Search results for: popular opinion
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2086

Search results for: popular opinion

1366 Automated Detection of Women Dehumanization in English Text

Authors: Maha Wiss, Wael Khreich

Abstract:

Animals, objects, foods, plants, and other non-human terms are commonly used as a source of metaphors to describe females in formal and slang language. Comparing women to non-human items not only reflects cultural views that might conceptualize women as subordinates or in a lower position than humans, yet it conveys this degradation to the listeners. Moreover, the dehumanizing representation of females in the language normalizes the derogation and even encourages sexism and aggressiveness against women. Although dehumanization has been a popular research topic for decades, according to our knowledge, no studies have linked women's dehumanizing language to the machine learning field. Therefore, we introduce our research work as one of the first attempts to create a tool for the automated detection of the dehumanizing depiction of females in English texts. We also present the first labeled dataset on the charted topic, which is used for training supervised machine learning algorithms to build an accurate classification model. The importance of this work is that it accomplishes the first step toward mitigating dehumanizing language against females.

Keywords: gender bias, machine learning, NLP, women dehumanization

Procedia PDF Downloads 80
1365 Enhancement of Genetic Diversity through Cross Breeding of Two Catfish (Heteropneustes fossilis and Clarias batrachus) in Bangladesh

Authors: M. F. Miah, A. Chakrabarty

Abstract:

Two popular and highly valued fish, Stinging catfish (Heteropneustes fossilis) and Asian catfish (Clarias batrachus) are considered for observing genetic enhancement. Cross breeding was performed considering wild and farmed fish through inducing agent. Five RAPD markers were used to assess genetic diversity among parents and offspring of these two catfish for evaluating genetic enhancement in F1 generation. Considering different genetic data such as banding pattern of DNA, polymorphic loci, polymorphic information content (PIC), inter individual pair wise similarity, Nei genetic similarity, genetic distance, phylogenetic relationships, allele frequency, genotype frequency, intra locus gene diversity and average gene diversity of parents and offspring of these two fish were analyzed and finally in both cases higher genetic diversity was found in F1 generation than the parents.

Keywords: Heteropneustes fossilis, Clarias batrachus, cross breeding, genetic enhancement

Procedia PDF Downloads 251
1364 What Lies Beneath: Kanti Shah’s Children of Midnight

Authors: Vibhushan Subba

Abstract:

B-movies are almost always ‘glanced over’, ‘swept beneath’, ‘hidden from’ and ‘locked away’ to live a secret life; a life that exists but enjoys only a mummified existence behind layers of protective covering. They are more often than not discarded as ‘trash’, ‘sleaze’, ‘porn’ and put down for their ‘bad taste’ or at least that has been the case in India. With the art film entering the realm of high art, the popular and the mainstream has been increasingly equated with the A grade Bollywood film. This leaves the B-movie to survive as a degraded cultural artifact on the fringes of the mainstream. Kanti Shah’s films are part of a secret, traversing the libidinal circuits of the B and C grade through history. His films still circulate like a corporeal reminder of the forbidden and that which is taboo, like a hidden fracture that threatens to split open bourgeois respectability. Seeking to find answers to an aesthetic that has been rejected and hidden, this paper looks at three films of Kanti Shah to see how the notion of taboo, censorship and the unseen coincide, how they operate in the domain of his cinema and try and understand a form that draws our attention to the subterranean forces at work.

Keywords: B-movies, trash, taboo, censorship

Procedia PDF Downloads 461
1363 Modified InVEST for Whatsapp Messages Forensic Triage and Search through Visualization

Authors: Agria Rhamdhan

Abstract:

WhatsApp as the most popular mobile messaging app has been used as evidence in many criminal cases. As the use of mobile messages generates large amounts of data, forensic investigation faces the challenge of large data problems. The hardest part of finding this important evidence is because current practice utilizes tools and technique that require manual analysis to check all messages. That way, analyze large sets of mobile messaging data will take a lot of time and effort. Our work offers methodologies based on forensic triage to reduce large data to manageable sets resulting easier to do detailed reviews, then show the results through interactive visualization to show important term, entities and relationship through intelligent ranking using Term Frequency-Inverse Document Frequency (TF-IDF) and Latent Dirichlet Allocation (LDA) Model. By implementing this methodology, investigators can improve investigation processing time and result's accuracy.

Keywords: forensics, triage, visualization, WhatsApp

Procedia PDF Downloads 168
1362 Motivating Factors to Use Electric Vehicles Based on Behavioral Intention Model in South Korea

Authors: Seyedsamad Tahani, Samira Ghorbanpour

Abstract:

The global warming crisis forced humans to consider their place in the world and the earth's future. In this regard, Electric Vehicles (EVs) are a significant step toward protecting the environment. By identifying factors that influence people's behavior intentions toward using Electric Vehicles (EV), we proposed a theoretical model by extending the Technology Acceptance Model (TAM), including three more concepts, Subjective Norm (SN), Self-Efficacy (SE), and Perceived Behavior Control (PBC). The study was conducted in South Korea, and a random sample was taken at a specific time. In order to collect data, a questionnaire was created in a Google Form and sent via Kakao Talk, a popular social media application used in Korea. There were about 220 participants in this survey. However, 201 surveys were completely done. The findings revealed that all factors in the TAM model and the other added concepts such as subjective norms, self-efficacy and perceived behavior control significantly affect the behavioral intention of using EVs.

Keywords: electric vehicles, behavioral intention, perceived trust, perceived enjoyment, self-efficacy

Procedia PDF Downloads 134
1361 Implementation of Geo-Crowdsourcing Mobile Applications in e-Government of V4 Countries: A State-of-the-Art Survey

Authors: Barbora Haltofová

Abstract:

In recent years, citizens have become an important source of geographic information and, therefore, geo-crowdsourcing, often known as volunteered geographic information, has provided an interesting alternative to traditional mapping practices which are becoming expensive, resource-intensive and unable to capture the dynamic nature of urban environments. In order to address a gap in research literature, this paper deals with a survey conducted to assess the current state of geo-crowdsourcing, a recent phenomenon popular with people who collect geographic information using their smartphones. This article points out that there is an increasing body of knowledge of geo-crowdsourcing mobile applications in the Visegrad countries marked by the ubiquitous Internet connection and the current massive proliferation of smartphones. This article shows how geo-crowdsourcing can be used as a complement, or in some cases a replacement, to traditionally generated sources of spatial data and information in public management. It discusses the new spaces of citizen participation constructed by these geo-crowdsourcing practices.

Keywords: citizen participation, e-Government, geo-crowdsourcing, participatory mapping, mobile applications

Procedia PDF Downloads 334
1360 Predictive Models of Ruin Probability in Retirement Withdrawal Strategies

Authors: Yuanjin Liu

Abstract:

Retirement withdrawal strategies are very important to minimize the probability of ruin in retirement. The ruin probability is modeled as a function of initial withdrawal age, gender, asset allocation, inflation rate, and initial withdrawal rate. The ruin probability is obtained based on the 2019 period life table for the Social Security, IRS Required Minimum Distribution (RMD) Worksheets, US historical bond and equity returns, and inflation rates using simulation. Several popular machine learning algorithms of the generalized additive model, random forest, support vector machine, extreme gradient boosting, and artificial neural network are built. The model validation and selection are based on the test errors using hyperparameter tuning and train-test split. The optimal model is recommended for retirees to monitor the ruin probability. The optimal withdrawal strategy can be obtained based on the optimal predictive model.

Keywords: ruin probability, retirement withdrawal strategies, predictive models, optimal model

Procedia PDF Downloads 74
1359 The Domino Principle of Dobbs v Jackson Women’s Health Organization: The Gays Are Next!

Authors: Alan Berman, Mark Brady

Abstract:

The phenomenon of homophobia and transphobia in the United States detrimentally impacts the health, wellbeing, and dignity of school students who identify with the LGBTQ+ community. These negative impacts also compromise the participation of LGBTQ+ individuals in the wider life of educational domains and endanger the potential economic, social and cultural contribution this community can make to American society. The recent 6:3 majority decision of the US Supreme Court in Dobbs v Jackson Women’s Health Organization expressly overruled the 1973 decision in Roe v Wade and the 1992 Planned Parenthood v Casey decision. This study will canvass the bases upon which the court in Dobbs overruled longstanding precedent established in Roe and Casey. It will examine the potential implications for the LGBTQ community of the result in Dobbs. The potential far-reaching consequences of this case are foreshadowed in a concurring opinion by Justice Clarence Thomas, suggesting the Court should revisit all substantive due process cases. This includes notably the Lawrence v Texas case (invalidating sodomy laws criminalizing same-sex relations) and the Obergefellcase (upholding same-sex marriage). Finally, the study will examine the likely impact of the uncertainty brought about by the decision in Doddsfor LGBTQ students in US educational institutions. The actions of several states post-Dobbs, reflects and exacerbates the problems facing LGBTQ+ students and uncovers and highlights societal homophobia and transphobia.

Keywords: human rights, LGBT rights, right to personal dignity and autonomy, substantive due process rights

Procedia PDF Downloads 104
1358 Charging-Vacuum Helium Mass Spectrometer Leak Detection Technology in the Application of Space Products Leak Testing and Error Control

Authors: Jijun Shi, Lichen Sun, Jianchao Zhao, Lizhi Sun, Enjun Liu, Chongwu Guo

Abstract:

Because of the consistency of pressure direction, more short cycle, and high sensitivity, Charging-Vacuum helium mass spectrometer leak testing technology is the most popular leak testing technology for the seal testing of the spacecraft parts, especially the small and medium size ones. Usually, auxiliary pump was used, and the minimum detectable leak rate could reach 5E-9Pa•m3/s, even better on certain occasions. Relative error is more important when evaluating the results. How to choose the reference leak, the background level of helium, and record formats would affect the leak rate tested. In the linearity range of leak testing system, it would reduce 10% relative error if the reference leak with larger leak rate was used, and the relative error would reduce obviously if the background of helium was low efficiently, the record format of decimal was used, and the more stable data were recorded.

Keywords: leak testing, spacecraft parts, relative error, error control

Procedia PDF Downloads 456
1357 Wood Framing Roof Resistant Support for Hurricane

Authors: P. Hajyalikhani, E. Gilmore, C. Petty, J. Duron

Abstract:

Wood framed construction is the most popular method of construction for residential buildings. The typical roof framing for wood-framed buildings is sloped and consists of several structural members, such as rafters, hips, and valleys that link to the ridge and ceiling joists. The most common type of wood framing used is platform framing, also known as stick framing. Failures of the wood framing structures are among the most common types of wind damage in densely populated regions. Wood-framed buildings are under uplift during tornadoes and hurricanes which cause the failure in the roof. The bracing long structure members such as hip and valley have a large impact on the resilience of wood-framed buildings. As a result, the common failures in wood-framed buildings are reviewed, and the critical support locations for lengthy hips and valleys with various slopes are analyzed and recommended.

Keywords: rafters, hips, valleys, hip, ceiling joist, roof failures, residential and commercial structures, hurricane, tornadoes, building codes

Procedia PDF Downloads 65
1356 Machine Learning-Enabled Classification of Climbing Using Small Data

Authors: Nicholas Milburn, Yu Liang, Dalei Wu

Abstract:

Athlete performance scoring within the climbing do-main presents interesting challenges as the sport does not have an objective way to assign skill. Assessing skill levels within any sport is valuable as it can be used to mark progress while training, and it can help an athlete choose appropriate climbs to attempt. Machine learning-based methods are popular for complex problems like this. The dataset available was composed of dynamic force data recorded during climbing; however, this dataset came with challenges such as data scarcity, imbalance, and it was temporally heterogeneous. Investigated solutions to these challenges include data augmentation, temporal normalization, conversion of time series to the spectral domain, and cross validation strategies. The investigated solutions to the classification problem included light weight machine classifiers KNN and SVM as well as the deep learning with CNN. The best performing model had an 80% accuracy. In conclusion, there seems to be enough information within climbing force data to accurately categorize climbers by skill.

Keywords: classification, climbing, data imbalance, data scarcity, machine learning, time sequence

Procedia PDF Downloads 142
1355 Exploring Teledermatology in Selected Dermatology Clinics in San Fernando City, La Union

Authors: Everdeanne Javier, Kelvin Louie Abat, Alodia Rizzalynn Cabaya, Chynna Allyson Manzano, Vlasta Sai Espiritu, Raniah May Puzon, Michelle Tobler

Abstract:

Teledermatology is becoming a more popular form of providing dermatologic healthcare worldwide, and it will almost certainly play a larger role in the future. As the current pandemic continues to worsen, Teledermatology is seen as the primary alternative to face-to-face dermatology consultation; therefore, it needs to be enhanced and developed to become as convenient and reliable as it can be for both patients and doctors. This research paper seeks to know the processes used in teledermatology regarding delivery modalities and proper consultation. This study's research design is a Qualitative Descriptive approach to describe further the processes used by teledermatologists. An online survey questionnaire was used to collect data from Teledermatology Clinics in San Fernando City, La Union. Research showed that patients tend to embrace and be pleased with teledermatology as a way of accessing healthcare. On the other hand, clinicians have usually reported positive outcomes from teledermatology. Furthermore, it is not intended to be used instead of a face-to-face appointment with a dermatologist.

Keywords: teledermatology, online dermatology consultation, dermatology, dermatologist

Procedia PDF Downloads 266
1354 Evolution of Leather in Fashion Industry

Authors: Utkarsh Goley

Abstract:

Leather has been a valued material for clothing and accessories for centuries, and its use has evolved along with fashion trends and technological advancements. From ancient times when leather was used for practical purposes, to the modern fashion industry, where it is used for both functional and decorative purposes, leather has undergone significant changes in its production and usage. In recent years, there has been a growing awareness of ethical and sustainable fashion, leading to a shift towards alternative materials and production methods. The leather industry has responded to this by exploring new techniques and materials, such as vegetable-tanned leather and leather substitutes made from plant-based materials. The evolution of leather in the fashion industry is also closely tied to cultural and social trends. The use of leather has been associated with rebellion and counterculture in the past, and today it is often used to evoke a sense of luxury and sophistication. Despite the challenges and controversies surrounding its production, leather continues to be a popular material in the fashion industry, with designers and consumers alike valuing its durability, versatility, and aesthetic appeal. As fashion continues to evolve, so will the role and use of leather in the industry. This research paper provides a detailed overview of the evolution of leather in the fashion industry throughout the different decades and centuries.

Keywords: evolution, fashion, leather, sustainable

Procedia PDF Downloads 92
1353 Atomic Clusters: A Unique Building Motif for Future Smart Nanomaterials

Authors: Debesh R. Roy

Abstract:

The fundamental issue in understanding the origin and growth mechanism of nanomaterials, from a fundamental unit is a big challenging problem to the scientists. Recently, an immense attention is generated to the researchers for prediction of exceptionally stable atomic cluster units as the building units for future smart materials. The present study is a systematic investigation on the stability and electronic properties of a series of bimetallic (semiconductor-alkaline earth) clusters, viz., BxMg3 (x=1-5) is performed, in search for exceptional and/ or unusual stable motifs. A very popular hybrid exchange-correlation functional, B3LYP as proposed by A. D. Becke along with a higher basis set, viz., 6-31+G[d,p] is employed for this purpose under the density functional formalism. The magic stability among the concerned clusters is explained using the jellium model. It is evident from the present study that the magic stability of B4Mg3 cluster arises due to the jellium shell closure.

Keywords: atomic clusters, density functional theory, jellium model, magic clusters, smart nanomaterials

Procedia PDF Downloads 528
1352 A Retrievable Genetic Algorithm for Efficient Solving of Sudoku Puzzles

Authors: Seyed Mehran Kazemi, Bahare Fatemi

Abstract:

Sudoku is a logic-based combinatorial puzzle game which is popular among people of different ages. Due to this popularity, computer softwares are being developed to generate and solve Sudoku puzzles with different levels of difficulty. Several methods and algorithms have been proposed and used in different softwares to efficiently solve Sudoku puzzles. Various search methods such as stochastic local search have been applied to this problem. Genetic Algorithm (GA) is one of the algorithms which have been applied to this problem in different forms and in several works in the literature. In these works, chromosomes with little or no information were considered and obtained results were not promising. In this paper, we propose a new way of applying GA to this problem which uses more-informed chromosomes than other works in the literature. We optimize the parameters of our GA using puzzles with different levels of difficulty. Then we use the optimized values of the parameters to solve various puzzles and compare our results to another GA-based method for solving Sudoku puzzles.

Keywords: genetic algorithm, optimization, solving Sudoku puzzles, stochastic local search

Procedia PDF Downloads 423
1351 Examining the Influences of Exchange Programmes on Youths' National Identity: A Hong Kong Case Study

Authors: Annie Y. N. Cheng

Abstract:

Since the handover of Hong Kong to China, 'National Identity' has become a vital focus promoted by the HKSAR government. According to the poll by the University of Hong Kong’s Public Opinion Programme (2010 – 2015), young people aged between 18 and 29 have the least and decreasing recognition, an average 5.5%, of their Chinese identity. Past research has shown that student participation in exchange programmes and study tours provides the possibility of new formulations of national identity. Since the Policy Address 2008, the HKSAR government has been actively expanding and exploring the feasibility of Mainland exchange programmes to enhance our youths’ understanding of Chineseness and to strengthen their national identity. Schools have been sponsored or subsidized with the costs of Mainland exchange activities through various grants and channels. Considering the significantly increasing number of Hong Kong youths who have participated in these Mainland exchange programmes and study tours, however, the effectiveness of these activities is understudied. At present, there is the lack of systematic research on the impacts of these activities and the ways in which they influence our students’ perceptions of national identity. Using case study approach, this study aims to examine students’ perceptions of their national identity; and evaluate whether the Mainland exchange programmes or study tours have influences on students’ perceptions of national identity. Results show that the influences on national identity varied which were dependent on the objectives and destinations of the programmes. The findings of this study can provide significant feedback for schools to organize meaningful Mainland exchange activities or study tours and inform policy makers how to formulate effective strategies for promoting such exchange activities.

Keywords: Hong Kong youth, mainland exchange programme, national identity, study tours

Procedia PDF Downloads 395
1350 Text Mining of Twitter Data Using a Latent Dirichlet Allocation Topic Model and Sentiment Analysis

Authors: Sidi Yang, Haiyi Zhang

Abstract:

Twitter is a microblogging platform, where millions of users daily share their attitudes, views, and opinions. Using a probabilistic Latent Dirichlet Allocation (LDA) topic model to discern the most popular topics in the Twitter data is an effective way to analyze a large set of tweets to find a set of topics in a computationally efficient manner. Sentiment analysis provides an effective method to show the emotions and sentiments found in each tweet and an efficient way to summarize the results in a manner that is clearly understood. The primary goal of this paper is to explore text mining, extract and analyze useful information from unstructured text using two approaches: LDA topic modelling and sentiment analysis by examining Twitter plain text data in English. These two methods allow people to dig data more effectively and efficiently. LDA topic model and sentiment analysis can also be applied to provide insight views in business and scientific fields.

Keywords: text mining, Twitter, topic model, sentiment analysis

Procedia PDF Downloads 179
1349 An Evaluation of Barriers to Implement Reverse Logistics: A Case Study of Indian Fastener Industry

Authors: D. Garg, S. Luthra, A. Haleem

Abstract:

Reverse logistics (RL) is supposed to be a systematic procedure that helps in improving the environmental hazards and maintain business sustainability for industries. Industries in Indian are now opting for adoption of RL techniques in business. But, RL practices are not popular in Indian industries because of many barriers for its successful implementation. Therefore, need arises to identify and evaluate the barriers to implement RL practices by taking an Indian industries perspective. Literature review approach and case study approach have been adapted to identify relevant barriers to implement RL practices. Further, Fuzzy Decision Making Trial and Evaluation Laboratory methodology has been brought into use for evaluating causal relationships among the barriers to implement RL practices. Seven barriers out of ten barriers have been categorized into the cause group and remaining into effect group. This research will help Indian industries to manage these barriers towards effective implementing RL practices.

Keywords: barriers, decision making trial and evaluation laboratory (DEMATEL), fuzzy set theory, Indian industries, reverse logistics (RL)

Procedia PDF Downloads 328
1348 Variants of Fat Mass Obesity Associated rs 9939609 Associated with Obesity and Eating Behavior in Adolescent of Minangkabau Ethnic

Authors: Susmiati, Ingrid S. Surono, Jamsari, Nur Indrawati Lipoeto

Abstract:

There are two contradicting opinions on the relationship between fat mass obesity associated (FTO) rs 9939609 variants and obesity on various ethnics and races. The first opinion agrees that there is an association between the two variables, yet another one disagree. Minangkabau ethnic had a different dietary pattern with other ethnics in Indonesia. They had higher fat and low fiber intakes compared to the other ethnics groups. There is little research in genetic factors that influence eating behavior (food preference or food selection). The objective of this study was to investigate the association between FTO rs 9939609 variants with obesity and eating behavior in adolescent girls of Minangkabau Ethnic. The research design was case control study. A total of 275 adolescent girls aged 12-15 years old (130 obese and 145 normal) were randomly chosen from four districts at West Sumatera (Padang, Padang Pariaman, Padang Panjang and Tanah Datar). Genetic variants of FTO rs 9939609 were analyzed with Tetra-primer Amplification Refractory Mutation System-Polimerase Chain Reaction (AMRS PCR), eating behavior were gathered using eating habits questionnaire, and Body Mass Index (BMI) was calculated according to BMI Z-score (WHO). The result showed that genetic variants of FTO rs 9939609 (TT, TA and AA genotype) had associated with obesity (p = 0,013), whereas subject with An Allele was significantly associated with obesity (odds ratio 1,62 [95% confidential interval, 1,00-2,60]). Subjects with An Allele carrier reported a higher consumption of fried food (p < 0.05) as compared to TT genotypes carriers. There is no association between genetic variants and meal frequency, fruit and fiber intakes p > 0.05. The genetic variants of FTO rs 9939609 are associated with obesity and eating behavior in adolescent of Minangkabau Ethics.

Keywords: FTO rs9939609, obesity, eating behavior, adolescents

Procedia PDF Downloads 173
1347 The Journey of a Malicious HTTP Request

Authors: M. Mansouri, P. Jaklitsch, E. Teiniker

Abstract:

SQL injection on web applications is a very popular kind of attack. There are mechanisms such as intrusion detection systems in order to detect this attack. These strategies often rely on techniques implemented at high layers of the application but do not consider the low level of system calls. The problem of only considering the high level perspective is that an attacker can circumvent the detection tools using certain techniques such as URL encoding. One technique currently used for detecting low-level attacks on privileged processes is the tracing of system calls. System calls act as a single gate to the Operating System (OS) kernel; they allow catching the critical data at an appropriate level of detail. Our basic assumption is that any type of application, be it a system service, utility program or Web application, “speaks” the language of system calls when having a conversation with the OS kernel. At this level we can see the actual attack while it is happening. We conduct an experiment in order to demonstrate the suitability of system call analysis for detecting SQL injection. We are able to detect the attack. Therefore we conclude that system calls are not only powerful in detecting low-level attacks but that they also enable us to detect high-level attacks such as SQL injection.

Keywords: Linux system calls, web attack detection, interception, SQL

Procedia PDF Downloads 358
1346 The Role of Artificial Intelligence Algorithms in Decision-Making Policies

Authors: Marisa Almeida AraúJo

Abstract:

Artificial intelligence (AI) tools are being used (including in the criminal justice system) and becomingincreasingly popular. The many questions that these (future) super-beings pose the neuralgic center is rooted in the (old) problematic between rationality and morality. For instance, if we follow a Kantian perspective in which morality derives from AI, rationality will also surpass man in ethical and moral standards, questioning the nature of mind, the conscience of self and others, and moral. The recognition of superior intelligence in a non-human being puts us in the contingency of having to recognize a pair in a form of new coexistence and social relationship. Just think of the humanoid robot Sophia, capable of reasoning and conversation (and who has been recognized for Saudi citizenship; a fact that symbolically demonstrates our empathy with the being). Machines having a more intelligent mind, and even, eventually, with higher ethical standards to which, in the alluded categorical imperative, we would have to subject ourselves under penalty of contradiction with the universal Kantian law. Recognizing the complex ethical and legal issues and the significant impact on human rights and democratic functioning itself is the goal of our work.

Keywords: ethics, artificial intelligence, legal rules, principles, philosophy

Procedia PDF Downloads 197
1345 Carbon Footprint and Exergy Destruction Footprint in White Wine Production Line

Authors: Mahmut Genc, Seda Genc

Abstract:

Wine is the most popular alcoholic drink in the World with 274.4 million of hectoliter annual production in the year of 2015. The wine industry is very important for some regions as well as creating significant value in their economies. This industry is very sensitive to the global warming since viticulture highly depends on climate and geographical region. Sustainability concept is a crucial issue for the wine industry and sustainability performances of wine production processes should be determined. Although wine production industry is an energy intensive sector as a whole, the most energy intensive products are widely used both in the viti and vinicultural process. In this study, gate-to-gate LCA approach in energy resource utilization and global warming potential impacts for white wine production line were attempted and carbon footprint and exergy destruction footprint were calculated, accordingly. As a result, carbon footprint and exergy destruction footprint values were calculated to be 1.75 kg CO2eq and 365.3kW, respectively.

Keywords: carbon footprint, exergy analysis, exergy destruction footprint, white wine

Procedia PDF Downloads 271
1344 The Application of Extend Spectrum-Based Pushover Analysis for Seismic Evaluation of Reinforced Concrete Wall Structures

Authors: Yang Liu

Abstract:

Reinforced concrete (RC) shear wall structures are one of the most popular and efficient structural forms for medium- and high-rise buildings to resist the action of earthquake loading. Thus, it is of great significance to evaluate the seismic demands of the RC shear walls. In this paper, the application of the extend spectrum-based pushover analysis (ESPA) method on the seismic evaluation of the shear wall structure is presented. The ESPA method includes a nonlinear consecutive pushover analysis procedure and a linear elastic modal response analysis procedure to consider the combination of modes in both elastic and inelastic cases. It is found from the results of case study that the ESPA method can predict the seismic performance of shear wall structures, including internal forces and deformations very well.

Keywords: reinforced concrete shear wall, seismic performance, high mode effect, nonlinear analysis

Procedia PDF Downloads 157
1343 A Hybrid System of Hidden Markov Models and Recurrent Neural Networks for Learning Deterministic Finite State Automata

Authors: Pavan K. Rallabandi, Kailash C. Patidar

Abstract:

In this paper, we present an optimization technique or a learning algorithm using the hybrid architecture by combining the most popular sequence recognition models such as Recurrent Neural Networks (RNNs) and Hidden Markov models (HMMs). In order to improve the sequence or pattern recognition/ classification performance by applying a hybrid/neural symbolic approach, a gradient descent learning algorithm is developed using the Real Time Recurrent Learning of Recurrent Neural Network for processing the knowledge represented in trained Hidden Markov Models. The developed hybrid algorithm is implemented on automata theory as a sample test beds and the performance of the designed algorithm is demonstrated and evaluated on learning the deterministic finite state automata.

Keywords: hybrid systems, hidden markov models, recurrent neural networks, deterministic finite state automata

Procedia PDF Downloads 388
1342 Brand Placement Strategies in Turkey: The Case of “Yalan Dünya”

Authors: Burçe Boyraz

Abstract:

This study examines appearances of brand placement as an alternative communication strategy in television series by focusing on Yalan Dünya which is one of the most popular television series in Turkey. Consequently, this study has a descriptive research design and quantitative content analysis method is used in order to analyze frequency and time data of brand placement appearances in first 3 seasons of Yalan Dünya with 16 episodes. Analysis of brand placement practices in Yalan Dünya is dealt in three categories: episode-based analysis, season-based analysis and comparative analysis. At the end, brand placement practices in Yalan Dünya are evaluated in terms of type, form, duration and legal arrangements. As a result of this study, it is seen that brand placement plays a determinant role in Yalan Dünya content. Also, current legal arrangements make brand placement closer to other traditional communication strategies instead of differing brand placement from them distinctly.

Keywords: advertising, alternative communication strategy, brand placement, Yalan Dünya

Procedia PDF Downloads 248
1341 Pudhaiyal: A Maze-Based Treasure Hunt Game for Tamil Words

Authors: Aarthy Anandan, Anitha Narasimhan, Madhan Karky

Abstract:

Word-based games are popular in helping people to improve their vocabulary skills. Games like ‘word search’ and crosswords provide a smart way of increasing vocabulary skills. Word search games are fun to play, but also educational which actually helps to learn a language. Finding the words from word search puzzle helps the player to remember words in an easier way, and it also helps to learn the spellings of words. In this paper, we present a tile distribution algorithm for a Maze-Based Treasure Hunt Game 'Pudhaiyal’ for Tamil words, which describes how words can be distributed horizontally, vertically or diagonally in a 10 x 10 grid. Along with the tile distribution algorithm, we also present an algorithm for the scoring model of the game. The proposed game has been tested with 20,000 Tamil words.

Keywords: Pudhaiyal, Tamil word game, word search, scoring, maze, algorithm

Procedia PDF Downloads 440
1340 Examining Awareness, Foresight and Expectations about Fatih Project Increasing the Occasions and Normalizing the Technology Movement

Authors: Agah Tugrul Korucu, Mustafa Mucahit Gundogdu, Tarık Gencturk, Ahmet Yucel

Abstract:

Countries are developing big projects and supplying financial resource for developing technological substructure and integrating technology into the education. In Turkey, the Ministry of Education, with the aim of integrating ICT into learning and teaching processes, created a project named increasing occasions and normalizing the technology movement. FATIH Project with this project, the aim is to create teaching environments which are enriched with technology. In orientating people with the technology and integrating technology into the education, teacher and teacher candidates have a big responsibility. While teachers are using technology in lesson, the devices in class and the methods developed are important factors. The aim of this research is to examine awareness, and foresight about FATIH Project in different aspects. This study was conducted during the practice period of the second semester in the 2014-2015 academic years. The working group of the research was created from 209 teacher candidates which are from different teaching departments in the Ahmet Kelesoglu Education Faculty of Necmettin Erbakan University. Scanning model was used in this research. In research, as a getting data tool evaluation of “opinion about FATIH Project: awareness, foresight and expectation scale” which was developed by Karal et. al.; personal information form which was developed by researchers were used. Cronbach coefficient which is the reliability of the scale is 0.91. In analyzing the data, statistical package program average, standard deviation, percentage, correlation, t-test and variance analysis test were used.

Keywords: Fatih Project, information and communication technologies, information technology integration, views on the Fatih Project, technology integration in education

Procedia PDF Downloads 466
1339 Consultation Liasion Psychiatry in a Tertiary Care Hospital

Authors: K. Pankaj, R. K. Chaudhary, B. P. Mishra, S. Kochar

Abstract:

Introduction: Consultation-Liaison psychiatry is a branch of psychiatry that includes clinical service, teaching and research. A consultation-liaison psychiatrist plays a role in having an expert opinion and linking the patients to other medical professionals and the patient’s bio-psycho-social aspects that may be leading to his/her symptoms. Consultation-Liaison psychiatry has been recognised as 'The guardian of the holistic approach to the patient', underlining its pre-eminent role in the management of patients who are admitted in a tertiary care hospital. Aims/ Objectives: The aim of the study was to analyse the utilization of psychiatric services and reasons for referrals in a tertiary care hospital. Materials and Methods: The study was done in a tertiary care hospital. The study included all the cases referred from different Inpatient wards to the psychiatry department for consultation. The study was conducted on 300 patients over a 3 month period. International classification of diseases 10 was used to diagnose the referred cases. Results: The majority of the referral was from the Medical Intensive care unit (22%) followed by general medical wards (18.66%). Majority of the referral was taken for altered sensorium (24.66%), followed by low mood or unexplained medical symptoms (21%). Majority of the referrals had a diagnosis of alcohol withdrawal syndrome (21%) as per International classification of diseases criteria, followed by unipolar Depression and Anxiety disorder (~ 14%), followed by Schizophrenia (5%) and Polysubstance abuse (2.6%). Conclusions: Our study concludes the importance of utilization of consultation-liaison psychiatric services. Also, the study signifies the need for sensitization of our colleagues regarding psychiatric sign and symptoms from time to time and seek psychiatric consult timely to decrease morbidity.

Keywords: consultation-liaison, psychiatry, referral, tertiary care hospital

Procedia PDF Downloads 152
1338 The Amorphousness of the Exposure Sphere

Authors: Nipun Ansal

Abstract:

People guard their beliefs and opinions with their lives. Beliefs that they’ve formed over a period of time, and can go to any lengths to defy, desist from, resist and negate any outward stimulus that has the potential to shake them. Cognitive dissonance is term used to describe it in theory. And every human being, in order to defend himself from cognitive dissonance applies 4 rings of defense viz. Selective Exposure, Selective Perception, Selective Attention, and Selective Retention. This paper is a discursive analysis on how the onslaught of social media, complete with its intrusive weaponry, has amorphized the external ring of defense: the selective exposure. The stimulus-response model of communication is one of the most inherent model that encompasses communication behaviours of children and elderly, individual and masses, humans and animals alike. The paper deliberates on how information bombardment through the uncontrollable channels of the social media, Facebook and Twitter in particular, have dismantled our outer sphere of exposure, leading users online to a state of constant dissonance, and thus feeding impulsive action-taking. It applies case study method citing an example to corroborate how knowledge generation has given in to the information overload and the effect it has on decision making. With stimulus increasing in number of encounters, opinion formation precedes knowledge because of the increased demand of participation and decrease in time for the information to permeate from the outer sphere of exposure to the sphere of retention, which of course, is through perception and attention. This paper discusses the challenge posed by this fleeting, stimulus rich, peer-dominated media on the traditional models of communication and meaning-generation.

Keywords: communication, discretion, exposure, social media, stimulus

Procedia PDF Downloads 408
1337 Changes in Student Definition of De-Escalation in Professional Peace Officer Education

Authors: Pat Nelson

Abstract:

Since the release of the 21st century policing report in the United States, the techniques of de-escalation have received a lot of attention and focus in political systems, policy changes, and the media. The challenge in professional peace officer education is that there is a vast range of defining de-escalation and understanding the various techniques involved, many of which are based on popular media. This research surveyed professional peace officer education university students on their definition of de-escalation and the techniques associated with de-escalation before specific communications coursework was completed. The students were then surveyed after the communication coursework was completed to determine the changes in defining and understanding de-escalation techniques. This research has found that clearly defining de-escalation and emphasizing the broad range of techniques available enhances the students’ understanding and application of proper de-escalation. This research demonstrates the need for professional peace officer education to move students from media concepts of law enforcement to theoretical concepts.

Keywords: criminal justice education, communication theory, de-escalation, peace officer communication

Procedia PDF Downloads 165