Search results for: inherent feature
1252 Occurrence of Foreign Matter in Food: Applied Identification Method - Association of Official Agricultural Chemists (AOAC) and Food and Drug Administration (FDA)
Authors: E. C. Mattos, V. S. M. G. Daros, R. Dal Col, A. L. Nascimento
Abstract:
The aim of this study is to present the results of a retrospective survey on the foreign matter found in foods analyzed at the Adolfo Lutz Institute, from July 2001 to July 2015. All the analyses were conducted according to the official methods described on Association of Official Agricultural Chemists (AOAC) for the micro analytical procedures and Food and Drug Administration (FDA) for the macro analytical procedures. The results showed flours, cereals and derivatives such as baking and pasta products were the types of food where foreign matters were found more frequently followed by condiments and teas. Fragments of stored grains insects, its larvae, nets, excrement, dead mites and rodent excrement were the most foreign matter found in food. Besides, foreign matters that can cause a physical risk to the consumer’s health such as metal, stones, glass, wood were found but rarely. Miscellaneous (shell, sand, dirt and seeds) were also reported. There are a lot of extraneous materials that are considered unavoidable since are something inherent to the product itself, such as insect fragments in grains. In contrast, there are avoidable extraneous materials that are less tolerated because it is preventable with the Good Manufacturing Practice. The conclusion of this work is that although most extraneous materials found in food are considered unavoidable it is necessary to keep the Good Manufacturing Practice throughout the food processing as well as maintaining a constant surveillance of the production process in order to avoid accidents that may lead to occurrence of these extraneous materials in food.Keywords: extraneous materials, food contamination, foreign matter, surveillance
Procedia PDF Downloads 3591251 Local Image Features Emerging from Brain Inspired Multi-Layer Neural Network
Authors: Hui Wei, Zheng Dong
Abstract:
Object recognition has long been a challenging task in computer vision. Yet the human brain, with the ability to rapidly and accurately recognize visual stimuli, manages this task effortlessly. In the past decades, advances in neuroscience have revealed some neural mechanisms underlying visual processing. In this paper, we present a novel model inspired by the visual pathway in primate brains. This multi-layer neural network model imitates the hierarchical convergent processing mechanism in the visual pathway. We show that local image features generated by this model exhibit robust discrimination and even better generalization ability compared with some existing image descriptors. We also demonstrate the application of this model in an object recognition task on image data sets. The result provides strong support for the potential of this model.Keywords: biological model, feature extraction, multi-layer neural network, object recognition
Procedia PDF Downloads 5421250 Talent-Priority: Exploring the Human Resource Reengineering Model in Digital Transformation of a Benchmark Company
Authors: Hsiu Hua Hu
Abstract:
Digital transformation has widely affected various industries. It provides technological innovation, process redesign, new business model construction, and talent value creation. This transformation not only allows organizations to obtain and deploy specific technologies and methods suitable for organizational reengineering but also is an important way to solve management problems in human resource (HR) reengineering, business efficiency, and process redesign. In this study, we present the results of a qualitative study that offers insight into a series of key feature of reengineering related to the digital transformation and how to create talent value when the companies successfully perform digital transformation and human resource reengineering, which is led by business digitalization strategies including talent planning, talent acquisition, talent adjustment, and talent development. Drawing from the qualitative investigation findings, we built an inductive model of HR reengineering, which aims to provide research and practical references on future digital transformation and management inquiry.Keywords: talent value creation, digital transformation, HR reengineering, qualitative study
Procedia PDF Downloads 1561249 Interpretation and Clustering Framework for Analyzing ECG Survey Data
Authors: Irum Matloob, Shoab Ahmad Khan, Fahim Arif
Abstract:
As Indo-Pak has been the victim of heart diseases since many decades. Many surveys showed that percentage of cardiac patients is increasing in Pakistan day by day, and special attention is needed to pay on this issue. The framework is proposed for performing detailed analysis of ECG survey data which is conducted for measuring prevalence of heart diseases statistics in Pakistan. The ECG survey data is evaluated or filtered by using automated Minnesota codes and only those ECGs are used for further analysis which is fulfilling the standardized conditions mentioned in the Minnesota codes. Then feature selection is performed by applying proposed algorithm based on discernibility matrix, for selecting relevant features from the database. Clustering is performed for exposing natural clusters from the ECG survey data by applying spectral clustering algorithm using fuzzy c means algorithm. The hidden patterns and interesting relationships which have been exposed after this analysis are useful for further detailed analysis and for many other multiple purposes.Keywords: arrhythmias, centroids, ECG, clustering, discernibility matrix
Procedia PDF Downloads 4691248 Development of a Low-Cost Smart Insole for Gait Analysis
Authors: S. M. Khairul Halim, Mojtaba Ghodsi, Morteza Mohammadzaheri
Abstract:
Gait analysis is essential for diagnosing musculoskeletal and neurological conditions. However, current methods are often complex and expensive. This paper introduces a methodology for analysing gait parameters using a smart insole with a built-in accelerometer. The system measures stance time, swing time, step count, and cadence and wirelessly transmits data to a user-friendly IoT dashboard for centralized processing. This setup enables remote monitoring and advanced data analytics, making it a versatile tool for medical diagnostics and everyday usage. Integration with IoT enhances the portability and connectivity of the device, allowing for secure, encrypted data access over the Internet. This feature supports telemedicine and enables personalized treatment plans tailored to individual needs. Overall, the approach provides a cost-effective (almost 25 GBP), accurate, and user-friendly solution for gait analysis, facilitating remote tracking and customized therapy.Keywords: gait analysis, IoT, smart insole, accelerometer sensor
Procedia PDF Downloads 171247 Reliable Soup: Reliable-Driven Model Weight Fusion on Ultrasound Imaging Classification
Authors: Shuge Lei, Haonan Hu, Dasheng Sun, Huabin Zhang, Kehong Yuan, Jian Dai, Yan Tong
Abstract:
It remains challenging to measure reliability from classification results from different machine learning models. This paper proposes a reliable soup optimization algorithm based on the model weight fusion algorithm Model Soup, aiming to improve reliability by using dual-channel reliability as the objective function to fuse a series of weights in the breast ultrasound classification models. Experimental results on breast ultrasound clinical datasets demonstrate that reliable soup significantly enhances the reliability of breast ultrasound image classification tasks. The effectiveness of the proposed approach was verified via multicenter trials. The results from five centers indicate that the reliability optimization algorithm can enhance the reliability of the breast ultrasound image classification model and exhibit low multicenter correlation.Keywords: breast ultrasound image classification, feature attribution, reliability assessment, reliability optimization
Procedia PDF Downloads 851246 I Feel Pretty: Using Discretization to Unpack Gender Disparity in Musical Theatre - A Study of Leonard Bernstein’s West Side Story
Authors: Erin McKellar, Narelle Yeo
Abstract:
Gender disparity can be found in the representation of the female characters in Leonard Bernstein’s musical West Side Story. As a postmodern composer, Bernstein was open about his social activism, yet did not consider his compositional portrayal of female characters as part of that activism. Using discretization as an analysis tool, this thesis explores the melodic contours of male and female songs in West Side Story to show differences in complexity between male and female characterisation. The analysis explores the intervallic relationship between the vocal line and melodic color in relation to the accompaniment harmony, taking into consideration the use of consonance and dissonance. West Side Story is commonly known for its distinct use of the tritone motif and its inherent dissonance. It is evident when reviewing the findings of this study that there is a distinct disparity between male-led and female-led music. The male-led numbers consistently adhere to a dissonant aesthetic with the tritone motif implemented in all of the extracted songs. By contrast, the female songs remain consonant with simple intervallic movements. By examining the results of this study through the lens of Equality Feminism, this thesis finds that Bernstein has simplified the characterisations of the female leads. The thesis further proposes that without cognisant consideration of the compositional portrayal of women, the musical theatre will continue to reinforce gender stereotypes, as evident through this study of Bernstein’s West Side Story.Keywords: music theatre, gender bias, composition, Leonard Bernstein
Procedia PDF Downloads 1611245 Reliability Based Analysis of Multi-Lane Reinforced Concrete Slab Bridges
Authors: Ali Mahmoud, Shadi Najjar, Mounir Mabsout, Kassim Tarhini
Abstract:
Empirical expressions for estimating the wheel load distribution and live-load bending moment are typically specified in highway bridge codes such as the AASHTO procedures. The purpose of this paper is to analyze the reliability levels that are inherent in reinforced concrete slab bridges that are designed based on the simplified empirical live load equations in the AASHTO LRFD procedures. To achieve this objective, bridges with multi-lanes (three and four lanes) and different spans are modeled using finite-element analysis (FEA) subjected to HS20 truck loading, tandem loading, and standard lane loading per AASHTO LRFD procedures. The FEA results are compared with the AASHTO LRFD moments in order to quantify the biases that might result from the simplifying assumptions adopted in AASHTO. A reliability analysis is conducted to quantify the reliability index for bridges designed using AASHTO procedures. To reach a consistent level of safety for three- and four-lane bridges, following a previous study restricted to one- and two-lane bridges, the live load factor in the design equation proposed by AASHTO LRFD will be assessed and revised if needed by alternating the live load factor for these lanes. The results will provide structural engineers with more consistent provisions to design concrete slab bridges or evaluate the load-carrying capacity of existing bridges.Keywords: reliability analysis of concrete bridges, finite element modeling, reliability analysis, reinforced concrete bridge design, load carrying capacity
Procedia PDF Downloads 3401244 Harmonic Distortion Analysis in Low Voltage Grid with Grid-Connected Photovoltaic
Authors: Hedi Dghim, Ahmed El-Naggar, Istvan Erlich
Abstract:
Power electronic converters are being introduced in low voltage (LV) grids at an increasingly rapid rate due to the growing adoption of power electronic-based home appliances in residential grid. Photovoltaic (PV) systems are considered one of the potential installed renewable energy sources in distribution power systems. This trend has led to high distortion in the supply voltage which consequently produces harmonic currents in the network and causes an inherent voltage unbalance. In order to investigate the effect of harmonic distortions, a case study of a typical LV grid configuration with high penetration of 3-phase and 1-phase rooftop mounted PV from southern Germany was first considered. Electromagnetic transient (EMT) simulations were then carried out under the MATLAB/Simulink environment which contain detailed models for power electronic-based loads, ohmic-based loads as well as 1- and 3-phase PV. Note that, the switching patterns of the power electronic circuits were considered in this study. Measurements were eventually performed to analyze the distortion levels when PV operating under different solar irradiance. The characteristics of the load-side harmonic impedances were analyzed, and their harmonic contributions were evaluated for different distortion levels. The effect of the high penetration of PV on the harmonic distortion of both positive and negative sequences was also investigated. The simulation results are presented based on case studies. The current distortion levels are in agreement with relevant standards, otherwise the Total Harmonic Distortion (THD) increases under low PV power generation due to its inverse relation with the fundamental current.Keywords: harmonic distortion analysis, power quality, PV systems, residential distribution system
Procedia PDF Downloads 2671243 Design of CMOS CFOA Based on Pseudo Operational Transconductance Amplifier
Authors: Hassan Jassim Motlak
Abstract:
A novel design technique employing CMOS Current Feedback Operational Amplifier (CFOA) is presented. The feature of consumption whivh has a very low power in designing pseudo-OTA is used to decreasing the total power consumption of the proposed CFOA. This design approach applies pseudo-OTA as input stage cascaded with buffer stage. Moreover, the DC input offset voltage and harmonic distortion (HD) of the proposed CFOA are very low values compared with the conventional CMOS CFOA due to symmetrical input stage. P-Spice simulation results using 0.18µm MIETEC CMOS process parameters using supply voltage of ±1.2V and 50μA biasing current. The P-Spice simulation shows excellent improvement of the proposed CFOA over existing CMOS CFOA. Some of these performance parameters, for example, are DC gain of 62. dB, open-loop gain-bandwidth product of 108 MHz, slew rate (SR+) of +71.2V/µS, THD of -63dB and DC consumption power (PC) of 2mW.Keywords: pseudo-OTA used CMOS CFOA, low power CFOA, high-performance CFOA, novel CFOA
Procedia PDF Downloads 3161242 Research on Urban Point of Interest Generalization Method Based on Mapping Presentation
Authors: Chengming Li, Yong Yin, Peipei Guo, Xiaoli Liu
Abstract:
Without taking account of the attribute richness of POI (point of interest) data and spatial distribution limited by roads, a POI generalization method considering both attribute information and spatial distribution has been proposed against the existing point generalization algorithm merely focusing on overall information of point groups. Hierarchical characteristic of urban POI information expression has been firstly analyzed to point out the measurement feature of the corresponding hierarchy. On this basis, an urban POI generalizing strategy has been put forward: POIs urban road network have been divided into three distribution pattern; corresponding generalization methods have been proposed according to the characteristic of POI data in different distribution patterns. Experimental results showed that the method taking into account both attribute information and spatial distribution characteristics of POI can better implement urban POI generalization in the mapping presentation.Keywords: POI, road network, selection method, spatial information expression, distribution pattern
Procedia PDF Downloads 4101241 A Comparative Study of Malware Detection Techniques Using Machine Learning Methods
Authors: Cristina Vatamanu, Doina Cosovan, Dragos Gavrilut, Henri Luchian
Abstract:
In the past few years, the amount of malicious software increased exponentially and, therefore, machine learning algorithms became instrumental in identifying clean and malware files through semi-automated classification. When working with very large datasets, the major challenge is to reach both a very high malware detection rate and a very low false positive rate. Another challenge is to minimize the time needed for the machine learning algorithm to do so. This paper presents a comparative study between different machine learning techniques such as linear classifiers, ensembles, decision trees or various hybrids thereof. The training dataset consists of approximately 2 million clean files and 200.000 infected files, which is a realistic quantitative mixture. The paper investigates the above mentioned methods with respect to both their performance (detection rate and false positive rate) and their practicability.Keywords: ensembles, false positives, feature selection, one side class algorithm
Procedia PDF Downloads 2921240 Low-Cost Embedded Biometric System Based on Fingervein Modality
Authors: Randa Boukhris, Alima Damak, Dorra Sellami
Abstract:
Fingervein biometric authentication is one of the most popular and accurate technologies. However, low cost embedded solution is still an open problem. In this paper, a real-time implementation of fingervein recognition process embedded in Raspberry-Pi has been proposed. The use of Raspberry-Pi reduces overall system cost and size while allowing an easy user interface. Implementation of a target technology has guided to opt some specific parallel and simple processing algorithms. In the proposed system, we use four structural directional kernel elements for filtering finger vein images. Then, a Top-Hat and Bottom-Hat kernel filters are used to enhance the visibility and the appearance of venous images. For feature extraction step, a simple Local Directional Code (LDC) descriptor is applied. The proposed system presents an Error Equal Rate (EER) and Identification Rate (IR), respectively, equal to 0.02 and 98%. Furthermore, experimental results show that real-time operations have good performance.Keywords: biometric, Bottom-Hat, Fingervein, LDC, Rasberry-Pi, ROI, Top-Hat
Procedia PDF Downloads 2051239 An Improved Face Recognition Algorithm Using Histogram-Based Features in Spatial and Frequency Domains
Authors: Qiu Chen, Koji Kotani, Feifei Lee, Tadahiro Ohmi
Abstract:
In this paper, we propose an improved face recognition algorithm using histogram-based features in spatial and frequency domains. For adding spatial information of the face to improve recognition performance, a region-division (RD) method is utilized. The facial area is firstly divided into several regions, then feature vectors of each facial part are generated by Binary Vector Quantization (BVQ) histogram using DCT coefficients in low frequency domains, as well as Local Binary Pattern (LBP) histogram in spatial domain. Recognition results with different regions are first obtained separately and then fused by weighted averaging. Publicly available ORL database is used for the evaluation of our proposed algorithm, which is consisted of 40 subjects with 10 images per subject containing variations in lighting, posing, and expressions. It is demonstrated that face recognition using RD method can achieve much higher recognition rate.Keywords: binary vector quantization (BVQ), DCT coefficients, face recognition, local binary patterns (LBP)
Procedia PDF Downloads 3491238 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm
Authors: Vaibhav Barve
Abstract:
Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.Keywords: data embedding, decryption, encryption, reversible data hiding, steganography
Procedia PDF Downloads 2881237 Embryonic and Larval Development of Pelophylax bedriagae (Amphibia, Anura), in Iran
Authors: Alireza Pesarakloo, Masoumeh Najibzadeh
Abstract:
We studied the development and morphology of different larval stages of Pelophylax bedriagae at two rearing temperatures (20 and 24°C). Eggs collected from a breeding site in south-western Iran. Diagnostic morphological characters are provided for Gosner (1960) larval stages 1-46. The larvae hatched about seven days after egg deposition. Principal diagnostic feature including the formation of the funnel-shaped oral disc became discernible about ten days after hatch at Gosner stage 21 and degenerated at Gosner stage 42. Larvae developed faster at higher temperatures. The largest body length of larval P. bedriagae measured about 54mm in 70 days after egg deposition. Based on our results, the longest metamorphosis time was observed on temperature (20°C) whilst the shortest metamorphosis time occurred on temperature (24°C). Compared with the majority of other Palearctic Anurans, it appears that embryonic and larval development is usually slow rapid in P. bedriagae.Keywords: development, larval stages, Pelophylax bedriagae, temperatures
Procedia PDF Downloads 1751236 Analysis of ECGs Survey Data by Applying Clustering Algorithm
Authors: Irum Matloob, Shoab Ahmad Khan, Fahim Arif
Abstract:
As Indo-pak has been the victim of heart diseases since many decades. Many surveys showed that percentage of cardiac patients is increasing in Pakistan day by day, and special attention is needed to pay on this issue. The framework is proposed for performing detailed analysis of ECG survey data which is conducted for measuring the prevalence of heart diseases statistics in Pakistan. The ECG survey data is evaluated or filtered by using automated Minnesota codes and only those ECGs are used for further analysis which is fulfilling the standardized conditions mentioned in the Minnesota codes. Then feature selection is performed by applying proposed algorithm based on discernibility matrix, for selecting relevant features from the database. Clustering is performed for exposing natural clusters from the ECG survey data by applying spectral clustering algorithm using fuzzy c means algorithm. The hidden patterns and interesting relationships which have been exposed after this analysis are useful for further detailed analysis and for many other multiple purposes.Keywords: arrhythmias, centroids, ECG, clustering, discernibility matrix
Procedia PDF Downloads 3511235 Using Happening Performance in Vocabulary Teaching
Authors: Mustafa Gultekin
Abstract:
It is believed that drama can be used in language classes to create a positive atmosphere for students to use the target language in an interactive way. Thus, drama has been extensively used in many settings in language classes. Although happening has been generally used as a performance art of theatre, this new kind of performance has not been widely known in language teaching area. Therefore, it can be an innovative idea to use happening in language classes, and thus a positive environment can be created for students to use the language in an interactive way. Happening can be defined as an art performance that puts emphasis on interaction in an audience. Because of its interactive feature, happening can also be used in language classes to motivate students to use the language in an interactive environment. The present study aims to explain how a happening performance can be applied to a learning environment to teach vocabulary in English. In line with this purpose, a learning environment was designed for a vocabulary presentation lesson. At the end of the performance, students were asked to compare the traditional way of teaching and happening performance in terms of effectiveness. It was found that happening performance provided the students with a more creative and interactive environment to use the language. Therefore, happening can be used in language classrooms as an innovative tool for education.Keywords: English, happening, language learning, vocabulary teaching
Procedia PDF Downloads 3671234 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids
Authors: Xun Li, Haojie Wang
Abstract:
Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense
Procedia PDF Downloads 1141233 UWB Channel Estimation Using an Efficient Sub-Nyquist Sampling Scheme
Authors: Yaacoub Tina, Youssef Roua, Radoi Emanuel, Burel Gilles
Abstract:
Recently, low-complexity sub-Nyquist sampling schemes based on the Finite Rate of Innovation (FRI) theory have been introduced to sample parametric signals at minimum rates. The multichannel modulating waveforms (MCMW) is such an efficient scheme, where the received signal is mixed with an appropriate set of arbitrary waveforms, integrated and sampled at rates far below the Nyquist rate. In this paper, the MCMW scheme is adapted to the special case of ultra wideband (UWB) channel estimation, characterized by dense multipaths. First, an appropriate structure, which accounts for the bandpass spectrum feature of UWB signals, is defined. Then, a novel approach to decrease the number of processing channels and reduce the complexity of this sampling scheme is presented. Finally, the proposed concepts are validated by simulation results, obtained with real filters, in the framework of a coherent Rake receiver.Keywords: coherent rake receiver, finite rate of innovation, sub-nyquist sampling, ultra wideband
Procedia PDF Downloads 2561232 A Hybrid System for Boreholes Soil Sample
Authors: Ali Ulvi Uzer
Abstract:
Data reduction is an important topic in the field of pattern recognition applications. The basic concept is the reduction of multitudinous amounts of data down to the meaningful parts. The Principal Component Analysis (PCA) method is frequently used for data reduction. The Support Vector Machine (SVM) method is a discriminative classifier formally defined by a separating hyperplane. In other words, given labeled training data, the algorithm outputs an optimal hyperplane which categorizes new examples. This study offers a hybrid approach that uses the PCA for data reduction and Support Vector Machines (SVM) for classification. In order to detect the accuracy of the suggested system, two boreholes taken from the soil sample was used. The classification accuracies for this dataset were obtained through using ten-fold cross-validation method. As the results suggest, this system, which is performed through size reduction, is a feasible system for faster recognition of dataset so our study result appears to be very promising.Keywords: feature selection, sequential forward selection, support vector machines, soil sample
Procedia PDF Downloads 4551231 Data Quality Enhancement with String Length Distribution
Authors: Qi Xiu, Hiromu Hota, Yohsuke Ishii, Takuya Oda
Abstract:
Recently, collectable manufacturing data are rapidly increasing. On the other hand, mega recall is getting serious as a social problem. Under such circumstances, there are increasing needs for preventing mega recalls by defect analysis such as root cause analysis and abnormal detection utilizing manufacturing data. However, the time to classify strings in manufacturing data by traditional method is too long to meet requirement of quick defect analysis. Therefore, we present String Length Distribution Classification method (SLDC) to correctly classify strings in a short time. This method learns character features, especially string length distribution from Product ID, Machine ID in BOM and asset list. By applying the proposal to strings in actual manufacturing data, we verified that the classification time of strings can be reduced by 80%. As a result, it can be estimated that the requirement of quick defect analysis can be fulfilled.Keywords: string classification, data quality, feature selection, probability distribution, string length
Procedia PDF Downloads 3181230 Spatial Correlation of Channel State Information in Real Long Range Measurement
Authors: Ahmed Abdelghany, Bernard Uguen, Christophe Moy, Dominique Lemur
Abstract:
The Internet of Things (IoT) is developed to ensure monitoring and connectivity within different applications. Thus, it is critical to study the channel propagation characteristics in Low Power Wide Area Network (LPWAN), especially Long Range Wide Area Network (LoRaWAN). In this paper, an in-depth investigation of the reciprocity between the uplink and downlink Channel State Information (CSI) is done by performing an outdoor measurement campaign in the area of Campus Beaulieu in Rennes. At each different location, the CSI reciprocity is quantified using the Pearson Correlation Coefficient (PCC) which shows a very high linear correlation between the uplink and downlink CSI. This reciprocity feature could be utilized for the physical layer security between the node and the gateway. On the other hand, most of the CSI shapes from different locations are highly uncorrelated from each other. Hence, it can be anticipated that this could achieve significant localization gain by utilizing the frequency hopping in the LoRa systems by getting access to a wider band.Keywords: IoT, LPWAN, LoRa, effective signal power, onsite measurement
Procedia PDF Downloads 1621229 Confess Your Sins to One Another: An Exploration of the Biblical Validity and the Psychological Efficacy of the Sacrament of Reconciliation in the Catholic Church
Authors: M. B. Peter
Abstract:
The Sacrament of Penance and Reconciliation has long been upheld, by the Catholic Church, as one of the Sacraments of healing, mainly due to the sense of peace, tranquility and psychological quiescence it accords the penitent upon receiving Sacramental absolution of sin through the action of the priest. This paper explores the Sacramental character of this practice and the psychological benefits of the celebration of the Sacrament. This is achieved in two parts: firstly, by the intellectual engagement of Sacred Scripture and the consolidated Sacred Tradition that the Catholic magisterium protects and, secondly, via a broad survey of the works of Carl Gustav Jung and Orval Hobart Mowrer regarding confession and forgiveness. The former will serve to demonstrate the Catholic belief of the divine institution of the Sacrament whilst the latter will demonstrate how this belief, coupled with the existing benefit of confessing guilt, collectively bolsters the Sacrament’s overall psychological efficacy. Fundamentally, the analysis of Jung and Mowrer’s works demonstrate that man, as a naturally religious being, has an inherent need for the confession of his wrong that he might be alleviated of psychological guilt in obtaining forgiveness of a (divinely ordained) minister who is sanctioned to absolve, i.e. the priest. The paper also presents the curative effect of the celebration of this Sacrament, illustrating how, without the act of confession, man remains in moral isolation from God and man; and, that with it, man is relieved of the mysterious feeling of guilt which lies at the root of his disquiet of mind and disturbance of will. Thus, the paper penultimately establishes how the Sacrament of Reconciliation is positioned in that place where psychology and theology meet: man’s sense of guilt. It is Jung’s views on confession and forgiveness that ultimately bridge the chasm between psychology and Christianity.Keywords: Catholic, confession, Jung, Mowrer, penance, psychology, Sacrament of Reconciliation
Procedia PDF Downloads 2761228 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding
Authors: R. S. Remya, U. S. Sethulekshmi
Abstract:
Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering
Procedia PDF Downloads 3591227 Key Competences in Economics and Business Field: The Employers’ Side of the Story
Authors: Bruno Škrinjarić
Abstract:
Rapid technological developments and increase in organizations’ interdependence on international scale are changing the traditional workplace paradigm. A key feature of knowledge based economy is that employers are looking for individuals that possess both specific academic skills and knowledge, and also capability to be proactive and respond to problems creatively and autonomously. The focus of this paper is workers with Economics and Business background and its goals are threefold: (1) to explore wide range of competences and identify which are the most important to employers; (2) to investigate the existence and magnitude of gap between required and possessed level of a certain competency; and (3) to inquire how this gap is connected with performance of a company. A study was conducted on a representative sample of Croatian enterprises during the spring of 2016. Results show that generic, rather than specific, competences are more important to employers and the gap between the relative importance of certain competence and its current representation in existing workforce is greater for generic competences than for specific. Finally, results do not support the hypothesis that this gap is correlated with firms’ performance.Keywords: competency gap, competency matching, key competences, firm performance
Procedia PDF Downloads 3331226 Memory Consolidation: Application of Retrieval Strategies in the Classroom
Authors: Eric Tardif, Nicolas Meylan
Abstract:
Recent studies suggest that the consolidation of episodic memory is better achieved through repeated retrieval than with the use of concept mapping or repeated study. Although such laboratory results highly appeal to educationalists, it remains to be shown whether they can be directly used in a classroom setting. Forty-five college students (42 girls; mean age 16.1 y/o) were asked to remember pairs of biology-related words (e.g. mitochondria-energy) in two configurations. The first configuration consisted of a three-minute study of pairs of words followed by a final one-minute test in which the first word of a pair was shown and the subject asked to write down the second associated word. This procedure was repeated three times. The second configuration consisted of a one-minute study of a list of pairs of words, which was immediately followed by a one-minute test. This procedure was repeated 6 times. Subjects filled out a small questionnaire assessing their general mood, level of fatigue, stress and motivation to do the exercise. One week later, subjects were given a final test using the same words. A total of 8 lists of words were studied and tested during the semester. Results showed that subjects recalled more correct words when using the second configuration, both within the study period and one week later, confirming laboratory findings. However, the general performance (mean items recalled) as well as the motivation to do the exercise gradually decreased during the semester. Motivation was positively correlated with performance (r=0.77, p<0.05). The results suggest that laboratory findings may provide some applications in education but other variables inherent to the classroom setting must also be considered.Keywords: long-term, episodic memory, consolidation, retrieval, school setting
Procedia PDF Downloads 3391225 Artificial Intelligence-Based Detection of Individuals Suffering from Vestibular Disorder
Authors: Dua Hişam, Serhat İkizoğlu
Abstract:
Identifying the problem behind balance disorder is one of the most interesting topics in the medical literature. This study has considerably enhanced the development of artificial intelligence (AI) algorithms applying multiple machine learning (ML) models to sensory data on gait collected from humans to classify between normal people and those suffering from Vestibular System (VS) problems. Although AI is widely utilized as a diagnostic tool in medicine, AI models have not been used to perform feature extraction and identify VS disorders through training on raw data. In this study, three machine learning (ML) models, the Random Forest Classifier (RF), Extreme Gradient Boosting (XGB), and K-Nearest Neighbor (KNN), have been trained to detect VS disorder, and the performance comparison of the algorithms has been made using accuracy, recall, precision, and f1-score. With an accuracy of 95.28 %, Random Forest Classifier (RF) was the most accurate model.Keywords: vestibular disorder, machine learning, random forest classifier, k-nearest neighbor, extreme gradient boosting
Procedia PDF Downloads 691224 The Applicability of Just Satisfaction in Inter-State Cases: A Case Study of Cyprus versus Turkey
Authors: Congrui Chen
Abstract:
The European Court of Human Rights (hereinafter ECtHR) delivered its judgment of just satisfaction on the case of Cyprus v. Turkey, ordering a lump sum of 9,000,000 euros as the just compensation. It is the first time that the ECtHR applied the Article 41 of just compensation in an inter-state case, and it stands as the highest amount of just compensation awarded in the history of the ECtHR. The Cyprus v. Turkey case, which represents the most crucial contribution to European peace in the history of the court. This thesis uses the methodologies of textual research, comparison analysis, and case law study to go further on the following two questions specifically:(i) whether the just compensation is applicable in an inter-state case; (ii) whether such just compensation is of punitive nature. From the point of view of general international law, the essence of the case is the state's responsibility for the violation of individual rights. In other words, the state takes a similar diplomatic protection approach to seek relief. In the course of the development of international law today, especially with the development of international human rights law, States that have a duty to protect human rights should bear corresponding responsibilities for their violations of international human rights law. Under the specific system of the European Court of Human Rights, the just compensation for article 41 is one of the specific ways of assuming responsibility. At the regulatory level, the European Court of Human Rights makes it clear that the just satisfaction of article 41 of the Convention does not include punitive damages, as it relates to the issue of national sovereignty. Nevertheless, it is undeniable that the relief to the victim and the punishment to the responsible State are two closely integrated aspects of responsibility. In other words, compensatory compensation has inherent "punitive".Keywords: European Court of Human Right, inter-state cases, just satisfaction, punitive damages
Procedia PDF Downloads 2701223 The Amorphousness of the Exposure Sphere
Authors: Nipun Ansal
Abstract:
People guard their beliefs and opinions with their lives. Beliefs that they’ve formed over a period of time, and can go to any lengths to defy, desist from, resist and negate any outward stimulus that has the potential to shake them. Cognitive dissonance is term used to describe it in theory. And every human being, in order to defend himself from cognitive dissonance applies 4 rings of defense viz. Selective Exposure, Selective Perception, Selective Attention, and Selective Retention. This paper is a discursive analysis on how the onslaught of social media, complete with its intrusive weaponry, has amorphized the external ring of defense: the selective exposure. The stimulus-response model of communication is one of the most inherent model that encompasses communication behaviours of children and elderly, individual and masses, humans and animals alike. The paper deliberates on how information bombardment through the uncontrollable channels of the social media, Facebook and Twitter in particular, have dismantled our outer sphere of exposure, leading users online to a state of constant dissonance, and thus feeding impulsive action-taking. It applies case study method citing an example to corroborate how knowledge generation has given in to the information overload and the effect it has on decision making. With stimulus increasing in number of encounters, opinion formation precedes knowledge because of the increased demand of participation and decrease in time for the information to permeate from the outer sphere of exposure to the sphere of retention, which of course, is through perception and attention. This paper discusses the challenge posed by this fleeting, stimulus rich, peer-dominated media on the traditional models of communication and meaning-generation.Keywords: communication, discretion, exposure, social media, stimulus
Procedia PDF Downloads 408