Search results for: semantic roles
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1819

Search results for: semantic roles

1129 Edge Detection and Morphological Image for Estimating Gestational Age Based on Fetus Length Automatically

Authors: Retno Supriyanti, Ahmad Chuzaeri, Yogi Ramadhani, A. Haris Budi Widodo

Abstract:

The use of ultrasonography in the medical world has been very popular including the diagnosis of pregnancy. In determining pregnancy, ultrasonography has many roles, such as to check the position of the fetus, abnormal pregnancy, fetal age and others. Unfortunately, all these things still need to analyze the role of the obstetrician in the sense of image raised by ultrasonography. One of the most striking is the determination of gestational age. Usually, it is done by measuring the length of the fetus manually by obstetricians. In this study, we developed a computer-aided diagnosis for the determination of gestational age by measuring the length of the fetus automatically using edge detection method and image morphology. Results showed that the system is sufficiently accurate in determining the gestational age based image processing.

Keywords: computer aided diagnosis, gestational age, and diameter of uterus, length of fetus, edge detection method, morphology image

Procedia PDF Downloads 282
1128 Deep Supervision Based-Unet to Detect Buildings Changes from VHR Aerial Imagery

Authors: Shimaa Holail, Tamer Saleh, Xiongwu Xiao

Abstract:

Building change detection (BCD) from satellite imagery is an essential topic in urbanization monitoring, agricultural land management, and updating geospatial databases. Recently, methods for detecting changes based on deep learning have made significant progress and impressive results. However, it has the problem of being insensitive to changes in buildings with complex spectral differences, and the features being extracted are not discriminatory enough, resulting in incomplete buildings and irregular boundaries. To overcome these problems, we propose a dual Siamese network based on the Unet model with the addition of a deep supervision strategy (DS) in this paper. This network consists of a backbone (encoder) based on ImageNet pre-training, a fusion block, and feature pyramid networks (FPN) to enhance the step-by-step information of the changing regions and obtain a more accurate BCD map. To train the proposed method, we created a new dataset (EGY-BCD) of high-resolution and multi-temporal aerial images captured over New Cairo in Egypt to detect building changes for this purpose. The experimental results showed that the proposed method is effective and performs well with the EGY-BCD dataset regarding the overall accuracy, F1-score, and mIoU, which were 91.6 %, 80.1 %, and 73.5 %, respectively.

Keywords: building change detection, deep supervision, semantic segmentation, EGY-BCD dataset

Procedia PDF Downloads 97
1127 The Study of the Factors Affecting Entrepreneurship in Sport

Authors: Habib Honari

Abstract:

The purpose of this study is an investigation of the factors affecting entrepreneurship in sport from the point of view of experts in this field. This study is a descriptive analytic one and was conducted as a survey and statistical sample consisted of 64 subjects including top managers and sport management professors at physical education organization. Data is collected by research designed questionnaire. Its reliability (α=.95) is obtained after its validity confirmation (by professors). In this article the most important factors affecting sport entrepreneurship, both as an interdisciplinary field in the world, are studied. Initially, infrastructures are identified for entrepreneurial opportunities in sports and related problems become known so that identifying factors for social, cultural, and economical development to entrepreneurs will be a smooth path, because sport entrepreneurship, given its effective roles in business development, welfare, health development, and participation in various aspects of society, can also play a crucial role in the development of the country. Finally, some solutions for developing entrepreneurial sport are introduced.

Keywords: sport entrepreneurship, entrepreneurial opportunities, entrepreneurial barriers, interdisciplinary

Procedia PDF Downloads 519
1126 The Role of Indigenous Informal Local Institutions and Social Capital for Adoption of Agricultural Innovation: A Special Emphasis in Ethiopia

Authors: Molla Tadesse Lakew

Abstract:

Researchers tried to find out the socio-economic and supply-side constraint factors to adoption. However, they overlooked the role of social networks and relationships among the community. Therefore, the aims of this review were to review the roles and negative effects of social capital. Based on its contents, relevancy, and time duration, only 121 (journals, books, and paper reports) were selected. It concludes that social capital has an indispensable role in facilitating cooperation and connection between members of the farmers' community, informal and experiential knowledge sharing, and access to research-based knowledge and contributes to reducing the transaction cost of adoption. On the contrary, inside the black box of social capital, the negative effects include the exclusion of outsider’s knowledge and experiences, excessive claims on group members, and restrictions on individual freedom.

Keywords: social capital, local institutions, adoption, Ethiopia

Procedia PDF Downloads 63
1125 The Roles of Mandarin and Local Dialect in the Acquisition of L2 English Consonants Among Chinese Learners of English: Evidence From Suzhou Dialect Areas

Authors: Weijing Zhou, Yuting Lei, Francis Nolan

Abstract:

In the domain of second language acquisition, whenever pronunciation errors or acquisition difficulties are found, researchers habitually attribute them to the negative transfer of the native language or local dialect. To what extent do Mandarin and local dialects affect English phonological acquisition for Chinese learners of English as a foreign language (EFL)? Little evidence, however, has been found via empirical research in China. To address this core issue, the present study conducted phonetic experiments to explore the roles of local dialects and Mandarin in Chinese EFL learners’ acquisition of L2 English consonants. Besides Mandarin, the sole national language in China, Suzhou dialect was selected as the target local dialect because of its distinct phonology from Mandarin. The experimental group consisted of 30 junior English majors at Yangzhou University, who were born and lived in Suzhou, acquired Suzhou Dialect since their early childhood, and were able to communicate freely and fluently with each other in Suzhou Dialect, Mandarin as well as English. The consonantal target segments were all the consonants of English, Mandarin and Suzhou Dialect in typical carrier words embedded in the carrier sentence Say again. The control group consisted of two Suzhou Dialect experts, two Mandarin radio broadcasters, and two British RP phoneticians, who served as the standard speakers of the three languages. The reading corpus was recorded and sampled in the phonetic laboratories at Yangzhou University, Soochow University and Cambridge University, respectively, then transcribed, segmented and analyzed acoustically via Praat software, and finally analyzed statistically via EXCEL and SPSS software. The main findings are as follows: First, in terms of correct acquisition rates (CARs) of all the consonants, Mandarin ranked top (92.83%), English second (74.81%) and Suzhou Dialect last (70.35%), and significant differences were found only between the CARs of Mandarin and English and between the CARs of Mandarin and Suzhou Dialect, demonstrating Mandarin was overwhelmingly more robust than English or Suzhou Dialect in subjects’ multilingual phonological ecology. Second, in terms of typical acoustic features, the average duration of all the consonants plus the voice onset time (VOT) of plosives, fricatives, and affricatives in 3 languages were much longer than those of standard speakers; the intensities of English fricatives and affricatives were higher than RP speakers but lower than Mandarin and Suzhou Dialect standard speakers; the formants of English nasals and approximants were significantly different from those of Mandarin and Suzhou Dialects, illustrating the inconsistent acoustic variations between the 3 languages. Thirdly, in terms of typical pronunciation variations or errors, there were significant interlingual interactions between the 3 consonant systems, in which Mandarin consonants were absolutely dominant, accounting for the strong transfer from L1 Mandarin to L2 English instead of from earlier-acquired L1 local dialect to L2 English. This is largely because the subjects were knowingly exposed to Mandarin since their nursery and were strictly required to speak in Mandarin through all the formal education periods from primary school to university.

Keywords: acquisition of L2 English consonants, role of Mandarin, role of local dialect, Chinese EFL learners from Suzhou Dialect areas

Procedia PDF Downloads 77
1124 The Influence of Leader’s Sources of Power on Organizational Citizenship Behaviour

Authors: Noor Azlina Mohamed Yunus, Noorlaila Yunus, Kadulliah Ghazali

Abstract:

In this an era of intense competition, Malaysia aspires to be a fully developed country by 2020 and desires its citizens to perform and execute excellent work behaviors. For that reason, organizations are focusing on employees’ positive and constructive behaviors such as organizational citizenship behavior (OCB). They expect employees to not only complete their required duties by providing excellent performance but also keenly go beyond their roles that are not specifying in their formal job descriptions to ensure organizational success. The role and duty to acquire employees to engage and connect in OCB is the responsibility of a leader. Thus, leaders can utilize their sources of power to enable subordinates to accomplish organizational objective including OCB. Therefore, this paper formulates a framework postulating leader’s sources of power as an antecedent of organizational citizenship behavior (OCB). The discussion on implications for future theory development is discussed.

Keywords: organizational citizenship behaviour (OCB), leader’s sources of power, call centre industry, conceptual paper

Procedia PDF Downloads 305
1123 Imagology: The Study of Multicultural Imagery Reflected in the Heart of Elif Shafak’s 'The Bastard of Istanbul'

Authors: Mohammad Reza Haji Babai, Sepideh Ahmadkhan Beigi

Abstract:

Internationalization and modernization of the globe have played their roles in the process of cultural interaction between globalized societies and, consequently, found their way to the world of literature under the name of ‘imagology’. Imagology has made it possible for the reader to understand the author’s thoughts and judgments of others. The present research focuses on the intercultural images portrayed in the novel of a popular Turkish-French writer, Elif Shafak, about the lifestyle, traditions, habits, and social norms of Turkish, Americans, and Armenians. The novel seeks to articulate a more intricate multicultural memory of Turkishness by grieving over the Armenian massacre. This study finds that, as a mixture of multiple lifestyles and discourses, The Bastard of Istanbul reflects not only images of oriental culture but also occidental cultures. This means that the author has attempted to maintain selfhood through historical and cultural recollection, which resulted in constructing the self and another identity.

Keywords: imagology, Elif Shafak, The Bastard of Istanbul, self-image, other-image

Procedia PDF Downloads 125
1122 A Novel Framework for User-Friendly Ontology-Mediated Access to Relational Databases

Authors: Efthymios Chondrogiannis, Vassiliki Andronikou, Efstathios Karanastasis, Theodora Varvarigou

Abstract:

A large amount of data is typically stored in relational databases (DB). The latter can efficiently handle user queries which intend to elicit the appropriate information from data sources. However, direct access and use of this data requires the end users to have an adequate technical background, while they should also cope with the internal data structure and values presented. Consequently the information retrieval is a quite difficult process even for IT or DB experts, taking into account the limited contributions of relational databases from the conceptual point of view. Ontologies enable users to formally describe a domain of knowledge in terms of concepts and relations among them and hence they can be used for unambiguously specifying the information captured by the relational database. However, accessing information residing in a database using ontologies is feasible, provided that the users are keen on using semantic web technologies. For enabling users form different disciplines to retrieve the appropriate data, the design of a Graphical User Interface is necessary. In this work, we will present an interactive, ontology-based, semantically enable web tool that can be used for information retrieval purposes. The tool is totally based on the ontological representation of underlying database schema while it provides a user friendly environment through which the users can graphically form and execute their queries.

Keywords: ontologies, relational databases, SPARQL, web interface

Procedia PDF Downloads 261
1121 Wireless Sensor Anomaly Detection Using Soft Computing

Authors: Mouhammd Alkasassbeh, Alaa Lasasmeh

Abstract:

We live in an era of rapid development as a result of significant scientific growth. Like other technologies, wireless sensor networks (WSNs) are playing one of the main roles. Based on WSNs, ZigBee adds many features to devices, such as minimum cost and power consumption, and increasing the range and connect ability of sensor nodes. ZigBee technology has come to be used in various fields, including science, engineering, and networks, and even in medicinal aspects of intelligence building. In this work, we generated two main datasets, the first being based on tree topology and the second on star topology. The datasets were evaluated by three machine learning (ML) algorithms: J48, meta.j48 and multilayer perceptron (MLP). Each topology was classified into normal and abnormal (attack) network traffic. The dataset used in our work contained simulated data from network simulation 2 (NS2). In each database, the Bayesian network meta.j48 classifier achieved the highest accuracy level among other classifiers, of 99.7% and 99.2% respectively.

Keywords: IDS, Machine learning, WSN, ZigBee technology

Procedia PDF Downloads 527
1120 Using Closed Frequent Itemsets for Hierarchical Document Clustering

Authors: Cheng-Jhe Lee, Chiun-Chieh Hsu

Abstract:

Due to the rapid development of the Internet and the increased availability of digital documents, the excessive information on the Internet has led to information overflow problem. In order to solve these problems for effective information retrieval, document clustering in text mining becomes a popular research topic. Clustering is the unsupervised classification of data items into groups without the need of training data. Many conventional document clustering methods perform inefficiently for large document collections because they were originally designed for relational database. Therefore they are impractical in real-world document clustering and require special handling for high dimensionality and high volume. We propose the FIHC (Frequent Itemset-based Hierarchical Clustering) method, which is a hierarchical clustering method developed for document clustering, where the intuition of FIHC is that there exist some common words for each cluster. FIHC uses such words to cluster documents and builds hierarchical topic tree. In this paper, we combine FIHC algorithm with ontology to solve the semantic problem and mine the meaning behind the words in documents. Furthermore, we use the closed frequent itemsets instead of only use frequent itemsets, which increases efficiency and scalability. The experimental results show that our method is more accurate than those of well-known document clustering algorithms.

Keywords: FIHC, documents clustering, ontology, closed frequent itemset

Procedia PDF Downloads 377
1119 Enhancing Metaverse Security: A Multi-Factor Authentication Scheme

Authors: R. Chinnaiyaprabhu, S. Bharanidharan, V. Dharsana, Rajalavanya

Abstract:

The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys.

Keywords: metaverse, multifactor authentication, security, facial recognition, patten password

Procedia PDF Downloads 52
1118 Experimental Investigation on Tsunami Acting on Bridges

Authors: Iman Mazinani, Zubaidah Ismail, Ahmad Mustafa Hashim, Amir Reza Saba

Abstract:

Two tragic tsunamis that devastated the west coast of Sumatra Island, Indonesia in 2004 and North East Japan in 2011 had damaged bridges to various extents. Tsunamis have resulted in the catastrophic deterioration of infrastructures i.e. coastal structures, utilities and transportation facilities. A bridge structure performs vital roles to enable people to perform activities related to their daily needs and for development. A damaged bridge needs to be repaired expeditiously. In order to understand the effects of tsunami forces on bridges, experimental tests are carried out to measure the characteristics of hydrodynamic force at various wave heights. Coastal bridge models designed at a 1:40 scale are used in a 24.0 m long hydraulic flume with a cross section of 1.5 m by 2.0 m. The horizontal forces and uplift forces in all cases show that forces increase nonlinearly with increasing wave amplitude.

Keywords: tsunami, bridge, horizontal force, uplift force

Procedia PDF Downloads 285
1117 Women’s History: Perspectives and Challenges

Authors: Bennabhaktula Lavanya

Abstract:

The study of women, their societal roles, and their importance has been a subject of intense discussion and scholarly inquiry. Researchers have diligently endeavoured to understand the influence of women in the domains of society, economy, culture, and politics, as well as the broader ramifications for society. Women's history aims to improve existing historical accounts by analyzing political institutions, economic events, social frameworks, cultural trends, and primary sources that have historically underprivileged women. The extensive research undertaken has resulted in the formation and recognition of women's history as a valid and unique subject of study within history. The Present paper analyses the academic discipline of Women's History and investigates its changing patterns. Tries to address the challenge of transforming the prevailing historical tradition by using innovative methods and frameworks and analyses the interests, experiences, and achievements of women in order to recreate their perceptions and priorities. The paper also examines the principles of Women's History, Gender Studies, and Feminist History and varying perspectives on women.

Keywords: history, perspectives, research, women

Procedia PDF Downloads 27
1116 Impulsivity Predicts Gambling Intention via Upward than Downward Counterfactual Thinking among Nigerians Youths

Authors: Larry O. Awo, Precious I. Nwachukwu

Abstract:

The increase in proliferation of gambling venues in Nigeria in the last decade has led to an increase in gambling prevalence among the youths who have shown signs of problem gambling and its associated risks and pressures to parents and therapists. The present study sought to investigate the roles of counterfactual thinking (CFT) forms (upward CFT vs downward CFT) in the relationship between impulsivity and gambling intention of 371 Nigerian youths who have gambled prior to the study (mean age = 17.37, SD = 4.13). Hayes PROCESS macro result revealed that, after controlling for age, downward CFT was negatively associated with and contributed to a decrease in gambling intention, while upward CFT was positively associated with and contributed to an increase in gambling intention. Mediation analysis result showed that upward CFT amplified the contribution of impulsivity to gambling intention. The association between impulsivity and gambling was partially weakened by downward CFT, even though this weakness was not significant. We conclude that gambling therapies should encourage packages that attenuate upward CFT impulsivity and at the same time, increase downward CFT skills.

Keywords: upward counterfactuals, downward counterfactuals, gambling intention, nigerian youths

Procedia PDF Downloads 89
1115 Problems and Prospects of Rural Women Entrepreneurs in Kakamega County, Kenya

Authors: Ondiba Hesborn Andole, Kenichi Matsui

Abstract:

Women entrepreneurs in the rural areas of Kenya have continually been affected by culturally engraved gendered bias customs. This research investigates challenges and prospects of rural women entrepreneurship in Kakamega County, Kenya. We conducted the questionnaire survey and interviews among 153 women entrepreneurs in the County to better understand how traditional norms influence them in conducting or seeking small businesses. We found that Luhya customs significantly affect growth and performance of rural women enterprises. Traditional Luhya society does not recognize women’s rights to land and higher education. The Luhya traditional roles of women are limited so that, without competing with men, they need to find gender biased works through networking activities. Also, without higher education degrees, their business prospects are limited. Among the respondents, 31% had primary education and about 5% had no formal education at all. We discuss how these women may succeed in businesses under these conditions.

Keywords: chama, culture, entrepreneurs, rural women

Procedia PDF Downloads 163
1114 The Roles of Pay Satisfaction and Intent to Leave on Counterproductive Work Behavior among Non-Academic University Employees

Authors: Abiodun Musbau Lawal, Sunday Samson Babalola, Uzor Friday Ordu

Abstract:

Issue of employees counterproductive work behavior in government owned organization in emerging economies has continued to be a major concern. This study investigated the factors of pay satisfaction, intent to leave and age as predictors of counterproductive work behavior among non-academic employee in a Nigerian federal government owned university. A sample of 200 non-academic employees completed questionnaires. Hierarchical multiple regression was conducted to determine the contribution of each of the predictor variables on the criterion variable on counterproductive work behavior. Results indicate that age of participants (β = -.18; p < .05) significantly independently predicted CWB by accounting for 3% of the explained variance. Addition of pay satisfaction (β = -.14; p < .05) significantly accounted for 5% of the explained variance, while intent to leave (β = -.17; p < .05) further resulted in 8% of the explained variance in counterproductive work behavior. The importance of these findings with regards to reduction in counterproductive work behavior is highlighted.

Keywords: counterproductive, work behaviour, pay satisfaction, intent to leave

Procedia PDF Downloads 363
1113 Conceptual Model for Massive Open Online Blended Courses Based on Disciplines’ Concepts Capitalization and Obstacles’ Detection

Authors: N. Hammid, F. Bouarab-Dahmani, T. Berkane

Abstract:

Since its appearance, the MOOC (massive open online course) is gaining more and more intention of the educational communities over the world. Apart from the current MOOCs design and purposes, the creators of MOOC focused on the importance of the connection and knowledge exchange between individuals in learning. In this paper, we present a conceptual model for massive open online blended courses where teachers over the world can collaborate and exchange their experience to get a common efficient content designed as a MOOC opened to their students to live a better learning experience. This model is based on disciplines’ concepts capitalization and the detection of the obstacles met by their students when faced with problem situations (exercises, projects, case studies, etc.). This detection is possible by analyzing the frequently of semantic errors committed by the students. The participation of teachers in the design of the course and the attendance by their students can guarantee an efficient and extensive participation (an important number of participants) in the course, the learners’ motivation and the evaluation issues, in the way that the teachers designing the course assess their students. Thus, the teachers review, together with their knowledge, offer a better assessment and efficient connections to their students.

Keywords: massive open online course, MOOC, online learning, e-learning

Procedia PDF Downloads 255
1112 Sustainable Development Goals: The Effect of a Board Structure on the Sustainability Performance

Authors: V. Naciti, L. Pulejo, F. Cesaroni

Abstract:

This study empirically analyzes whether the composition of the board of directors (BoD) enhances sustainability performance, in order to understand how the BoD contribute to the integration of Sustainable Development Goals (SDGs) in their businesses. Hypotheses are developed based on the agency theory and stakeholder theory. Using a system generalized method of the moment (SGMM) two-step estimator, with data from Sustainalytics and Compustat databases for 362 firms in six regions, we find that firms with more diversity on the board and a separation of chair and CEO roles have higher sustainability performance. Moreover, our findings provide that a higher number of independent directors is negatively associated with sustainability performance. This study contributes to the literature on corporate governance and the firm’s performance by demonstrating that the composition of the board of directors contributes to a better sustainability performance: by the implementation of a particular corporate governance mechanism, it is possible to integrate SDGs in the corporate strategy.

Keywords: sustainable development goals, corporate governance, board of directors, sustainability performance

Procedia PDF Downloads 164
1111 Factors Impacting Shopping Behavior for Luxury Fashion Brands: A Case of National Capital Region in India

Authors: Manoj Kumar, Preeti Goel

Abstract:

National Capital Region of India is one of the most populous urban agglomerations in the world. This region has residents from all the parts of India, and their shopping behaviors are quite different. The region also has the substantial population of people from other countries. Due to high purchasing power of a large number of people, NCR is one the major markets for luxury fashion brands. Marketers of luxury fashion brands keep on adding innovative features to their products to attract the buyers. This research is an attempt to understand the major factors which impact the brand selection for these brands and other buying decisions like purchasing time and location. The research is based on primary data collected from potential buyers of luxury fashion brands and the people involved in the marketing of these brands in various roles. The research has tried to identify the relative strength of various factors on the shopping behavior for these brands.

Keywords: luxury brands, fashion, shopping, National Capital Region (NCR)

Procedia PDF Downloads 394
1110 Collective Strategies Dominate in Spatial Iterated Prisoners Dilemma

Authors: Jiawei Li

Abstract:

How cooperation emerges and persists in a population of selfish agents is a fundamental question in evolutionary game theory. Our research shows that Collective Strategies with Master-Slave Mechanism (CSMSM) defeat Tit-for-Tat and other well-known strategies in spatial iterated prisoner’s dilemma. A CSMSM identifies kin members by means of a handshaking mechanism. If the opponent is identified as non-kin, a CSMSM will always defect. Once two CSMSMs meet, they play master and slave roles. A mater defects and a slave cooperates in order to maximize the master’s payoff. CSMSM outperforms non-collective strategies in spatial IPD even if there is only a small cluster of CSMSMs in the population. The existence and performance of CSMSM in spatial iterated prisoner’s dilemma suggests that cooperation first appears and persists in a group of collective agents.

Keywords: Evolutionary game theory, spatial prisoners dilemma, collective strategy, master-slave mechanism

Procedia PDF Downloads 135
1109 English Grammatical Errors of Arabic Sentence Translations Done by Machine Translations

Authors: Muhammad Fathurridho

Abstract:

Grammar as a rule used by every language to be understood by everyone is always related to syntax and morphology. Arabic grammar is different with another languages’ grammars. It has more rules and difficulties. This paper aims to investigate and describe the English grammatical errors of machine translation systems in translating Arabic sentences, including declarative, exclamation, imperative, and interrogative sentences, specifically in year 2018 which can be supported with artificial intelligence’s role. The Arabic sample sentences which are divided into two; verbal and nominal sentence of several Arabic published texts will be examined as the source language samples. The translated sentences done by several popular online machine translation systems, including Google Translate, Microsoft Bing, Babylon, Facebook, Hellotalk, Worldlingo, Yandex Translate, and Tradukka Translate are the material objects of this research. Descriptive method that will be taken to finish this research will show the grammatical errors of English target language, and classify them. The conclusion of this paper has showed that the grammatical errors of machine translation results are varied and generally classified into morphological, syntactical, and semantic errors in all type of Arabic words (Noun, Verb, and Particle), and it will be one of the evaluations for machine translation’s providers to correct them in order to improve their understandable results.

Keywords: Arabic, Arabic-English translation, machine translation, grammatical errors

Procedia PDF Downloads 142
1108 The Budget Profile of the Municipality of AtaleIa-MG in the Context of the Micro-Region of Teofilo Otoni in Brazil

Authors: Jeferson Gomes Dos Santos, Mirelle Cristina De Abreu Quintela

Abstract:

Considering that after the 1988 Constitution, in Brazil, municipalities have acquired new roles in the face of a financial reality that jeopardizes more substantial actions, the Public Budget is essential for the establishment of guidelines for action, within each budgetary reality. Within this, the present work sought to understand the budget profile of the mining municipality of Ataleia, with a view to identifying its budget composition, in relation to the main sources of revenue and expenditure. To achieve the purposes of the study, information was collected on the municipality's finances, from the years 2000 to 2016, visualizing the progress of its revenues in terms of funding and origin, and expenses in terms of nature and purpose. It was evidenced that the municipality, having its budget revenue in the period, still shows great dependence on intergovernmental transfers, as the own collection was relatively low. The budget expenditure of the period was mainly influenced by social expenditures, but it must be said that the municipality complied with the limits of spending, minimum and maximum, established by law.

Keywords: expenses, municipal budget, planning, revenue

Procedia PDF Downloads 206
1107 Choral Singers' Preference for Expressive Priming Techniques

Authors: Shawn Michael Condon

Abstract:

Current research on teaching expressivity mainly involves instrumentalists. This study focuses on choral singers’ preference of priming techniques based on four methods for teaching expressivity. 112 choral singers answered the survey about their preferred methods for priming expressivity (vocal modelling, using metaphor, tapping into felt emotions, and drawing on past experiences) in three conditions (active, passive, and instructor). Analysis revealed higher preference for drawing on past experience among more experienced singers. The most preferred technique in the passive and instructor roles was vocal modelling, with metaphors and tapping into felt emotions favoured in an active role. Priming techniques are often used in combination with other methods to enhance singing technique or expressivity and are dependent upon the situation, repertoire, and the preferences of the instructor and performer.

Keywords: emotion, expressivity, performance, singing, teaching

Procedia PDF Downloads 142
1106 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 344
1105 How Unicode Glyphs Revolutionized the Way We Communicate

Authors: Levi Corallo

Abstract:

Typed language made by humans on computers and cell phones has made a significant distinction from previous modes of written language exchanges. While acronyms remain one of the most predominant markings of typed language, another and perhaps more recent revolution in the way humans communicate has been with the use of symbols or glyphs, primarily Emojis—globally introduced on the iPhone keyboard by Apple in 2008. This paper seeks to analyze the use of symbols in typed communication from both a linguistic and machine learning perspective. The Unicode system will be explored and methods of encoding will be juxtaposed with the current machine and human perception. Topics in how typed symbol usage exists in conversation will be explored as well as topics across current research methods dealing with Emojis like sentiment analysis, predictive text models, and so on. This study proposes that sequential analysis is a significant feature for analyzing unicode characters in a corpus with machine learning. Current models that are trying to learn or translate the meaning of Emojis should be starting to learn using bi- and tri-grams of Emoji, as well as observing the relationship between combinations of different Emoji in tandem. The sociolinguistics of an entire new vernacular of language referred to here as ‘typed language’ will also be delineated across my analysis with unicode glyphs from both a semantic and technical perspective.

Keywords: unicode, text symbols, emojis, glyphs, communication

Procedia PDF Downloads 182
1104 ICT in Education – A Quest for Quality Learning in the 21st Century

Authors: Adam Johnbull

Abstract:

The paper discusses ICT in Education as a quest for quality learning in the 21st century. Education is the key that unlock the door to development, without adequate education of the citizenry, the development of a nation becomes a sham. Information Communication Technologies (ICTs) has revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICT’s to win global recognition and attention and thus ensure desire quality in our school system. Thus, the purpose of the paper is to discuss amongst others, what is ICT. The roles of ICT’s in education, limitation and key challenges of integrating ICT to education in the enhancement of student learning and experiences in other to encourage policy makers, school administrators and teachers pay the required attention to integrate this technology in the education system. The paper concludes that regardless of all the limitation characterizing it. ICT benefit education system to provide quality education in the 21st century.

Keywords: ICTs, quest, information, global, sham, century

Procedia PDF Downloads 411
1103 An Experiential Learning of Ontology-Based Multi-document Summarization by Removal Summarization Techniques

Authors: Pranjali Avinash Yadav-Deshmukh

Abstract:

Remarkable development of the Internet along with the new technological innovation, such as high-speed systems and affordable large storage space have led to a tremendous increase in the amount and accessibility to digital records. For any person, studying of all these data is tremendously time intensive, so there is a great need to access effective multi-document summarization (MDS) systems, which can successfully reduce details found in several records into a short, understandable summary or conclusion. For semantic representation of textual details in ontology area, as a theoretical design, our system provides a significant structure. The stability of using the ontology in fixing multi-document summarization problems in the sector of catastrophe control is finding its recommended design. Saliency ranking is usually allocated to each phrase and phrases are rated according to the ranking, then the top rated phrases are chosen as the conclusion. With regards to the conclusion quality, wide tests on a selection of media announcements are appropriate for “Jammu Kashmir Overflow in 2014” records. Ontology centered multi-document summarization methods using “NLP centered extraction” outshine other baselines. Our participation in recommended component is to implement the details removal methods (NLP) to enhance the results.

Keywords: disaster management, extraction technique, k-means, multi-document summarization, NLP, ontology, sentence extraction

Procedia PDF Downloads 365
1102 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships

Authors: Martina Maria Keitsch

Abstract:

Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.

Keywords: critical design, postmodern design theories, narratives, rhizome

Procedia PDF Downloads 155
1101 Changing Faces of the Authoritarian Reflex and Islamist Actors in the Maghreb and Mashreq after Arab Uprisings

Authors: Nur Köprülü

Abstract:

One of the main questions that have arisen after the Arab uprisings has centered on whether they will lead to democratic transition and what the roles of Islamist actors will be. It has become apparent today that one of the key outcomes has been the partial, if not total, overthrow of authoritarian regimes in some cases. So, this article aims to analyse three synchronous upshots brought about by the uprisings, referring to patterns of state formation in the Maghreb and Mashreq. One of the main outcomes has been the persistence of authoritarianism in various forms, and the fragility of the Arab republics coping with the protests as compared to the more resilient character of the monarchies. In addition, none of the uprisings has brought an Islamist organization to incontestable power, as some predicted. However, ‘old’ Islamist actors have since re-emerged as key players, namely the Muslim Brotherhood in Tunisia, Egypt, Jordan and elsewhere. Thus, to understand the synthesis of change and continuity in the Middle East in the aftermath of the Arab Spring, analysing the changing faces of authoritarianism in the region and the impact on Islamists in both the Maghreb and the Mashreq is imperative.

Keywords: authoritarianism, democratization, Arab spring, Islamists

Procedia PDF Downloads 201
1100 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach

Authors: Alev Atak

Abstract:

In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.

Keywords: financial sentiment, machine learning, information disclosure, risk

Procedia PDF Downloads 82