Search results for: affective computing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1238

Search results for: affective computing

608 Interoperable Platform for Internet of Things at Home Applications

Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo

Abstract:

With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.

Keywords: cloud computing, IoT, robotics, smart house

Procedia PDF Downloads 351
607 Being Young in Times of Change: Transformative Aspects of Migration across Generations in South Wollo, Ethiopia

Authors: Adamnesh A. Bogale, Dorte Thorsen

Abstract:

This paper aims to learn how children/siblings left behind due to parental migration experience care and the effects of the separation. It also aims to unpack the experiences of youth migrants in rural Ethiopia. It focuses specifically on how children and youth are affected in order to highlight in which areas intervention can enhance or inadvertently undermine the development impact of migration on young people. Based on a qualitative study in South Wollo, Ethiopia, which was undertaken in three stages in 2017-19 and involved 34 households and a number of key informants, the analysis offers insights into how migration contributes to household sustainability and, in the process, alters intergenerational relationships and dynamics. Contemporary migration in Ethiopia is complex and highly gendered. For young women, the migration corridor from Ethiopia to the Middle East is the most important, whereas young men mostly engage in local migration or travel to South Africa or Sudan. Arguing that children and youths’ experience of migration must be understood in the context of the moral, affective, and material economies, the paper distinguishes between young people’s experiences of migration as children of migrants, as siblings of a migrant, and as migrants. The material shows that children and youths demonstrate different experiences in parental migration depending on age, care arrangement, and the ability to communicate with an absent mother. Migration has a different implication for younger siblings depending on their gender. The division of work and future responsibilities post marriage combine to disadvantage female siblings while male siblings are either unaffected or reaped the benefits of investments made with remittances. Finally, migration is a mechanism to change generational power relationships. As remitters, young migrants yield better recognition in the family, though not always to the degree that they can control the use of remittances. The power to make decisions is not tied only to material resources and the household; migration facilitates social change that opens space for young women to have more influence over their own lives.

Keywords: migration, youth, Ethiopia, generations

Procedia PDF Downloads 16
606 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment

Authors: Y. Xu, L. Xiong, Z. Xu

Abstract:

In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.

Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing

Procedia PDF Downloads 461
605 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 382
604 An Approach for the Assessment of Semi-Elliptical Surface Crack

Authors: Muhammad Naweed, Usman Tariq Murtaza, Waseem Siddique

Abstract:

A pallet body approach is a finite element-based computational approach used for the modeling and assessment of a three-dimensional surface crack. The approach is capable of inserting the crack in an engineering structure and generating high-quality hexahedral mesh in the cracked region of the structure. The approach is capable of computing the stress intensity factors along a semi-elliptical surface crack numerically. The objective of this work is to present that the stress intensity factors produced by the approach can be used with confidence for capturing the parameters during the fatigue crack growth.

Keywords: pallet body approach, semi-elliptical surface crack, stress intensity factors, fatigue crack growth

Procedia PDF Downloads 84
603 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 336
602 Scheduling in Cloud Networks Using Chakoos Algorithm

Authors: Masoumeh Ali Pouri, Hamid Haj Seyyed Javadi

Abstract:

Nowadays, cloud processing is one of the important issues in information technology. Since scheduling of tasks graph is an NP-hard problem, considering approaches based on undeterminisitic methods such as evolutionary processing, mostly genetic and cuckoo algorithms, will be effective. Therefore, an efficient algorithm has been proposed for scheduling of tasks graph to obtain an appropriate scheduling with minimum time. In this algorithm, the new approach is based on making the length of the critical path shorter and reducing the cost of communication. Finally, the results obtained from the implementation of the presented method show that this algorithm acts the same as other algorithms when it faces graphs without communication cost. It performs quicker and better than some algorithms like DSC and MCP algorithms when it faces the graphs involving communication cost.

Keywords: cloud computing, scheduling, tasks graph, chakoos algorithm

Procedia PDF Downloads 44
601 Low-Complexity Multiplication Using Complement and Signed-Digit Recoding Methods

Authors: Te-Jen Chang, I-Hui Pan, Ping-Sheng Huang, Shan-Jen Cheng

Abstract:

In this paper, a fast multiplication computing method utilizing the complement representation method and canonical recoding technique is proposed. By performing complements and canonical recoding technique, the number of partial products can be reduced. Based on these techniques, we propose an algorithm that provides an efficient multiplication method. On average, our proposed algorithm is to reduce the number of k-bit additions from (0.25k+logk/k+2.5) to (k/6 +logk/k+2.5), where k is the bit-length of the multiplicand A and multiplier B. We can therefore efficiently speed up the overall performance of the multiplication. Moreover, if we use the new proposes to compute common-multiplicand multiplication, the computational complexity can be reduced from (0.5 k+2 logk/k+5) to (k/3+2 logk/k+5) k-bit additions.

Keywords: algorithm design, complexity analysis, canonical recoding, public key cryptography, common-multiplicand multiplication

Procedia PDF Downloads 410
600 Task Scheduling on Parallel System Using Genetic Algorithm

Authors: Jasbir Singh Gill, Baljit Singh

Abstract:

Scheduling and mapping the application task graph on multiprocessor parallel systems is considered as the most crucial and critical NP-complete problem. Many genetic algorithms have been proposed to solve such problems. In this paper, two genetic approach based algorithms have been designed and developed with or without task duplication. The proposed algorithms work on two fitness functions. The first fitness i.e. task fitness is used to minimize the total finish time of the schedule (schedule length) while the second fitness function i.e. process fitness is concerned with allocating the tasks to the available highly efficient processor from the list of available processors (load balance). Proposed genetic-based algorithms have been experimentally implemented and evaluated with other state-of-art popular and widely used algorithms.

Keywords: parallel computing, task scheduling, task duplication, genetic algorithm

Procedia PDF Downloads 321
599 PlayTrain: A Research and Intervention Project for Early Childhood Teacher Education

Authors: Dalila Lino, Maria Joao Hortas, Carla Rocha, Clarisse Nunes, Natalia Vieira, Marina Fuertes, Kátia Sa

Abstract:

The value of play is recognized worldwide and is considered a fundamental right of all children, as defined in Article 31 of the United Nations Children’s Rights. It is consensual among the scientific community that play, and toys are of vital importance for children’s learning and development. Play promotes the acquisition of language, enhances creativity and improves social, affective, emotional, cognitive and motor development of young children. Young children ages 0 to 6 who have had many opportunities to get involved in play show greater competence to adapt to new and unexpected situations and more easily overcome the pain and suffering caused by traumatic situations. The PlayTrain Project aims to understand the places/spaces of play in the education of children from 0 to 6 years and promoting the training of preschool teachers to become capable of developing practices that enhance children’s agency, experimentation in the physical and social world and the development of imagination and creativity. This project follows the Design-Based-Research (DBR) and has two dimensions: research and intervention. The participants are 120 students from the Master in Pre-school Education of the Higher School of Education, Polytechnic Institute of Lisbon enrolled in the academic year 2018/2019. The development of workshops focused on the role of play and toys for young children’s learning promotes the participants reflection and the development of skills and knowledge to construct developmentally appropriated practices in early childhood education. Data was collected through an online questionnaire and focal groups. Results show that the PlayTrain Project contribute to the development of a body of knowledge about the role of play for early childhood education. It was possible to identify the needs of preschool teacher education and to enhance the discussion among the scientific and academic community about the importance of deepening the role of play and toys in the study plans of the masters in pre-school education.

Keywords: children's learning, early childhood education, play, teacher education, toys

Procedia PDF Downloads 123
598 A New Prediction Model for Soil Compression Index

Authors: D. Mohammadzadeh S., J. Bolouri Bazaz

Abstract:

This paper presents a new prediction model for compression index of fine-grained soils using multi-gene genetic programming (MGGP) technique. The proposed model relates the soil compression index to its liquid limit, plastic limit and void ratio. Several laboratory test results for fine-grained were used to develop the models. Various criteria were considered to check the validity of the model. The parametric and sensitivity analyses were performed and discussed. The MGGP method was found to be very effective for predicting the soil compression index. A comparative study was further performed to prove the superiority of the MGGP model to the existing soft computing and traditional empirical equations.

Keywords: new prediction model, compression index soil, multi-gene genetic programming, MGGP

Procedia PDF Downloads 347
597 Educatronic Prototype for Learning Geometry, Based on a Multitouch Surface

Authors: Vicario Marina, Bustos Freddy, Olivares Jesús, Gómez Pilar

Abstract:

This paper presents a didactic model and a tool as educational resources to support the learning of geometry; they focus on topics difficult to understand. The target population is elementary school students. The tool is based on a collaborative educational approach using multi-touch devices. The proposal is based on the challenges found in the instructional design and prototype implementation. Traditionally, elementary students have had many problems assimilating mathematical topics; this new Educatronic prototype facilitates the learning experience using exercises and they were tested with different children demonstrating the benefits of the prototype by improving their mathematical skills.

Keywords: educatronic prototype, geometry, multitouch surface, educational computing, primary school, mathematics, educational informatics

Procedia PDF Downloads 300
596 A Model for Analyzing the Startup Dynamics of a Belt Transmission Driven by a DC Motor

Authors: Giovanni Incerti

Abstract:

In this paper the dynamic behavior of a synchronous belt drive during start-up is analyzed and discussed. Besides considering the belt elasticity, the mathematical model here proposed also takes into consideration the electrical behaviour of the DC motor. The solution of the motion equations is obtained by means of the modal analysis in state space, which allows to obtain the decoupling of all equations of the mathematical model without introducing the hypothesis of proportional damping. The mathematical model of the transmission and the solution algorithms have been implemented within a computing software that allows the user to simulate the dynamics of the system and to evaluate the effects due to the elasticity of the belt branches and to the electromagnetic behavior of the DC motor. In order to show the details of the calculation procedure, the paper presents a case study developed with the aid of the abovementioned software.

Keywords: belt drive, vibrations, startup, DC motor

Procedia PDF Downloads 552
595 One Plus One is More than Two: Why Nurse Recruiters Need to Use Various Multivariate Techniques to Understand the Limitations of the Concept of Emotional Intelligence

Authors: Austyn Snowden

Abstract:

Aim: To examine the construct validity of the Trait Emotional Intelligence Questionnaire Short form. Background: Emotional intelligence involves the identification and regulation of our own emotions and the emotions of others. It is therefore a potentially useful construct in the investigation of recruitment and retention in nursing and many questionnaires have been constructed to measure it. Design: Secondary analysis of existing dataset of responses to TEIQue-SF using concurrent application of Rasch analysis and confirmatory factor analysis. Method: First year undergraduate nursing and computing students completed Trait Emotional Intelligence Questionnaire-Short Form. Responses were analysed by synthesising results of Rasch analysis and confirmatory factor analysis.

Keywords: emotional intelligence, rasch analysis, factor analysis, nurse recruiters

Procedia PDF Downloads 441
594 Aperiodic and Asymmetric Fibonacci Quasicrystals: Next Big Future in Quantum Computation

Authors: Jatindranath Gain, Madhumita DasSarkar, Sudakshina Kundu

Abstract:

Quantum information is stored in states with multiple quasiparticles, which have a topological degeneracy. Topological quantum computation is concerned with two-dimensional many body systems that support excitations. Anyons are elementary building block of quantum computations. When anyons tunneling in a double-layer system can transition to an exotic non-Abelian state and produce Fibonacci anyons, which are powerful enough for universal topological quantum computation (TQC).Here the exotic behavior of Fibonacci Superlattice is studied by using analytical transfer matrix methods and hence Fibonacci anyons. This Fibonacci anyons can build a quantum computer which is very emerging and exciting field today’s in Nanophotonics and quantum computation.

Keywords: quantum computing, quasicrystals, Multiple Quantum wells (MQWs), transfer matrix method, fibonacci anyons, quantum hall effect, nanophotonics

Procedia PDF Downloads 362
593 Evaluating the Teaching and Learning Value of Tablets

Authors: Willem J. A. Louw

Abstract:

The wave of new advanced computing technology that has been developed during the recent past has significantly changed the way we communicate, collaborate and collect information. It has created a new technology environment and paradigm in which our children and students grow-up and this impacts on their learning. Research confirmed that Generation Y students have a preference for learning in the new technology environment. The challenge or question is: How do we adjust our teaching and learning to make the most of these changes. The complexity of effective and efficient teaching and learning must not be underestimated and changes must be preceded by proper objective research to prevent any haphazard developments that could do more harm than benefit. A blended learning approach has been used in the Forestry department for a few numbers of years including the use of electronic-peer assisted learning (e-pal) in a fixed-computer set-up within a learning management system environment. It was decided to extend the investigation and do some exploratory research by using a range of different Tablet devices. For this purpose, learning activities or assignments were designed to cover aspects of communication, collaboration and collection of information. The Moodle learning management system was used to present normal module information, to communicate with students and for feedback and data collection. Student feedback was collected by using an online questionnaire and informal discussions. The research project was implemented in 2013, 2014 and 2015 amongst first and third-year students doing a forestry three-year technical tertiary qualification in commercial plantation management. In general, more than 80% of the students alluded to that the device was very useful in their learning environment while the rest indicated that the devices were not very useful. More than ninety percent of the students acknowledged that they would like to continue using the devices for all of their modules whilst the rest alluded to functioning efficiently without the devices. Results indicated that information collection (access to resources) was rated the highest advantageous factor followed by communication and collaboration. The main general advantages of using Tablets were listed by the students as being mobility (portability), 24/7 access to learning material and information of any kind on a user friendly device in a Wi-Fi environment, fast computing process speeds, saving time, effort and airtime through skyping and e-mail, and use of various applications. Ownership of the device is a critical factor while the risk was identified as a major potential constraint. Significant differences were reported between the different types and quality of Tablets. The preferred types are those with a bigger screen and the ones with overall better functionality and quality features. Tablets significantly increase the collaboration, communication and information collection needs of the students. It does, however, not replace the need of a computer/laptop because of limited storage and computation capacity, small screen size and inefficient typing.

Keywords: tablets, teaching, blended learning, tablet quality

Procedia PDF Downloads 231
592 Definition of a Computing Independent Model and Rules for Transformation Focused on the Model-View-Controller Architecture

Authors: Vanessa Matias Leite, Jandira Guenka Palma, Flávio Henrique de Oliveira

Abstract:

This paper presents a model-oriented development approach to software development in the Model-View-Controller (MVC) architectural standard. This approach aims to expose a process of extractions of information from the models, in which through rules and syntax defined in this work, assists in the design of the initial model and its future conversions. The proposed paper presents a syntax based on the natural language, according to the rules agreed in the classic grammar of the Portuguese language, added to the rules of conversions generating models that follow the norms of the Object Management Group (OMG) and the Meta-Object Facility MOF.

Keywords: BNF Syntax, model driven architecture, model-view-controller, transformation, UML

Procedia PDF Downloads 371
591 How Unpleasant Emotions, Morals and Normative Beliefs of Severity Relate to Cyberbullying Intentions

Authors: Paula C. Ferreira, Ana Margarida Veiga Simão, Nádia Pereira, Aristides Ferreira, Alexandra Marques Pinto, Alexandra Barros, Vitor Martinho

Abstract:

Cyberbullying is a phenomenon of worldwide concern regarding children and adolescents’ mental health and risk behavior. Bystanders of this phenomenon can help diminish the incidence of this phenomenon if they engage in pro-social behavior. However, different social-cognitive and affective bystander reactions may surface because of the lack of contextual information and emotional cues in cyberbullying situations. Hence, this study investigated how cyberbullying bystanders’ unpleasant emotions could be related to their personal moral beliefs and their behavioral intentions to cyberbully or defend the victim. It also proposed to investigate how their normative beliefs of perceived severity about cyberbullying behavior could be related to their personal moral beliefs and their behavioral intentions. Three groups of adolescents participated in this study, namely a first of group 402 students (5th – 12th graders; Mage = 13.12; SD = 2.19; 55.7% girls) to compute explorative factorial analyses of the instruments used; a second group of 676 students (5th – 12th graders; Mage = 14.10; SD = 2.74; 55.5% were boys) to run confirmatory factor analyses; and a third group (N = 397; 5th – 12th graders; Mage = 13.88 years; SD = 1.45; 55.5% girls) to perform the main analyses to test the research hypotheses. Self-report measures were used, such as the Personal moral beliefs about cyberbullying behavior questionnaire, the Normative beliefs of perceived severity about cyberbullying behavior questionnaire, the Unpleasant emotions about cyberbullying incidents questionnaires, and the Bystanders’ behavioral intentions in cyberbullying situations questionnaires. Path analysis results revealed that unpleasant emotions were mediators of the relationship between adolescent cyberbullying bystanders’ personal moral beliefs and their intentions to help the victims in cyberbullying situations. Moreover, adolescent cyberbullying bystanders’ normative beliefs of gravity were mediators of the relationship between their personal moral beliefs and their intentions to cyberbully others. These findings provide insights for the development of prevention and intervention programs that promote social and emotional learning strategies as a means to prevent and intervene in cyberbullying.

Keywords: cyberbullying, normative beliefs of perceived severity, personal moral beliefs, unpleasant emotions

Procedia PDF Downloads 189
590 Simulation of Behaviour Dynamics and Optimization of the Energy System

Authors: Iva Dvornik, Sandro Božić, Žana Božić Brkić

Abstract:

System-dynamic simulating modelling is one of the most appropriate and successful scientific methods of the complex, non-linear, natural, technical and organizational systems. In the recent practice its methodology proved to be efficient in solving the problems of control, behavior, sensitivity and flexibility of the system dynamics behavior having a high degree of complexity, all these by computing simulation i.e. “under laboratory conditions” what means without any danger for observed realities. This essay deals with the research of the gas turbine dynamic process as well as the operating pump units and transformation of gas energy into hydraulic energy has been simulated. In addition, system mathematical model has been also researched (gas turbine- centrifugal pumps – pipeline pressure system – storage vessel).

Keywords: system dynamics, modelling, centrifugal pump, turbine, gases, continuous and discrete simulation, heuristic optimisation

Procedia PDF Downloads 87
589 Effectiveness Evaluation of a Machine Design Process Based on the Computation of the Specific Output

Authors: Barenten Suciu

Abstract:

In this paper, effectiveness of a machine design process is evaluated on the basis of the specific output calculus. Concretely, a screw-worm gear mechanical transmission is designed by using the classical and the 3D-CAD methods. Strength analysis and drawing of the designed parts is substantially aided by employing the SolidWorks software. Quality of the design process is assessed by manufacturing (printing) the parts, and by computing the efficiency, specific load, as well as the specific output (work) of the mechanical transmission. Influence of the stroke, travelling velocity and load on the mechanical output, is emphasized. Optimal design of the mechanical transmission becomes possible by the appropriate usage of the acquired results.

Keywords: mechanical transmission, design, screw, worm-gear, efficiency, specific output, 3D-printing

Procedia PDF Downloads 124
588 The Impact of the Number of Neurons in the Hidden Layer on the Performance of MLP Neural Network: Application to the Fast Identification of Toxics Gases

Authors: Slimane Ouhmad, Abdellah Halimi

Abstract:

In this work, we have applied neural networks method MLP type to a database from an array of six sensors for the detection of three toxic gases. As the choice of the number of hidden layers and the weight values has a great influence on the convergence of the learning algorithm, we proposed, in this article, a mathematical formulation to determine the optimal number of hidden layers and good weight values based on the method of back propagation of errors. The results of this modeling have improved discrimination of these gases on the one hand, and optimize the computation time on the other hand, the comparison to other results achieved in this case.

Keywords: MLP Neural Network, back-propagation, number of neurons in the hidden layer, identification, computing time

Procedia PDF Downloads 321
587 Touch Interaction through Tagging Context

Authors: Gabriel Chavira, Jorge Orozco, Salvador Nava, Eduardo Álvarez, Julio Rolón, Roberto Pichardo

Abstract:

Ambient Intelligence promotes a shift in computing which involves fitting-out the environments with devices to support context-aware applications. One of main objectives is the reduction to a minimum of the user’s interactive effort, the diversity and quantity of devices with which people are surrounded with, in existing environments; increase the level of difficulty to achieve this goal. The mobile phones and their amazing global penetration, makes it an excellent device for delivering new services to the user, without requiring a learning effort. The environment will have to be able to perceive all of the interaction techniques. In this paper, we present the PICTAC model (Perceiving touch Interaction through TAgging Context), which similarly delivers service to members of a research group.

Keywords: ambient intelligence, tagging context, touch interaction, touching services

Procedia PDF Downloads 365
586 Evaluating Classification with Efficacy Metrics

Authors: Guofan Shao, Lina Tang, Hao Zhang

Abstract:

The values of image classification accuracy are affected by class size distributions and classification schemes, making it difficult to compare the performance of classification algorithms across different remote sensing data sources and classification systems. Based on the term efficacy from medicine and pharmacology, we have developed the metrics of image classification efficacy at the map and class levels. The novelty of this approach is that a baseline classification is involved in computing image classification efficacies so that the effects of class statistics are reduced. Furthermore, the image classification efficacies are interpretable and comparable, and thus, strengthen the assessment of image data classification methods. We use real-world and hypothetical examples to explain the use of image classification efficacies. The metrics of image classification efficacy meet the critical need to rectify the strategy for the assessment of image classification performance as image classification methods are becoming more diversified.

Keywords: accuracy assessment, efficacy, image classification, machine learning, uncertainty

Procedia PDF Downloads 185
585 The ReliVR Project: Feasibility of a Virtual Reality Intervention in the Psychotherapy of Depression

Authors: Kyra Kannen, Sonja D. Roelen, Sebastian Schnieder, Jarek Krajewski, Steffen Holsteg, André Karger, Johanna Askeridis, Celina Slawik, Philip Mildner, Jens Piesk, Ruslan David, Holger Kürten, Benjamin Oster, Robert Malzan, Mike Ludemann

Abstract:

Virtual Reality (VR) is increasingly recognized for its potential in transforming mental disorder treatment, offering advantages such as cost-effectiveness, time efficiency, accessibility, reduced stigma, and scalability. While the application of VR in the context of anxiety disorders has been extensively evaluated and demonstrated to be effective, the utilization of VR as a therapeutic treatment for depression remains under-investigated. Our goal is to pioneer immersive VR therapy modules for treating major depression, alongside a web-based system for home use. We develop a modular digital therapy platform grounded in psychodynamic therapy interventions which addresses stress reduction, exploration of social situations and relationship support, social skill training, avoidance behavior analysis, and psychoeducation. In addition, an automated depression monitoring system, based on acoustic voice analysis, is implemented in the form of a speech-based diary to track the affective state of the user and depression severity. The use of immersive VR facilitates patient immersion into complex and realistic interpersonal interactions with high emotional engagement, which may contribute to positive treatment acceptance and satisfaction. In a proof-of-concept study, 45 depressed patients were assigned to VR or web-platform modules, evaluating user experience, usability and additional metrics including depression severity, mindfulness, interpersonal problems, and treatment satisfaction. The findings provide valuable insights into the effectiveness and user-friendliness of VR and web modules for depression therapy and contribute to the refinement of more tailored digital interventions to improve mental health.

Keywords: virtual reality therapy, digital health, depression, psychotherapy

Procedia PDF Downloads 42
584 Mask-Prompt-Rerank: An Unsupervised Method for Text Sentiment Transfer

Authors: Yufen Qin

Abstract:

Text sentiment transfer is an important branch of text style transfer. The goal is to generate text with another sentiment attribute based on a text with a specific sentiment attribute while maintaining the content and semantic information unrelated to sentiment unchanged in the process. There are currently two main challenges in this field: no parallel corpus and text attribute entanglement. In response to the above problems, this paper proposed a novel solution: Mask-Prompt-Rerank. Use the method of masking the sentiment words and then using prompt regeneration to transfer the sentence sentiment. Experiments on two sentiment benchmark datasets and one formality transfer benchmark dataset show that this approach makes the performance of small pre-trained language models comparable to that of the most advanced large models, while consuming two orders of magnitude less computing and memory.

Keywords: language model, natural language processing, prompt, text sentiment transfer

Procedia PDF Downloads 53
583 Speaking Anxiety: Sources, Coping Mechanisms and Teacher Management

Authors: Mylene T. Caytap-Milan

Abstract:

This study was materialized with the purpose of determining the anxieties of students towards spoken English, sources of the specified anxiety, coping mechanisms to counter the apprehensions, and teacher management to reduce the anxiety within the classroom. Being qualitative in nature, interview as the data gathering tool was utilized with an audio-recorder. Participants of the study included thirteen teachers and students of speech classes in a state university in Region I, Philippines. Data elicited were transcribed in verbatim, confirmed by the participants, coded and categorized, and themed accordingly. A triangulation method was applied to establish the stronger validity of the data. Findings confirmed teachers’ and students’ awareness of the existence of Anxiety in speaking English (ASE). Based on the data gathered from the teachers, the following themes on students’ ASE were identified: (1) No Brain and Mouth Coordination, (2) Center of Attention, and (3) Acting Out Loud. However, the following themes were formulated based on the responses made by the students themselves: (1) The Common Feeling, (2) The Incompetent Me, and (3) The Limelight. With regard the sources of students’ ASE according to teachers are the following: (1) It Began at Home, (2) It Continued in School, (3) It’s not for me at all. On the other hand, the sources of students’ ASE according to students themselves are: (1) It Comes from Within, (2) It wasn’t Nursed Well, and (3) They’re Looking for Errors. In terms of coping with ASE, students identified the following mechanisms, which were themed into: (1) Acceptance, (2) Application, and (3) Apathy. Moreover, to reduce the ASE phenomenon within the classroom, the teachers demonstrate the following roles according to themes: (1) The Compass, (2) The Counselor, (3) The Referee, (4) The Polyglot, and (5) The English Nazi. Based on the findings, the following conclusions were drawn: (1) ASE can both serve positive and negative influences to the English speaking skills of students, (2) ASE can be reduced with teachers’ provision of more English speaking opportunities and with students’ initiative of personal training, (3) ASE can be reduced when English is introduced and practiced by children at an early age, and (4) ASE is inevitable in the affective domain thus teachers are encouraged to apply psychological positivism in the classroom. Studies related to the present undertaking may refer to the succeeding recommendations: (1) experiment on activities that will reduce anxiety ASE, (2) involve a psychologist for more critical but reliable results and recommendations, and (3) conduct the study among high school and primary students.

Keywords: coping mechanisms, sources, speaking anxiety, teacher management

Procedia PDF Downloads 100
582 Bag of Words Representation Based on Weighting Useful Visual Words

Authors: Fatma Abdedayem

Abstract:

The most effective and efficient methods in image categorization are almost based on bag-of-words (BOW) which presents image by a histogram of occurrence of visual words. In this paper, we propose a novel extension to this method. Firstly, we extract features in multi-scales by applying a color local descriptor named opponent-SIFT. Secondly, in order to represent image we use Spatial Pyramid Representation (SPR) and an extension to the BOW method which based on weighting visual words. Typically, the visual words are weighted during histogram assignment by computing the ratio of their occurrences in the image to the occurrences in the background. Finally, according to classical BOW retrieval framework, only a few words of the vocabulary is useful for image representation. Therefore, we select the useful weighted visual words that respect the threshold value. Experimentally, the algorithm is tested by using different image classes of PASCAL VOC 2007 and is compared against the classical bag-of-visual-words algorithm.

Keywords: BOW, useful visual words, weighted visual words, bag of visual words

Procedia PDF Downloads 413
581 Review of Energy Efficiency Routing in Ad Hoc Wireless Networks

Authors: P. R. Dushantha Chaminda, Peng Kai

Abstract:

In this review paper, we enclose the thought of wireless ad hoc networks and particularly mobile ad hoc network (MANET), their field of study, intention, concern, benefit and disadvantages, modifications, with relation of AODV routing protocol. Mobile computing is developing speedily with progression in wireless communications and wireless networking protocols. Making communication easy, we function most wireless network devices and sensor networks, movable, battery-powered, thus control on a highly constrained energy budget. However, progress in battery technology presents that only little improvements in battery volume can be expected in the near future. Moreover, recharging or substitution batteries is costly or unworkable, it is preferable to support energy waste level of devices low.

Keywords: wireless ad hoc network, energy efficient routing protocols, AODV, EOAODV, AODVEA, AODVM, AOMDV, FF-AOMDV, AOMR-LM

Procedia PDF Downloads 190
580 Efficient Subgoal Discovery for Hierarchical Reinforcement Learning Using Local Computations

Authors: Adrian Millea

Abstract:

In hierarchical reinforcement learning, one of the main issues encountered is the discovery of subgoal states or options (which are policies reaching subgoal states) by partitioning the environment in a meaningful way. This partitioning usually requires an expensive global clustering operation or eigendecomposition of the Laplacian of the states graph. We propose a local solution to this issue, much more efficient than algorithms using global information, which successfully discovers subgoal states by computing a simple function, which we call heterogeneity for each state as a function of its neighbors. Moreover, we construct a value function using the difference in heterogeneity from one step to the next, as reward, such that we are able to explore the state space much more efficiently than say epsilon-greedy. The same principle can then be applied to higher level of the hierarchy, where now states are subgoals discovered at the level below.

Keywords: exploration, hierarchical reinforcement learning, locality, options, value functions

Procedia PDF Downloads 144
579 Software Defined Storage: Object Storage over Hadoop Platform

Authors: Amritesh Srivastava, Gaurav Sharma

Abstract:

The purpose of this project is to develop an open source object storage system that is highly durable, scalable and reliable. There are two representative systems in cloud computing: Google and Amazon. Their storage systems for Google GFS and Amazon S3 provide high reliability, performance and stability. Our proposed system is highly inspired from Amazon S3. We are using Hadoop Distributed File System (HDFS) Java API to implement our system. We propose the architecture of object storage system based on Hadoop. We discuss the requirements of our system, what we expect from our system and what problems we may encounter. We also give detailed design proposal along with the abstract source code to implement it. The final goal of the system is to provide REST based access to our object storage system that exists on top of HDFS.

Keywords: Hadoop, HBase, object storage, REST

Procedia PDF Downloads 311