords: second language acquisition, applied linguistics, contrastive analysis, applied contrastive analysis English language department, meta-linguistic rules, cross-linguistics studies, computational thought, natural language processing

Procedia PDF Downloads 150
307 The Decline of Verb-Second in the History of English: Combining Historical and Theoretical Explanations for Change

Authors: Sophie Whittle

Abstract:

Prior to present day, English syntax historically exhibited an inconsistent verb-second (V2) rule, which saw the verb move to the second position in the sentence following the fronting of a type of phrase. There was a high amount of variation throughout the history of English with regard to the ordering of subject and verb, and many explanations attempting to account for this variation have been documented in previous literature. However, these attempts have been contradictory, with many accounts positing the effect of previous syntactic changes as the main motivations behind the decline of V2. For instance, morphosyntactic changes, such as the loss of clitics and the loss of empty expletives, have been loosely connected to changes in frequency for the loss of V2. The questions surrounding the development of non-V2 in English have, therefore, yet to be answered. The current paper aims to bring together a number of explanations from different linguistic fields to determine the factors driving the changes in English V2. Using historical corpus-based methods, the study analyses both quantitatively and qualitatively the changes in frequency for the history of V2 in the Old, Middle, and Modern English periods to account for the variation in a range of sentential environments. These methods delve into the study of information structure, prosody and language contact to explain variation within different contexts. The analysis concludes that these factors, in addition to changes within the syntax, are responsible for the position of verb movement. The loss of V2 serves as an exemplar study within the field of historical linguistics, which combines a number of factors in explaining language change in general.

Keywords: corpora, English, language change, mixed-methods, syntax, verb-second

Procedia PDF Downloads 135
306 Combating Money Laundering and Inroads into Banking Secrecy: Evidence from Malaysia

Authors: Aspalella A. Rahman

Abstract:

It is widely accepted that the investigation of money laundering and the tracing and confiscation of criminal proceeds have intruded into the principles of banking secrecy. The inroads into banking secrecy present serious threats to democracy, and more importantly, to the traditional banker-customer relationship. It is generally accepted that the fight against money laundering is in conflict with the secrecy rule. Banking secrecy is a customer privilege whereas combating crime is critical for public safety and security. Indeed, achieving a proper balance is a desirable goal. But how we go about achieving such a balance is a question encountered by many law enforcement authorities. Therefore, this paper examines the effect of disclosure under the Malaysian anti-money laundering laws on the traditional duty of banks to keep the customer’s information confidential. It also analyzes whether the Malaysian laws provide a right balance between a duty to keep customer’s information secret and a duty to disclose such information in the fight against money laundering. On closer inspection, it is submitted that the Malaysian laws provide sufficient safeguards to ensure that the disclosure of customer’s information is carried out in a manner that is not prejudicial to the interest of legitimate customers. This is a positive approach that could protect the innocent customers from being mistreated by the law. Ultimately, it can be said that the growing threat of global money laundering and terrorism makes the overriding of banking secrecy justified because without a flow of information from the banks, the effective prevention of the menace is not possible.

Keywords: anti-money laundering law, banker-customer relationship, banking secrecy, confidentiality, money laundering

Procedia PDF Downloads 428
305 Modeling Engagement with Multimodal Multisensor Data: The Continuous Performance Test as an Objective Tool to Track Flow

Authors: Mohammad H. Taheri, David J. Brown, Nasser Sherkat

Abstract:

Engagement is one of the most important factors in determining successful outcomes and deep learning in students. Existing approaches to detect student engagement involve periodic human observations that are subject to inter-rater reliability. Our solution uses real-time multimodal multisensor data labeled by objective performance outcomes to infer the engagement of students. The study involves four students with a combined diagnosis of cerebral palsy and a learning disability who took part in a 3-month trial over 59 sessions. Multimodal multisensor data were collected while they participated in a continuous performance test. Eye gaze, electroencephalogram, body pose, and interaction data were used to create a model of student engagement through objective labeling from the continuous performance test outcomes. In order to achieve this, a type of continuous performance test is introduced, the Seek-X type. Nine features were extracted including high-level handpicked compound features. Using leave-one-out cross-validation, a series of different machine learning approaches were evaluated. Overall, the random forest classification approach achieved the best classification results. Using random forest, 93.3% classification for engagement and 42.9% accuracy for disengagement were achieved. We compared these results to outcomes from different models: AdaBoost, decision tree, k-Nearest Neighbor, naïve Bayes, neural network, and support vector machine. We showed that using a multisensor approach achieved higher accuracy than using features from any reduced set of sensors. We found that using high-level handpicked features can improve the classification accuracy in every sensor mode. Our approach is robust to both sensor fallout and occlusions. The single most important sensor feature to the classification of engagement and distraction was shown to be eye gaze. It has been shown that we can accurately predict the level of engagement of students with learning disabilities in a real-time approach that is not subject to inter-rater reliability, human observation or reliant on a single mode of sensor input. This will help teachers design interventions for a heterogeneous group of students, where teachers cannot possibly attend to each of their individual needs. Our approach can be used to identify those with the greatest learning challenges so that all students are supported to reach their full potential.

Keywords: affective computing in education, affect detection, continuous performance test, engagement, flow, HCI, interaction, learning disabilities, machine learning, multimodal, multisensor, physiological sensors, student engagement

Procedia PDF Downloads 94
304 Performing Diagnosis in Building with Partially Valid Heterogeneous Tests

Authors: Houda Najeh, Mahendra Pratap Singh, Stéphane Ploix, Antoine Caucheteux, Karim Chabir, Mohamed Naceur Abdelkrim

Abstract:

Building system is highly vulnerable to different kinds of faults and human misbehaviors. Energy efficiency and user comfort are directly targeted due to abnormalities in building operation. The available fault diagnosis tools and methodologies particularly rely on rules or pure model-based approaches. It is assumed that model or rule-based test could be applied to any situation without taking into account actual testing contexts. Contextual tests with validity domain could reduce a lot of the design of detection tests. The main objective of this paper is to consider fault validity when validate the test model considering the non-modeled events such as occupancy, weather conditions, door and window openings and the integration of the knowledge of the expert on the state of the system. The concept of heterogeneous tests is combined with test validity to generate fault diagnoses. A combination of rules, range and model-based tests known as heterogeneous tests are proposed to reduce the modeling complexity. Calculation of logical diagnoses coming from artificial intelligence provides a global explanation consistent with the test result. An application example shows the efficiency of the proposed technique: an office setting at Grenoble Institute of Technology.

Keywords: heterogeneous tests, validity, building system, sensor grids, sensor fault, diagnosis, fault detection and isolation

Procedia PDF Downloads 295
303 Inclusion of Transgender in Mainstream Secondary Schools of Bangladesh: Perceptions and Issues

Authors: Shanaj Parvin Jonaki

Abstract:

After the first wave of the feminist movement, gender has become one of the most important issues to be researched in social science. Many gender theories have been invented and opened a new window to look at. These works showed how gender is a social construct, how gender has been used to oppress, how to rule. While it's the education system’s duty to guide students to understand the concept of gender, it sometimes shows gender-based discrimination. Transgenders exclusion from educational institutes of Bangladesh justifies this very statement. This study aims to figure out how people perceive transgenders’ identity, their inclusion in secondary schools, as well as the underlying barriers in the pathway of inclusion in the context of Bangladesh. A qualitative approach was taken to explore different perspectives towards transgender inclusion from several stakeholders such as students, parents, and teachers of secondary schools and transgenders as well. Data were collected through focus group discussion and interview by convenient sampling. 15 students, 10 parents, and 5 teachers were selected from Bangla Medium school as well as from Madrasha. Collected data were analyzed thematically and were run by experts of gender, education, and psychology to identify the core barriers of inclusion. The study revealed that most of the students, teachers, and parents lacked the knowledge of non-binary gender identities, and they showed unwillingness towards the inclusion of transgender in schools because of the cultural context of Bangladesh. Moreover, this study suggests future initiatives to be taken to ensure the inclusion of transgenders in a secondary school in our country and analyzes it through the lens of feminist theories.

Keywords: education, gender, inclusion, transgender

Procedia PDF Downloads 191
302 Does Women Involvement in Politics Decrease Corruption? A Context Based Approach to the Corruption Rate Index of ASEAN Countries

Authors: Lu Anne A. Godinez, May Claudine I. Gador, Preacious G. Gumolon, Louiechi Von R. Mendoza, Neil Bryan N. Moninio

Abstract:

Gender equality and women empowerment is the third of eight Millennium Development Goals. Understanding corruption’s linkages to gender equality issues and how it impacts women’s empowerment is part of the broader process of advancing women’s rights and understanding the gender dimensions of democratic governance. Taking a long view of political (corruption index) and the social (women empowerment) dimension — a view from 2015 to 2030, a context based forecast was conducted to forecast the ASEAN corruption index in the next 15 years, answering the question: “Does women political involvement decrease corruption rate index of ASEAN countries in the next 15 years?” The study have established that there will be an increase women political involvement in the ASEAN countries in the next 15 years that will cause a drop on corruption rate index. There will be a significant decline on corruption rate index in 2030. This change entails reform not only in the political aspect of progress, but to the social aspect as well. Finally, the political aspect is increasing at a constant rate however a double or triple increase of the social aspect is seen to be the key solution for corruption.

Keywords: women, women political involvement, corruption, gender equity index, economic participation, educational attainment, political empowerment, control of corruption, regulatory quality, rule of law, voice and accountability government effectiveness, political stability and corruption perception index

Procedia PDF Downloads 424
301 South African Municipal Service Delivery Failure and Public Value Theory

Authors: Andrew Enaifoghe

Abstract:

Municipalities are the most fundamental units of governance, and they are responsible for providing basic services and supporting growth in the areas they rule. South African local government is primarily understood in terms of service delivery, and the South African constitution provides municipalities with the responsibility of mobilizing economic resources, to better the lives of all people. Essential public services are the primary pillars of enhanced quality of life, and appropriate supplies of safe water and sanitation are required for life, well-being, and human dignity. Therefore, having access to basic services is directly tied to social inclusion and social capital, and towns' inability to offer services can have a negative influence on social and economic growth. The problem of service delivery is seen as one of the biggest challenges facing South African municipalities today. This study attempts to assess South African municipal service delivery. Focusing on the main causes of service delivery challenges, the study also looks at the impact of these challenges to identify ways to minimize such challenges by introducing legal instruments such as municipal budgeting and annual reports. A qualitative design was adopted, and data were collected using a desktop technique and analyzed based on content. While public engagement in municipal affairs is required by law, considerable work has to be done to ensure successful participation. Finally, municipalities were deemed to need to do more to improve human capacity to offer services.

Keywords: municipalities, service delivery, corruption, monitoring, South Africa

Procedia PDF Downloads 149
300 Electrokinetic Regulation of Flow in Microcrack Reservoirs

Authors: Aslanova Aida Ramiz

Abstract:

One of the important aspects of rheophysical problems in oil and gas extraction is the regulation of thermohydrodynamic properties of liquid systems using physical and physicochemical methods. It is known that the constituent parts of real fluid systems in oil and gas production are practically non-conducting, non-magnetically active components. Real heterogeneous hydrocarbon systems, from the structural point of view, consist of an infinite number of microscopic local ion-electrostatic cores distributed in the volume of the dispersion medium. According to Cohen's rule, double electric layers are formed at the contact boundaries of components in contact (oil-gas, oil-water, water-condensate, etc.) in a heterogeneous system, and as a result, each real fluid system can be represented as a complex composition of a set of local electrostatic fields. The electrokinetic properties of this structure are characterized by a certain electrode potential. Prof. F.H. Valiyev called this potential the α-factor and came up with the idea that many natural and technological rheophysical processes (effects) are essentially electrokinetic in nature, and by changing the α-factor, it is possible to adjust the physical properties of real hydraulic systems, including thermohydrodynamic parameters. Based on this idea, extensive research work was conducted, and the possibility of reducing hydraulic resistances and improving rheological properties was experimentally discovered in real liquid systems by reducing the electrical potential with various physical and chemical methods.

Keywords: microcracked, electrode potential, hydraulic resistance, Newtonian fluid, rheophysical properties

Procedia PDF Downloads 77
299 Finding the Longest Common Subsequence in Normal DNA and Disease Affected Human DNA Using Self Organizing Map

Authors: G. Tamilpavai, C. Vishnuppriya

Abstract:

Bioinformatics is an active research area which combines biological matter as well as computer science research. The longest common subsequence (LCSS) is one of the major challenges in various bioinformatics applications. The computation of the LCSS plays a vital role in biomedicine and also it is an essential task in DNA sequence analysis in genetics. It includes wide range of disease diagnosing steps. The objective of this proposed system is to find the longest common subsequence which presents in a normal and various disease affected human DNA sequence using Self Organizing Map (SOM) and LCSS. The human DNA sequence is collected from National Center for Biotechnology Information (NCBI) database. Initially, the human DNA sequence is separated as k-mer using k-mer separation rule. Mean and median values are calculated from each separated k-mer. These calculated values are fed as input to the Self Organizing Map for the purpose of clustering. Then obtained clusters are given to the Longest Common Sub Sequence (LCSS) algorithm for finding common subsequence which presents in every clusters. It returns nx(n-1)/2 subsequence for each cluster where n is number of k-mer in a specific cluster. Experimental outcomes of this proposed system produce the possible number of longest common subsequence of normal and disease affected DNA data. Thus the proposed system will be a good initiative aid for finding disease causing sequence. Finally, performance analysis is carried out for different DNA sequences. The obtained values show that the retrieval of LCSS is done in a shorter time than the existing system.

Keywords: clustering, k-mers, longest common subsequence, SOM

Procedia PDF Downloads 267
298 A Sectional Control Method to Decrease the Accumulated Survey Error of Tunnel Installation Control Network

Authors: Yinggang Guo, Zongchun Li

Abstract:

In order to decrease the accumulated survey error of tunnel installation control network of particle accelerator, a sectional control method is proposed. Firstly, the accumulation rule of positional error with the length of the control network is obtained by simulation calculation according to the shape of the tunnel installation-control-network. Then, the RMS of horizontal positional precision of tunnel backbone control network is taken as the threshold. When the accumulated error is bigger than the threshold, the tunnel installation control network should be divided into subsections reasonably. On each segment, the middle survey station is taken as the datum for independent adjustment calculation. Finally, by taking the backbone control points as faint datums, the weighted partial parameters adjustment is performed with the adjustment results of each segment and the coordinates of backbone control points. The subsections are jointed and unified into the global coordinate system in the adjustment process. An installation control network of the linac with a length of 1.6 km is simulated. The RMS of positional deviation of the proposed method is 2.583 mm, and the RMS of the difference of positional deviation between adjacent points reaches 0.035 mm. Experimental results show that the proposed sectional control method can not only effectively decrease the accumulated survey error but also guarantee the relative positional precision of the installation control network. So it can be applied in the data processing of tunnel installation control networks, especially for large particle accelerators.

Keywords: alignment, tunnel installation control network, accumulated survey error, sectional control method, datum

Procedia PDF Downloads 191
297 Good Governance in Perspective: An Example of Transition from Corruption towards Integrity within a Developing Country (Pakistan)

Authors: Saifullah Khalid

Abstract:

Governance and good governance are among the main topics in international discussions about the success factors for social and economic development. The image of developing countries as for example Pakistan in this respect is bad (in TI Corruption Index nr. among countries). Additionally, the police are among the sectors and organizations which are seen as most corrupt in many countries. However, in case of Pakistan there seem to be exceptions to the rule, and improvement can be brought in specific police departments. This paper represents the findings of Islamabad traffic police (ITP). In Pakistan, the police, in general, have been stigmatized for being the most corrupt department in the country. However, the few recent examples of Motorway police and its replicated model of Islamabad traffic police changed the perception about police and policing. These police forces have shown that Policing in Pakistan can be changed for better. In this paper, the research question that is addressed is: How corrupt are (traffic) police forces in Pakistan and what factors influence corruption within that police force? And What lessons can be learned from that to improve police integrity? Both qualitative and quantitative tools are utilized for data collection. The overall picture of the factors is not so easy to interpret and summarise. Nevertheless paying a better salary does not seem to limit integrity violations, neither does recruitment and selection and leadership, while supervision and control, training and stimulating the positive and limiting the negative elements of culture appear to be important in curbing (sometimes specific) integrity violations in the context of Pakistani police forces. The study also leads to a number of suggestions for curbing corruption and other integrity violations in the Pakistan police.

Keywords: corruption control, governance, integrity violations, Islamabad traffic police, Pakistan

Procedia PDF Downloads 216
296 Power Relation, Symbolic Rules and the Position of Belis in the Habitus of the East Nusa Tenggara Society’s Customary Marriage

Authors: Siti Rodliyah, Andrik Purwasito, Bani Sudardi, Abdullah Wakit

Abstract:

This study employs sociological-ethnographic basic method and the cultural studies paradigm as the approach in understanding the habitus within the customary marriage of the East Nusa Tenggara society who require belis as a bride-price. The conceptual basis underlying the application of habitus theory and symbolic power in East Nusa Tenggara (NTT) society refers to the Bourdieu’s framework. This study is a result of participatory observation on habitus of a marital system using belis observed by the NTT society as a cognitive structure which connects individuals to the social activities of the customary marriage and makes it unquestionable habits. Knowledge of the social world under the pretext of prosperity for the recipients (family) of a bride-price can be a political instrument for the sustainability of power relations. The ritual-mythical system in the society has never been fully present as a neutral habit. The habitus reflected in the marital relationship among the NTT society enables the men to obtain and exercise their power relations. The sustainability of power relations can be seen from the representation of the social status of a girl and the properties attached to her. This is what gave birth to a symbolic rule, in which the social rules about bride-price or belis eventually will serve the interests of those who occupy a dominant position in the social structure, namely the rich men.

Keywords: belis, habitus, East Nusa Tenggara, marital system, power, symbolic

Procedia PDF Downloads 244
295 Examining the Relevance of Electoral Commission in Fostering Democratic Governance in Nigeria

Authors: Ahmed Usman

Abstract:

This paper attempts to examine the relevance of an Electoral Commission in the democratic process of governance in Nigeria. However, democratic system and governance present a clear indication of responsive and responsible governments. The idea of a government being responsive and responsible is based on the premise of conventional principles of democracy such as freedom of political, economic and social rights of and individual. More so, upholding of the Rule of Law based on the ground of constitutionalism is a clear manifestation of the democratic governance. The burdens of ascertaining theses democratic ethos rely solely on the constituted election management body known as Independent National Electoral Commission (INEC) for the case of Nigeria. This body is however, saddled with the responsibility of organizing and conducting periodic regular credible election known as free and fair election. The body also, is expected to be neutral, and independent to ensure fair treatment to all. It is on the basis of this fair treatment that credible leaders emerged. To this end, the paper examines the powers, functions and features of Independent National Electoral Commission. More so, the concepts of election and democracy have been operationalized. It is obvious that electoral process in Nigeria is marred with series of problems of which the paper identified and solutions were proffered towards credible, free and fair elections for sustainable democratic governance. In order to succinctly discuss and analyze the issues at stake, Structural Functional Analysis theory is adopted as a theoretical frame work for the paper.

Keywords: election, electoral commission, democracy, governance

Procedia PDF Downloads 211
294 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 107
293 A Framework Based on Dempster-Shafer Theory of Evidence Algorithm for the Analysis of the TV-Viewers’ Behaviors

Authors: Hamdi Amroun, Yacine Benziani, Mehdi Ammi

Abstract:

In this paper, we propose an approach of detecting the behavior of the viewers of a TV program in a non-controlled environment. The experiment we propose is based on the use of three types of connected objects (smartphone, smart watch, and a connected remote control). 23 participants were observed while watching their TV programs during three phases: before, during and after watching a TV program. Their behaviors were detected using an approach based on The Dempster Shafer Theory (DST) in two phases. The first phase is to approximate dynamically the mass functions using an approach based on the correlation coefficient. The second phase is to calculate the approximate mass functions. To approximate the mass functions, two approaches have been tested: the first approach was to divide each features data space into cells; each one has a specific probability distribution over the behaviors. The probability distributions were computed statistically (estimated by empirical distribution). The second approach was to predict the TV-viewing behaviors through the use of classifiers algorithms and add uncertainty to the prediction based on the uncertainty of the model. Results showed that mixing the fusion rule with the computation of the initial approximate mass functions using a classifier led to an overall of 96%, 95% and 96% success rate for the first, second and third TV-viewing phase respectively. The results were also compared to those found in the literature. This study aims to anticipate certain actions in order to maintain the attention of TV viewers towards the proposed TV programs with usual connected objects, taking into account the various uncertainties that can be generated.

Keywords: Iot, TV-viewing behaviors identification, automatic classification, unconstrained environment

Procedia PDF Downloads 229
292 Comparative Evaluation of Pharmacologically Guided Approaches (PGA) to Determine Maximum Recommended Starting Dose (MRSD) of Monoclonal Antibodies for First Clinical Trial

Authors: Ibraheem Husain, Abul Kalam Najmi, Karishma Chester

Abstract:

First-in-human (FIH) studies are a critical step in clinical development of any molecule that has shown therapeutic promise in preclinical evaluations, since preclinical research and safety studies into clinical development is a crucial step for successful development of monoclonal antibodies for guidance in pharmaceutical industry for the treatment of human diseases. Therefore, comparison between USFDA and nine pharmacologically guided approaches (PGA) (simple allometry, maximum life span potential, brain weight, rule of exponent (ROE), two species methods and one species methods) were made to determine maximum recommended starting dose (MRSD) for first in human clinical trials using four drugs namely Denosumab, Bevacizumab, Anakinra and Omalizumab. In our study, the predicted pharmacokinetic (pk) parameters and the estimated first-in-human dose of antibodies were compared with the observed human values. The study indicated that the clearance and volume of distribution of antibodies can be predicted with reasonable accuracy in human and a good estimate of first human dose can be obtained from the predicted human clearance and volume of distribution. A pictorial method evaluation chart was also developed based on fold errors for simultaneous evaluation of various methods.

Keywords: clinical pharmacology (CPH), clinical research (CRE), clinical trials (CTR), maximum recommended starting dose (MRSD), clearance and volume of distribution

Procedia PDF Downloads 374
291 The Ethio-Eritrea Claims Commission on Use of Force: Issue of Self-Defense or Violation of Sovereignty

Authors: Isaias Teklia Berhe

Abstract:

A decision that deals with international disputes, be it arbitral or judicial, has to properly reflect objectivity and coherence with existing rules of international law. This paper shows the decision of the Ethio-Eritrea Claims Commission on the jus ad bellum case is bereft of objectivity and coherence, which contributed a disservice to international law on many aspects. The Commission’s decision that holds Eritrea in contravention to Art 2(4) of the UN Charter based on Ethiopia’s contention is flawed. It fails to consider: the illegitimacy of an actual authority established over contested territory through hostile acts, the proper determination of effectivites under international law, the sanctity of colonially determined boundaries, Ethiopia’s prior firm political recognition and undergirds to respect colonial boundary, and Ethio-Eritrea Border Commission’s decision. The paper will also argue that the Commission confused Eritrea’s right of self-defense with the rule against the non-use of force to settle territorial disputes; wherefore its decision sanitizes or sterilizes unlawful change of territory resulted through unlawful use of force to the effect of advantaging aggressions. The paper likewise argues that the decision is so sacrilegious that it disregards the ossified legal finality of colonial boundaries. Moreover, its approach toward armed attack does not reflect the peculiarity of the jus ad bellum case rather it brings about definitional uncertainties and sustains the perception that the law on self-defense is unsettled.

Keywords: armed attack, Eritrea, Ethiopia, self-defense, territorial integrity, use of force

Procedia PDF Downloads 278
290 Coordinated Interference Canceling Algorithm for Uplink Massive Multiple Input Multiple Output Systems

Authors: Messaoud Eljamai, Sami Hidouri

Abstract:

Massive multiple-input multiple-output (MIMO) is an emerging technology for new cellular networks such as 5G systems. Its principle is to use many antennas per cell in order to maximize the network's spectral efficiency. Inter-cellular interference remains a fundamental problem. The use of massive MIMO will not derogate from the rule. It improves performances only when the number of antennas is significantly greater than the number of users. This, considerably, limits the networks spectral efficiency. In this paper, a coordinated detector for an uplink massive MIMO system is proposed in order to mitigate the inter-cellular interference. The proposed scheme combines the coordinated multipoint technique with an interference-cancelling algorithm. It requires the serving cell to send their received symbols, after processing, decision and error detection, to the interfered cells via a backhaul link. Each interfered cell is capable of eliminating intercellular interferences by generating and subtracting the user’s contribution from the received signal. The resulting signal is more reliable than the original received signal. This allows the uplink massive MIMO system to improve their performances dramatically. Simulation results show that the proposed detector improves system spectral efficiency compared to classical linear detectors.

Keywords: massive MIMO, COMP, interference canceling algorithm, spectral efficiency

Procedia PDF Downloads 147
289 A Case Study of Physical and Psychological Forces in the Nigerian Criminal and Military Interrogations

Authors: Onimisi Ekuh Abdullahi, Lasbat Omoshalewa Akinsemoyin

Abstract:

In Nigeria, over two decades now, there has been a steady increase in the insecurity of human lives and physical properties. In the South-South Nigeria, there is an acute insecurity of militants destroying oil pipe-lines and kidnapping cases; in the Middle-Belt zone, insecurity centers on kidnapping and in a few states crises between Herdsmen and Farmers range like wildfire; in the South-Western zone, kidnapping is vile, in the North-East zone the issue of Boko Haram has become World-wide concern, and in North-west zone, cattle rustlers and religious crisis are of great concern. At the initial stage, the Nigerian Police Force was called upon to quell the crisis. It soon became obvious that the dimension of the crisis was beyond police force. The Nigerian Armed Forces were called to maintain peace and order because the magnitude of the crisis was threatening the national unity and cohesion. The main objective of this paper, was to examine the investigative techniques of criminal by the military in Nigeria. Specifically to examine the physical and psychological force; the abusive techniques and tactics; and suggest modern psychological techniques of interrogating criminals accepted to Human Right Activists and the rule of law. The process is to create room behaviour and practices that carefully monitored the trust and reliability of admissions produced by Psychological manipulative process in Nigeria.

Keywords: military, Nigerian criminal, physical, psychological force

Procedia PDF Downloads 161
288 Origins of Strict Liability for Abnormally Dangerous Activities in the United States, Rylands v. Fletcher and a General Clause of Strict Liability in the UK

Authors: Maria Lubomira Kubica

Abstract:

The paper reveals the birth and evolution of the British precedent Rylands v. Fletcher that, once adopted on the other side of the Ocean (in United States), gave rise to a general clause of liability for abnormally dangerous activities recognized by the §20 of the American Restatements of the Law Third, Liability for Physical and Emotional Harm. The main goal of the paper was to analyze the development of the legal doctrine and of the case law posterior to the precedent together with the intent of the British judicature to leapfrog from the traditional rule contained in Rylands v. Fletcher to a general clause similar to that introduced in the United States and recently also on the European level. As it is well known, within the scope of tort law two different initiatives compete with the aim of harmonizing the European laws: European Group on Tort Law with its Principles of European Tort Law (hereinafter PETL) in which article 5:101 sets forth a general clause for strict liability for abnormally dangerous activities and Study Group on European Civil Code with its Common Frame of Reference (CFR) which promotes rather ad hoc model of listing out determined cases of strict liability. Very narrow application scope of the art. 5:101 PETL, restricted only to abnormally dangerous activities, stays in opposition to very broad spectrum of strict liability cases governed by the CFR. The former is a perfect example of a general clause that offers a minimum and basic standard, possibly acceptable also in those countries in which, like in the United Kingdom, this regime of liability is completely marginalized.

Keywords: Rylands v. Fletcher, strict liability, dangerous activities, general clause

Procedia PDF Downloads 321
287 Effects of Work Load and Surface Acting on Emotional Exhaustion and Work Satisfaction of Social Worker Students: Chinese Indigenous Ren-Qing Shi-Ku Trait as Moderator

Authors: Chung-Kwei Wang, Kuo-Ying Lo

Abstract:

The study is aimed to examine main and moderation effect of Chinese traditional social wisdom ‘Ren-qing Shi-kuon' the adjustment of social worker students during their practicum. Ren-qing Shi-ku as a social wisdom has been emphasized by collective-oriented Chinese society for thousand years. Based on interview and literature review, we operationalized the concept as four factors, including ‘harmonious interaction’, ‘understanding and tolerance’, ‘empathetic communication’ and ‘rule abiding’. We administer the scale to 96 social worker senior students before their summer practicums begins and collect their response on emotion labor, emotional exhaustion, work load, work satisfaction. We also ask their supervisors rated their performance on empathy, interpersonal relationships, performance on practicum and their Ren-qing Shi-ku performance. Results indicated that self-ratings of students on Ren-qing Shi-ku scale are correlated with rating from their supervisors. Students who have higher Ren-qing Shi-ku have better adjustment and higher ratings from their supervisor. Ren-qing Shi-ku also moderate effects of surface acting labor and work load on emotional exhaustion and work satisfaction. However, Ren-qing Shi-ku seems more beneficial under low work load situations. The finding of this study suggested traditional social skill training might be very effective for social service providers in a collective-oriented culture.

Keywords: emotion labor, ren-qing shi-ku, emotional exhaustion, work satisfaction and performance

Procedia PDF Downloads 491
286 Characterization of Heterotrimeric G Protein α Subunit in Tomato

Authors: Thi Thao Ninh, Yuri Trusov, José Ramón Botella

Abstract:

Heterotrimeric G proteins, comprised of three subunits, α, β and γ, are involved in signal transduction pathways that mediate a vast number of processes across the eukaryotic kingdom. 23 Gα subunits are present in humans whereas most plant genomes encode for only one canonical Gα. The disparity observed between Arabidopsis, rice, and maize Gα-deficient mutant phenotypes suggest that Gα functions have diversified between eudicots and monocots during evolution. Alternatively, since the only Gα mutations available in dicots have been produced in Arabidopsis, the possibility exists that this species might be an exception to the rule. In order to test this hypothesis, we studied the G protein α subunit (TGA1) in tomato. Four tga1 knockout lines were generated in tomato cultivar Moneymaker using CRISPR/Cas9. The tga1 mutants exhibit a number of auxin-related phenotypes including changes in leaf shape, reduced plant height, fruit size and number of seeds per fruit. In addition, tga1 mutants have increased sensitivity to abscisic acid during seed germination, reduced sensitivity to exogenous auxin during adventitious root formation from cotyledons and excised hypocotyl explants. Our results suggest that Gα mutant phenotypes in tomato are very similar to those observed in monocots, i.e. rice and maize, and cast doubts about the validity of using Arabidopsis as a model system for plant G protein studies.

Keywords: auxin-related phenotypes, CRISPR/Cas9, G protein α subunit, heterotrimeric G proteins, tomato

Procedia PDF Downloads 137
285 Classification of EEG Signals Based on Dynamic Connectivity Analysis

Authors: Zoran Šverko, Saša Vlahinić, Nino Stojković, Ivan Markovinović

Abstract:

In this article, the classification of target letters is performed using data from the EEG P300 Speller paradigm. Neural networks trained with the results of dynamic connectivity analysis between different brain regions are used for classification. Dynamic connectivity analysis is based on the adaptive window size and the imaginary part of the complex Pearson correlation coefficient. Brain dynamics are analysed using the relative intersection of confidence intervals for the imaginary component of the complex Pearson correlation coefficient method (RICI-imCPCC). The RICI-imCPCC method overcomes the shortcomings of currently used dynamical connectivity analysis methods, such as the low reliability and low temporal precision for short connectivity intervals encountered in constant sliding window analysis with wide window size and the high susceptibility to noise encountered in constant sliding window analysis with narrow window size. This method overcomes these shortcomings by dynamically adjusting the window size using the RICI rule. This method extracts information about brain connections for each time sample. Seventy percent of the extracted brain connectivity information is used for training and thirty percent for validation. Classification of the target word is also done and based on the same analysis method. As far as we know, through this research, we have shown for the first time that dynamic connectivity can be used as a parameter for classifying EEG signals.

Keywords: dynamic connectivity analysis, EEG, neural networks, Pearson correlation coefficients

Procedia PDF Downloads 216
284 Legal Doctrine on Rylands v. Fletcher: One more time on Feasibility of a General Clause of Strict Liability in the UK

Authors: Maria Lubomira Kubica

Abstract:

The paper reveals the birth and evolution of the British precedent Rylands v. Fletcher that, once adopted on the other side of the Ocean (in United States), gave rise to a general clause of liability for abnormally dangerous activities recognized by the §20 of the American Restatements of the Law Third, Liability for Physical and Emotional Harm. The main goal of the paper was to analyze the development of the legal doctrine and of the case law posterior to the precedent together with the intent of the British judicature to leapfrog from the traditional rule contained in Rylands v. Fletcher to a general clause similar to that introduced in the United States and recently also on the European level. As it is well known, within the scope of tort law two different initiatives compete with the aim of harmonizing the European laws: European Group on Tort Law with its Principles of European Tort Law (hereinafter PETL) in which article 5:101 sets forth a general clause for strict liability for abnormally dangerous activities and Study Group on European Civil Code with its Common Frame of Reference (CFR) which promotes rather ad hoc model of listing out determined cases of strict liability. Very narrow application scope of the art. 5:101 PETL, restricted only to abnormally dangerous activities, stays in opposition to very broad spectrum of strict liability cases governed by the CFR. The former is a perfect example of a general clause that offers a minimum and basic standard, possibly acceptable also in those countries in which, like in the United Kingdom, this regime of liability is completely marginalized.

Keywords: abnormally dangerous activities, general clause, Rylands v. Fletcher, strict liability

Procedia PDF Downloads 201
283 Novel Inference Algorithm for Gaussian Process Classification Model with Multiclass and Its Application to Human Action Classification

Authors: Wanhyun Cho, Soonja Kang, Sangkyoon Kim, Soonyoung Park

Abstract:

In this paper, we propose a novel inference algorithm for the multi-class Gaussian process classification model that can be used in the field of human behavior recognition. This algorithm can drive simultaneously both a posterior distribution of a latent function and estimators of hyper-parameters in a Gaussian process classification model with multi-class. Our algorithm is based on the Laplace approximation (LA) technique and variational EM framework. This is performed in two steps: called expectation and maximization steps. First, in the expectation step, using the Bayesian formula and LA technique, we derive approximately the posterior distribution of the latent function indicating the possibility that each observation belongs to a certain class in the Gaussian process classification model. Second, in the maximization step, using a derived posterior distribution of latent function, we compute the maximum likelihood estimator for hyper-parameters of a covariance matrix necessary to define prior distribution for latent function. These two steps iteratively repeat until a convergence condition satisfies. Moreover, we apply the proposed algorithm with human action classification problem using a public database, namely, the KTH human action data set. Experimental results reveal that the proposed algorithm shows good performance on this data set.

Keywords: bayesian rule, gaussian process classification model with multiclass, gaussian process prior, human action classification, laplace approximation, variational EM algorithm

Procedia PDF Downloads 334
282 Corporate Governance and Disclosure Quality: Taxonomy of Tunisian Listed Firms Using the Decision Tree Method Based Approach

Authors: Wided Khiari, Adel Karaa

Abstract:

This study aims to establish a typology of Tunisian listed firms according to their corporate governance characteristics and disclosure quality. The paper uses disclosed scores to examine corporate governance practices of Tunisian listed firms. A content analysis of 46 Tunisian listed firms from 2001 to 2010 has been carried out and a disclosure index developed to determine the level of disclosure of the companies. The disclosure quality is appreciated through the quantity and also through the nature (type) of information disclosed. Applying the decision tree method, the obtained tree diagrams provide ways to know the characteristics of a particular firm regardless of its level of disclosure. Obtained results show that the characteristics of corporate governance to achieve good quality of disclosure are not unique for all firms. These structures are not necessarily all of the recommendations of best practices, but converge towards the best combination. Indeed, in practice, there are companies which have a good quality of disclosure, but are not well-governed. However, we hope that by improving their governance system their level of disclosure may be better. These findings show, in a general way, a convergence towards the standards of corporate governance with a few exceptions related to the specificity of Tunisian listed firms and show the need for the adoption of a code for each context. These findings shed the light on corporate governance features that enhance incentives for good disclosure. It allows identifying, for each firm and in any date, corporate governance determinants of disclosure quality. More specifically, and all being equal, obtained tree makes a rule of decision for the company to know the level of disclosure based on certain characteristics of the governance strategy adopted by the latter.

Keywords: corporate governance, disclosure, decision tree, economics

Procedia PDF Downloads 336
281 Sequential Pattern Mining from Data of Medical Record with Sequential Pattern Discovery Using Equivalent Classes (SPADE) Algorithm (A Case Study : Bolo Primary Health Care, Bima)

Authors: Rezky Rifaini, Raden Bagus Fajriya Hakim

Abstract:

This research was conducted at the Bolo primary health Care in Bima Regency. The purpose of the research is to find out the association pattern that is formed of medical record database from Bolo Primary health care’s patient. The data used is secondary data from medical records database PHC. Sequential pattern mining technique is the method that used to analysis. Transaction data generated from Patient_ID, Check_Date and diagnosis. Sequential Pattern Discovery Algorithms Using Equivalent Classes (SPADE) is one of the algorithm in sequential pattern mining, this algorithm find frequent sequences of data transaction, using vertical database and sequence join process. Results of the SPADE algorithm is frequent sequences that then used to form a rule. It technique is used to find the association pattern between items combination. Based on association rules sequential analysis with SPADE algorithm for minimum support 0,03 and minimum confidence 0,75 is gotten 3 association sequential pattern based on the sequence of patient_ID, check_Date and diagnosis data in the Bolo PHC.

Keywords: diagnosis, primary health care, medical record, data mining, sequential pattern mining, SPADE algorithm

Procedia PDF Downloads 401