Search results for: deaf and hard of hearing
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1382

Search results for: deaf and hard of hearing

512 Machine Learning for Rational Decision-Making: Introducing Creativity to Teachers within a School System

Authors: Larry Audet

Abstract:

Creativity is suddenly and fortunately a new educational focus in the United Arab Emirates and around the world. Yet still today many leaders of creativity are not sure how to introduce it to their teachers. It is impossible to simultaneously introduce every aspect of creativity into a work climate and reach any degree of organizational coherence. The number of alternatives to explore is so great; the information teachers need to learn is so vast, that even an approximation to including every concept and theory of creativity into the school organization is hard to conceive. Effective leaders of creativity need evidence-based and practical guidance for introducing and stimulating creativity in others. Machine learning models reveal new findings from KEYS Survey© data about teacher perceptions of stimulants and barriers to their individual and collective creativity. Findings from predictive and causal models provide leaders with a rational for decision-making when introducing creativity into their organization. Leaders should focus on management practices first. Analyses reveal that creative outcomes are more likely to occur when teachers perceive supportive management practices: providing teachers with challenging work that calls for their best efforts; allowing freedom and autonomy in their practice of work; allowing teachers to form creative work-groups; and, recognizing them for their efforts. Once management practices are in place, leaders should focus their efforts on modeling risk-taking, providing optimal amounts of preparation time, and evaluating teachers fairly.

Keywords: creativity, leadership, KEYS survey, teaching, work climate

Procedia PDF Downloads 163
511 Arithmetic Operations Based on Double Base Number Systems

Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan

Abstract:

Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.

Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm

Procedia PDF Downloads 392
510 The Impact of Bitcoin and Cryptocurrency on the Development of Community

Authors: Felib Ayman Shawky Salem

Abstract:

Nowadays crypto currency has become a global phenomenon known to most people. People using this alternative digital money to do a transaction in many ways (e.g. Used for online shopping, wealth management, and fundraising). However, this digital asset also widely used in criminal activities since its use decentralized control as opposed to centralized electronic money and central banking systems and this makes a user, who used this currency invisible. The high-value exchange of these digital currencies also has been a target to criminal activities. The crypto currency crimes have become a challenge for the law enforcement to analyze and to proof the evidence as criminal devices. In this paper, our focus is more on bitcoin crypto currency and the possible artifacts that can be obtained from the different type of digital wallet, which is software and browser-based application. The process memory and physical hard disk are examined with the aims of identifying and recovering potential digital evidence. The stage of data acquisition divided by three states which are the initial creation of the wallet, transaction that consists transfer and receiving a coin and the last state is after the wallet is being deleted. Findings from this study suggest that both data from software and browser type of wallet process memory is a valuable source of evidence, and many of the artifacts found in process memory are also available from the application and wallet files on the client computer storage.

Keywords: cryptocurrency, bitcoin, payment methods, blockchain, appropriation, online retailers, TOE framework, disappropriation, non-appropriationBitCoin, financial protection, crypto currency, money laundering cryptocurrency, digital wallet, digital forensics

Procedia PDF Downloads 33
509 Development of a Plug-In Hybrid Powertrain System with Double Continuously Variable Transmissions

Authors: Cheng-Chi Yu, Chi-Shiun Chiou

Abstract:

This study developed a plug-in hybrid powertrain system which consisted of two continuous variable transmissions. By matching between the engine, motor, generator, and dual continuous variable transmissions, this integrated power system can take advantages of the components. The hybrid vehicle can be driven by the internal combustion engine, or electric motor alone, or by these two power sources together when the vehicle is driven in hard acceleration or high load. The energy management of this integrated hybrid system controls the power systems based on rule-based control strategy to achieve better fuel economy. When the vehicle driving power demand is low, the internal combustion engine is operating in the low efficiency region, so the internal combustion engine is shut down, and the vehicle is driven by motor only. When the vehicle driving power demand is high, internal combustion engine would operate in the high efficiency region; then the vehicle could be driven by internal combustion engine. This strategy would operate internal combustion engine only in optimal efficiency region to improve the fuel economy. In this research, the vehicle simulation model was built in MATLAB/ Simulink environment. The analysis results showed that the power coupled efficiency of the hybrid powertrain system with dual continuous variable transmissions was better than that of the Honda hybrid system on the market.

Keywords: plug-in hybrid power system, fuel economy, performance, continuously variable transmission

Procedia PDF Downloads 284
508 Velocity Profiles of Vowel Perception by Javanese and Sundanese English Language Learners

Authors: Arum Perwitasari

Abstract:

Learning L2 sounds is influenced by the first language (L1) sound system. This current study seeks to examine how the listeners with a different L1 vowel system perceive L2 sounds. The fact that English has a bigger number of vowel inventory than Javanese and Sundanese L1 might cause problems for Javanese and Sundanese English language learners perceiving English sounds. To reveal the L2 sound perception over time, we measured the mouse trajectories related to the hand movements made by Javanese and Sundanese language learners, two of Indonesian local languages. Do the Javanese and Sundanese listeners show higher velocity than the English listeners when they perceive English vowels which are similar and new to their L1 system? The study aims to map the patterns of real-time processing through compatible hand movements to reveal any uncertainties when making selections. The results showed that the Javanese listeners exhibited significantly slower velocity values than the English listeners for similar vowels /I, ɛ, ʊ/ in the 826-1200ms post stimulus. Unlike the Javanese, the Sundanese listeners showed slow velocity values except for similar vowel /ʊ/. For the perception of new vowels /i:, æ, ɜ:, ʌ, ɑː, u:, ɔ:/, the Javanese listeners showed slower velocity in making the lexical decision. In contrast, the Sundanese listeners showed slow velocity only for vowels /ɜ:, ɔ:, æ, I/ indicating that these vowels are hard to perceive. Our results fit well with the second language model representing how the L1 vowel system influences the L2 sound perception.

Keywords: velocity profiles, EFL learners, speech perception, experimental linguistics

Procedia PDF Downloads 215
507 Geoelectrical Investigation Around Bomo Area, Kaduna State, Nigeria

Authors: B. S. Jatau, Baba Adama, S. I. Fadele

Abstract:

Electrical resistivity investigation was carried out around Bomo area, Zaria, Kaduna state in order to study the subsurface geologic layer with a view of determining the depth to the bedrock and thickness of the geologic layers. Vertical Electrical Sounding (VES) using Schlumberger array was carried out at fifteen (15) VES stations. ABEM terrameter (SAS 300) was used for the data acquisition. The field data obtained have been analyzed using computer software (IPI2win) which gives an automatic interpretation of the apparent resistivity. The VES results revealed heterogeneous nature of the subsurface geological sequence. The geologic sequence beneath the study area is composed of hard pan top soil (clayey and sandy-lateritic), weathered layer, partly weathered or fractured basement and fresh basement. The resistivity value for the topsoil layer varies from 40Ωm to 450Ωm with thickness ranging from 1.25 to 7.5 m. The weathered basement has resistivity values ranging from 50Ωm to 593Ωm and thickness between 1.37 and 20.1 m. The fractured basement has resistivity values ranging from 218Ωm to 520Ωm and thickness of between 12.9 and 26.3 m. The fresh basement (bedrock) has resistivity values ranging from 1215Ωm to 2150Ωm with infinite depth. However, the depth of the earth’s surface to the bedrock surface varies between 2.63 and 34.99 m. The study further stressed the importance of the findings in civil engineering structures and groundwater prospecting.

Keywords: electrical resistivity, CERT (CT), vertical electrical sounding (VES), top soil (TP), weathered basement (WB), partly weathered basement (PWB), fresh basement (FB)

Procedia PDF Downloads 324
506 Effect of Varying Scaffold Architecture and Porosity of Calcium Alkali Orthophosphate Based-Scaffolds for Bone Tissue Engineering

Authors: D. Adel, F. Giacomini, R. Gildenhaar, G. Berger, C. Gomes, U. Linow, M. Hardt, B. Peleskae, J. Günster, A. Houshmand, M. Stiller, A. Rack, K. Ghaffar, A. Gamal, M. El Mofty, C. Knabe

Abstract:

The goal of this study was to develop 3D scaffolds from a silica containing calcium alkali orthophosphate utilizing two different fabrication processes, first a replica technique namely the Schwartzwalder Somers method (SSM), and second 3D printing, i.e. Rapid prototyping (RP). First, the mechanical and physical properties of the scaffolds (porosity, compressive strength, and solubility) was assessed and second their potential to facilitate homogenous colonization with osteogenic cells and extracellular bone matrix formation throughout the porous scaffold architecture. To this end murine and rat calavarie osteoblastic cells were dynamically seeded on both scaffold types under perfusion with concentrations of 3 million cells. The amount of cells and extracellular matrix as well as osteogenic marker expression was evaluated using hard tissue histology, immunohistochemistry, and histomorphometric analysis. Total porosities of both scaffolds were 86.9 % and 50% for SSM and RP respectively, Compressive strength values were 0.46 ± 0.2 MPa for SSM and 6.6± 0.8 MPa for RP. Regarding the cellular behavior, RP scaffolds displayed a higher cell and matrix percentage of 24.45%. Immunoscoring yielded strong osteocalcin expression of cells and matrix in RP scaffolds and a moderate expression in SSM scaffolds. 3D printed RP scaffolds displayed superior mechanical and biological properties compared to SSM. 3D printed scaffolds represent excellent candidates for bone tissue engineering.

Keywords: calcium alkali orthophosphate, extracellular matrix mineralization, osteoblast differentiation, rapid prototyping, scaffold

Procedia PDF Downloads 325
505 Applications of Drones in Infrastructures: Challenges and Opportunities

Authors: Jin Fan, M. Ala Saadeghvaziri

Abstract:

Unmanned aerial vehicles (UAVs), also referred to as drones, equipped with various kinds of advanced detecting or surveying systems, are effective and low-cost in data acquisition, data delivery and sharing, which can benefit the building of infrastructures. This paper will give an overview of applications of drones in planning, designing, construction and maintenance of infrastructures. The drone platform, detecting and surveying systems, and post-data processing systems will be introduced, followed by cases with details of the applications. Challenges from different aspects will be addressed. Opportunities of drones in infrastructure include but not limited to the following. Firstly, UAVs equipped with high definition cameras or other detecting equipment are capable of inspecting the hard to reach infrastructure assets. Secondly, UAVs can be used as effective tools to survey and map the landscape to collect necessary information before infrastructure construction. Furthermore, an UAV or multi-UVAs are useful in construction management. UVAs can also be used in collecting roads and building information by taking high-resolution photos for future infrastructure planning. UAVs can be used to provide reliable and dynamic traffic information, which is potentially helpful in building smart cities. The main challenges are: limited flight time, the robustness of signal, post data analyze, multi-drone collaboration, weather condition, distractions to the traffic caused by drones. This paper aims to help owners, designers, engineers and architects to improve the building process of infrastructures for higher efficiency and better performance.

Keywords: bridge, construction, drones, infrastructure, information

Procedia PDF Downloads 121
504 Effective Stacking of Deep Neural Models for Automated Object Recognition in Retail Stores

Authors: Ankit Sinha, Soham Banerjee, Pratik Chattopadhyay

Abstract:

Automated product recognition in retail stores is an important real-world application in the domain of Computer Vision and Pattern Recognition. In this paper, we consider the problem of automatically identifying the classes of the products placed on racks in retail stores from an image of the rack and information about the query/product images. We improve upon the existing approaches in terms of effectiveness and memory requirement by developing a two-stage object detection and recognition pipeline comprising of a Faster-RCNN-based object localizer that detects the object regions in the rack image and a ResNet-18-based image encoder that classifies the detected regions into the appropriate classes. Each of the models is fine-tuned using appropriate data sets for better prediction and data augmentation is performed on each query image to prepare an extensive gallery set for fine-tuning the ResNet-18-based product recognition model. This encoder is trained using a triplet loss function following the strategy of online-hard-negative-mining for improved prediction. The proposed models are lightweight and can be connected in an end-to-end manner during deployment to automatically identify each product object placed in a rack image. Extensive experiments using Grozi-32k and GP-180 data sets verify the effectiveness of the proposed model.

Keywords: retail stores, faster-RCNN, object localization, ResNet-18, triplet loss, data augmentation, product recognition

Procedia PDF Downloads 150
503 The Scientific Phenomenon Revealed in the Holy Quran - an Update

Authors: Arjumand Warsy

Abstract:

The Holy Quran was revealed to Prophet Mohammad (May Peace and Blessings of Allah be upon Him) over fourteen hundred years ago, at a time when majority of the people in Arabia were illiterate and very few could read or write. Any knowledge about medicine, anatomy, biology, astronomy, physics, geology, geophysics or other sciences were almost non-existent. Many superstitious and groundless believes were prevalent and these believes were passed down through past generations. At that time, the Holy Quran was revealed and it presented several phenomenon that have been only currently unveiled, as scientists have worked endlessly to provide explanation for these physical and biological phenomenon applying scientific technologies. Many important discoveries were made during the 20th century and it is interesting to note that many of these discoveries were already present in the Holy Quran fourteen hundred years ago. The Scientific phenomenon, mentioned in the Holy Quran, cover many different fields in biological and physical sciences and have been the source of guidance for a number of scientists. A perfect description of the creation of the universe, the orbits in space, the development process, development of hearing process prior to sight, importance of the skin in sensing pain, uniqueness of fingerprints, role of males in selection of the sex of the baby, are just a few of the many facts present in the Quran that have astonished many scientists. The Quran in Chapter 20, verse 50 states: قَالَ رَبُّنَا الَّذِيۤ اَعْطٰى كُلَّ شَيْءٍ خَلْقَهٗ ثُمَّ هَدٰى ۰۰ (He said "Our Lord is He, Who has given a distinctive form to everything and then guided it aright”). Explaining this brief statement in the light of the modern day Molecular Genetics unveils the entire genetic basis of life and how guidance is stored in the genetic material (DNA) present in the nucleus. This thread like structure, made of only six molecules (sugar, phosphate, adenine, thymine, cytosine and guanine), is so brilliantly structured by the Creator that it holds all the information about each and every living thing, whether it is viruses, bacteria, fungi, plants, animals or humans or any other living being. This paper will present an update on some of the physical and biological phenomena’ presented in the Holy Quran, unveiled using advanced technologies during the last century and will discuss how the need to incorporate this information in the curricula.

Keywords: The Holy Quran, scientific facts, curriculum, Muslims

Procedia PDF Downloads 349
502 Hydrothermal Synthesis of Hydrosodalite by Using Ultrasounds

Authors: B. Białecka, Z. Adamczyk, M. Cempa

Abstract:

The use of ultrasounds in zeolization of fly ash can increase the efficiency of this process. The molar ratios of the reagents, as well as the time and temperature of the synthesis, are the main parameters determining the type and properties of the zeolite formed. The aim of the work was to create hydrosodalite in a short time (8h), with low NaOH concentration (3 M) and in low temperature (80°C). A zeolite material contained in fly ash from hard coal combustion in one of Polish Power Plant was subjected to hydrothermal alkaline synthesis. The phase composition of the ash consisted mainly of glass, mullite, quartz, and hematite. The dominant chemical components of the ash were SiO₂ (over 50%mas.) and Al₂O₃ (more than 28%mas.), whereas the contents of the remaining components, except Fe₂O₃ (6.34%mas.), did not exceed 4% mas. The hydrothermal synthesis of the zeolite material was carried out in the following conditions: 3M-solution of NaOH, synthesis time – 8 hours, 40 kHz-frequency ultrasounds during the first two hours of synthesis. The mineral components of the input ash as well as product after synthesis were identified in microscopic observations, in transmitted light, using X-ray diffraction (XRD) and electron scanning microscopy (SEM/EDS). The chemical composition of the input ash was identified by the method of X-ray fluorescence (XRF). The obtained material apart from phases found in the initial fly ash sample, also contained new phases, i.e., hydrosodalite and NaP-type zeolite. The chemical composition in micro areas of grains indicated their diversity: i) SiO₂ content was in the range 30-59%mas., ii) Al₂O₃ content was in the range 24-35%mas., iii) Na₂O content was in the range 6-15%mas. This clearly indicates that hydrosodalite forms hypertrophies with NaP type zeolite as well as relict grains of fly ash. A small amount of potassium in the examined grains is noteworthy, which may indicate the substitution of sodium with potassium. This is confirmed by the high value of the correlation coefficient between these two components.

Keywords: fly ash, hydrosodalite, ultrasounds, zeolite

Procedia PDF Downloads 148
501 A Model for Helicopter Routing Problem

Authors: Aydin Sipahioglu, Gokhan Celik

Abstract:

Helicopter routing problem (HRP) is finding good tours for helicopter so as to pick up and deliver personnel or material among specified nodes, mutually. It can be encountered in case of being lots of supply and demand points for different commodities and requiring delivering commodities with helicopter. For instance, to deliver personnel or material from shore to oil rig is a good example. In fact, HRP is a branch of vehicle routing problem with pickup and delivery (VRPPD). However, it has additional constraints such that fuel capacity, performance of helicopter in different altitude and temperature, and the number of maximum takeoff and landing allowed. This kind of pickup and delivery problems can be classified into 3 groups, basically. 1-1 (one to one), M-M (many to many) and 1-M-1 (one to many to one). 1-1 means each commodity has only one supply and one demand point. M-M means there can be more than one supply and demand points for each kind of commodity. 1-M-1 means commodities at depot are delivered to demand points and commodities at customers are delivered to depot. In this case helicopter takes off from its own base, complete its tour and return to its own base. In this study, we define 1-M-M-1 type HRP. That means helicopter takes off from its home base, deliver commodities among the nodes as well as between depot and customers and return to its home base. These problems have NP-hard nature. Therefore, obtaining a good solution in a reasonable time is not easy. In this study, a model is offered for 1-M-M-1 type HRP. It is shown on small scale test instances that the model can find the optimal solution.

Keywords: helicopter routing problem, vehicle routing with pickup and delivery, integer programming

Procedia PDF Downloads 426
500 Design of a Virtual Reality System for Children with Developmental Coordination Disorder

Authors: Ya-Ju Ju, Li-Chen Yang, Yi-Chun Du, Rong-Ju Cherng

Abstract:

Introduction: It is estimated that 5-6% of school-aged children may be diagnosed to have developmental coordination disorder (DCD). Children with DCD are characterized with motor skill difficulty which cannot be explained by any medical or intellectual reasons. Such motor difficulties limit children’s participation to sports activity, further affect their physical fitness, cardiopulmonary function and balance, and may lead to obesity. The purpose of the project was to develop an exergaming system for children with DCD aiming to improve their physical fitness, cardiopulmonary function and balance ability. Methods: This study took five steps to build up the system: system planning, tasks selection, tasks programming, system integration and usability test. The system basically adopted virtual reality technique to integrate self-developed training programs. The training programs were developed to brainstorm among team members and after literature review. The selected tasks for training in the system were a combination of fundamental movement tor skill. Results and Discussion: Based on the theory of motor development, we design the training task from easy ones to hard ones, from single tasks to dual tasks. The tasks included walking, sit to stand, jumping, kicking, weight shifting, side jumping and their combination. Preliminary study showed that the tasks presented an order of development. Further study is needed to examine its effect on motor skill and cardiovascular fitness in children with DCD.

Keywords: virtual reality, virtual reality system, developmental coordination disorder, children

Procedia PDF Downloads 112
499 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 206
498 Comparison of the Factor of Safety and Strength Reduction Factor Values from Slope Stability Analysis of a Large Open Pit

Authors: James Killian, Sarah Cox

Abstract:

The use of stability criteria within geotechnical engineering is the way the results of analyses are conveyed, and sensitivities and risk assessments are performed. Historically, the primary stability criteria for slope design has been the Factor of Safety (FOS) coming from a limit calculation. Increasingly, the value derived from Strength Reduction Factor (SRF) analysis is being used as the criteria for stability analysis. The purpose of this work was to study in detail the relationship between SRF values produced from a numerical modeling technique and the traditional FOS values produced from Limit Equilibrium (LEM) analyses. This study utilized a model of a 3000-foot-high slope with a 45-degree slope angle, assuming a perfectly plastic mohr-coulomb constitutive model with high cohesion and friction angle values typical of a large hard rock mine slope. A number of variables affecting the values of the SRF in a numerical analysis were tested, including zone size, in-situ stress, tensile strength, and dilation angle. This paper demonstrates that in most cases, SRF values are lower than the corresponding LEM FOS values. Modeled zone size has the greatest effect on the estimated SRF value, which can vary as much as 15% to the downside compared to FOS. For consistency when using SRF as a stability criteria, the authors suggest that numerical model zone sizes should not be constructed to be smaller than about 1% of the overall problem slope height and shouldn’t be greater than 2%. Future work could include investigations of the effect of anisotropic strength assumptions or advanced constitutive models.

Keywords: FOS, SRF, LEM, comparison

Procedia PDF Downloads 301
497 Distributed System Computing Resource Scheduling Algorithm Based on Deep Reinforcement Learning

Authors: Yitao Lei, Xingxiang Zhai, Burra Venkata Durga Kumar

Abstract:

As the quantity and complexity of computing in large-scale software systems increase, distributed system computing becomes increasingly important. The distributed system realizes high-performance computing by collaboration between different computing resources. If there are no efficient resource scheduling resources, the abuse of distributed computing may cause resource waste and high costs. However, resource scheduling is usually an NP-hard problem, so we cannot find a general solution. However, some optimization algorithms exist like genetic algorithm, ant colony optimization, etc. The large scale of distributed systems makes this traditional optimization algorithm challenging to work with. Heuristic and machine learning algorithms are usually applied in this situation to ease the computing load. As a result, we do a review of traditional resource scheduling optimization algorithms and try to introduce a deep reinforcement learning method that utilizes the perceptual ability of neural networks and the decision-making ability of reinforcement learning. Using the machine learning method, we try to find important factors that influence the performance of distributed system computing and help the distributed system do an efficient computing resource scheduling. This paper surveys the application of deep reinforcement learning on distributed system computing resource scheduling proposes a deep reinforcement learning method that uses a recurrent neural network to optimize the resource scheduling, and proposes the challenges and improvement directions for DRL-based resource scheduling algorithms.

Keywords: resource scheduling, deep reinforcement learning, distributed system, artificial intelligence

Procedia PDF Downloads 108
496 Confluence of Relations: An Auto-Ethnographic Account of Field Recording in the Anthropocene Age

Authors: Freya Zinovieff

Abstract:

In the age of the Anthropocene, all ecosystems, no matter how remote, is influenced by the relations between humans and technology. These influences are evidenced by current extinction rates, changes in species diversity, and species adaptation to pollution. Field recording is a tool through which we are able to document the extent to which life forms associated with the place are entangled with human-technology relationships. This paper documents the convergence of interaction between technologies, species, and landscape via an auto-ethnographic account of a field recording taken from a cell phone tower in Bali, Indonesia. In the recording, we hear a confluence of relations where critter and technology meet. The electrical hum of the tower merges with frogs and the amaranthine throb of crickets, in such a way that it is hard to tell where technology begins and the voice of creatures ends. The outcomes of this venture resulted in a framework for evaluating the sensorial relations within field recording. The framework calls for the soundscape to be understood as a multilayered ontology through which there is a convergence of multispecies relationships, or entanglements, across time and geographic location. These entanglements are not necessarily obvious. Sometimes quiet, sometimes elusive, sometimes only audible through the mediated conduit of digital technology. The paper argues that to be aware of these entanglements is to open ourselves to a type of beauty that is firmly rooted in the present paradigm of extinction and loss. By virtue of this understanding, we are bestowed with an opportunity to embrace the grave reality of the current sixth mass extinction and move forwards with what activist Joanna Macy calls the compassionate action.

Keywords: anthropocene, human-technology relationships, multispecies ethnography, field recording

Procedia PDF Downloads 149
495 Recognition and Counting Algorithm for Sub-Regional Objects in a Handwritten Image through Image Sets

Authors: Kothuri Sriraman, Mattupalli Komal Teja

Abstract:

In this paper, a novel algorithm is proposed for the recognition of hulls in a hand written images that might be irregular or digit or character shape. Identification of objects and internal objects is quite difficult to extract, when the structure of the image is having bulk of clusters. The estimation results are easily obtained while going through identifying the sub-regional objects by using the SASK algorithm. Focusing mainly to recognize the number of internal objects exist in a given image, so as it is shadow-free and error-free. The hard clustering and density clustering process of obtained image rough set is used to recognize the differentiated internal objects, if any. In order to find out the internal hull regions it involves three steps pre-processing, Boundary Extraction and finally, apply the Hull Detection system. By detecting the sub-regional hulls it can increase the machine learning capability in detection of characters and it can also be extend in order to get the hull recognition even in irregular shape objects like wise black holes in the space exploration with their intensities. Layered hulls are those having the structured layers inside while it is useful in the Military Services and Traffic to identify the number of vehicles or persons. This proposed SASK algorithm is helpful in making of that kind of identifying the regions and can useful in undergo for the decision process (to clear the traffic, to identify the number of persons in the opponent’s in the war).

Keywords: chain code, Hull regions, Hough transform, Hull recognition, Layered Outline Extraction, SASK algorithm

Procedia PDF Downloads 342
494 Health Status, Perception of Self-Efficacy and Social Support of Thailand Aging

Authors: Wipakon Sonsnam, Kanya Napapongsa

Abstract:

The quantitative aim of the study; 1) health conditions, to examine the state of health of the aging, 2) perceived of self-efficacy, self-care of aging ,3) perceived of social support of the aging, 4) to examine factors associated with self-efficacy in enhancing the health and self-care when illness. 100 samples selected from communities in Dusit, Bangkok, 2014 by random sampling. The questionnaires were used to collect data have 5-point rating scale, consisting of strongly agree, agree, undecided, disagree, and strongly disagree; approved content valid by 3 experts, reliability coefficients alpha was .784 for perceived of self-efficacy, self-care of aging and .827 for perceived of social support of the aging. ST-5, 2Q used for collect mental health. The ability to engage in a daily routine was collected by Barthel ADL index. Founding, the sample group were female (68%). (33%) of them were in the age of 60-65. Most of them were married and still live with their spouse (55%) and do not work (38%). The average annual income was less than 10,000 baht supported by child. Most people think that income was adequate (49.0%) and Satisfaction (61.0%). Most of aging caring them-self, followed by them spouse (26%). Welfare of the public had supported, living for the aging (100%), followed by Join and health volunteers in communities (23%). In terms of health, (53%) of the sample group feels health was fair, hypertension was the most common health condition among sample group (68%), following by diabetes (55%). About eyesight, (42%) have visual acuity. (59.0%) do not need hearing aids. 84% have more than 20 teeth remaining, and have no problem with chewing (61%). In terms of Ability to engage in a daily routine, most of people (84%) in sample group are in type 1. (91%) of the participants don’t have bladder incontinence. For mental condition, (82%) do not have insomnia. (87%) do not have anxiety. (96%) do not have depression. However, (77%) of the sample group is facing stress. In terms of environment in home, bathroom in the home (90.0%) and floor of bathroom was slippery (91.0%). (48%) of the sample group has the skills of how to look after themselves while being sick, and how to keep up healthy lifestyle. Besides, some other factors, such as gender, age and educational background are related to the health perception. The statistical significance was <0.05. Suggestion: The instruments available to national standards such as ST-5, 2Q and Barthel ADL index. Reliability coefficients alpha was .784 for perceived of self-efficacy, self-care of aging and .827 for perceived of social support of the aging. The instrument used to collect perceived of social support must be further developed to study level of influence of social support that affect the health of elderly.

Keywords: ้health status, perception of aging, self-efficacy, social support

Procedia PDF Downloads 540
493 Study and Solving High Complex Non-Linear Differential Equations Applied in the Engineering Field by Analytical New Approach AGM

Authors: Mohammadreza Akbari, Sara Akbari, Davood Domiri Ganji, Pooya Solimani, Reza Khalili

Abstract:

In this paper, three complicated nonlinear differential equations(PDE,ODE) in the field of engineering and non-vibration have been analyzed and solved completely by new method that we have named it Akbari-Ganji's Method (AGM) . As regards the previous published papers, investigating this kind of equations is a very hard task to do and the obtained solution is not accurate and reliable. This issue will be emerged after comparing the achieved solutions by Numerical Method. Based on the comparisons which have been made between the gained solutions by AGM and Numerical Method (Runge-Kutta 4th), it is possible to indicate that AGM can be successfully applied for various differential equations particularly for difficult ones. Furthermore, It is necessary to mention that a summary of the excellence of this method in comparison with the other approaches can be considered as follows: It is noteworthy that these results have been indicated that this approach is very effective and easy therefore it can be applied for other kinds of nonlinear equations, And also the reasons of selecting the mentioned method for solving differential equations in a wide variety of fields not only in vibrations but also in different fields of sciences such as fluid mechanics, solid mechanics, chemical engineering, etc. Therefore, a solution with high precision will be acquired. With regard to the afore-mentioned explanations, the process of solving nonlinear equation(s) will be very easy and convenient in comparison with the other methods. And also one of the important position that is explored in this paper is: Trigonometric and exponential terms in the differential equation (the method AGM) , is no need to use Taylor series Expansion to enhance the precision of the result.

Keywords: new method (AGM), complex non-linear partial differential equations, damping ratio, energy lost per cycle

Procedia PDF Downloads 463
492 The Effectiveness of Summative Assessment in Practice Learning

Authors: Abdool Qaiyum Mohabuth, Syed Munir Ahmad

Abstract:

Assessment enables students to focus on their learning, assessment. It engages them to work hard and motivates them in devoting time to their studies. Student learning is directly influenced by the type of assessment involved in the programme. Summative Assessment aims at providing measurement of student understanding. In fact, it is argued that summative assessment is used for reporting and reviewing, besides providing an overall judgement of achievement. While summative assessment is a well defined process for learning that takes place in the classroom environment, its application within the practice environment is still being researched. This paper discusses findings from a mixed-method study for exploring the effectiveness of summative assessment in practice learning. A survey questionnaire was designed for exploring the perceptions of mentors and students about summative assessment in practice learning. The questionnaire was administered to the University of Mauritius students and mentors who supervised students for their Work-Based Learning (WBL) practice at the respective placement settings. Some students, having undertaken their WBL practice, were interviewed, for capturing their views and experiences about the application of summative assessment in practice learning. Semi-structured interviews were also conducted with three experienced mentors who have assessed students on practice learning. The findings reveal that though learning in the workplace is entirely different from learning at the University, most students had positive experiences about their summative assessments in practice learning. They felt comfortable and confident to be assessed by their mentors in their placement settings and wished that the effort and time that they devoted to their learning be recognised and valued. Mentors on their side confirmed that the summative assessment is valid and reliable, enabling them to better monitor and coach students to achieve the expected learning outcomes.

Keywords: practice learning, judgement, summative assessment, knowledge, skills, workplace

Procedia PDF Downloads 338
491 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 468
490 Assessment of E-Readiness in Libraries of Public Sector Universities Khyber Pakhtunkhwa-Pakistan

Authors: Saeed Ullah Jan

Abstract:

This study has examined the e-readiness in libraries of public sector universities in Khyber Pakhtunkhwa. Efforts were made to evaluate the availability of human resources, electronic infrastructure, and network services and programs in the public sector university libraries. The population of the study was the twenty-seven public sector university libraries of Khyber Pakhtunkhwa. A quantitative approach was adopted, and a questionnaire-based survey was conducted to collect data from the librarian/in charge of public sector university libraries. The collected data were analyzed using Statistical Package for Social Sciences version 22 (SPSS). The mean score of the knowledge component interpreted magnitudes below three which indicates that the respondents are poorly or moderately satisfied regards knowledge of libraries. The satisfaction level of the respondents about the other components, such as electronic infrastructure, network services and programs, and enhancers of the networked world, was rated as average or below. The study suggested that major aspects of existing public-sector university libraries require significant transformation. For this purpose, the government should provide all the required resources and facilities to meet the population's informational and recreational demands. The Information Communication Technology (ICT) infrastructure of public university libraries needs improvement in terms of the availability of computer equipment, databases, network servers, multimedia projectors, digital cameras, uninterruptible power supply, scanners, and backup devices such as hard discs and Digital Video Disc/Compact Disc.

Keywords: ICT-libraries, e-readiness-libraries, e-readiness-university libraries, e-readiness-Pakistan

Procedia PDF Downloads 86
489 Friendship Love Orientation as Predictor of Attachment Style: A Gender Perspective

Authors: Maria Sana Amin, Anum Atiq, Haya Fatimah

Abstract:

Secure attachment in childhood creates a healthy love attitude in the adulthood. Child secure attachment develops a positive relation attitude in their adulthood, similarly, anxiety-avoidant attachment develops negative attitude toward relations. The aim of this paper is twofold: 1) We investigate the relationship between Friendship Attitude and Attachment Styles; and 2) explore the impact of gender on Love Attitudes and Attachment styles. Data was collected by convincing sampling among the students of University of Management and Technology age group 18- 25. The sample consists 60 young adults (Male=36, Female =54). The Love Attitudes Scales subscale Storage was used to measure attitudes towards friendship love and The Experiences in Close Relationships-Revised questionnaire was used to measure Adult Attachment Style. The result of Independent T-Test analysis shows that there was no significant difference in anxiety for female and male conditions; t (58) =-.768, p=.446 and avoidance for female and male conditions; t (58) =1.63, p=.108. Moreover, also there was no significant difference in friendship love for female (M=27.37, SD=6.371) and male (M=26.08, SD=5.709) conditions; t (58) =-.820, p=.416. Pearson correlation analysis shows significantly negative correlation between love attitude-friendship and attachment style- avoidance, (r=-.433, p=.008) among male and love attitude-friendship and attachment style- avoidance (r=-.438, p=.032) among female. There are no gender differences in attachment styles i.e. anxiety, avoidance and their relationship with friendship love attitude. People have avoidant attachment find it hard to fall in love and develop intimacy, and they tend to search for independence.

Keywords: avoidance attachment style, anxiety attachment style, friendship love attitude, gender difference/similarity

Procedia PDF Downloads 305
488 An ICF Framework for Game-Based Experiences in Geriatric Care

Authors: Marlene Rosa, Susana Lopes

Abstract:

Board games have been used for different purposes in geriatric care, demonstrating good results for health in general. However, there is not a conceptual framework that can help professionals and researchers in this area to design intervention programs or to think about future studies in this area. The aim of this study was to provide a pilot collection of board games’ serious purposes in geriatric care, using a WHO framework for health and disability. Study cases were developed in seven geriatric residential institutions from the center region in Portugal that are included in AGILAB program. The AGILAB program is a serious game-based method to train and spread out the implementation of board games in geriatric care. Each institution provides 2-hours/week of experiences using TATI Hand Game for serious purposes and then fulfill questions about a study-case (player characteristics; explain changes in players health according to this game experience). Two independent researchers read the information and classified it according to the International Classification for Functioning and Disability (ICF) categories. Any discrepancy was solved in a consensus meeting. Results indicate an important variability in body functions and structures: specific mental functions (e.g., b140 Attention functions, b144 Memory functions), b156 Perceptual functions, b2 sensory functions and pain (e.g., b230 Hearing functions; b265 Touch function; b280 Sensation of pain), b7 neuromusculoskeletal and movement-related functions (e.g., b730 Muscle power functions; b760 Control of voluntary movement functions; b710 Mobility of joint functions). Less variability was found in activities and participation domains, such as purposeful sensory experiences (d110-d129) (e.g., d115 Listening), communication (d3), d710 basic interpersonal interactions, d920 recreation and leisure (d9200 Play; d9205 Socializing). Concluding, this framework designed from a brief gamed-based experience includes mental, perceptual, sensory, neuromusculoskeletal, and movement-related functions and participation in sensory, communication, and leisure domains. More studies, including different experiences and a high number of users, should be developed to provide a more comprehensive ICF framework for game-based experiences in geriatric care.

Keywords: board game, aging, framework, experience

Procedia PDF Downloads 124
487 Microstructures and Chemical Compositions of Quarry Dust As Alternative Building Material in Malaysia

Authors: Abdul Murad Zainal Abidin, Tuan Suhaimi Salleh, Siti Nor Azila Khalid, Noryati Mustapa

Abstract:

Quarry dust is a quarry end product from rock crushing processes, which is a concentrated material used as an alternative to fine aggregates for concreting purposes. In quarrying activities, the rocks are crushed into aggregates of varying sizes, from 75mm until less than 4.5 mm, the size of which is categorized as quarry dust. The quarry dust is usually considered as waste and not utilized as a recycled aggregate product. The dumping of the quarry dust at the quarry plant poses the risk of environmental pollution and health hazard. Therefore, the research is an attempt to identify the potential of quarry dust as an alternative building material that would reduce the materials and construction costs, as well as contribute effort in mitigating depletion of natural resources. The objectives are to conduct material characterization and evaluate the properties of fresh and hardened engineering brick with quarry dust mix proportion. The microstructures of quarry dust and the bricks were investigated using scanning electron microscopy (SEM), and the results suggest that the shape and surface texture of quarry dust is a combination of hard and angular formation. The chemical composition of the quarry dust was also evaluated using X-ray fluorescence (XRF) and compared against sand and concrete. The quarry dust was found to have a higher presence of alumina (Al₂O₃), indicating the possibility of an early strength effect for brick. They are utilizing quarry dust waste as replacement material has the potential of conserving non-renewable resources as well as providing a viable alternative to disposal of current quarry waste.

Keywords: building materials, cement replacement, quarry microstructure, quarry product, sustainable materials

Procedia PDF Downloads 180
486 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security

Authors: Shanshan Zhu, Mohammad Nasim

Abstract:

Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.

Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection

Procedia PDF Downloads 29
485 Automated Weight Painting: Using Deep Neural Networks to Adjust 3D Mesh Skeletal Weights

Authors: John Gibbs, Benjamin Flanders, Dylan Pozorski, Weixuan Liu

Abstract:

Weight Painting–adjusting the influence a skeletal joint has on a given vertex in a character mesh–is an arduous and time con- suming part of the 3D animation pipeline. This process generally requires a trained technical animator and many hours of work to complete. Our skiNNer plug-in, which works within Autodesk’s Maya 3D animation software, uses Machine Learning and data pro- cessing techniques to create a deep neural network model that can accomplish the weight painting task in seconds rather than hours for bipedal quasi-humanoid character meshes. In order to create a properly trained network, a number of challenges were overcome, including curating an appropriately large data library, managing an arbitrary 3D mesh size, handling arbitrary skeletal architectures, accounting for extreme numeric values (most data points are near 0 or 1 for weight maps), and constructing an appropriate neural network model that can properly capture the high frequency alter- ation between high weight values (near 1.0) and low weight values (near 0.0). The arrived at neural network model is a cross between a traditional CNN, deep residual network, and fully dense network. The resultant network captures the unusually hard-edged features of a weight map matrix, and produces excellent results on many bipedal models.

Keywords: 3d animation, animation, character, rigging, skinning, weight painting, machine learning, artificial intelligence, neural network, deep neural network

Procedia PDF Downloads 268
484 Investigation on the Structure of Temperature-Responsive N-isopropylacrylamide Microgels Containing a New Hydrophobic Crosslinker

Authors: G. Roshan Deen, J. S. Pedersen

Abstract:

Temperature-responsive poly(N-isopropyl acrylamide) PNIPAM microgels crosslinked with a new hydrophobic chemical crosslinker was prepared by surfactant-mediated precipitation emulsion polymerization. The temperature-responsive property of the microgel and the influence of the crosslinker on the swelling behaviour was studied systematically by light scattering and small-angle X-ray scattering (SAXS). The radius of gyration (Rg) and the hydrodynamic radius (Rh) of the microgels decreased with increase in temperature due to the volume phase transition from a swollen to a collapsed state. The ratio of Rg/Rh below the transition temperature was lower than that of hard-spheres due to the lower crosslinking density of the microgels. The SAXS data was analysed by a model in which the microgels were modelled as core-shell particles with a graded interface. The model at intermediate temperatures included a central core and a more diffuse outer layer describing pending polymer chains with a low crosslinking density. In the fully swollen state, the microgels were modelled with a single component with a broad graded surface. In the collapsed state they were modelled as homogeneous and relatively compact particles. The polymer volume fraction inside the microgel was also derived based on the model and was found to increase with increase in temperature as a result of collapse of the microgel to compact particles. The polymer volume fraction in the core of the microgel in the collapsed state was about 60% which is higher than that of similar microgels crosslinked with hydrophilic and flexible cross-linkers.

Keywords: microgels, SAXS, hydrophobic crosslinker, light scattering

Procedia PDF Downloads 423
483 The Impact of Training on Commitment, Retention, Job Satisfaction and Performance of Private Sector Banks in Bangladesh

Authors: Md. Arifur Rahman, Ummya Salma, Nazrul Islam

Abstract:

Private sector banking business is one of the leading businesses of Bangladesh as it is profitable and directly attached with the economic development of the country. Training has got very high importance in this sector for increasing the performance of the banks. It has a long term impact on a number of aspects of the bank employees and their performances. It is an investment of the organization that is permanent in nature. Study shows that there are positive relationships between training and the employee commitment, job retention, job satisfaction and company performance. Training is also concerned with promotion, compensation, work-life policies, career development, task and contextual performance of the employees. As such, this paper aims at identifying the impact of training on employee commitment, job retention, job satisfaction and the performance of the private sector banks in Bangladesh. Both primary and secondary data were used to conduct the study. Data were collected from the bank officers who were trained in their banks. Both descriptive and inferential statistics were used to analyze the data. Descriptive statistics were used to describe the present situation of the banks and their employees. Inferential statistics were used to identify the factors and their significance concerned with training. Results show that there is a significant relationship between the performance and the training of the employees. It also shows that the training can motivate employees and encourage them to work hard. However, this study did not find any relationship between the commitment of the employees and the training. This study suggests that for increasing the performance of the banks, training is a must which is to be given deliberately for improving the specific skills of the bank employees.

Keywords: training, promotion, compensation, work-life policies

Procedia PDF Downloads 283