Search results for: secondary user (SU)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5238

Search results for: secondary user (SU)

4518 A Novel Method for Face Detection

Authors: H. Abas Nejad, A. R. Teymoori

Abstract:

Facial expression recognition is one of the open problems in computer vision. Robust neutral face recognition in real time is a major challenge for various supervised learning based facial expression recognition methods. This is due to the fact that supervised methods cannot accommodate all appearance variability across the faces with respect to race, pose, lighting, facial biases, etc. in the limited amount of training data. Moreover, processing each and every frame to classify emotions is not required, as the user stays neutral for the majority of the time in usual applications like video chat or photo album/web browsing. Detecting neutral state at an early stage, thereby bypassing those frames from emotion classification would save the computational power. In this work, we propose a light-weight neutral vs. emotion classification engine, which acts as a preprocessor to the traditional supervised emotion classification approaches. It dynamically learns neutral appearance at Key Emotion (KE) points using a textural statistical model, constructed by a set of reference neutral frames for each user. The proposed method is made robust to various types of user head motions by accounting for affine distortions based on a textural statistical model. Robustness to dynamic shift of KE points is achieved by evaluating the similarities on a subset of neighborhood patches around each KE point using the prior information regarding the directionality of specific facial action units acting on the respective KE point. The proposed method, as a result, improves ER accuracy and simultaneously reduces the computational complexity of ER system, as validated on multiple databases.

Keywords: neutral vs. emotion classification, Constrained Local Model, procrustes analysis, Local Binary Pattern Histogram, statistical model

Procedia PDF Downloads 329
4517 Feature-Based Summarizing and Ranking from Customer Reviews

Authors: Dim En Nyaung, Thin Lai Lai Thein

Abstract:

Due to the rapid increase of Internet, web opinion sources dynamically emerge which is useful for both potential customers and product manufacturers for prediction and decision purposes. These are the user generated contents written in natural languages and are unstructured-free-texts scheme. Therefore, opinion mining techniques become popular to automatically process customer reviews for extracting product features and user opinions expressed over them. Since customer reviews may contain both opinionated and factual sentences, a supervised machine learning technique applies for subjectivity classification to improve the mining performance. In this paper, we dedicate our work is the task of opinion summarization. Therefore, product feature and opinion extraction is critical to opinion summarization, because its effectiveness significantly affects the identification of semantic relationships. The polarity and numeric score of all the features are determined by Senti-WordNet Lexicon. The problem of opinion summarization refers how to relate the opinion words with respect to a certain feature. Probabilistic based model of supervised learning will improve the result that is more flexible and effective.

Keywords: opinion mining, opinion summarization, sentiment analysis, text mining

Procedia PDF Downloads 319
4516 Wellbeing Warriors: A Randomized Controlled Trial Examining the Effect of Martial Arts Training on Mental Health Outcomes

Authors: Brian Moore, Stuart Woodcock, Dean Dudley

Abstract:

Mental health problems have significant social and economic consequences; however, many individuals do not seek traditional assistance for mental health difficulties. Martial arts training may provide an inexpensive alternative to traditional psychological therapy. While limited research has suggested martial arts training may be an efficacious intervention, the validity and reliability of this are questionable given the small number of relevant studies and other methodological problems. The study examined the effects of 10-week martial arts-based psycho-social intervention which was evaluated using a randomized controlled trial. The intervention was delivered to 283 secondary school students, aged between 12-14 years, who were recruited from government and catholic secondary schools in New South Wales, Australia. The intervention was delivered in a group format onsite at participating schools and had an intervention dose of 10 x 50-60 minute sessions, once per week for 10 weeks. Data were collected at baseline, post-intervention, and 12-week follow-up. Results found a consistent pattern for strength based wellbeing outcomes. All primary and secondary measures relating to resilience and self-efficacy improved for the intervention group and declined for the control group. As these findings were derived from a robust design and rigorous evaluation, they provide valid and reliable evidence that martial arts-based psycho-social interventions can be considered as an efficacious method of improving strength and wellbeing outcomes.

Keywords: martial arts, mental health, resilience, self-efficacy

Procedia PDF Downloads 147
4515 Computational Fluid Dynamics (CFD) Simulation Approach for Developing New Powder Dispensing Device

Authors: Revanth Rallapalli

Abstract:

Manually dispensing solids and powders can be difficult as it requires gradually pour and check the amount on the scale to be dispensed. Current systems are manual and non-continuous in nature and are user-dependent and difficult to control powder dispensation. Recurrent dosing of powdered medicines in precise amounts quickly and accurately has been an all-time challenge. Various new powder dispensing mechanisms are being designed to overcome these challenges. A battery-operated screw conveyor mechanism is being innovated to overcome the above problems faced. These inventions are numerically evaluated at the concept development level by employing Computational Fluid Dynamics (CFD) of gas-solids multiphase flow systems. CFD has been very helpful in development of such devices saving time and money by reducing the number of prototypes and testing. Furthermore, this paper describes a simulation of powder dispensation from the trocar’s end by considering the powder as secondary flow in air, is simulated by using the technique called Dense Discrete Phase Model incorporated with Kinetic Theory of Granular Flow (DDPM-KTGF). By considering the volume fraction of powder as 50%, the transportation of powder from the inlet side to trocar’s end side is done by rotation of the screw conveyor. Thus, the performance is calculated for a 1-sec time frame in an unsteady computation manner. This methodology will help designers in developing design concepts to improve the dispensation and also at the effective area within a quick turnaround time frame.

Keywords: DDPM-KTGF, gas-solids multiphase flow, screw conveyor, Unsteady

Procedia PDF Downloads 171
4514 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens

Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang

Abstract:

The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.

Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen

Procedia PDF Downloads 53
4513 RAPDAC: Role Centric Attribute Based Policy Driven Access Control Model

Authors: Jamil Ahmed

Abstract:

Access control models aim to decide whether a user should be denied or granted access to the user‟s requested activity. Various access control models have been established and proposed. The most prominent of these models include role-based, attribute-based, policy based access control models as well as role-centric attribute based access control model. In this paper, a novel access control model is presented called “Role centric Attribute based Policy Driven Access Control (RAPDAC) model”. RAPDAC incorporates the concept of “policy” in the “role centric attribute based access control model”. It leverages the concept of "policy‟ by precisely combining the evaluation of conditions, attributes, permissions and roles in order to allow authorization access. This approach allows capturing the "access control policy‟ of a real time application in a well defined manner. RAPDAC model allows making access decision at much finer granularity as illustrated by the case study of a real time library information system.

Keywords: authorization, access control model, role based access control, attribute based access control

Procedia PDF Downloads 142
4512 Teachers' Mental Health: Perceived Social Justice and Life Satisfaction

Authors: Yan Li, Qi-Fan Jia, Jie Zhou

Abstract:

In today’s China, primary and secondary teachers are living a hard life with high pressure but low payment, which results in a sense of unfair and less satisfaction of life. However, teachers’ life satisfaction is a significant factor of their mental health and plays an important role in the development and progress of the society. This study was aimed to explore the effect of teachers’ perception of social justice on life satisfaction. 450 primary and secondary teachers from China were measured with life satisfaction scales, social justice scales, income satisfaction scale, job satisfaction scale, pressure condition scale, and major life event scale. Results showed their pressure is significantly higher than average, while life satisfaction, job satisfaction, income satisfaction and perceived social justice are lower. Hierarchical regression analysis showed that demographic variables, i.e., gender, age, education level and matric status, and factors related to occupation, i.e., professional title, school type and working hours per day cannot predict teachers’ life satisfaction. Teachers who had worked for 11-20 years had a lower life satisfaction compared to those with 1-5 years working experience. However, social status, monthly household income, income satisfaction, as well as job satisfaction were positively related to life satisfaction, whereas pressure condition was negatively related to it. After controlling for demographic factors and individual attitudes, social justice still had a positive effect on life satisfaction, among which distributive justice played a more important role than procedural justice. The suggestions on teachers’ condition in China and the implications for education reform to improve teachers’ mental health are discussed.

Keywords: life satisfaction, mental health, primary and secondary teachers, social justice

Procedia PDF Downloads 303
4511 Programming Language Extension Using Structured Query Language for Database Access

Authors: Chapman Eze Nnadozie

Abstract:

Relational databases constitute a very vital tool for the effective management and administration of both personal and organizational data. Data access ranges from a single user database management software to a more complex distributed server system. This paper intends to appraise the use a programming language extension like structured query language (SQL) to establish links to a relational database (Microsoft Access 2013) using Visual C++ 9 programming language environment. The methodology used involves the creation of tables to form a database using Microsoft Access 2013, which is Object Linking and Embedding (OLE) database compliant. The SQL command is used to query the tables in the database for easy extraction of expected records inside the visual C++ environment. The findings of this paper reveal that records can easily be accessed and manipulated to filter exactly what the user wants, such as retrieval of records with specified criteria, updating of records, and deletion of part or the whole records in a table.

Keywords: data access, database, database management system, OLE, programming language, records, relational database, software, SQL, table

Procedia PDF Downloads 173
4510 Significance of Life Values in Relationship: A Detailed Analysis of Teenage Population

Authors: Preeti Nakhat

Abstract:

Background: Values are essential part of one's life. They are inculcated since the early years of life and shape the personality of the individual. They play a tremendous role in decision making. Teenagers are seen perplexed about the values of their life. The challenge faced by majority of the teenage population in choosing between a positive and negative value is high. The values they adopt remain throughout their life and in every decision, hence it is a crucial topic of research. Research Methodology: This research aimed at finding out the value conflict of teenagers in relations. Hypothesis of the study are: H₀- There is no significant association between the life values and value conflict of higher secondary students; H₁– There is a significant association between the life values and value conflict of higher secondary students. For the same, the standardized tool, value conflict scale by R. L. Bhardwaj has been used. The tool consists 24 questions of different life situations with multiple choice options. Findings: There is 96% variation in value conflict due to evasion vs. fortitude, dependence vs. self-reliance, selfishness vs. probity, hate vs. love, fear vs. assertion and pragmatism vs. idealism life values. There is a positive association between all the life values and value conflict of higher secondary school students. Percentages of association are: 0.17% between value conflict and evasion vs. fortitude value, 0.16% between value conflict and dependence vs. self-reliance value, 0.17% between value conflict and selfishness vs. probity value, 0.16% between value conflict and hate vs. love value, 0.17% between value conflict and fear vs. assertion, 0.17% between value conflict and pragmatism vs. idealism value. Discussions: The dilemma faced by the students regarding value conflict is high. Bewilderment of being honest or lying, of loving or hating family and friends, being pragmatic or idealistic in life decision, being selfish or selfless is seen among the students. It is the challenge for the future. Teaching of values with a practical aspect should be added in the school curriculum.

Keywords: dilemma, conflict, school, values

Procedia PDF Downloads 225
4509 A Comparative CFD Study on the Hemodynamics of Flow through an Idealized Symmetric and Asymmetric Stenosed Arteries

Authors: B. Prashantha, S. Anish

Abstract:

The aim of the present study is to computationally evaluate the hemodynamic factors which affect the formation of atherosclerosis and plaque rupture in the human artery. An increase of atherosclerosis disease in the artery causes geometry changes, which results in hemodynamic changes such as flow separation, reattachment, and adhesion of new cells (chemotactic) in the artery. Hence, geometry plays an important role in the determining the nature of hemodynamic patterns. Influence of stenosis in the non-bifurcating artery, under pulsatile flow condition, has been studied on an idealized geometry. Analysis of flow through symmetric and asymmetric stenosis in the artery revealed the significance of oscillating shear index (OSI), flow separation, low WSS zones and secondary flow patterns on plaque formation. The observed characteristic of flow in the post-stenotic region highlight the importance of plaque eccentricity on the formation of secondary stenosis on the arterial wall.

Keywords: atherosclerotic plaque, oscillatory shear index, stenosis nature, wall shear stress

Procedia PDF Downloads 340
4508 Background Check System for Turkish IT Companies

Authors: Arzu Baloglu, Ugur Kaplancali

Abstract:

This paper focuses on Background Check Systems and Pre-Employment Screening. In our study, we attempted to make an online background checking site that will help employers when hiring employees. Our site has two types of users which are free and powered user. Free users are the employees and powered users are the employers which will hire employers. The database of the site will contain all the information about the employees and employers which are registered in the system so the employers can make a search based on their searching criteria to find the suitable employee for the job. The web site also has a comments and points system. The current employer can make comments to his/her employees and can also give them points. The comments will be shown on employee’s profile, so; when an employer searches for an employee he/she can check the points and comments of the employee to see whether he or she is capable of the job or not. The employers can also follow some employees if they desire. This paper has been designed and implemented with using ASP.NET, C# and JavaScript. The outputs have a user friendly interface. The interface also aimed to provide the useful information for Turkish Technology Companies.

Keywords: background, checking, verification, human resources, online

Procedia PDF Downloads 188
4507 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 210
4506 Integration of Edible Insects into the Animal Husbandry Curriculum in Senior Secondary Schools in Nigeria: Teachers’ Perception

Authors: Ali Christian Chinedu, Asogwa Vincent Chidindu, Ejiofor Toochukwu Eleazar, Okadi Ashagwu Ojang

Abstract:

The increasing rate of Boko Haram insurgency, farmer-herder clashes, and kidnapping in Nigeria has resulted in food shortages and high cost of protein sources like beef and fish. This challenge could be curbed with the production of edible insects, which contain several nutritional benefits like calories, protein, fat, vitamins, and minerals, depending on their species, metamorphic stage, and diet. Unfortunately, the benefits and competencies in producing, preserving, and marketing edible insects are still unknown to the public, including prospective farmers in Nigeria. Hence, this study determined teachers’ perception of integrating edible insects into the Animal Husbandry Curriculum in Senior Secondary Schools in Nigeria to equip the future generation with the relevant competencies for alternative sustainable protein supply. The study was carried out in Enugu State, Nigeria. The participants for the study comprised 162 agricultural science teachers. A questionnaire titled: Edible Insects Integration in Animal Husbandry Curriculum Questionnaire (EIIAHCQ) was used to collect data using a descriptive survey research design. We conducted data collection with the help of six research assistants. The study identified 11 objectives, 11 contents, 10 teaching methods, and 9 evaluation methods that could be integrated into the existing curriculum of animal husbandry in Nigeria. Among others, the Ministry of Education should integrate the finding of this study into the curriculum of Animal Husbandry in Nigeria to enhance the protein supply and curb food insecurity now and in the future.

Keywords: animal husbandry curriculum, edible insects, entomophagy, integration, secondary school, Nigeria

Procedia PDF Downloads 77
4505 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 289
4504 Residual Stress Around Embedded Particles in Bulk YBa2Cu3Oy Samples

Authors: Anjela Koblischka-Veneva, Michael R. Koblischka

Abstract:

To increase the flux pinning performance of bulk YBa2Cu3O7-δ (YBCO or Y-123) superconductors, it is common to employ secondary phase particles, either Y2BaCuO5 (Y-211) particles created during the growth of the samples or additionally added (nano)particles of various types, embedded in the superconducting Y-123 matrix. As the crystallographic parameters of all the particles indicate a misfit to Y-123, there will be residual strain within the Y-123 matrix around such particles. With a dedicated analysis of electron backscatter diffraction (EBSD) data obtained on various bulk, Y-123 superconductor samples, the strain distribution around such embedded secondary phase particles can be revealed. The results obtained are presented in form of Kernel Average Misorientation (KAM) mappings. Around large Y-211 particles, the strain can be so large that YBCO subgrains are formed. Therefore, it is essential to properly control the particle size as well as their distribution within the bulk sample to obtain the best performance. The impact of the strain distribution on the flux pinning properties is discussed.

Keywords: Bulk superconductors, EBSD, Strain, YBa2Cu3Oy

Procedia PDF Downloads 139
4503 Trend of Overweight and Obesity, Based on Population Study among School Children in North West of Iran: Implications for When to Intervene

Authors: Sakineh Nouri Saeidlou, Fatemeh Rezaiegoyjeloo, Parvin Ayremlou, Fariba Babaie

Abstract:

Introduction: Childhood overweight and obesity is a major public health problem in both developed and developing countries. Overweight and obesity in children may have severe consequences later in adolescence and adulthood. The aim of current study was to determine the prevalence trend of overweight and obesity in school-aged children from 2009 to 2011. Methods: The present study was a population-based study and conducted in three consecutive years, from 2009 to 2011. The study population included all of primary, secondary and high school children in rural and urban regions of West Azarbijan province in West-North of Iran. Body mass index (BMI), the ratio of weight to height squared [weight (kg)]/ [height (m)]2, was calculated to the nearest decimal place. Overweight and obesity were classified using CDC recommendations for age and sex: a BMI 85th–95th percentile was classified as overweight and a BMI>95th percentile was classified as obese. All statistical analyses were performed using the Excel Software. Descriptive statistics were used to characterize the sample in different time periods. The prevalence was calculated as the ratio of number present cases to a given population number in a given subgroup at a given time. Results: Overall, 165740, 145146 and 146203 school children were assessed at 2009, 2010 and 2011, respectively. Prevalence of overweight in primary school children among girls were 52.83, 86.93 and 116.36 and for boys were 57.07, 53.4 and 93.55 per 1000 person in 2009, 2010 and 2011 years ,respectively. The prevalence of obesity in secondary school children for girls were 22.26, 27.75 and 28.43 and 26.52, 25.72 and 35.85 for boys per 1000 person in 2009, 2010 and 2011, respectively, The highest prevalence of overweight was 77.58, 142.4 and 126.46 per 1000 person among primary, secondary and high school children, respectively, in 2011. The lowest prevalence of obesity was 12.52, 24.1 and 21.61 per 1000 person among primary, secondary and high school children, respectively, in 2009. Conclusion: However, the rapid increase in both obesity and overweight should have a special attention. Research on prevalence trend of overweight and obesity in children is poorly reported in Iran. So that, future studies need to follow-up on the associations between overweight and obesity with health outcomes when children develop and reach adolescence and adulthood.

Keywords: overweight, obesity, school children, prevalence trend, Iran

Procedia PDF Downloads 330
4502 Human Centred Design Approach for Public Transportation

Authors: Jo Kuys, Kirsten Day

Abstract:

Improving urban transportation systems requires an emphasis on users’ end-to-end journey experience, from the moment the user steps out of their home to when they arrive at their destination. In considering such end-to-end experiences, human centred design (HCD) must be integrated from the very beginning to generate viable outcomes for the public. An HCD approach will encourage innovative outcomes while acknowledging all factors that need to be understood along the journey. We provide evidence to show that when designing for public transportation, it is not just about the physical manifestation of a particular outcome; moreover, it’s about the context and human behaviours that need to be considered throughout the design process. Humans and their behavioural factors are vitally important to successful implementation of sustainable public transport systems. Through an in-depth literature review of HCD approaches for urban transportation systems, we provide a base to exploit the benefits and highlight the importance of including HCD in public transportation projects for greater patronage, resulting in more sustainable cities. An HCD approach is critical to all public transportation projects to understand different levels of transportation design, from the setting of transport policy to implementation to infrastructure, vehicle, and interface design.

Keywords: human centred design, public transportation, urban planning, user experience

Procedia PDF Downloads 172
4501 Reduce, Reuse and Recycle: Grand Challenges in Construction Recovery Process

Authors: Abioye A. Oyenuga, Rao Bhamidiarri

Abstract:

Hurling a successful Construction and Demolition Waste (C&DW) recycling operation around the globe is a challenge today, predominantly because secondary materials markets are yet to be integrated. Reducing, Reusing and recycling of (C&DW) have been employed over the years, and various techniques have been investigated. However, the economic and environmental viability of its application seems limited. This paper discusses the costs and benefits in using secondary materials and focus on investigating reuse and recycling process for five major types of construction materials: concrete, metal, wood, cardboard/paper, and plasterboard. Data obtained from demolition specialist and contractors are considered and evaluated. With the date source, the research paper found that construction material recovery process fully incorporate the 3R’s process and shows how energy recovery by means of 3R's principles can be evaluated. This scrutiny leads to the empathy of grand challenges in construction material recovery process. Recommendations to deepen material recovery process are also discussed.

Keywords: construction and demolition waste (C&DW), 3R concept, recycling, reuse, waste management, UK

Procedia PDF Downloads 415
4500 A Web-Based Self-Learning Grammar for Spoken Language Understanding

Authors: S. Biondi, V. Catania, R. Di Natale, A. R. Intilisano, D. Panno

Abstract:

One of the major goals of Spoken Dialog Systems (SDS) is to understand what the user utters. In the SDS domain, the Spoken Language Understanding (SLU) Module classifies user utterances by means of a pre-definite conceptual knowledge. The SLU module is able to recognize only the meaning previously included in its knowledge base. Due the vastity of that knowledge, the information storing is a very expensive process. Updating and managing the knowledge base are time-consuming and error-prone processes because of the rapidly growing number of entities like proper nouns and domain-specific nouns. This paper proposes a solution to the problem of Name Entity Recognition (NER) applied to a SDS domain. The proposed solution attempts to automatically recognize the meaning associated with an utterance by using the PANKOW (Pattern based Annotation through Knowledge On the Web) method at runtime. The method being proposed extracts information from the Web to increase the SLU knowledge module and reduces the development effort. In particular, the Google Search Engine is used to extract information from the Facebook social network.

Keywords: spoken dialog system, spoken language understanding, web semantic, name entity recognition

Procedia PDF Downloads 328
4499 The Role of Secondary Filler on the Fracture Toughness of HDPE/Clay Nanocomposites

Authors: R. Kamarudzaman, A. Kalam, N. A. Mohd Fadzil

Abstract:

Oil Palm Fruit Bunch Fiber (OPEFB) was used as secondary filler in HDPE/clay nanocomposites. The composites were prepared by melt compounding which contains High Density Polyethylene (HDPE), OPEFB fibers, Maleic Anhydride Graft Polyethylene (MAPE) and four different clay loading (3, 5, 7 and 10 PE nanoclay pellets per hundred of HDPE pellets). Four OPEFB sizes (180 µm, 250 µm, 300 µm and 355 µm) were added in the composites to investigate their effects on fracture toughness. Fracture toughness of the composites were determined according to ASTM D5045 and Single Edge Notch Bending (SENB) been employed during the test. The effects of alkali treatment were also investigated in this study. The results indicate that the fracture toughness slightly increased as clay loading increased. The highest value of fracture toughness was 0.47 and 1.06 MPa.m1/2 at 5 phr for both types of clay loading. The presence of filler as reinforcement with the matrix indicates the enhancement of composites compared to those without the filler.

Keywords: oil palm empty fruit bunch, fiber, polyethylene, polymer nanocomposite, impact strength

Procedia PDF Downloads 564
4498 Elvis Improved Method for Solving Simultaneous Equations in Two Variables with Some Applications

Authors: Elvis Adam Alhassan, Kaiyu Tian, Akos Konadu, Ernest Zamanah, Michael Jackson Adjabui, Ibrahim Justice Musah, Esther Agyeiwaa Owusu, Emmanuel K. A. Agyeman

Abstract:

In this paper, how to solve simultaneous equations using the Elvis improved method is shown. The Elvis improved method says; to make one variable in the first equation the subject; make the same variable in the second equation the subject; equate the results and simplify to obtain the value of the unknown variable; put the value of the variable found into one equation from the first or second steps and simplify for the remaining unknown variable. The difference between our Elvis improved method and the substitution method is that: with Elvis improved method, the same variable is made the subject in both equations, and the two resulting equations equated, unlike the substitution method where one variable is made the subject of only one equation and substituted into the other equation. After describing the Elvis improved method, findings from 100 secondary students and the views of 5 secondary tutors to demonstrate the effectiveness of the method are presented. The study's purpose is proved by hypothetical examples.

Keywords: simultaneous equations, substitution method, elimination method, graphical method, Elvis improved method

Procedia PDF Downloads 113
4497 Integrating Road Safety into Mainstreaming Education and Other Initiatives with Holistic Approach in the State: A Case Study of Madhya Pradesh, India

Authors: Yogesh Mahor, Subhash Nigam, Abhai Khare

Abstract:

Road safety education is a composite subject which should be viewed holistically if taken into accoubehavior change communication, safe road infrastructure and low enforcement. Specific and customized road safety education is crucial for each type of road user and learners in the formal and informal teaching and various kind of training programs directly sponsored by state and center government, as they are active contributors to shaping a community and responsible citizens. The aim of this discussion article is to explore a strategy to integrate road safety education into the formal curriculum of schools, higher education institutions, driving schools, skill development centers, various government funded urban and rural development training institutions and their work plans as standing agenda. By applying the desktop research method, the article conceptualizes what the possible focus of road safety education and training should be. The article then explores international common practices in road safety education and training, and considers the necessary synergy between education, road engineering and low enforcement. The article uses secondary data collected from documents which are then analysed in a sectoral way. A well-designed road safety strategy for mainstreaming education and government-sponsored training is urgently needed, facilitating partnerships in various sectors to implement such education in the students and learners in multidisciplinary ways.

Keywords: road safety education, curriculum-based road safety education, behavior change communication, low enforcement, road engineering, safe system approach, infrastructure development consultants

Procedia PDF Downloads 112
4496 Development of Wave-Dissipating Block Installation Simulation for Inexperienced Worker Training

Authors: Hao Min Chuah, Tatsuya Yamazaki, Ryosui Iwasawa, Tatsumi Suto

Abstract:

In recent years, with the advancement of digital technology, the movement to introduce so-called ICT (Information and Communication Technology), such as computer technology and network technology, to civil engineering construction sites and construction sites is accelerating. As part of this movement, attempts are being made in various situations to reproduce actual sites inside computers and use them for designing and construction planning, as well as for training inexperienced engineers. The installation of wave-dissipating blocks on coasts, etc., is a type of work that has been carried out by skilled workers based on their years of experience and is one of the tasks that is difficult for inexperienced workers to carry out on site. Wave-dissipating blocks are structures that are designed to protect coasts, beaches, and so on from erosion by reducing the energy of ocean waves. Wave-dissipating blocks usually weigh more than 1 t and are installed by being suspended by a crane, so it would be time-consuming and costly for inexperienced workers to train on-site. In this paper, therefore, a block installation simulator is developed based on Unity 3D, a game development engine. The simulator computes porosity. Porosity is defined as the ratio of the total volume of the wave breaker blocks inside the structure to the final shape of the ideal structure. Using the evaluation of porosity, the simulator can determine how well the user is able to install the blocks. The voxelization technique is used to calculate the porosity of the structure, simplifying the calculations. Other techniques, such as raycasting and box overlapping, are employed for accurate simulation. In the near future, the simulator will install an automatic block installation algorithm based on combinatorial optimization solutions and compare the user-demonstrated block installation and the appropriate installation solved by the algorithm.

Keywords: 3D simulator, porosity, user interface, voxelization, wave-dissipating blocks

Procedia PDF Downloads 84
4495 Operating System Based Virtualization Models in Cloud Computing

Authors: Dev Ras Pandey, Bharat Mishra, S. K. Tripathi

Abstract:

Cloud computing is ready to transform the structure of businesses and learning through supplying the real-time applications and provide an immediate help for small to medium sized businesses. The ability to run a hypervisor inside a virtual machine is important feature of virtualization and it is called nested virtualization. In today’s growing field of information technology, many of the virtualization models are available, that provide a convenient approach to implement, but decision for a single model selection is difficult. This paper explains the applications of operating system based virtualization in cloud computing with an appropriate/suitable model with their different specifications and user’s requirements. In the present paper, most popular models are selected, and the selection was based on container and hypervisor based virtualization. Selected models were compared with a wide range of user’s requirements as number of CPUs, memory size, nested virtualization supports, live migration and commercial supports, etc. and we identified a most suitable model of virtualization.

Keywords: virtualization, OS based virtualization, container based virtualization, hypervisor based virtualization

Procedia PDF Downloads 303
4494 Challenges and Pedagogical Strategies in Teaching Chemical Bonding: Perspectives from Moroccan Educators

Authors: Sara atibi, Azzeddine Atibi, Salim Ahmed, Khadija El Kababi

Abstract:

The concept of chemical bonding is fundamental in chemistry education, ubiquitous in school curricula, and essential to numerous topics in the field. Mastery of this concept enables students to predict and explain the physical and chemical properties of substances. However, chemical bonding is often regarded as one of the most complex concepts for secondary and higher education students to comprehend, due to the underlying complex theory and the use of abstract models. Teachers also encounter significant challenges in conveying this concept effectively. This study aims to identify the difficulties and alternative conceptions faced by Moroccan secondary school students in learning about chemical bonding, as well as the pedagogical strategies employed by teachers to overcome these obstacles. A survey was conducted involving 150 Moroccan secondary school physical science teachers, using a structured questionnaire comprising closed, open-ended, and multiple-choice questions. The results reveal frequent student misconceptions, such as the octet rule, molecular geometry, and molecular polarity. Contributing factors to these misconceptions include the abstract nature of the concepts, the use of models, and teachers' difficulties in explaining certain aspects of chemical bonding. The study proposes improvements for teaching chemical bonding, such as integrating information and communication technologies (ICT), diversifying pedagogical tools, and considering students' pre-existing conceptions. These recommendations aim to assist teachers, curriculum developers, and textbook authors in making chemistry more accessible and in addressing students' misconceptions.

Keywords: chemical bonding, alternative conceptions, chemistry education, pedagogical strategies

Procedia PDF Downloads 9
4493 ECOSURF EH3 - A Taq DNA Polymerase Enhancer

Authors: Kimberley Phoena Fan, Yu Zhang

Abstract:

ECOSURF™ EH-3 Surfactant (EH3) is a nonionic surfactant and has superior wetting and excellent oil removal properties. It is biodegradable with low toxicity and meets or exceeds US EPA Design for the Environment Criteria, and is widely used as a home cleaner, commercial and industrial degreaser. We have recently found that EH3 also possesses a special function which is characterized as an enhancer to Taq DNA polymerase and ameliorator to reduce the effects of PCR inhibitors, i.e., blood, urea, Guanidinium thiocyanate, Humic acids, polyphenol, and Polysaccharides. This is a new kind of PCR enhancer that does not work on relieving secondary structures of GC-rich templates. We have compared EH3’s effects on Taq DNA Polymerase along with other well-known enhancers, such as DMSO, betaine, and BSA, using GC rich or deficient template and found that, unlike DMSO and Betaine, the EH3 boosting effect on PCR reaction is not through reducing Tm. The results show the same increase of PCR products regardless of the GC contents or secondary structures. The mechanism of EH3 enhancing PCR is through its direct interaction with or stimulation of the DNA polymerase and making the enzymes more resistant to inhibitors in the presence of EH3. This phenomenon has first been observed for EH3, a new type of PCR enzyme enhancer. Subsequent research also shows that a series of similar surfactants boost Taq DNA polymerase as well.

Keywords: EH3, DNA, polymerase, enhancer, raw biological samples

Procedia PDF Downloads 124
4492 In Vitro Evaluation of the Antimitotic and Genotoxic Effect by the Allium cepa L. Test of the Aqueous Extract of Peganum harmala L. Leaves (Laghouat, Algeria)

Authors: Ouzid Yasmina, Aiche-Iratni Ghenima, Harchaoui Lina, Saadoun Noria, Houali Karim

Abstract:

Medicinal plants are an important source of bioactive molecules with biological activities such as anticancer, antioxidant, anti-inflammatory, antibacterial, antimitotic.... These molecules include alkaloids, polyphenols and terpenes. The latter can be extracted by different solvents, namely: water, ethanol, methanol, butanol, acetone... This is why it seemed interesting to us to evaluate in vitro the antimitotic and genotoxic effect of these secondary metabolites contained in the aqueous extract of the leaves of Peganum harmala L. by the Allium cepa L. test on meristematic cells by calculating the mitotic parameters (The mitotic index, the aberration index and the limit value of cytotoxicity).A spectrophotometric determination of secondary metabolites, namely alkaloids and flavonoids in the aqueous extract of this essence, was performed. As a result, the alkaloid content is estimated to be 28.42 μg EC/mg extract, and the flavonoid content is 12.52 μg EQ/mg extract. The determination of the mitotic index revealed disturbances in cell division with a highly significant difference between the negative control (distilled water) and the different samples (aqueous extracts, colchicine and quecetin). The exposure of meristematic cells to our samples resulted in a large number of chromosomal, nuclear and cellular aberrations with an aberration index reaching 16.21±1.28% for the 4mg/ml aqueous extract and 11.71±3.32% for the 10mg/ml aqueous extract. The limit value of cytotoxicity revealed that our samples are sublethal on Allium cepa L. meristematic cells.

Keywords: allium cepa l., antimitotic and genotoxic effect, aqueous leaf extract, laghouat (algeria), peganum harmala l., secondary metabolites

Procedia PDF Downloads 72
4491 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 44
4490 Reliability Factors Based Fuzzy Logic Scheme for Spectrum Sensing

Authors: Tallataf Rasheed, Adnan Rashdi, Ahmad Naeem Akhtar

Abstract:

The accurate spectrum sensing is a fundamental requirement of dynamic spectrum access for deployment of Cognitive Radio Network (CRN). To acheive this requirement a Reliability factors based Fuzzy Logic (RFL) Scheme for Spectrum Sensing has been proposed in this paper. Cognitive Radio User (CRU) predicts the presence or absence of Primary User (PU) using energy detector and calculates the Reliability factors which are SNR of sensing node, threshold of energy detector and decision difference of each node with other nodes in a cooperative spectrum sensing environment. Then the decision of energy detector is combined with Reliability factors of sensing node using Fuzzy Logic. These Reliability Factors used in RFL Scheme describes the reliability of decision made by a CRU to improve the local spectrum sensing. This Fuzzy combining scheme provides the accuracy of decision made by sensornode. The simulation results have shown that the proposed technique provide better PU detection probability than existing Spectrum Sensing Techniques.

Keywords: cognitive radio, spectrum sensing, energy detector, reliability factors, fuzzy logic

Procedia PDF Downloads 468
4489 Specialized Phytochemical Properties of Stachys inflata Eco-Types in Different Ecological Circumstances of Southern Iran

Authors: Ghasem Khodahami, Vahid Rowshan, Mojtaba Pakparvar

Abstract:

Stachys forms one of the largest genera in the flowering plant family Lamiaceae. The number of species in the genus is estimated from about 300 to about 450 and comprises some 34 species in Iran. This genus is one of the richest sources of diterpenes which are particularly interesting because of their ecological role as antifeedants against different species of insects and for their role as the medicinal properties of the plants. The ecological distribution of Stachys inflata was studied and the resulted eco-types were sampled from four regions ranging 230-340 mm of rainfall and 1690-2125 m a.s.l of height In Fars Province Southern Iran. The essential oils of air-dried samples were obtained by hydrodistillation and analyzed by gas chromatography and gas chromatography/mass spectrometry. The number of secondary metabolites varied from 25 to 50 depending to ecological conditions. The main compounds in these areas were: Germacrene D, Bicyclogermacrene, spathulenol, δ-cadinene. Statistical analysis of photochemical resulted in recognizing 3 distinct groups that show internal variety in these herbs.

Keywords: eco-type, phytochemistry, secondary metabolites, Stachys inflata

Procedia PDF Downloads 212