Search results for: information recognition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12086

Search results for: information recognition

11276 Causal Relationship between Corporate Governance and Financial Information Transparency: A Simultaneous Equations Approach

Authors: Maali Kachouri, Anis Jarboui

Abstract:

We focus on the causal relationship between governance and information transparency as well as interrelation among the various governance mechanisms. This paper employs a simultaneous equations approach to show this relationship in the Tunisian context. Based on an 8-year dataset, our sample covers 28 listed companies over 2006-2013. Our findings suggest that internal and external governance mechanisms are interdependent. Moreover, in order to analyze the causal effect between information transparency and governance mechanisms, we found evidence that information transparency tends to increase good corporate governance practices.

Keywords: simultaneous equations approach, transparency, causal relationship, corporate governance

Procedia PDF Downloads 354
11275 Gendered Effects on Productivity Gap Due to Information Asymmetry

Authors: Shruti Sengupta

Abstract:

According to the nationally representative data, about 73% of India's rural workforce is engaged in agriculture. While women make significant contributions to total agriculture production, they contribute to about one-third in India. In terms of gender composition, about 80% of the female and 69% of the male workforce is engaged in agriculture in rural India. Still, it is common to find gender differences in plot management within the household. In the last two and half years, India's agri-food system has undergone several changes due to this pandemic, both the demand and supply side, making agriculture more information and knowledge-intensive. Therefore, this paper investigates, using a nationally representative sample, how information asymmetry affects the net returns per hectare of land between female and male farm managers. Empirical results show that information intensity has a significant positive effect on net farm returns per hectare. Results suggest that if females have the same access to technical information as their male counterparts, their farm income can go up by .96 pp compared to male-headed farms. Results also indicate that literate females have higher farm incomes than non-literate females. The study contributes to the literature by employing gender differentials in farm income due to the information gap.

Keywords: agriculture, gender, information asymmetry, farm income, social bias

Procedia PDF Downloads 142
11274 Everyday Life Information Seeking among Female Students: A Survey of University and Private Hostels at Lahore

Authors: Sadaf Rafiq, Muhammad Waqas, Shakeel Ahmad Khan, Nisar Ahmad

Abstract:

Everyday life information seeking (ELIS) is considered as the mastery of life. It plays an important role in daily problem solving activities. Female students living in university hostels need variety of information to fulfil their everyday information needs. To find accurate and timely information is really challenging for females students who move from rural areas for educational purposes. These challenges involve culture differences, stress, financial issues, homesickness, diet needs and change in sleeping and eating habits. These complications create numerous problems for female students to adjust themselves in new and unfamiliar environment. Although the Internet has increased the ease of seeking everyday life information to survive successfully but there is still uncertainty to fully rely on the quality of information available on the web. Pakistan is an underdeveloped country where limited budget is allocated for educational institutions to enable them in developing well established hostels for their students. Female students who pursue for higher education has to stay at hostels for years to obtain education goals. It really becomes very difficult for them to spend life in hostels if they are not properly facilitated with relevant information sources to acquire everyday life information. The proposed study attempts to investigate the everyday life information seeking behavior of female students who are living in university and private hostels of Lahore. It investigates the various sources of information used by female students. It also identifies the problems faced by the female students in accessing everyday life information. The results of this study will be helpful for university management to understand their information need and provide required information sources which are essential for them to spend a comfortable, successful and peaceful life in hostels and achieve their educational goals. To achieve the objectives of the study, we will use quantitative research approach by using questionnaire as a data collection tool. The population of this study will be the university students living in public and private hostels of Lahore, Pakistan. This study will increase the understanding of everyday life information seeking behavior of female students living in hostels. Results of the study will be helpful for hostel administrations to better understand the students’ everyday life information needs and provide high quality of information services and living environment.

Keywords: everyday, information seeking, hostel, female

Procedia PDF Downloads 151
11273 Indium-Gallium-Zinc Oxide Photosynaptic Device with Alkylated Graphene Oxide for Optoelectronic Spike Processing

Authors: Seyong Oh, Jin-Hong Park

Abstract:

Recently, neuromorphic computing based on brain-inspired artificial neural networks (ANNs) has attracted huge amount of research interests due to the technological abilities to facilitate massively parallel, low-energy consuming, and event-driven computing. In particular, research on artificial synapse that imitate biological synapses responsible for human information processing and memory is in the spotlight. Here, we demonstrate a photosynaptic device, wherein a synaptic weight is governed by a mixed spike consisting of voltage and light spikes. Compared to the device operated only by the voltage spike, ∆G in the proposed photosynaptic device significantly increased from -2.32nS to 5.95nS with no degradation of nonlinearity (NL) (potentiation/depression values were changed from 4.24/8 to 5/8). Furthermore, the Modified National Institute of Standards and Technology (MNIST) digit pattern recognition rates improved from 36% and 49% to 50% and 62% in ANNs consisting of the synaptic devices with 20 and 100 weight states, respectively. We expect that the photosynaptic device technology processed by optoelectronic spike will play an important role in implementing the neuromorphic computing systems in the future.

Keywords: optoelectronic synapse, IGZO (Indium-Gallium-Zinc Oxide) photosynaptic device, optoelectronic spiking process, neuromorphic computing

Procedia PDF Downloads 173
11272 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 343
11271 Comparison of Crossover Types to Obtain Optimal Queries Using Adaptive Genetic Algorithm

Authors: Wafa’ Alma'Aitah, Khaled Almakadmeh

Abstract:

this study presents an information retrieval system of using genetic algorithm to increase information retrieval efficiency. Using vector space model, information retrieval is based on the similarity measurement between query and documents. Documents with high similarity to query are judge more relevant to the query and should be retrieved first. Using genetic algorithms, each query is represented by a chromosome; these chromosomes are fed into genetic operator process: selection, crossover, and mutation until an optimized query chromosome is obtained for document retrieval. Results show that information retrieval with adaptive crossover probability and single point type crossover and roulette wheel as selection type give the highest recall. The proposed approach is verified using (242) proceedings abstracts collected from the Saudi Arabian national conference.

Keywords: genetic algorithm, information retrieval, optimal queries, crossover

Procedia PDF Downloads 292
11270 The Ameliorative Effects of the Histamine H3 Receptor Antagonist/Inverse Agonist DL77 on MK801-Induced Memory Deficits in Rats

Authors: B. Sadek, N. Khan, Shreesh K. Ojha, Adel Sadeq, D. Lazewska, K. Kiec-Kononowicz

Abstract:

The involvement of Histamine H3 receptors (H3Rs) in memory and the potential role of H3R antagonists in pharmacological control of neurodegenerative disorders, e.g., Alzheimer disease (AD) is well established. Therefore, the memory-enhancing effects of the H3R antagonist DL77 on MK801-induced cognitive deficits were evaluated in passive avoidance paradigm (PAP) and novel object recognition (NOR) tasks in adult male rats, applying donepezil (DOZ) as a reference drug. Animals pretreated with acute systemic administration of DL77 (2.5, 5, and 10 mg/kg, i.p.) were significantly ameliorated in regard to MK801-induced memory deficits in PAP. The ameliorative effect of most effective dose of DL77 (5 mg/kg, i.p.) was abrogated when animals were pretreated with a co-injection with the H3R agonist R-(α)-methylhistamine (RAMH, 10 mg/kg, i.p.). Moreover, and in the NOR paradigm, DL77 (5 mg/kg, i.p.) reversed MK801-induced deficits long-term memory (LTM), and the DL77-provided procognitive effect was comparable to that of reference drug DOZ, and was reversed when animals were co-injected with RAMH (10 mg/kg, i.p.). However, DL77(5 mg/kg, i.p.) failed to alter short-term memory (STM) impairment in NOR test. Furthermore, DL77 (5 mg/kg) failed to induce any alterations of anxiety and locomotor behaviors of animals naive to elevated-plus maze (EPM), indicating that the ameliorative effects observed in PAP or NOR tests were not associated to alterations in emotions or in natural locomotion of tested animals. These results reveal the potential contribution of H3Rs in modulating CNS neurotransmission systems associated with neurodegenerative disorders, e.g., AD.

Keywords: histamine H3 receptor, antagonist, learning and memory, Alzheimer's disease, neurodegeneration, passive avoidance paradigm, novel object recognition, behavioral research

Procedia PDF Downloads 155
11269 Similar Script Character Recognition on Kannada and Telugu

Authors: Gurukiran Veerapur, Nytik Birudavolu, Seetharam U. N., Chandravva Hebbi, R. Praneeth Reddy

Abstract:

This work presents a robust approach for the recognition of characters in Telugu and Kannada, two South Indian scripts with structural similarities in characters. To recognize the characters exhaustive datasets are required, but there are only a few publicly available datasets. As a result, we decided to create a dataset for one language (source language),train the model with it, and then test it with the target language.Telugu is the target language in this work, whereas Kannada is the source language. The suggested method makes use of Canny edge features to increase character identification accuracy on pictures with noise and different lighting. A dataset of 45,150 images containing printed Kannada characters was created. The Nudi software was used to automatically generate printed Kannada characters with different writing styles and variations. Manual labelling was employed to ensure the accuracy of the character labels. The deep learning models like CNN (Convolutional Neural Network) and Visual Attention neural network (VAN) are used to experiment with the dataset. A Visual Attention neural network (VAN) architecture was adopted, incorporating additional channels for Canny edge features as the results obtained were good with this approach. The model's accuracy on the combined Telugu and Kannada test dataset was an outstanding 97.3%. Performance was better with Canny edge characteristics applied than with a model that solely used the original grayscale images. The accuracy of the model was found to be 80.11% for Telugu characters and 98.01% for Kannada words when it was tested with these languages. This model, which makes use of cutting-edge machine learning techniques, shows excellent accuracy when identifying and categorizing characters from these scripts.

Keywords: base characters, modifiers, guninthalu, aksharas, vattakshara, VAN

Procedia PDF Downloads 53
11268 Biodiversity Conservation Practices Among Indigenous Peoples in Caraga Region, Mindanao, Philippines

Authors: Milagros S. Salibad, Levita B. Grana

Abstract:

The presence and role of Indigenous Peoples residing in key biodiversity, protected, and watershed areas within the ancestral domain in the Caraga Region hold immense significance. This study aimed to determine the level of biodiversity conservation practices among the Mamanwas, Manobos, and Higaonons, and identify facilitating or hindering factors. Employing a mixed-method research design, 421 respondents participated through a researcher-made questionnaire. Focus group discussions, key informant interviews, researcher field notes, community immersions, and secondary sources were done. The three groups have demonstrated a high level of biodiversity conservation practices manifesting their commitment to conserving their natural resources and ecosystems. Evidently, selecting and cutting only mature trees for shelter and tribal usage, and preservation of large trees that harbor ancestors’ spirits and worship through rituals (Mambabaja). Each group exhibited unique environmental practices shaped by their distinct cultures, traditions, customary knowledge, and access to information. The Mamanwa practiced traditional hunting and gathering by using traps while Manobo practiced shifting cultivation to maintain soil fertility and biodiversity, and Higaonon managed forest resources through traditional forest management (establishment of sacred forests and conservation areas). Various facilitating and hindering factors influenced their conservation efforts. Their traditional knowledge and practices, partnership and collaboration, legal recognition and support, access to information, and biodiversity monitoring system facilitate practices. Insufficient government assistance, political and social issues, scarce financial support, inadequate policy enforcement, lack of livelihood opportunities, and land use conflicts hinder them. Monitoring the sustainability of IPs' local biodiversity conservation practices is essential as they contribute to conservation endeavors.

Keywords: biodiversity, conservation, indigenous peoples, traditional knowledge

Procedia PDF Downloads 77
11267 Gendered Effects on Productivity Gap Due to Information Asymmetry in India

Authors: Shruti Sengupta

Abstract:

According to the nationally representative data, about 73% of India's rural workforce is engaged in agriculture. While women make significant contributions to total agriculture production, they contribute to about one-third in India. In terms of gender composition, about 80% of the female and 69% of the male workforce is engaged in agriculture in rural India. Still, it is common to find gender differences in plot management within the household. In the last two and half years, India's agri-food system has undergone several changes due to this pandemic, both the demand and supply side, making agriculture more information and knowledge-intensive. Therefore, this paper investigates, using a nationally representative sample, how information asymmetry affects the net returns per hectare of land between female and male farm managers. Empirical results show that information intensity has a significant positive effect on net farm returns per hectare. Results suggest that if females have the same access to technical information as their male counterparts, their farm income can go up by .96 pp compared to male-headed farms. Results also indicate that literate females have higher farm incomes than non-literate females. The study contributes to the literature by employing gender differentials in farm income due to the information gap.

Keywords: agriculture, gender, information asymmetry, farm income, social bias

Procedia PDF Downloads 104
11266 Learning from Inclusive Education of Exceptional and Normal Children in Primary School for Architectural Design

Authors: T. Pastraporn, J. Panida, P. Gasamapong, N. Jintana

Abstract:

The study of inclusive educational environment of exceptional and normal children at the regional centre for special education aimed to establish guidelines for creating an environment for inclusive education. Buildings utilization of thirty-five elementary schools providing inclusive educational program in Bangkok were analyzed to study the following aspects: 1) The environment of exceptional and normal students’ inclusive classes at the regional centre for special education 2) The patterns of the environment suited to the exceptional and normal students’ inclusive classes 3) Environmental management policies for the inclusive classes of exceptional and normal students. Information was gathered from surveys, observations, questionnaires, document analysis, interviews, and non-experimental research. The findings showed that the usable spaces in school buildings were designated to enhance the three kinds of social learning experience: 1) Support class control 2) Help developing students’ personality consisting of physical, verbal and emotional expressions that are socially accepted 3) Recognition and learning, which are needed for the increasing of learning experience, were caused by having an interaction with the environment. Thus, the school buildings’ space designation positively affected the environmental management of exceptional and normal students’ inclusive classes.

Keywords: learning environment, inclusive education, school buildings, exceptional and normal children

Procedia PDF Downloads 331
11265 Distance Education Technologies for Empowerment and Equity in an Information Technology Environment

Authors: Leila Goosen, Toppie N. Mukasa-Lwanga

Abstract:

The purpose of this paper relates to exploring academics’ use of distance education technologies for empowerment and equity in an Information Technology environment. Literature was studied on academics’ technology use towards effective teaching and meaningful learning in a distance education Information Technology environment. Main arguments presented center on formulating and situating significant concepts within an appropriate theoretical and conceptual framework, including those related to distance education, throughput and other measures of academic efficiency. The research design, sampling, data collection instrument and the validity and reliability thereof, as well as the data analysis method used is described. The paper discusses results related to academics’ use of technology towards effective teaching and meaningful learning in a distance education Information Technology environment. Conclusions are finally presented on the way in which this paper makes a significant and original contribution regarding academics’ use of technology towards effective teaching and meaningful learning in a distance education Information Technology environment.

Keywords: distance, education, technologies, Information Technology Environment

Procedia PDF Downloads 523
11264 An Experimental Study of Online Peer-to-Peer Language Learning

Authors: Abrar Al-Hasan

Abstract:

Web 2.0 has significantly increased the amount of information available to users not only about firms and their offerings, but also about the activities of other individuals in their networks and markets. It is widely acknowledged that this increased availability of ‘social’ information, particularly about other individuals, is likely to influence a user’s behavior and choices. However, there are very few systematic studies of how such increased information transparency on the behavior of other users in a focal users’ network influences a focal users’ behavior in the emerging marketplace of online language learning. This study seeks to examine the value and impact of ‘social activities’ – wherein, a user sees and interacts with the learning activities of her peers – on her language learning efficiency. An online experiment in a peer-to-peer language marketplace was conducted to compare the learning efficiency of users with ‘social’ information versus users with no ‘social’ information. The results of this study highlight the impact and importance of ‘social’ information within the language learning context. The study concludes by exploring how these insights may inspire new developments in online education.

Keywords: e-Learning, language learning marketplace, peer-to-peer, social network

Procedia PDF Downloads 385
11263 Seismic Performance Evaluation of Existing Building Using Structural Information Modeling

Authors: Byungmin Cho, Dongchul Lee, Taejin Kim, Minhee Lee

Abstract:

The procedure for the seismic retrofit of existing buildings includes the seismic evaluation. In the evaluation step, it is assessed whether the buildings have satisfactory performance against seismic load. Based on the results of that, the buildings are upgraded. To evaluate seismic performance of the buildings, it usually goes through the model transformation from elastic analysis to inelastic analysis. However, when the data is not delivered through the interwork, engineers should manually input the data. In this process, since it leads to inaccuracy and loss of information, the results of the analysis become less accurate. Therefore, in this study, the process for the seismic evaluation of existing buildings using structural information modeling is suggested. This structural information modeling makes the work economic and accurate. To this end, it is determined which part of the process could be computerized through the investigation of the process for the seismic evaluation based on ASCE 41. The structural information modeling process is developed to apply to the seismic evaluation using Perform 3D program usually used for the nonlinear response history analysis. To validate this process, the seismic performance of an existing building is investigated.

Keywords: existing building, nonlinear analysis, seismic performance, structural information modeling

Procedia PDF Downloads 384
11262 Financial Information and Collective Bargaining: Conflicting or Complementing

Authors: Humayun Murshed, Shibly Abdullah

Abstract:

The research conducted in early seventies apparently assumed the existence of a universal decision model for union negotiators and furthermore tended to regard financial information as a ‘neutral’ input into a rational decision-making process. However, research in the eighties began to question the neutrality of financial information as an input in collective bargaining rather viewing it as a potentially effective means for controlling the labour force. Furthermore, this later research also started challenging the simplistic assumptions relating particularly to union objectives which have underpinned the earlier search for universal union decision models. Despite the above developments there seems to be a dearth of studies in developing countries concerning the use of financial information in collective bargaining. This paper seeks to begin to remedy this deficiency. Utilising a case study approach based on two enterprises, one in the public sector and the other a multinational, the universal decision model is rejected and it is argued that the decision whether or not to use financial information is a contingent one and such a contingency is largely defined by the context and environment in which both union and management negotiators work. An attempt is also made to identify the factors constraining as well as promoting the use of financial information in collective bargaining, these being regarded as unique to the organizations within which the case studies are conducted.

Keywords: collective bargaining, developing countries, disclosures, financial information

Procedia PDF Downloads 471
11261 Infrastructure Development – Stages in Development

Authors: Seppo Sirkemaa

Abstract:

Information systems infrastructure is the basis of business systems and processes in the company. It should be a reliable platform for business processes and activities but also have the flexibility to change business needs. The development of an infrastructure that is robust, reliable, and flexible is a challenge. Understanding technological capabilities and business needs is a key element in the development of successful information systems infrastructure.

Keywords: development, information technology, networks, technology

Procedia PDF Downloads 118
11260 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 85
11259 Contribution to the Study of Automatic Epileptiform Pattern Recognition in Long Term EEG Signals

Authors: Christine F. Boos, Fernando M. Azevedo

Abstract:

Electroencephalogram (EEG) is a record of the electrical activity of the brain that has many applications, such as monitoring alertness, coma and brain death; locating damaged areas of the brain after head injury, stroke and tumor; monitoring anesthesia depth; researching physiology and sleep disorders; researching epilepsy and localizing the seizure focus. Epilepsy is a chronic condition, or a group of diseases of high prevalence, still poorly explained by science and whose diagnosis is still predominantly clinical. The EEG recording is considered an important test for epilepsy investigation and its visual analysis is very often applied for clinical confirmation of epilepsy diagnosis. Moreover, this EEG analysis can also be used to help define the types of epileptic syndrome, determine epileptiform zone, assist in the planning of drug treatment and provide additional information about the feasibility of surgical intervention. In the context of diagnosis confirmation the analysis is made using long term EEG recordings with at least 24 hours long and acquired by a minimum of 24 electrodes in which the neurophysiologists perform a thorough visual evaluation of EEG screens in search of specific electrographic patterns called epileptiform discharges. Considering that the EEG screens usually display 10 seconds of the recording, the neurophysiologist has to evaluate 360 screens per hour of EEG or a minimum of 8,640 screens per long term EEG recording. Analyzing thousands of EEG screens in search patterns that have a maximum duration of 200 ms is a very time consuming, complex and exhaustive task. Because of this, over the years several studies have proposed automated methodologies that could facilitate the neurophysiologists’ task of identifying epileptiform discharges and a large number of methodologies used neural networks for the pattern classification. One of the differences between all of these methodologies is the type of input stimuli presented to the networks, i.e., how the EEG signal is introduced in the network. Five types of input stimuli have been commonly found in literature: raw EEG signal, morphological descriptors (i.e. parameters related to the signal’s morphology), Fast Fourier Transform (FFT) spectrum, Short-Time Fourier Transform (STFT) spectrograms and Wavelet Transform features. This study evaluates the application of these five types of input stimuli and compares the classification results of neural networks that were implemented using each of these inputs. The performance of using raw signal varied between 43 and 84% efficiency. The results of FFT spectrum and STFT spectrograms were quite similar with average efficiency being 73 and 77%, respectively. The efficiency of Wavelet Transform features varied between 57 and 81% while the descriptors presented efficiency values between 62 and 93%. After simulations we could observe that the best results were achieved when either morphological descriptors or Wavelet features were used as input stimuli.

Keywords: Artificial neural network, electroencephalogram signal, pattern recognition, signal processing

Procedia PDF Downloads 528
11258 Design Patterns for Emergency Management Processes

Authors: Tomáš Ludík, Jiří Barta, Josef Navrátil

Abstract:

Natural or human made disasters have a significant negative impact on the environment. At the same time there is an extensive effort to support management and decision making in emergency situations by information technologies. Therefore the purpose of the paper is to propose a design patterns applicable in emergency management, enabling better analysis and design of emergency management processes and therefore easier development and deployment of information systems in the field of emergency management. It will be achieved by detailed analysis of existing emergency management legislation, contingency plans, and information systems. The result is a set of design patterns focused at emergency management processes that enable easier design of emergency plans or development of new information system. These results will have a major impact on the development of new information systems as well as to more effective and faster solving of emergencies.

Keywords: analysis and design, Business Process Modelling Notation, contingency plans, design patterns, emergency management

Procedia PDF Downloads 484
11257 Detection of Phoneme [S] Mispronounciation for Sigmatism Diagnosis in Adults

Authors: Michal Krecichwost, Zauzanna Miodonska, Pawel Badura

Abstract:

The diagnosis of sigmatism is mostly based on the observation of articulatory organs. It is, however, not always possible to precisely observe the vocal apparatus, in particular in the oral cavity of the patient. Speech processing can allow to objectify the therapy and simplify the verification of its progress. In the described study the methodology for classification of incorrectly pronounced phoneme [s] is proposed. The recordings come from adults. They were registered with the speech recorder at the sampling rate of 44.1 kHz and the resolution of 16 bit. The database of pathological and normative speech has been collected for the study including reference assessments provided by the speech therapy experts. Ten adult subjects were asked to simulate a certain type of stigmatism under the speech therapy expert supervision. In the recordings, the analyzed phone [s] was surrounded by vowels, viz: ASA, ESE, ISI, SPA, USU, YSY. Thirteen MFCC (mel-frequency cepstral coefficients) and RMS (root mean square) values are calculated within each frame being a part of the analyzed phoneme. Additionally, 3 fricative formants along with corresponding amplitudes are determined for the entire segment. In order to aggregate the information within the segment, the average value of each MFCC coefficient is calculated. All features of other types are aggregated by means of their 75th percentile. The proposed method of features aggregation reduces the size of the feature vector used in the classification. Binary SVM (support vector machine) classifier is employed at the phoneme recognition stage. The first group consists of pathological phones, while the other of the normative ones. The proposed feature vector yields classification sensitivity and specificity measures above 90% level in case of individual logo phones. The employment of a fricative formants-based information improves the sole-MFCC classification results average of 5 percentage points. The study shows that the employment of specific parameters for the selected phones improves the efficiency of pathology detection referred to the traditional methods of speech signal parameterization.

Keywords: computer-aided pronunciation evaluation, sibilants, sigmatism diagnosis, speech processing

Procedia PDF Downloads 283
11256 An Observation Approach of Reading Order for Single Column and Two Column Layout Template

Authors: In-Tsang Lin, Chiching Wei

Abstract:

Reading order is an important task in many digitization scenarios involving the preservation of the logical structure of a document. From the paper survey, it finds that the state-of-the-art algorithm could not fulfill to get the accurate reading order in the portable document format (PDF) files with rich formats, diverse layout arrangement. In recent years, most of the studies on the analysis of reading order have targeted the specific problem of associating layout components with logical labels, while less attention has been paid to the problem of extracting relationships the problem of detecting the reading order relationship between logical components, such as cross-references. Over 3 years of development, the company Foxit has demonstrated the layout recognition (LR) engine in revision 20601 to eager for the accuracy of the reading order. The bounding box of each paragraph can be obtained correctly by the Foxit LR engine, but the result of reading-order is not always correct for single-column, and two-column layout format due to the table issue, formula issue, and multiple mini separated bounding box and footer issue. Thus, the algorithm is developed to improve the accuracy of the reading order based on the Foxit LR structure. In this paper, a creative observation method (Here called the MESH method) is provided here to open a new chance in the research of the reading-order field. Here two important parameters are introduced, one parameter is the number of the bounding box on the right side of the present bounding box (NRight), and another parameter is the number of the bounding box under the present bounding box (Nunder). And the normalized x-value (x/the whole width), the normalized y-value (y/the whole height) of each bounding box, the x-, and y- position of each bounding box were also put into consideration. Initial experimental results of single column layout format demonstrate a 19.33% absolute improvement in accuracy of the reading-order over 7 PDF files (total 150 pages) using our proposed method based on the LR structure over the baseline method using the LR structure in 20601 revision, which its accuracy of the reading-order is 72%. And for two-column layout format, the preliminary results demonstrate a 44.44% absolute improvement in accuracy of the reading-order over 2 PDF files (total 18 pages) using our proposed method based on the LR structure over the baseline method using the LR structure in 20601 revision, which its accuracy of the reading-order is 0%. Until now, the footer issue and a part of multiple mini separated bounding box issue can be solved by using the MESH method. However, there are still three issues that cannot be solved, such as the table issue, formula issue, and the random multiple mini separated bounding boxes. But the detection of the table position and the recognition of the table structure are out of the scope in this paper, and there is needed another research. In the future, the tasks are chosen- how to detect the table position in the page and to extract the content of the table.

Keywords: document processing, reading order, observation method, layout recognition

Procedia PDF Downloads 181
11255 An Observation of the Information Technology Research and Development Based on Article Data Mining: A Survey Study on Science Direct

Authors: Muhammet Dursun Kaya, Hasan Asil

Abstract:

One of the most important factors of research and development is the deep insight into the evolutions of scientific development. The state-of-the-art tools and instruments can considerably assist the researchers, and many of the world organizations have become aware of the advantages of data mining for the acquisition of the knowledge required for the unstructured data. This paper was an attempt to review the articles on the information technology published in the past five years with the aid of data mining. A clustering approach was used to study these articles, and the research results revealed that three topics, namely health, innovation, and information systems, have captured the special attention of the researchers.

Keywords: information technology, data mining, scientific development, clustering

Procedia PDF Downloads 278
11254 Cross Matching: An Improved Method to Obtain Comprehensive and Consolidated Evidence

Authors: Tuula Heinonen, Wilhelm Gaus

Abstract:

At present safety, assessment starts with animal tests although their predictivity is often poor. Even after extended human use experimental data are often judged as the core information for risk assessment. However, the best opportunity to generate true evidence is to match all available information. Cross matching methodology combines the different fields of knowledge and types of data (e.g. in-vitro and in-vivo experiments, clinical observations, clinical and epidemiological studies, and daily life observations) and gives adequate weight to individual findings. To achieve a consolidated outcome, the information from all available sources is analysed and compared with each other. If single pieces of information fit together a clear picture becomes visible. If pieces of information are inconsistent or contradictory careful consideration is necessary. 'Cross' can be understood as 'orthographic' in geometry or as 'independent' in mathematics. Results coming from different sources bring independent and; therefore, they result in new information. Independent information gives a larger contribution to evidence than results coming repeatedly from the same source. A successful example of cross matching is the assessment of Ginkgo biloba where we were able to come to the conclusive result: Ginkgo biloba leave extract is well tolerated and safe for humans.

Keywords: cross-matching, human use, safety assessment, Ginkgo biloba leave extract

Procedia PDF Downloads 287
11253 Right to Information in Egypt and the Prospects of Renegotiating a New Social Order

Authors: Farida Ibrahim

Abstract:

Right to information is the public's right to know through having access to public information held by state bodies. Recognized as a cornerstone in transparent, participatory and open democracies, the right to information is increasingly perceived today as an emerging human right on the international level. While this right is conceptualized in a range of different contexts, the paper focuses on its conceptualization as a force for socio-economic change for disadvantaged groups. The paper's goal is study the instrumental capacity of this right in empowering the public to access state-held information pertinent to their socio-economic rights. In this regard, the paper views the right to information as an inclusionary tool that is capable of spurring inclusion for individuals excluded from the ambits of both: public participation and social justice. For exploring this, the paper examines the advocacy role played by civil society groups in furthering this instrumental capacity. In particular, the paper presents a focused account on the Egyptian case. While Egypt has recently adopted its constitutional provision on access to information, doubts arise on Egyptian citizens' genuine ability to access information held by state bodies. The politico-economic environment, long term culture of bureaucratic secrecy, and legal framework do not provide promising outcomes on access to public information. Within the particular context of the Egyptian case, this paper questions the extent to which civil society in Egypt is capable of instrumentally employing the political opportunity offered by the constitutional entitlement to information access for pressuring public authorities to disclose information. Through four lawsuits brought by civil society groups in Egypt, the paper argues that the right to information has instrumentally provided civil society actors with new domains of mobilization for furthering the realization of social and economic rights, and ultimately, for renegotiating a new social order lining the relationship between the Egyptian state and its citizens marginalized by socio-economic imbalances.

Keywords: civil society, Egypt, right to information, socio-economic rights

Procedia PDF Downloads 281
11252 Developmental Psycholinguistic Approach to Conversational Skills: A Continuum of the Sensitivity to Gricean Maxims

Authors: Zsuzsanna Schnell, Francesca Ervas

Abstract:

Background: Our experimental pragmatic study confirms a basic tenet in the Relevance of theoretical views in language philosophy. It draws up a developmental trajectory of the maxims, revealing the cognitive difficulty of their interpretation, their relative place to each other, and the order they may follow in development. A central claim of the present research is that social-cognitive skills play a significant role in inferential meaning construction. Children passing the False Belief Test are significantly more successful in tasks measuring the recognition of the infringement of conversational maxims. Aims and method: We examine preschoolers' conversational and pragmatic competence in view of their mentalization skills. To do so, we use a measure of linguistic tasks containing 5 short scenarios for each Gricean maxim. We measure preschoolers’ ToM performance with a first- and second-order ToM task and compare participants’ ability to recognize the infringement of the Gricean maxims in view of their social cognitive skills. Results: Findings suggest that Theory of Mind has a predictive force of 75% concerning the ability to follow Gricean maxims efficiently. ToM proved to be a significant factor in predicting the group’s performance and success rates in 3 out of 4 maxim infringement recognition tasks: in the Quantity, Relevance and Manner conditions, but not in the Quality trial. Conclusions: Our results confirm that children’s communicative competence in social contexts requires the development of higher-order social-cognitive reasoning. They reveal the cognitive effort needed to recognize the infringement of each maxim, yielding a continuum of their cognitive difficulty and trajectory of development.

Keywords: developmental pragmatics, social cognition, preschoolers, maxim infringement, Gricean pragmatics

Procedia PDF Downloads 30
11251 Official Secrecy and Confidentiality in Tax Administration and Its Impact on Right to Access Information: Nigerian Perspectives

Authors: Kareem Adedokun

Abstract:

Official secrecy is one of the colonial vestiges which upholds non – disclosure of essential information for public consumption. Information, though an indispensable tool in tax administration, is not to be divulged by any person in an official duty of the revenue agency. As a matter o fact, the Federal Inland Revenue Service (Establishment) Act, 2007 emphasizes secrecy and confidentiality in dealing with tax payer’s document, information, returns and assessment in a manner reminiscent of protecting tax payer’s privacy in all situations. It is so serious that any violation attracts criminal sanction. However, Nigeria, being a democratic and egalitarian state recently enacted Freedom of Information Act which heralded in openness in governance and takes away the confidentialities associated with official secrets Laws. Official secrecy no doubts contradicts the philosophy of freedom of information but maintaining a proper balance between protected rights of tax payers and public interest which revenue agency upholds is an uphill task. Adopting the Doctrinal method, therefore, the author of this paper probes into the real nature of the relationship between taxpayers and Revenue Agencies. It also interfaces official secrecy with the doctrine of Freedom of Information and consequently queries the retention of non – disclosure clause under Federal Inland Revenue Service (Establishment) Act (FIRSEA) 2007. The paper finds among others that non – disclosure provision in tax statutes particularly as provided for in FIRSEA is not absolute; so also is the constitutional rights and freedom of information and unless the non – disclosure clause finds justification under any recognized exemption provided under the Freedom of Information Act, its retention is antithesis to democratic ethos and beliefs as it may hinder public interest and public order.

Keywords: confidentiality, information, official secrecy, tax administration

Procedia PDF Downloads 341
11250 Citizenship Education and Access to Information for Political Socialization and Unity in Nigeria

Authors: Alh Rauf Bello Bella

Abstract:

The main purpose of citizenship education if properly executed is to create awareness and enlightenment in the society to bring tolerance and political unity among the people. For the citizenry to have a meaningful participation for the achievement of this objective in a modern society where democracy thrives, all citizens should also have access to information on all matters affecting their lives and well-being. The paper therefore examines the scope of citizenship education and the complementary role of information providers in the quest for political socialization and national unity. It emphasizes some issues of national unity which should be addressed through proper enlightenment of the citizenry and access to relevant and timely information at the grassroots.

Keywords: citizenship education, national unity, political socialization, Nigeria

Procedia PDF Downloads 478
11249 Category-Base Theory of the Optimum Signal Approximation Clarifying the Importance of Parallel Worlds in the Recognition of Human and Application to Secure Signal Communication with Feedback

Authors: Takuro Kida, Yuichi Kida

Abstract:

We show a base of the new trend of algorithm mathematically that treats a historical reason of continuous discrimination in the world as well as its solution by introducing new concepts of parallel world that includes an invisible set of errors as its companion. With respect to a matrix operator-filter bank that the matrix operator-analysis-filter bank H and the matrix operator-sampling-filter bank S are given, firstly, we introduce the detailed algorithm to derive the optimum matrix operator-synthesis-filter bank Z that minimizes all the worst-case measures of the matrix operator-error-signals E(ω) = F(ω) − Y(ω) between the matrix operator-input-signals F(ω) and the matrix operator-output signals Y(ω) of the matrix operator-filter bank at the same time. Further, feedback is introduced to the above approximation theory and it is indicated that introducing conversations with feedback does not superior automatically to the accumulation of existing knowledge of signal prediction. Secondly, the concept of category in the field of mathematics is applied to the above optimum signal approximation and is indicated that the category-based approximation theory is applied to the set-theoretic consideration of the recognition of humans. Based on this discussion, it is shown naturally why the narrow perception that tends to create isolation shows an apparent advantage in the short term and, often, why such narrow thinking becomes intimate with discriminatory action in a human group. Throughout these considerations, it is presented that, in order to abolish easy and intimate discriminatory behavior, it is important to create a parallel world of conception where we share the set of invisible error signals, including the words and the consciousness of both worlds.

Keywords: signal prediction, pseudo inverse matrix, artificial intelligence, conditional optimization

Procedia PDF Downloads 156
11248 Crowdalert: An Android Application for Increasing the Awareness and Response Initiatives of the Citizens through Crowdsourcing

Authors: John Benedict Bernardo

Abstract:

Crowdsourcing is a way of collecting information provided by the volunteers. This crowdsourced information has the capacity to increase the people’s situational awareness in times of disasters. The research reflected in this paper strives to demonstrate the benefits of crowdsourcing during natural disasters and the ways of utilizing it for disaster response. Shared information regarding natural disasters from social media is often scattered as the inputs from these media are uncategorized. For this reason, the study aims to equip the citizens a medium that is solely intended for sharing and/or obtaining natural disaster-related information. Ergo, an android application was developed to gather and publicize this volunteered information. The capability of crowdsourcing and the effectiveness of the application were evaluated and the result shows overwhelming agreement that this study is indeed efficient in increasing the awareness and response initiatives of the citizens during natural disasters.

Keywords: crowdsourcing, natural disasters, mobile application, social media

Procedia PDF Downloads 320
11247 Digital Library in India: Importance and Problem Issues in Present Days: A Conceptual Study

Authors: Mehtab Alam Ansari, Shamim Aktar Munshi

Abstract:

The purpose of this paper is to find out the importance of digital libraries in Indian educational system, and also different types of problems faced by the digital library in modern age. This study uses both qualitative and quantitative approaches along with review of related literature. The conceptual and textual information related to the present study were collected from primary and secondary sources of information such as books and National and International journals etc. Websites were also used for collecting information. The study finds out that due to high demand of information resources so many digital libraries are established in India, e.g. IGNCA digital library, Digital Library of India, Archives of Indian Labour, Digital Library of Library and Information Science etc, and also it found that it is very helpful to the modern civilization. The digital library movement in India is rapidly increasing and the traditional libraries are now on their way to digitization in a phased manner. But digital library in India has failed to spread its root in each and every part. So many problems are facing to develop the digital libraries in present days. This study briefly explained the services, impact, and problems of digital libraries in Indian.

Keywords: digital Libraries, India, information technology, education

Procedia PDF Downloads 581