Search results for: voice recognition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2149

Search results for: voice recognition

1279 CVOIP-FRU: Comprehensive VoIP Forensics Report Utility

Authors: Alejandro Villegas, Cihan Varol

Abstract:

Voice over Internet Protocol (VoIP) products is an emerging technology that can contain forensically important information for a criminal activity. Without having the user name and passwords, this forensically important information can still be gathered by the investigators. Although there are a few VoIP forensic investigative applications available in the literature, most of them are particularly designed to collect evidence from the Skype product. Therefore, in order to assist law enforcement with collecting forensically important information from variety of Betamax VoIP tools, CVOIP-FRU framework is developed. CVOIP-FRU provides a data gathering solution that retrieves usernames, contact lists, as well as call and SMS logs from Betamax VoIP products. It is a scripting utility that searches for data within the registry, logs and the user roaming profiles in Windows and Mac OSX operating systems. Subsequently, it parses the output into readable text and html formats. One superior way of CVOIP-FRU compared to the other applications that due to intelligent data filtering capabilities and cross platform scripting back end of CVOIP-FRU, it is expandable to include other VoIP solutions as well. Overall, this paper reveals the exploratory analysis performed in order to find the key data paths and locations, the development stages of the framework, and the empirical testing and quality assurance of CVOIP-FRU.

Keywords: betamax, digital forensics, report utility, VoIP, VoIPBuster, VoIPWise

Procedia PDF Downloads 298
1278 The Role of Cholesterol Oxidase of Mycobacterium tuberculosis in the Down-Regulation of TLR2-Signaling Pathway in Human Macrophages during Infection Process

Authors: Michal Kielbik, Izabela Szulc-Kielbik, Anna Brzostek, Jaroslaw Dziadek, Magdalena Klink

Abstract:

The goal of many research groups in the world is to find new components that are important for survival of mycobacteria in the host cells. Mycobacterium tuberculosis (Mtb) possesses a number of enzymes degrading cholesterol that are considered to be an important factor for its survival and persistence in host macrophages. One of them - cholesterol oxidase (ChoD), although not being essential for cholesterol degradation, is discussed as a virulence compound, however its involvement in macrophages’ response to Mtb is still not sufficiently determined. The recognition of tubercle bacilli antigens by pathogen recognition receptors is crucial for the initiation of the host innate immune response. An important receptor that has been implicated in the recognition and/or uptake of Mtb is Toll-like receptor type 2 (TLR2). Engagement of TLR2 results in the activation and phosphorylation of intracellular signaling proteins including IRAK-1 and -4, TRAF-6, which in turn leads to the activation of target kinases and transcription factors responsible for bactericidal and pro-inflammatory response of macrophages. The aim of these studies was a detailed clarification of the role of Mtb cholesterol oxidase as a virulence factor affecting the TLR2 signaling pathway in human macrophages. As human macrophages the THP-1 differentiated cells were applied. The virulent wild-type Mtb strain (H37Rv), its mutant lacking a functional copy of gene encoding cholesterol oxidase (∆choD), as well as complimented strain (∆choD–choD) were used. We tested the impact of Mtb strains on the expression of TLR2-depended signaling proteins (mRNA level, cytosolic level and phosphorylation status). The cytokine and bactericidal response of THP-1 derived macrophages infected with Mtb strains in relation to TLR2 signaling pathway dependence was also determined. We found that during the 24-hours of infection process the wild-type and complemented Mtb significantly reduced the cytosolic level and phosphorylation status of IRAK-4 and TRAF-6 proteins in macrophages, that was not observed in the case of ΔchoD mutant. Decreasement of TLR2-dependent signaling proteins, induced by wild-type Mtb, was not dependent on the activity of proteasome. Blocking of TLR2 expression, before infection, effectively prevented the induced by wild-type strain reduction of cytosolic level and phosphorylation of IRAK-4. None of the strains affected the surface expression of TLR2. The mRNA level of IRAK-4 and TRAF-6 genes were significantly increased in macrophages 24 hours post-infection with either of tested strains. However, the impact of wild-type Mtb strain on both examined genes was significantly stronger than its ΔchoD mutant. We also found that wild-type strain stimulated macrophages to release high amount of immunosuppressive IL-10, accompanied by low amount of pro-inflammatory IL-8 and bactericidal nitric oxide in comparison to mutant lacking cholesterol oxidase. The influence of wild-type Mtb on this type of macrophages' response strongly dependent on fully active IRAK-1 and IRAK-4 signaling proteins. In conclusion, Mtb using cholesterol oxidase causes the over-activation of TLR2 signaling proteins leading to the reduction of their cytosolic level and activity resulting in the modulation of macrophages response to allow its intracellular survival. Supported by grant: 2014/15/B/NZ6/01565, National Science Center, Poland

Keywords: Mycobacterium tuberculosis, cholesterol oxidase, macrophages, TLR2-dependent signaling pathway

Procedia PDF Downloads 420
1277 Effective Learning and Testing Methods in School-Aged Children

Authors: Farzaneh Badinlou, Reza Kormi-Nouri, Monika Knopf, Kamal Kharrazi

Abstract:

When we teach, we have two critical elements at our disposal to help students: learning styles as well as testing styles. There are many different ways in which educators can effectively teach their students; verbal learning and experience-based learning. Lecture as a form of verbal learning style is a traditional arrangement in which teachers are more active and share information verbally with students. In experienced-based learning as the process of through, students learn actively through hands-on learning materials and observing teachers or others. Meanwhile, standard testing or assessment is the way to determine progress toward proficiency. Teachers and instructors mainly use essay (requires written responses), multiple choice questions (includes the correct answer and several incorrect answers as distractors), or open-ended questions (respondents answers it with own words). The current study focused on exploring an effective teaching style and testing methods as the function of age over school ages. In the present study, totally 410 participants were selected randomly from four grades (2ⁿᵈ, 4ᵗʰ, 6ᵗʰ, and 8ᵗʰ). Each subject was tested individually in one session lasting around 50 minutes. In learning tasks, the participants were presented three different instructions for learning materials (learning by doing, learning by observing, and learning by listening). Then, they were tested via different standard assessments as free recall, cued recall, and recognition tasks. The results revealed that generally students remember more of what they do and what they observe than what they hear. The age effect was more pronounced in learning by doing than in learning by observing, and learning by listening, becoming progressively stronger in the free-recall, cued-recall, and recognition tasks. The findings of this study indicated that learning by doing and free recall task is more age sensitive, suggesting that both of them are more strategic and more affected by developmental differences. Pedagogically, these results denoted that learning by modeling and engagement in program activities have the special role for learning. Moreover, the findings indicated that the multiple-choice questions can produce the best performance for school-aged children but is less age-sensitive. By contrast, the essay as essay can produce the lowest performance but is more age-sensitive. It will be very helpful for educators to know that what types of learning styles and test methods are most effective for students in each school grade.

Keywords: experience-based learning, learning style, school-aged children, testing methods, verbal learning

Procedia PDF Downloads 204
1276 Technique and Use of Machine Readable Dictionary: In Special Reference to Hindi-Marathi Machine Translation

Authors: Milind Patil

Abstract:

Present paper is a discussion on Hindi-Marathi Morphological Analysis and generating rules for Machine Translation on the basis of Machine Readable Dictionary (MRD). This used Transformative Generative Grammar (TGG) rules to design the MRD. As per TGG rules, the suffix of a particular root word is based on its Tense, Aspect, Modality and Voice. That's why the suffix is very important for the word meanings (or root meanings). The Hindi and Marathi Language both have relation with Indo-Aryan language family. Both have been derived from Sanskrit language and their script is 'Devnagari'. But there are lots of differences in terms of semantics and grammatical level too. In Marathi, there are three genders, but in Hindi only two (Masculine and Feminine), the Natural gender is absent in Hindi. Likewise other grammatical categories also differ in their level of use. For MRD the suffixes (or Morpheme) are of particular root word for GNP (Gender, Number and Person) are based on its natural phenomena. A particular Suffix and Morphine change as per the need of person, number and gender. The design of MRD also based on this format. In first, Person, Number, Gender and Tense are key points than root words and suffix of particular Person, Number Gender (PNG). After that the inferences are drawn on the basis of rules that is (V.stem) (Pre.T/Past.T) (x) + (Aux-Pre.T) (x) → (V.Stem.) + (SP.TM) (X).

Keywords: MRD, TGG, stem, morph, morpheme, suffix, PNG, TAM&V, root

Procedia PDF Downloads 325
1275 Nondestructive Prediction and Classification of Gel Strength in Ethanol-Treated Kudzu Starch Gels Using Near-Infrared Spectroscopy

Authors: John-Nelson Ekumah, Selorm Yao-Say Solomon Adade, Mingming Zhong, Yufan Sun, Qiufang Liang, Muhammad Safiullah Virk, Xorlali Nunekpeku, Nana Adwoa Nkuma Johnson, Bridget Ama Kwadzokpui, Xiaofeng Ren

Abstract:

Enhancing starch gel strength and stability is crucial. However, traditional gel property assessment methods are destructive, time-consuming, and resource-intensive. Thus, understanding ethanol treatment effects on kudzu starch gel strength and developing a rapid, nondestructive gel strength assessment method is essential for optimizing the treatment process and ensuring product quality consistency. This study investigated the effects of different ethanol concentrations on the microstructure of kudzu starch gels using a comprehensive microstructural analysis. We also developed a nondestructive method for predicting gel strength and classifying treatment levels using near-infrared (NIR) spectroscopy, and advanced data analytics. Scanning electron microscopy revealed progressive network densification and pore collapse with increasing ethanol concentration, correlating with enhanced mechanical properties. NIR spectroscopy, combined with various variable selection methods (CARS, GA, and UVE) and modeling algorithms (PLS, SVM, and ELM), was employed to develop predictive models for gel strength. The UVE-SVM model demonstrated exceptional performance, with the highest R² values (Rc = 0.9786, Rp = 0.9688) and lowest error rates (RMSEC = 6.1340, RMSEP = 6.0283). Pattern recognition algorithms (PCA, LDA, and KNN) successfully classified gels based on ethanol treatment levels, achieving near-perfect accuracy. This integrated approach provided a multiscale perspective on ethanol-induced starch gel modification, from molecular interactions to macroscopic properties. Our findings demonstrate the potential of NIR spectroscopy, coupled with advanced data analysis, as a powerful tool for rapid, nondestructive quality assessment in starch gel production. This study contributes significantly to the understanding of starch modification processes and opens new avenues for research and industrial applications in food science, pharmaceuticals, and biomaterials.

Keywords: kudzu starch gel, near-infrared spectroscopy, gel strength prediction, support vector machine, pattern recognition algorithms, ethanol treatment

Procedia PDF Downloads 40
1274 Automatic Intelligent Analysis of Malware Behaviour

Authors: Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato

Abstract:

In this paper we describe the use of formal methods to model malware behaviour. The modelling of harmful behaviour rests upon syntactic structures that represent malicious procedures inside malware. The malicious activities are modelled by a formal grammar, where API calls’ components are the terminals and the set of API calls used in combination to achieve a goal are designated non-terminals. The combination of different non-terminals in various ways and tiers make up the attack vectors that are used by harmful software. Based on these syntactic structures a parser can be generated which takes execution traces as input for pattern recognition.

Keywords: malware behaviour, modelling, parsing, search, pattern matching

Procedia PDF Downloads 335
1273 The Perspective of British Politicians on English Identity: Qualitative Study of Parliamentary Debates, Blogs, and Interviews

Authors: Victoria Crynes

Abstract:

The question of England’s role in Britain is increasingly relevant due to the ongoing rise in citizens identifying as English. Furthermore, the Brexit Referendum was predominantly supported by constituents identifying as English. Few politicians appear to comprehend how Englishness is politically manifested. Politics and the media have depicted English identity as a negative and extremist problem - an inaccurate representation that ignores the breadth of English identifying citizens. This environment prompts the question, 'How are British Politicians Addressing the Modern English Identity Question?' Parliamentary debates, political blogs, and interviews are synthesized to establish a more coherent understanding of the current political attitudes towards English identity, the perceived nature of English identity, and the political manifestation of English representation and governance. Analyzed parliamentary debates addressed the democratic structure of English governance through topics such as English votes for English laws, devolution, and the union. The blogs examined include party-based, multi-author style blogs, and independently authored blogs by politicians, which provide a dynamic and up-to-date representation of party and politician viewpoints. Lastly, fourteen semi-structured interviews of British politicians provide a nuanced perspective on how politicians conceptualize Englishness. Interviewee selection was based on three criteria: (i) Members of Parliament (MP) known for discussing English identity politics, (ii) MPs of strongly English identifying constituencies, (iii) MPs with minimal English identity affiliation. Analysis of parliamentary debates reveals the discussion of English representation has gained little momentum. Many politicians fail to comprehend who the English are, why they desire greater representation and believe that increased recognition of the English would disrupt the unity of the UK. These debates highlight the disconnect of parliament from the disenfranchised English towns. A failure to recognize the legitimacy of English identity politics generates an inability for solution-focused debates to occur. Political blogs demonstrate cross-party recognition of growing English disenfranchisement. The dissatisfaction with British politics derives from multiple factors, including economic decline, shifting community structures, and the delay of Brexit. The left-behind communities have seen little response from Westminster, which is often contrasted to the devolved and louder voices of the other UK nations. Many blogs recognize the need for a political response to the English and lament the lack of party-level initiatives. In comparison, interviews depict an array of local-level initiatives reconnecting MPs to community members. Local efforts include town trips to Westminster, multi-cultural cooking classes, and English language courses. These efforts begin to rebuild positive, local narratives, promote engagement across community sectors, and acknowledge the English voices. These interviewees called for large-scale, political action. Meanwhile, several interviewees denied the saliency of English identity. For them, the term held only extremist narratives. The multi-level analysis reveals continued uncertainty on Englishness within British politics, contrasted with increased recognition of its saliency by politicians. It is paramount that politicians increase discussions on English identity politics to avoid increased alienation of English citizens and to rebuild trust in the abilities of Westminster.

Keywords: British politics, contemporary identity politics and its impacts, English identity, English nationalism, identity politics

Procedia PDF Downloads 115
1272 Subtitled Based-Approach for Learning Foreign Arabic Language

Authors: Elleuch Imen

Abstract:

In this paper, it propose a new approach for learning Arabic as a foreign language via audio-visual translation, particularly subtitling. The approach consists of developing video sequences appropriate to different levels of learning (from A1 to C2) containing conversations, quizzes, games and others. Each video aims to achieve a specific objective, such as the correct pronunciation of Arabic words, the correct syntactic structuring of Arabic sentences, the recognition of the morphological characteristics of terms and the semantic understanding of statements. The subtitled videos obtained can be incorporated into different Arabic second language learning tools such as Moocs, websites, platforms, etc.

Keywords: arabic foreign language, learning, audio-visuel translation, subtitled videos

Procedia PDF Downloads 61
1271 Futuristic Black Box Design Considerations and Global Networking for Real Time Monitoring of Flight Performance Parameters

Authors: K. Parandhama Gowd

Abstract:

The aim of this research paper is to conceptualize, discuss, analyze and propose alternate design methodologies for futuristic Black Box for flight safety. The proposal also includes global networking concepts for real time surveillance and monitoring of flight performance parameters including GPS parameters. It is expected that this proposal will serve as a failsafe real time diagnostic tool for accident investigation and location of debris in real time. In this paper, an attempt is made to improve the existing methods of flight data recording techniques and improve upon design considerations for futuristic FDR to overcome the trauma of not able to locate the block box. Since modern day communications and information technologies with large bandwidth are available coupled with faster computer processing techniques, the attempt made in this paper to develop a failsafe recording technique is feasible. Further data fusion/data warehousing technologies are available for exploitation.

Keywords: flight data recorder (FDR), black box, diagnostic tool, global networking, cockpit voice and data recorder (CVDR), air traffic control (ATC), air traffic, telemetry, tracking and control centers ATTTCC)

Procedia PDF Downloads 574
1270 Implementation of Real-Time Multiple Sound Source Localization and Separation

Authors: Jeng-Shin Sheu, Qi-Xun Zheng

Abstract:

This paper mainly discusses a method of separating speech when using a microphone array without knowing the number and direction of sound sources. In recent years, there have been many studies on the method of separating signals by using masking, but most of the separation methods must be operated under the condition of a known number of sound sources. Such methods cannot be used for real-time applications. In our method, this paper uses Circular-Integrated-Cross-Spectrum to estimate the statistical histogram distribution of the direction of arrival (DOA) to obtain the number of sound sources and sound in the mixed-signal Source direction. In calculating the relevant parameters of the ring integrated cross-spectrum, the phase (Phase of the Cross-Power Spectrum) and phase rotation factors (Phase Rotation Factors) calculated by the cross power spectrum of each microphone pair are used. In the part of separating speech, it uses the DOA weighting and shielding separation method to calculate the sound source direction (DOA) according to each T-F unit (time-frequency point). The weight corresponding to each T-F unit can be used to strengthen the intensity of each sound source from the T-F unit and reduce the influence of the remaining sound sources, thereby achieving voice separation.

Keywords: real-time, spectrum analysis, sound source localization, sound source separation

Procedia PDF Downloads 156
1269 Translation And Cultural Adaptation Of The Rivermead Behavioural Memory Test–3rd Edition Into the Arabic Language

Authors: Mai Alharthy, Agnes Shiel, Hynes Sinead

Abstract:

Objectives: The objectives of the study are to translate and culturally adapt the RBMT-3 to be appropriate for use within an Arabic-speaking population and to achieve maximum equivalency between the translated and original versions and to evaluate the psychometric properties of the Arabic version of the RBMT-3. Participants' numbers are 16 (10 females and 6 males). All participants are bilingual speakers of Arabic and English, above 18 years old and with no current nor past memory impairment. Methods: The study was conducted in two stages: Translation and cultural adaptation stage: Forward and backward translations were completed by professional translators. Five out of the 14 RBMT-3 subtests required cultural adaptations. Half of the faces in the face recognition subtests were replaced with Arabic faces by a professional photographer. Pictures that are irrelevant to the Arabic culture in the picture recognition subtests were replaced. Names, story and orientations subtests were also adapted to suit the Arabic culture. An expert committee was formed to compare the translated and original versions and to advise on further changes required for test materials. Validation of the Arabic RBMT-3- pilot: 16 Participants were tested on version 1 of the English version and the two versions of the Arabic RBMT-3 ( counterbalanced ). The assessment period was 6 weeks long, with two weeks gap between tests. All assessments took place in a quiet room in the National University of Ireland Galway. Two qualified occupational therapists completed the assessments. Results: Wilcox signed-rank test was used to compare between subtest scores. Significant differences were found in the story, orientation and names subtests between the English and Arabic versions. No significant differences were found in subtests from both Arabic versions except for the story subtest. Conclusion: The story and orientation subtests should be revised by the expert committee members to make further adaptations. The rest of the Arabic RBMT-3 subtests are equivalent to the subtests of the English version. The psychometric properties of the Arabic RBMT-3 will be investigated in a larger Arabic-speaking sample in Saudi Arabia. The outcome of this research is to provide clinicians and researchers with a reliable tool to assess memory problems in Arabic speaking population.

Keywords: memory impairment, neuropsychological assessment, cultural adaptation, cognitive assessment

Procedia PDF Downloads 256
1268 Emulation Model in Architectural Education

Authors: Ö. Şenyiğit, A. Çolak

Abstract:

It is of great importance for an architectural student to know the parameters through which he/she can conduct his/her design and makes his/her design effective in architectural education. Therefore; an empirical application study was carried out through the designing activity using the emulation model to support the design and design approaches of architectural students. During the investigation period, studies were done on the basic design elements and principles of the fall semester, and the emulation model, one of the designing methods that constitute the subject of the study, was fictionalized as three phased “recognition-interpretation-application”. As a result of the study, it was observed that when students were given a key method during the design process, their awareness increased and their aspects improved as well.

Keywords: basic design, design education, design methods, emulation

Procedia PDF Downloads 236
1267 Non-Mammalian Pattern Recognition Receptor from Rock Bream (Oplegnathus fasciatus): Genomic Characterization and Transcriptional Profile upon Bacterial and Viral Inductions

Authors: Thanthrige Thiunuwan Priyathilaka, Don Anushka Sandaruwan Elvitigala, Bong-Soo Lim, Hyung-Bok Jeong, Jehee Lee

Abstract:

Toll like receptors (TLRs) are a phylogeneticaly conserved family of pattern recognition receptors, which participates in the host immune responses against various pathogens and pathogen derived mitogen. TLR21, a non-mammalian type, is almost restricted to the fish species even though those can be identified rarely in avians and amphibians. Herein, this study was carried out to identify and characterize TLR21 from rock bream (Oplegnathus fasciatus) designated as RbTLR21, at transcriptional and genomic level. In this study, the full length cDNA and genomic sequence of RbTLR21 was identified using previously constructed cDNA sequence database and BAC library, respectively. Identified RbTLR21 sequence was characterized using several bioinformatics tools. The quantitative real time PCR (qPCR) experiment was conducted to determine tissue specific expressional distribution of RbTLR21. Further, transcriptional modulation of RbTLR21 upon the stimulation with Streptococcus iniae (S. iniae), rock bream iridovirus (RBIV) and Edwardsiella tarda (E. tarda) was analyzed in spleen tissues. The complete coding sequence of RbTLR21 was 2919 bp in length which can encode a protein consisting of 973 amino acid residues with molecular mass of 112 kDa and theoretical isoelectric point of 8.6. The anticipated protein sequence resembled a typical TLR domain architecture including C-terminal ectodomain with 16 leucine rich repeats, a transmembrane domain, cytoplasmic TIR domain and signal peptide with 23 amino acid residues. Moreover, protein folding pattern prediction of RbTLR21 exhibited well-structured and folded ectodomain, transmembrane domain and cytoplasmc TIR domain. According to the pair wise sequence analysis data, RbTLR21 showed closest homology with orange-spotted grouper (Epinephelus coioides) TLR21with 76.9% amino acid identity. Furthermore, our phylogenetic analysis revealed that RbTLR21 shows a close evolutionary relationship with its ortholog from Danio rerio. Genomic structure of RbTLR21 consisted of single exon similar to its ortholog of zebra fish. Sevaral putative transcription factor binding sites were also identified in 5ʹ flanking region of RbTLR21. The RBTLR 21 was ubiquitously expressed in all the tissues we tested. Relatively, high expression levels were found in spleen, liver and blood tissues. Upon induction with rock bream iridovirus, RbTLR21 expression was upregulated at the early phase of post induction period even though RbTLR21 expression level was fluctuated at the latter phase of post induction period. Post Edwardsiella tarda injection, RbTLR transcripts were upregulated throughout the experiment. Similarly, Streptococcus iniae induction exhibited significant upregulations of RbTLR21 mRNA expression in the spleen tissues. Collectively, our findings suggest that RbTLR21 is indeed a homolog of TLR21 family members and RbTLR21 may be involved in host immune responses against bacterial and DNA viral infections.

Keywords: rock bream, toll like receptor 21 (TLR21), pattern recognition receptor, genomic characterization

Procedia PDF Downloads 543
1266 19th Century Exam, 21st Century Policing: An Examination of the New York State Civil Service and Police Officer Recruitment Efforts

Authors: A. Edwards

Abstract:

The civil service was created to reform the hiring process for public officials, changing the patronage system to a merit-based system. Though exam reforms continued throughout the 20th century, there have been few during the 21st century, particularly in New York state. In the case of police departments, the civil service exam has acted as a hindrance to its ‘21st Century Policing’ goals and new exam reform efforts have left out officers voices and concerns. Through in-depth interviews of current and retired police officers and local and state civil service administrators in Albany County in New York, this study seeks to understand police influence and insight regarding the civil service exam, placing some of the voice and input for civil service reform on police departments, instead of local and state bureaucrats. The study also looks at the relationship between civil service administrators and police departments. Using practice theory, the study seeks to understand the ways in which the civil service exam was defined in the 20th century and how it is out of step with current thinking while examining possible changes to the civil service exam that would lead to a more equitable hiring process and successful police departments.

Keywords: civil service, hiring, merit, policing

Procedia PDF Downloads 205
1265 Mother Tounge Based Multilingual Education Policy: Voices of Two Cities, 'The Voice of Laguna'

Authors: Cecilia Velasco, Q.

Abstract:

This study was undertaken to find out the perceived efficiency, appropriateness effectiveness, acceptability and relevance, if at all such exist, of the Mother Tongue Based Multilingual Education Policy under the K-12 Curriculum, as seen by the stakeholders who are directly affected by this policy. The researcher believed that it is right and fitting to get the views and opinions of the people directly involved and/or concerned about this education policy. The results of the study will hopefully guide lawmakers and/or policymakers to fine-tune educational policy or policies. The locale of the study was the DepEd schools in Laguna, (San Pablo City and other nearby cities). The subjects of the study were the teachers (first phase) from the public schools of Department of Education (San Pablo City), in particular and parents (second phase) from nearby cities who are the direct stakeholders of this Policy. To determine the perception of the teachers toward Mother Tongue Based Multilingual Education Policy; its acceptability, efficiency, appropriateness, effectiveness and relevance, factor analysis was used to refine the instrument (questionnaire). To find out the significant difference between the perceptions of the primary and intermediate group of teachers, including those who teach mother tongue and non-mother tongue subjects, t-test of difference between means was employed.

Keywords: DepEd, K12 curriculum, MTBMLE, stakeholders

Procedia PDF Downloads 301
1264 Life-Narratives and Human Rights: Reflections about the Women's Rights and State of Exception

Authors: Luana Mathias Souto

Abstract:

The situation about women’s rights it’s a sensitive issue when it’s talking about human rights. More difficult its find a way to protect these rights. Aware of this problem, this article aims to analyze the women’s rights in the Brazilian context, mainly, the reproductive rights. So, to achieve this purpose, this paper through the combination of Law, philosophy, and Literature tries to rethinking why women can’t have a voice when the decisions about their rights are taken. Methodologically, it was used as an interdisciplinary bibliographical revision between Law, philosophy, and Literature. From Literature it brings the contributions from the life-narratives as an instrument to promote human rights. Besides the life-narratives theory, it’s also used the novel The Handmaid’s tale from Margaret Atwood, which became a symbol to reflect about reproductive rights. From philosophy, it’s adopted the concepts of Homo sacer and state of exception developed by the philosopher Giorgio Agamben. The contributions of these different researches fields made possible to conclude that women are Homo sacer because governments ignore their voices and opinions when they talk about abortion. The control of the human body, mainly, women bodies it’s more important than preserving some fundamental rights and because of this, it’s so difficult to preserve and promote the human rights. Based on these conclusions, it is understood that when the state is incapable or does not want to guarantee the adequate protection of human rights, it is up to society through its various means to find ways to protect them, and this is the main proposal sought by this article.

Keywords: dystopian fiction, human rights, life-narratives, state of exception

Procedia PDF Downloads 209
1263 When Women Take the Lead: Exploring the Intersection Between Gender Equality and Women’s Environmental Political Engagement from a Comparative Perspective

Authors: Summer Isaacson

Abstract:

Research on gender differences in environmental behavior has long claimed that women engage less than men in environmental political participation (EPP) (protests, petitions), despite their higher levels of environmental concern and vulnerability. Using recent data from the ISSP’s 2020 Environment module including 28 countries, we revisit the gender gap in EPP. Arguing that increasing gender equality and socio-economic development can allow women to voice their environmental grievances, we use multi-level models to examine the effects of macro-level gender equality on gender differences in environmental protests, petitions, and boycotts. By distinguishing individual from collective and non-confrontational from confrontational engagement forms, this study offers an encompassing understanding of gendered patterns of participation. Women do participate more than men, but mainly in individual and non-confrontational EPP forms (petitions, boycotts) and with substantial variation across countries. Moreover, considering how women have historically been restrained from participating in politics, we argue that structural gender inequality remains an important limitation to women’s engagement. Cross-level interactions indicate that in more egalitarian countries, women are more likely to engage in several types of EPP than men. The study offers new perspectives and findings on gender differences in EPP, highlighting the impact of gender inequality on women’s participation.

Keywords: environmental activism, political participation, gender equality, pro-environmental behavior

Procedia PDF Downloads 64
1262 Children in Opera: Sociological and Musicological Trends

Authors: Andrew Sutherland

Abstract:

In many ways, opera is not a natural domain for children. It is hardly surprising that from the thousands of works, comparatively few include roles for children. There are several possibilities for this, the dramatic themes in opera are often about the human condition from the adult perspective; the need for developed voices to project in large, theatrical spaces underpinned by orchestral accompaniment does not naturally suit the child’s voice, and enabling children to cope with long runs of performances on top of their education requires vocal and physical stamina. In more recent times, the involvement of children contributes another layer of difficulty in terms of having access to young singers while adhering to laws that protect their working rights. Despite these points, children have been in opera since its inception in a variety of ways, but their contribution is often undervalued or ignored by musicologists and even the industry itself. In this paper, the phenomenon of children in opera from the late 16th century to the present day is explored through empirical, socio-musicological observations with reference to score analysis. Conclusions are drawn regarding the changing attitudes of composers when scoring for children’s voices in relation to societal developments. From the use of ‘kindertruppen’ in the pre-enlightenment period to Handel’s virtuosic writing for William Savage, to the darkness of the inter-war eras which saw a proliferation of operatic characters for children and the post-war era which saw children as the new frontier of building audiences for opera, the links between changes in society and the inclusion, portrayal and scoring for children in opera are largely congruent.

Keywords: children, musical analysis, opera, sociology

Procedia PDF Downloads 112
1261 Intelligent Prediction System for Diagnosis of Heart Attack

Authors: Oluwaponmile David Alao

Abstract:

Due to an increase in the death rate as a result of heart attack. There is need to develop a system that can be useful in the diagnosis of the disease at the medical centre. This system will help in preventing misdiagnosis that may occur from the medical practitioner or the physicians. In this research work, heart disease dataset obtained from UCI repository has been used to develop an intelligent prediction diagnosis system. The system is modeled on a feedforwad neural network and trained with back propagation neural network. A recognition rate of 86% is obtained from the testing of the network.

Keywords: heart disease, artificial neural network, diagnosis, prediction system

Procedia PDF Downloads 450
1260 Designing and Implementation of MPLS Based VPN

Authors: Muhammad Kamran Asif

Abstract:

MPLS stands for Multi-Protocol Label Switching. It is the technology which replaces ATM (Asynchronous Transfer Mode) and frame relay. In this paper, we have designed a full fledge small scale MPLS based service provider network core network model, which provides communication services (e.g. voice, video and data) to the customer more efficiently using label switching technique. Using MPLS VPN provides security to the customers which are either on LAN or WAN. It protects its single customer sites from being attacked by any intruder from outside world along with the provision of concept of extension of a private network over an internet. In this paper, we tried to implement a service provider network using minimum available resources i.e. five 3800 series CISCO routers comprises of service provider core, provider edge routers and customer edge routers. The customers on the one end of the network (customer side) is capable of sending any kind of data to the customers at the other end using service provider cloud which is MPLS VPN enabled. We have also done simulation and emulation for the model using GNS3 (Graphical Network Simulator-3) and achieved the real time scenarios. We have also deployed a NMS system which monitors our service provider cloud and generates alarm in case of any intrusion or malfunctioning in the network. Moreover, we have also provided a video help desk facility between customers and service provider cloud to resolve the network issues more effectively.

Keywords: MPLS, VPN, NMS, ATM, asynchronous transfer mode

Procedia PDF Downloads 331
1259 Understanding Music through the Framework of Feminist Confessional Literary Criticism: Heightening Audience Identification and Prioritising the Female Voice

Authors: Katharine Pollock

Abstract:

Feminist scholars assert that a defining aspect of feminist confessional literature is that it expresses both an individual and communal identity, one which is predicated on the commonly-shared aspects of female experience. Reading feminist confessional literature in this way accommodates a plurality of readerly experiences and textual interpretations. It affirms the individual whilst acknowledging those experiences which bind women together, and refuses traditional objective criticism. It invites readers to see themselves reflected in the text, and encourages them to share their own stories. Similarly, music which communicates women’s personal experience, fictive or not, expresses a dual identity. There is an inherent risk of imposing a confessional reading upon a musical or literary text. Understanding music as being multivocal in the same way as confessional literature negates this patriarchal tendency, and allows listeners to engage with both the subjective and collective aspects of a text. By hearing their own stories reflected in the music, listeners engage in an ongoing dialogic process in which female stories are prioritised. This refuses patriarchal silencing and ensures a diversity of female voices. To demonstrate the veracity of these claims, literary criticism is applied to Lily Allen’s music, and memoir My Thoughts Exactly.

Keywords: confession, female, feminist, literature, music

Procedia PDF Downloads 155
1258 An Ethnographic Study on How Namibian Sex Workers Experience Their Violation of Rights

Authors: Tessa Verhallen, Mama Africa

Abstract:

By co-constructing personal narratives of sex workers in Namibia this paper represents how sex workers experience their violation of rights in Namibia. It is written from an emic (as an advisor for a sex worker-led organization named Rights not Rescue Trust) and an etic (as an ethnographer) point of view, in collaboration with the staff of the organization Rights not Rescue Trust. This organization represents circa 3000 members. The paper describes the current deplorable situation of sex workers in Namibia, encompassing the stigma and discrimination they face, their struggle to have their work decriminalized and their urge to advocate for human rights and the end of violations. Based on a triangular research design (ethnography, narratives, literature study, human rights’ training and counseling sessions) the authors show that sex workers, particularly LGBTI sex workers, are extremely vulnerable to emotional, physical, and sexual violence in Namibia. The main perpetrators of violence turn out to be not only clients and intimate partners but also law enforcement officers and health care workers who are supposed to protect and support sex workers. The sex workers’ narratives voice their disgraceful circumstances regarding how their rights are violated. It also highlights their importance to fight for their rights and access to health care, legal services and education in order to improve the sexual reproductive health of sex workers.

Keywords: HIV/aids, LGBTI, methodological innovative, sex work

Procedia PDF Downloads 312
1257 Enhancing Tower Crane Safety: A UAV-based Intelligent Inspection Approach

Authors: Xin Jiao, Xin Zhang, Jian Fan, Zhenwei Cai, Yiming Xu

Abstract:

Tower cranes play a crucial role in the construction industry, facilitating the vertical and horizontal movement of materials and aiding in building construction, especially for high-rise structures. However, tower crane accidents can lead to severe consequences, highlighting the importance of effective safety management and inspection. This paper presents an innovative approach to tower crane inspection utilizing Unmanned Aerial Vehicles (UAVs) and an Intelligent Inspection APP System. The system leverages UAVs equipped with high-definition cameras to conduct efficient and comprehensive inspections, reducing manual labor, inspection time, and risk. By integrating advanced technologies such as Real-Time Kinematic (RTK) positioning and digital image processing, the system enables precise route planning and collection of safety hazards images. A case study conducted on a construction site demonstrates the practicality and effectiveness of the proposed method, showcasing its potential to enhance tower crane safety. On-site testing of UAV intelligent inspections reveals key findings: efficient tower crane hazard inspection within 30 minutes, with a full-identification capability coverage rates of 76.3%, 64.8%, and 76.2% for major, significant, and general hazards respectively and a preliminary-identification capability coverage rates of 18.5%, 27.2%, and 19%, respectively. Notably, UAVs effectively identify various tower crane hazards, except for those requiring auditory detection. The limitations of this study primarily involve two aspects: Firstly, during the initial inspection, manual drone piloting is required for marking tower crane points, followed by automated flight inspections and reuse based on the marked route. Secondly, images captured by the drone necessitate manual identification and review, which can be time-consuming for equipment management personnel, particularly when dealing with a large volume of images. Subsequent research efforts will focus on AI training and recognition of safety hazard images, as well as the automatic generation of inspection reports and corrective management based on recognition results. The ongoing development in this area is currently in progress, and outcomes will be released at an appropriate time.

Keywords: tower crane, inspection, unmanned aerial vehicle (UAV), intelligent inspection app system, safety management

Procedia PDF Downloads 44
1256 Design and Implementation of Generative Models for Odor Classification Using Electronic Nose

Authors: Kumar Shashvat, Amol P. Bhondekar

Abstract:

In the midst of the five senses, odor is the most reminiscent and least understood. Odor testing has been mysterious and odor data fabled to most practitioners. The delinquent of recognition and classification of odor is important to achieve. The facility to smell and predict whether the artifact is of further use or it has become undesirable for consumption; the imitation of this problem hooked on a model is of consideration. The general industrial standard for this classification is color based anyhow; odor can be improved classifier than color based classification and if incorporated in machine will be awfully constructive. For cataloging of odor for peas, trees and cashews various discriminative approaches have been used Discriminative approaches offer good prognostic performance and have been widely used in many applications but are incapable to make effectual use of the unlabeled information. In such scenarios, generative approaches have better applicability, as they are able to knob glitches, such as in set-ups where variability in the series of possible input vectors is enormous. Generative models are integrated in machine learning for either modeling data directly or as a transitional step to form an indeterminate probability density function. The algorithms or models Linear Discriminant Analysis and Naive Bayes Classifier have been used for classification of the odor of cashews. Linear Discriminant Analysis is a method used in data classification, pattern recognition, and machine learning to discover a linear combination of features that typifies or divides two or more classes of objects or procedures. The Naive Bayes algorithm is a classification approach base on Bayes rule and a set of qualified independence theory. Naive Bayes classifiers are highly scalable, requiring a number of restraints linear in the number of variables (features/predictors) in a learning predicament. The main recompenses of using the generative models are generally a Generative Models make stronger assumptions about the data, specifically, about the distribution of predictors given the response variables. The Electronic instrument which is used for artificial odor sensing and classification is an electronic nose. This device is designed to imitate the anthropological sense of odor by providing an analysis of individual chemicals or chemical mixtures. The experimental results have been evaluated in the form of the performance measures i.e. are accuracy, precision and recall. The investigational results have proven that the overall performance of the Linear Discriminant Analysis was better in assessment to the Naive Bayes Classifier on cashew dataset.

Keywords: odor classification, generative models, naive bayes, linear discriminant analysis

Procedia PDF Downloads 390
1255 Social Technology and Youth Justice: An Exploration of Ethical and Practical Challenges

Authors: Ravinder Barn, Balbir Barn

Abstract:

This paper outlines ethical and practical challenges in the building of social technology for use with socially excluded and marginalised groups. The primary aim of this study was to design, deploy and evaluate social technology that may help to promote better engagement between case workers and young people to help prevent recidivism, and support young people’s transition towards social inclusion in society. A total of 107 practitioners/managers (n=64), and young people (n=43) contributed to the data collection via surveys, focus groups and 1-1 interviews. Through a process of co-design where end-users are involved as key contributors to social technological design, this paper seeks to make an important contribution to the area of participatory methodologies by arguing that whilst giving ‘voice’ to key stakeholders in the research process is crucial, there is a risk that competing voices may lead to tensions and unintended outcomes. The paper is contextualized within a Foucauldian perspective to examine significant concepts including power, authority and surveillance. Implications for youth justice policy and practice are considered. The authors conclude that marginalized youth and over-stretched practitioners are better served when such social technology is perceived and adopted as a tool of empowerment within a framework of child welfare and child rights.

Keywords: youth justice, social technology, marginalization, participatory research, power

Procedia PDF Downloads 449
1254 Detection and Tracking Approach Using an Automotive Radar to Increase Active Pedestrian Safety

Authors: Michael Heuer, Ayoub Al-Hamadi, Alexander Rain, Marc-Michael Meinecke

Abstract:

Vulnerable road users, e.g. pedestrians, have a high impact on fatal accident numbers. To reduce these statistics, car manufactures are intensively developing suitable safety systems. Hereby, fast and reliable environment recognition is a major challenge. In this paper we describe a tracking approach that is only based on a 24 GHz radar sensor. While common radar signal processing loses much information, we make use of a track-before-detect filter to incorporate raw measurements. It is explained how the Range-Doppler spectrum can help to indicated pedestrians and stabilize tracking even in occultation scenarios compared to sensors in series.

Keywords: radar, pedestrian detection, active safety, sensor

Procedia PDF Downloads 531
1253 Hydraulic Performance of Curtain Wall Breakwaters Based on Improved Moving Particle Semi-Implicit Method

Authors: Iddy Iddy, Qin Jiang, Changkuan Zhang

Abstract:

This paper addresses the hydraulic performance of curtain wall breakwaters as a coastal structure protection based on the particles method modelling. The hydraulic functions of curtain wall as wave barriers by reflecting large parts of incident waves through the vertical wall, a part transmitted and a particular part was dissipating the wave energies through the eddy flows formed beneath the lower end of the plate. As a Lagrangian particle, the Moving Particle Semi-implicit (MPS) method which has a robust capability for numerical representation has proven useful for design of structures application that concern free-surface hydrodynamic flow, such as wave breaking and overtopping. In this study, a vertical two-dimensional numerical model for the simulation of violent flow associated with the interaction between the curtain-wall breakwaters and progressive water waves is developed by MPS method in which a higher precision pressure gradient model and free surface particle recognition model were proposed. The wave transmission, reflection, and energy dissipation of the vertical wall were experimentally and theoretically examined. With the numerical wave flume by particle method, very detailed velocity and pressure fields around the curtain-walls under the action of waves can be computed in each calculation steps, and the effect of different wave and structural parameters on the hydrodynamic characteristics was investigated. Also, the simulated results of temporal profiles and distributions of velocity and pressure in the vicinity of curtain-wall breakwaters are compared with the experimental data. Herein, the numerical investigation of hydraulic performance of curtain wall breakwaters indicated that the incident wave is largely reflected from the structure, while the large eddies or turbulent flows occur beneath the curtain-wall resulting in big energy losses. The improved MPS method shows a good agreement between numerical results and analytical/experimental data which are compared to related researches. It is thus verified that the improved pressure gradient model and free surface particle recognition methods are useful for enhancement of stability and accuracy of MPS model for water waves and marine structures. Therefore, it is possible for particle method (MPS method) to achieve an appropriate level of correctness to be applied in engineering fields through further study.

Keywords: curtain wall breakwaters, free surface flow, hydraulic performance, improved MPS method

Procedia PDF Downloads 149
1252 EEG Diagnosis Based on Phase Space with Wavelet Transforms for Epilepsy Detection

Authors: Mohmmad A. Obeidat, Amjed Al Fahoum, Ayman M. Mansour

Abstract:

The recognition of an abnormal activity of the brain functionality is a vital issue. To determine the type of the abnormal activity either a brain image or brain signal are usually considered. Imaging localizes the defect within the brain area and relates this area with somebody functionalities. However, some functions may be disturbed without affecting the brain as in epilepsy. In this case, imaging may not provide the symptoms of the problem. A cheaper yet efficient approach that can be utilized to detect abnormal activity is the measurement and analysis of the electroencephalogram (EEG) signals. The main goal of this work is to come up with a new method to facilitate the classification of the abnormal and disorder activities within the brain directly using EEG signal processing, which makes it possible to be applied in an on-line monitoring system.

Keywords: EEG, wavelet, epilepsy, detection

Procedia PDF Downloads 538
1251 Researching and Interpreting Art: Analyzing Whose Voice Matters

Authors: Donna L. Roberts

Abstract:

Beyond the fundamental question of what is (and what isn’t) art, one then moves to the question of what about art, or a specific artwork, matters. If there is an agreement that something is art, the next step is to answer the obvious, ‘So what? What does it mean?’ In answering these questions, one must decide how to focus the proverbial microscope –i.e., what level of perspective is relevant as a point of view for this analysis- the artwork itself, the artist’s intention, the viewer’s interpretation, the artwork’s reflection of the larger artistic movement, the social, political, and historical context of art? One must determine what product and what contexts are meaningful when experiencing and interpreting art. Is beauty really in the eye of the beholder? Or is it more important what the creator was trying to say than what the critic or observer heard? The fact that so many artists –from Rembrandt to Van Gogh to Picasso- include among their works at least one self-portrait seems to scream their point –I matter. But, Is a piece more impactful because of the persona behind it? Or does that persona impose limits and close one’s mind to the possibilities of interpretation? In the popular art text visual culture, Richard Howells argues against a biographical focus on the artist in the analysis of art. Similarly, abstract expressionist Mark Rothko, along with several of his contemporaries of the genre, often did not title his paintings for the express purpose of not imposing a specific meaning or interpretation on the piece. And yet, he once said, ‘The people who weep before my pictures are having the same religious experience I had when I painted them,’ thus alluding to a desire for a shared connection and revelation. This research analyzes the arguments for differing levels of interpretation and points of view when considering a work of art and/or the artist who created it.

Keywords: art analysis, art interpretation, art theory, artistic perspective

Procedia PDF Downloads 150
1250 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 239