Search results for: violent video games
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1611

Search results for: violent video games

621 A Semiotic Approach to the Construction of Classical Identity in Indian Classical Music Videos

Authors: Jayakrishnan Narayanan, Sengamalam Periyasamy Dhanavel

Abstract:

Indian classical (Karnatik) music videos across various media platforms have followed an audio-visual pattern that conforms to its socio-cultural and quasi-religious identity. The present paper analyzes the semiotic variations between ‘pure Karnatik music videos’ and ‘independent/contemporary-collaborative music videos’ posted on social media by young professional Karnatik musicians. The paper analyzes these media texts by comparing their various structural sememes namely, the title, artists, music, narrative schemata, visuals, lighting, sound, and costumes. The paper argues that the pure Karnatik music videos are marked by the presence of certain recurring mythological or third level signifiers and that these signifiers and codes are marked by their conspicuous absence in the independent music videos produced by the same musicians. While the music and the musical instruments used in both these sets of music videos remain similar, the meaning that is abducted by the beholder in each case is entirely different. The paper also attempts to study the identity conflicts that are projected through these music videos and the extent to which the cultural connotations of Karnatik music govern the production of its music videos.

Keywords: abduction, identity, media semiotics, music video

Procedia PDF Downloads 222
620 A Psycho-Education Strategy as a Method for Reconstructing Identity in the Context of Family Violence

Authors: Charlene Petersen, Herman Grobler, Karel Botha

Abstract:

Restorative intervention with adolescents from a family violence context is a much needed resource given the limited access to mental health services in South Africa. In this research article the qualitative component which formed part of a mixed methods design of an overall research study, is discussed. A qualitative case study design was used. This article explores a psycho-education strategy, using a visual creative medium as a method for reconstructing identity in the context of family violence. The aim of this psycho-education strategy was to move away from interventions based on the biomedical model, but focused more on meaning-making about violent traumatic events adolescents have experienced, and to develop more positive, adaptive views about themselves in the present, and experience hope about the future. The research question that was asked was how the meaning, that adolescents from a specific community in South Africa give to family violence, contribute to defining their identity? Twelve participants were purposively selected for the study and included both male and female adolescents with ages ranging from 15 to 18 years from three secondary schools. The strategy was applied over five sessions with the intention to bring about awareness of different selves, identifying and naming the selves, and becoming aware of the configuration of identity that could lead to a redefined identity. The data were thematically and visually analyzed. Through the process of tailoring which forms the basis for reconstruction process, participants could identify the different selves, become aware of how they configure in the field. Through the process of tailoring the different self-parts, the sense of self became more self-cohesive and allowed the individual to become aware of the role of certain. Through identifying and naming the future self and resilient self the participants were able to accomplish some order and meaning in their lives. It provided them with a sense of predictability and an optimistic and hopefulness towards the future. The research findings indicated that this strategy can be used as a method for reconstructing identity in the context of family violence.

Keywords: identity, family violence, self-configuration, reconstructing identity, psycho-education strategy

Procedia PDF Downloads 367
619 Skin-to-Skin Contact Simulation: Improving Health Outcomes for Medically Fragile Newborns in the Neonatal Intensive Care Unit

Authors: Gabriella Zarlenga, Martha L. Hall

Abstract:

Introduction: Premature infants are at risk for neurodevelopmental deficits and hospital readmissions, which can increase the financial burden on the health care system and families. Kangaroo care (skin-to-skin contact) is a practice that can improve preterm infant health outcomes. Preterm infants can acquire adequate body temperature, heartbeat, and breathing regulation through lying directly on the mother’s abdomen and in between her breasts. Due to some infant’s condition, kangaroo care is not a feasible intervention. The purpose of this proof-of-concept research project is to create a device which simulates skin-to-skin contact for pre-term infants not eligible for kangaroo care, with the aim of promoting baby’s health outcomes, reducing the incidence of serious neonatal and early childhood illnesses, and/or improving cognitive, social and emotional aspects of development. Methods: The study design is a proof-of-concept based on a three-phase approach; (1) observational study and data analysis of the standard of care for 2 groups of pre-term infants, (2) design and concept development of a novel device for pre-term infants not currently eligible for standard kangaroo care, and (3) prototyping, laboratory testing, and evaluation of the novel device in comparison to current assessment parameters of kangaroo care. A single center study will be conducted in an area hospital offering Level III neonatal intensive care. Eligible participants include newborns born premature (28-30 weeks of age) admitted to the NICU. The study design includes 2 groups: a control group receiving standard kangaroo care and an experimental group not eligible for kangaroo care. Based on behavioral analysis of observational video data collected in the NICU, the device will be created to simulate mother’s body using electrical components in a thermoplastic polymer housing covered in silicone. It will be designed with a microprocessor that controls simulated respiration, heartbeat, and body temperature of the 'simulated caregiver' by using a pneumatic lung, vibration sensors (heartbeat), pressure sensors (weight/position), and resistive film to measure temperature. A slight contour of the simulator surface may be integrated to help position the infant correctly. Control and monitoring of the skin-to-skin contact simulator would be performed locally by an integrated touchscreen. The unit would have built-in Wi-Fi connectivity as well as an optional Bluetooth connection in which the respiration and heart rate could be synced with a parent or caregiver. A camera would be integrated, allowing a video stream of the infant in the simulator to be streamed to a monitoring location. Findings: Expected outcomes are stabilization of respiratory and cardiac rates, thermoregulation of those infants not eligible for skin to skin contact with their mothers, and real time mother Bluetooth to the device to mimic the experience in the womb. Results of this study will benefit clinical practice by creating a new standard of care for premature neonates in the NICU that are deprived of skin to skin contact due to various health restrictions.

Keywords: kangaroo care, wearable technology, pre-term infants, medical design

Procedia PDF Downloads 156
618 Examining the Contemporary Relevance of Mahatma Gandhi’s Thought: A Bulwark against Terrorism

Authors: Jayita Mukhopadhyay

Abstract:

Even though more than six decades has passed since the death of India’s iconic thinker and mass leader Mahatma Gandhi, the world besieged by terrorism may still take a leaf out of his philosophical discourse on non-violence and attempt to turn his theory into praxis to save mankind. The greatest soul world has ever produced, a man of divine fire, an apostle of peace and non-violence, a revolutionary, a visionary, a social reformer and deliverer of the downtrodden, Father of the nation, these and numerous other epithets have been used by eminent personalities and scholars while describing Mahatma Gandhi. Gandhi was a relentless fighter and mass mobiliser who awakened a sleeping giant, the common men and women of India, shook them out of their docile, fatalistic mould, invigorated them with his doctrine of ahimsa and satyagraha (non violence and strict adherence to truth), instilled in them nationalist zeal and patriotic fervour and turned them into determined, steadfast freedom fighters. Under his leadership, the national liberation movement got a new life and ultimately succeeded in ending the era of foreign domination. And he did all these while resisting a natural tendency of his people to respond violently to unspeakable violence and atrocities unleashed by the colonial British administration desperate to keep India in its empire. In this paper, an attempt will be made to unravel Gandhi’s elucidation of the concept of non-violent resistance, along with non-cooperation and civil disobedience and their actual application through political practices which succeeded in capturing the imagination of not only India’s teeming millions but the entire world. The methodology of analytical study will be used as Gandhi’s own writings and those by noted scholars on Gandhi will be examined extensively to establish contemporary relevance of his thought, his invaluable guidelines about how to cope with poverty, inequality, exploitation, repression and marginalization of some sections of society and resultant radicalization of some disturbed members of human race, the very conditions which spawn terrorism in today’s world.

Keywords: India, non cooperation, non violence, terrorism

Procedia PDF Downloads 324
617 Bag of Local Features for Person Re-Identification on Large-Scale Datasets

Authors: Yixiu Liu, Yunzhou Zhang, Jianning Chi, Hao Chu, Rui Zheng, Libo Sun, Guanghao Chen, Fangtong Zhou

Abstract:

In the last few years, large-scale person re-identification has attracted a lot of attention from video surveillance since it has a potential application prospect in public safety management. However, it is still a challenging job considering the variation in human pose, the changing illumination conditions and the lack of paired samples. Although the accuracy has been significantly improved, the data dependence of the sample training is serious. To tackle this problem, a new strategy is proposed based on bag of visual words (BoVW) model of designing the feature representation which has been widely used in the field of image retrieval. The local features are extracted, and more discriminative feature representation is obtained by cross-view dictionary learning (CDL), then the assignment map is obtained through k-means clustering. Finally, the BoVW histograms are formed which encodes the images with the statistics of the feature classes in the assignment map. Experiments conducted on the CUHK03, Market1501 and MARS datasets show that the proposed method performs favorably against existing approaches.

Keywords: bag of visual words, cross-view dictionary learning, person re-identification, reranking

Procedia PDF Downloads 195
616 Social Distancing as a Population Game in Networked Social Environments

Authors: Zhijun Wu

Abstract:

While social living is considered to be an indispensable part of human life in today's ever-connected world, social distancing has recently received much public attention on its importance since the outbreak of the coronavirus pandemic. In fact, social distancing has long been practiced in nature among solitary species and has been taken by humans as an effective way of stopping or slowing down the spread of infectious diseases. A social distancing problem is considered for how a population, when in the world with a network of social sites, decides to visit or stay at some sites while avoiding or closing down some others so that the social contacts across the network can be minimized. The problem is modeled as a population game, where every individual tries to find some network sites to visit or stay so that he/she can minimize all his/her social contacts. In the end, an optimal strategy can be found for everyone when the game reaches an equilibrium. The paper shows that a large class of equilibrium strategies can be obtained by selecting a set of social sites that forms a so-called maximal r-regular subnetwork. The latter includes many well-studied network types, which are easy to identify or construct and can be completely disconnected (with r = 0) for the most-strict isolation or allow certain degrees of connectivity (with r > 0) for more flexible distancing. The equilibrium conditions of these strategies are derived. Their rigidity and flexibility are analyzed on different types of r-regular subnetworks. It is proved that the strategies supported by maximal 0-regular subnetworks are strictly rigid, while those by general maximal r-regular subnetworks with r > 0 are flexible, though some can be weakly rigid. The proposed model can also be extended to weighted networks when different contact values are assigned to different network sites.

Keywords: social distancing, mitigation of spread of epidemics, populations games, networked social environments

Procedia PDF Downloads 133
615 Dizziness in the Emergency: A 1 Year Prospective Study

Authors: Nouini Adrâa

Abstract:

Background: The management of dizziness and vertigo can be challenging in the emergency department (ED). It is important to rapidly diagnose vertebrobasilar stroke (VBS), as therapeutic options such as thrombolysis and anticoagulation require prompt decisions. Objective: This study aims to assess the rate of misdiagnosis in patients with dizziness caused by VBS in the ED. Methods and Results: The cohort was comprised of 82 patients with a mean age of 55 years; 51% were women and 49% were men. Among dizzy patients, 15% had VBS. We used Cohen’s kappa test to quantify the agreement between two raters – namely, emergency physicians and neurologists – regarding the causes of dizziness in the ED. The agreement between emergency physicians and neurologists is low for the final diagnosis of central vertigo disorders and moderate for the final diagnosis of VBS. The sensitivity of ED clinal examination for benign conditions such as BPPV was low at 56%. The positive predictive value of the ED clinical examination for VBS was also low at 50%. Conclusion: There is a substantial rate of misdiagnosis in patients with dizziness caused by VBS in the ED. To reduce the number of missing diagnoses of VBS in the future, there is a need to train emergency physicians in neuro vestibular examinations, including the HINTS examination for acute vestibular syndrome (AVS) and the Dix-Hallpike (DH) maneuver for episodic vestibular syndrome. Using video head impulse tests could help reduce the rate of misdiagnosis of VBS in the ED.

Keywords: dizziness, vertigo, vestibular disease, emergency

Procedia PDF Downloads 56
614 SiamMask++: More Accurate Object Tracking through Layer Wise Aggregation in Visual Object Tracking

Authors: Hyunbin Choi, Jihyeon Noh, Changwon Lim

Abstract:

In this paper, we propose SiamMask++, an architecture that performs layer-wise aggregation and depth-wise cross-correlation and introduce multi-RPN module and multi-MASK module to improve EAO (Expected Average Overlap), a representative performance evaluation metric for Visual Object Tracking (VOT) challenge. The proposed architecture, SiamMask++, has two versions, namely, bi_SiamMask++, which satisfies the real time (56fps) on systems equipped with GPUs (Titan XP), and rf_SiamMask++, which combines mask refinement modules for EAO improvements. Tests are performed on VOT2016, VOT2018 and VOT2019, the representative datasets of Visual Object Tracking tasks labeled as rotated bounding boxes. SiamMask++ perform better than SiamMask on all the three datasets tested. SiamMask++ is achieved performance of 62.6% accuracy, 26.2% robustness and 39.8% EAO, especially on the VOT2018 dataset. Compared to SiamMask, this is an improvement of 4.18%, 37.17%, 23.99%, respectively. In addition, we do an experimental in-depth analysis of how much the introduction of features and multi modules extracted from the backbone affects the performance of our model in the VOT task.

Keywords: visual object tracking, video, deep learning, layer wise aggregation, Siamese network

Procedia PDF Downloads 158
613 Evaluating a Holistic Fitness Program Used by High Performance Athletes and Mass Participants

Authors: Peter Smolianov, Jed Smith, Lisa Chen, Steven Dion, Christopher Schoen, Jaclyn Norberg

Abstract:

This study evaluated the effectiveness of an experimental training program used to improve performance and health of competitive athletes and recreational sport participants. This holistic program integrated and advanced Eastern and Western methods of prolonging elite sports participation and enjoying lifelong fitness, particularly from China, India, Russia, and the United States. The program included outdoor, gym, and water training approaches focused on strengthening while stretching/decompressing and on full body activation-all in order to improve performance as well as treat and prevent common disorders and pains. The study observed and surveyed over 100 users of the program including recreational fitness and sports enthusiasts as well as elite athletes who competed for national teams of different countries and for Division I teams of National Collegiate Athletic Association in the United States. Different types of sport were studied, including territorial games (e.g., American football, basketball, volleyball), endurance/cyclical (athletics/track and field, swimming), and artistic (e.g., gymnastics and synchronized swimming). Results of the study showed positive effects on the participants’ performance and health, particularly for those who used the program for more than two years and especially in reducing spinal disorders and in enabling to perform new training tasks which previously caused back pain.

Keywords: lifelong fitness, injury prevention, prolonging sport participation, improving performance and health

Procedia PDF Downloads 155
612 A Unified Deep Framework for Joint 3d Pose Estimation and Action Recognition from a Single Color Camera

Authors: Huy Hieu Pham, Houssam Salmane, Louahdi Khoudour, Alain Crouzil, Pablo Zegers, Sergio Velastin

Abstract:

We present a deep learning-based multitask framework for joint 3D human pose estimation and action recognition from color video sequences. Our approach proceeds along two stages. In the first, we run a real-time 2D pose detector to determine the precise pixel location of important key points of the body. A two-stream neural network is then designed and trained to map detected 2D keypoints into 3D poses. In the second, we deploy the Efficient Neural Architecture Search (ENAS) algorithm to find an optimal network architecture that is used for modeling the Spatio-temporal evolution of the estimated 3D poses via an image-based intermediate representation and performing action recognition. Experiments on Human3.6M, Microsoft Research Redmond (MSR) Action3D, and Stony Brook University (SBU) Kinect Interaction datasets verify the effectiveness of the proposed method on the targeted tasks. Moreover, we show that our method requires a low computational budget for training and inference.

Keywords: human action recognition, pose estimation, D-CNN, deep learning

Procedia PDF Downloads 146
611 Exploring the Profiles of Militants in the SWAT Valley of Pakistan

Authors: Lateef Hakim Zai Khyber, Syed Rashid Ali

Abstract:

In the post 9/11 era, a new trend has developed of terrorist profiling on the basis of the ethnic, religious, political, psychological, social, and economic background of the terrorists to anticipate and assess the possible risk and to prevent and prosecute the suspected before they commit any violent act. The same profiling approach was adopted in different militant or terrorist de-radicalization and rehabilitation programs across the world in order to evaluate and identify the reasons and causes for joining terrorism in terms of push and pull factors. This paper attempts to explore and investigate the profiles of the detainees in the Sabaoon de-radicalization and Emancipation program, which aimed at de-radicalizing the former militants of Tehrik-e-Taliban (TTP) Pakistan in the Swat valley of Pakistan. This research attempted to use qualitative methods for collecting data, including a number of formal and informal open-ended interviews with the former staff members of Sabaoon to explore various aspects of the program, such as various approaches used at Sabaoon for terrorist profiling. It conducts a thorough examination of the profiles of the terrorist through their socioeconomic, ideological, emotional, intellectual, and psychological conditions and orientations, personal details, family issues, social preferences, etc. The study finds out that the majority of the terrorists belonged to the marginalized groups or lower class, including underprivileged tenants and poor laborers, of society having no access to land. They possess almost the same profiles, including low socioeconomic status, absence of a father or strict behavior of parents, large and combined families, lack of education, lack of religious understanding, etc. They also possess some common traits such as anxiety disorder, emotional instability, aggressive impulses and insecurity, depression, inferiority complex, lack of critical thinking and logical reasoning, authority-seeking behavior, and revenge-seeking behavior.

Keywords: terrorist profiling, Sabaoon, de-radicalization, rehabilitation, Swat, Pakistan, juvenile militants

Procedia PDF Downloads 155
610 Out of Order: The Rise of Stop and Search in Civil Orders Legislation

Authors: Jodie Bradshaw, Rebecca Dooley, Habib Kadiri, Holly Bird, Aaliyah Felix-West, Udit Mahalingam, Ella Thomson

Abstract:

The sharp rise of civil orders has led to an expansion of police powers, particularly in the realm of stop and search activities. The broad scope and objectives of these civil orders –addressing issues as varied as public safety, crime prevention, and counter-terrorism – has led to ‘mission-creep’, whereby orders were being imposed in a wider range of contexts than initially intended. The ever-widening purview of civil orders in practice necessitates proactive measures by law enforcement which often rely heavily on the utilisation of stop and search, leading to an expansion of stop and search practices and the regulation of public space. Civil liberties organisations, criminal justice and legal practitioners, activist groups, and researchers have argued that civil orders dilute and undermine foundational legal principles, pose a threat to our basic rights and freedoms, facilitate dangerous criminal justice net-widening, and disproportionately target young, working-class people of colour. Many of the provisions in these orders are potentially incompatible with the right to liberty and security. The conditions of an order (whether negative restrictions or positive obligations) tend to be extremely easy to breach –and in some cases, almost impossible for the person subject to the order not to breach. When the conditions of an order are breached, the result is criminal punishment – often in the form of imprisonment. This paper argues that civil orders set people up to fail, sending them down a path towards incarceration and the ultimate deprivation of liberty. The proclaimed intentions underpinning these civil orders – to tackle purportedly ‘undesirable’ behaviour (which in and of itself is not a crime) committed by ‘undesirable’ people – paves the way for justifying violent and racially disproportionate policing practices.

Keywords: civil orders, policing, stop and search, crime, civil liberties, criminal punishment, anti-social behaviour

Procedia PDF Downloads 3
609 A Discourse Study of Multimodal Intertextuality in Egyptian Social Media Memes

Authors: Ola Hafez

Abstract:

This study examines the way selected Egyptian digitally mediated memes utilize intertextuality as a means of expression. It is motivated by the emerging digital socio-political humorous practice using various forms of political commentary in Egyptian social media. One of these forms involves the use of memes incorporating (often doctored) video frames taken from Egyptian plays, films and songs, and relocated in a different socio-political context, often with a caption that re-appropriates the frame for the purpose of critical commentary, thus juxtaposing the socio-political phenomena being addressed and the Egyptian artistic and cultural heritage. The paper presents a discourse study of a convenience sample of a recent social media campaign and carries out two levels of analysis. At the micro level, the study pinpoints the various modes of intertextuality employed, including verbal as well as visual intertextuality in the light of the work of social semiotics by Kress and van Leeuwen. At the macro level, the paper sheds light on the socio-political implications of such practice in the light of Political Discourse Analysis.

Keywords: digitally mediated discourse, discourse analysis, Egyptian Arabic, intertextuality, memes, multimodality, political discourse analysis

Procedia PDF Downloads 217
608 A Deforestation Dilemma: An Integrated Approach to Conservation and Development in Madagascar

Authors: Tara Moore

Abstract:

Madagascar is one of the regions of the world with the highest biodiversity, with more than 600 new species discovered in just the last decade. In parallel with its record-breaking biodiversity, Madagascar is also the tenth poorest country in the world. The resultant socio-economic pressures are leading to a highly threatened environment. In particular, deforestation is at the core of biodiversity and ecosystem loss, primarily from slash and burn agriculture and illegal rosewood tree harvesting. Effective policy response is imperative for improved conservation in Madagascar. However, these changes cannot come from the current, unstable government institutions. After a violent and politically turbulent coup in 2009, any effort to defend Madagascar's biodiversity has been eclipsed by the high corruption of government bodies. This paper presents three policy options designed for a private donor to invest in conservation in Madagascar. The first proposed policy consists of payments for ecosystem services model, which involves paying local Malagasy women to reforest nearby territories. The second option is a micro-irrigation system proposal involving relocating local Malagasy out of the threatened forest region. The final proposition is captive breeding funding for the Madagascar Fauna and Flora Group, which could then lead to new reintroductions in the threatened northeastern rainforests. In the end, all three options present feasible, impactful options for a conservation-minded major donor. Ideally, the policy change would involve a combination of all three options, as each provides necessary development and conservation re-structuring goals. Option one, payments for ecosystem services, would be the preferred choice if there were only enough funding for one project. The payments for ecosystem services project both support local populations and promotes sustainable development while reforesting the threatened Marojejy National Park. Regardless of the chosen policy solution, any support from a donor will make a huge impact if it supports both sustainable development and biodiversity conservation.

Keywords: captive breeding, cnservation policy, lemur conservation, Madagascar conservation, payments for ecosystem services

Procedia PDF Downloads 134
607 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 185
606 An Ecological Systems Approach to Risk and Protective Factors of Sibling Conflict for Children in the United Kingdom

Authors: C. A. Bradley, D. Patsios, D. Berridge

Abstract:

This paper presents evidence to better understand the risk and protective factors related to sibling conflict and the patterns of association between sibling conflict and negative adjustment outcomes by incorporating additional familial and societal factors within statistical models of risk and adjustment. It was conducted through the secondary analysis of a large representative cross-sectional dataset of children in the UK. The original study includes proxy interviews for young children and self-report interviews for adolescents. The study applies an ecological systems framework for the analyses. Hierarchical regression models assess risk and protective factors and adjustment outcomes associated with sibling conflict. Interactions reveal differential effect between contextual risk factors and the social context of influence. The general pattern of findings suggested that, although factors affecting likelihood of experiencing sibling conflict were often determined by child age, some remained consistent across childhood. These factors were often conditional on each other, reinforcing the importance of an ecological framework. Across both age-groups, sibling conflict was associated with siblings closer in age; male sibling groups; most advantaged socio-economic group; and exposure to community violence, such as witnessing violent assault or robbery. The study develops the evidence base on the influence of ethnicity and socio-economic group on sibling conflict by exploring interactions between social context. It also identifies key new areas of influence – such as family structure, disability, and community violence in exacerbating or reducing risk of conflict. The study found negative associations between sibling conflict and young children’s mental well-being and adolescents' mental well-being and anti-social behaviour, but also more context specific associations – such as sibling conflict moderating the negative impact of adversity and high risk experiences for young children such as parental violence toward the child.

Keywords: adjustment, conflict, ecological systems, family systems, risk and protective factors, sibling

Procedia PDF Downloads 106
605 Discriminant Analysis of Pacing Behavior on Mass Start Speed Skating

Authors: Feng Li, Qian Peng

Abstract:

The mass start speed skating (MSSS) is a new event for the 2018 PyeongChang Winter Olympics and will be an official race for the 2022 Beijing Winter Olympics. Considering that the event rankings were based on points gained on laps, it is worthwhile to investigate the pacing behavior on each lap that directly influences the ranking of the race. The aim of this study was to detect the pacing behavior and performance on MSSS regarding skaters’ level (SL), competition stage (semi-final/final) (CS) and gender (G). All the men's and women's races in the World Cup and World Championships were analyzed in the 2018-2019 and 2019-2020 seasons. As a result, a total of 601 skaters from 36 games were observed. ANOVA for repeated measures was applied to compare the pacing behavior on each lap, and the three-way ANOVA for repeated measures was used to identify the influence of SL, CS, and G on pacing behavior and total time spent. In general, the results showed that the pacing behavior from fast to slow were cluster 1—laps 4, 8, 12, 15, 16, cluster 2—laps 5, 9, 13, 14, cluster 3—laps 3, 6, 7, 10, 11, and cluster 4—laps 1 and 2 (p=0.000). For CS, the total time spent in the final was less than the semi-final (p=0.000). For SL, top-level skaters spent less total time than the middle-level and low-level (p≤0.002), while there was no significant difference between the middle-level and low-level (p=0.214). For G, the men’s skaters spent less total time than women on all laps (p≤0.048). This study could help to coach staff better understand the pacing behavior regarding SL, CS, and G, further providing references concerning promoting the pacing strategy and decision making before and during the race.

Keywords: performance analysis, pacing strategy, winning strategy, winter Olympics

Procedia PDF Downloads 193
604 Administrative Determinants of Students' Sports Participation in Private and Public Secondary Schools in Kwara State, Nigeria

Authors: Danjuma Moudu Momoh

Abstract:

Participation in sports is of immense benefit to the soundness of individual mental and social wellness, particularly among youngsters. The 1980’s and 1990’s compared to 2000’s witnessed great involvement of youngsters in school games arising from the high administrative supports attached to sports. Previous studies in an attempt to increase youngster’s participation in sports had focused more on other factors rather than on administrative factors. This study, therefore, investigated the importance of administrative factors (availability of facilities, availability of equipment, funding, scheduling of sports programme and administrative style of school principals) on students’ sports participation in private and public secondary schools in Kwara State, Nigeria. Descriptive survey research design using validated and structured questionnaire, was adopted. Stratified random sampling technique was used to pick the students both male and female. A total of two thousand five hundred and sixty participants were involved in the study. A reliable coefficient of r=0.82 was obtained for the instruments using Cronbach Alpha. Data were analyzed using multiple regressions to test the hypotheses at 00.5 significant levels. At the end of the study, it was discovered that the relative contributions of administrative factors among the students were: availability of facilities (β=0.314), availability of equipment (β=0.444), funding (β=0.301), scheduling of sports programme (β=0.447), made relative contributions to the dependent variable, administrative style of school principal (β=0.077) did not make significant but minimal contribution to the student’s sports participation.

Keywords: administrative determinants, secondary school students, physical activity, sports participation

Procedia PDF Downloads 550
603 Social Media as a Means of Participation in Democracies

Authors: C. Arslan, K. Yakar

Abstract:

Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools. Social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that social media has positive effects on participation in democracies allowing people express themselves freely and limitlessly, but obviously, the misuse of it is very common and it is quite possible that even a five-minute-long video record can topple down a government or give a solid reason to a government to review its policies on some certain areas. As one of the most important and effective means of participation, social media presents some opportunities as well as risks. In this study, the place of social media for participation in democracies will be demonstrated under the light of opportunities and risks.

Keywords: social media, democracy, participation, risks, opportunities

Procedia PDF Downloads 422
602 Working Memory in Children: The Relationship with Father-Child Rough-and-Tumble Play

Authors: Robinson, E. L., Freeman, E. E.

Abstract:

Over the last few decades, the social movement of involved fatherhood has stimulated a research focus on fathers, leading to an increase in the body of evidence into the paternal contributions to child development. Past research has suggested that rough-and-tumble play, which involves wrestling, chasing and tumbling, is the preferred play type of western fathers. This type of play remains underutilized and underrepresented in child developmental research as it’s perceived to be dangerous or too aggressive. The limited research available has shown a relationship between high quality rough-and-tumble play interactions, lower childhood aggression and improved child emotional regulation. The aim of this study was to examine father-child rough-and-tumble play and assess the impact on cognitive development in children aged 4-7 years. Father-child dyads completed a 10-minute rough-and-tumble play interaction, which consisted of 2 games, at the University of Newcastle. Children then completed the Wechsler Preschool & Primary Scale of Intelligence - Fourth Edition Australian and New Zealand Standardized Edition (WPPSI-IV A&NZ). Fathers reported on their involvement in various caregiving activities and on their child’s development. Analyses revealed that fathers-child play quality was positively related to working memory outcomes in children. Furthermore, the amount of rough-and-tumble play father and child did together on a regular basis was also related to working memory outcomes. While father-child play interactions remain an understudied area of research, this study outlines the importance of examining the paternal play role in children’s cognitive development.

Keywords: children, development, father, executive function

Procedia PDF Downloads 204
601 Ultra-High Frequency Passive Radar Coverage for Cars Detection in Semi-Urban Scenarios

Authors: Pedro Gómez-del-Hoyo, Jose-Luis Bárcena-Humanes, Nerea del-Rey-Maestre, María-Pilar Jarabo-Amores, David Mata-Moya

Abstract:

A study of achievable coverages using passive radar systems in terrestrial traffic monitoring applications is presented. The study includes the estimation of the bistatic radar cross section of different commercial vehicle models that provide challenging low values which make detection really difficult. A semi-urban scenario is selected to evaluate the impact of excess propagation losses generated by an irregular relief. A bistatic passive radar exploiting UHF frequencies radiated by digital video broadcasting transmitters is assumed. A general method of coverage estimation using electromagnetic simulators in combination with estimated car average bistatic radar cross section is applied. In order to reduce the computational cost, hybrid solution is implemented, assuming free space for the target-receiver path but estimating the excess propagation losses for the transmitter-target one.

Keywords: bistatic radar cross section, passive radar, propagation losses, radar coverage

Procedia PDF Downloads 336
600 Melodic and Temporal Structure of Indonesian Sentences of Sitcom "International Class" Actors: Prosodic Study with Experimental Phonetics Approach

Authors: Tri Sulistyaningtyas, Yani Suryani, Dana Waskita, Linda Handayani Sukaemi, Ferry Fauzi Hermawan

Abstract:

The enthusiasm of foreigners studying the Indonesian language by Foreign Speakers (BIPA) was documented in a sitcom "International Class". Tone and stress when they speak the Indonesian language is unique and different from Indonesian pronunciation. By using the Praat program, this research aims to describe prosodic Indonesian language which is spoken by ‘International Class” actors consisting of Abbas from Nigeria, Lee from Korea, and Kotaro from Japan. Data for the research are taken from the video sitcom "International Class" that aired on Indonesian television. The results of this study revealed that pitch movement that arises when pronouncing Indonesian sentences was up and down gradually, there is also a rise and fall sharply. In terms of stress, respondents tend to contain a lot of stress when pronouncing Indonesian sentences. Meanwhile, in terms of temporal structure, the duration pronouncing Indonesian sentences tends to be longer than that of Indonesian speakers.

Keywords: melodic structure, temporal structure, prosody, experimental phonetics, international class

Procedia PDF Downloads 302
599 A Machine Learning Based Method to Detect System Failure in Resource Constrained Environment

Authors: Payel Datta, Abhishek Das, Abhishek Roychoudhury, Dhiman Chattopadhyay, Tanushyam Chattopadhyay

Abstract:

Machine learning (ML) and deep learning (DL) is most predominantly used in image/video processing, natural language processing (NLP), audio and speech recognition but not that much used in system performance evaluation. In this paper, authors are going to describe the architecture of an abstraction layer constructed using ML/DL to detect the system failure. This proposed system is used to detect the system failure by evaluating the performance metrics of an IoT service deployment under constrained infrastructure environment. This system has been tested on the manually annotated data set containing different metrics of the system, like number of threads, throughput, average response time, CPU usage, memory usage, network input/output captured in different hardware environments like edge (atom based gateway) and cloud (AWS EC2). The main challenge of developing such system is that the accuracy of classification should be 100% as the error in the system has an impact on the degradation of the service performance and thus consequently affect the reliability and high availability which is mandatory for an IoT system. Proposed ML/DL classifiers work with 100% accuracy for the data set of nearly 4,000 samples captured within the organization.

Keywords: machine learning, system performance, performance metrics, IoT, edge

Procedia PDF Downloads 195
598 Digital Repository as a Service: Enhancing Access and Preservation of Cultural Heritage Artefacts

Authors: Lefteris Tsipis, Demosthenes Vouyioukas, George Loumos, Antonis Kargas, Dimitris Varoutas

Abstract:

The employment of technology and digitization is crucial for cultural organizations to establish and sustain digital repositories for their cultural heritage artefacts. This utilization is also essential in facilitating the presentation of cultural works and exhibits to a broader audience. Consequently, in this work, we propose a digital repository that functions as Software as a Service (SaaS), primarily promoting the safe storage, display, and sharing of cultural materials, enhancing accessibility, and fostering a deeper understanding and appreciation of cultural heritage. Moreover, the proposed digital repository service is designed as a multitenant architecture, which enables organizations to expand their reach, enhance accessibility, foster collaboration, and ensure the preservation of their content. Specifically, this project aims to assist each cultural institution in organizing its digital cultural assets into collections and feeding other digital platforms, including educational, museum, pedagogical, and games, through appropriate interfaces. Moreover, the creation of this digital repository offers a cutting-edge and effective open-access laboratory solution. It allows organizations to have a significant influence on their audiences by fostering cultural understanding and appreciation. Additionally, it facilitates the connection between different digital repositories and national/European aggregators, promoting collaboration and information sharing. By embracing this solution, cultural institutions can benefit from shared resources and features, such as system updates, backup and recovery services, and data analytics tools, that are provided by the platform.

Keywords: cultural technologies, gaming technologies, web sharing, digital repository

Procedia PDF Downloads 79
597 Justice and the Juvenile: Changing Trends and Developments

Authors: Shikhar Shrivastava, Varun Khare

Abstract:

Background: We are confronted by a society that is becoming more complex, more mobile, and more dysfunctional. Teen pregnancy, suicide, elopement, and the perusal of dangerous drugs have become commonplace. In addition, children do not settle their disputes as they once did. Guns and knives are quotidian. Therefore, it has been an exigent to have a "Juvenile Code" that would provide specific substantive and procedural rules for juveniles in the justice system. However, until the twentieth century, there was little difference between how the justice system treated adults and children. Age was considered only in terms of appropriate punishment and juveniles were eligible for the same punishment as adults. Findings: The increased prevalence and legislative support for specialized courts, Juvenile Justice Boards, including juvenile drug, mental health and truancy court programs, as well as diversion programs and evidence-based approaches into the fabric of juvenile justice are just a few examples of recent advances. In India, various measures were taken to prosecute young offenders who committed violent crimes as adults. But it was argued that equating juveniles with adult criminals was neither scientifically correct nor normatively defensible. It would defeat the very purpose of the justice system. Methodology and Conclusion: This paper attempts to bring forth the results of analytical and descriptive research that examined changing trends in juvenile justice legislation. It covers the investigative and inspective practices of police, the various administrative agencies who have roles in implementing the legislation, the courts, and the detention centers. In this paper we shall discuss about how the juvenile justice system is the dumping ground for many of a youths’ problem. The changing notions of justice, from retributive to restorative and rehabilitative shall be discussed. A comparative study of the Juvenile act in India and that of the U.S has been discussed. Specific social institutions and forces that explain juvenile delinquency are identified. In addition, various influences on juvenile delinquency are noted, such as families, schools, peer groups and communities. The text concludes by addressing socialization, deterrence, imprisonments, alternatives, restitution and preventions.

Keywords: juvenile, justice system, retributive, rehabilitative, delinquency

Procedia PDF Downloads 457
596 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink

Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang

Abstract:

In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.

Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN

Procedia PDF Downloads 541
595 Fast Prediction Unit Partition Decision and Accelerating the Algorithm Using Cudafor Intra and Inter Prediction of HEVC

Authors: Qiang Zhang, Chun Yuan

Abstract:

Since the PU (Prediction Unit) decision process is the most time consuming part of the emerging HEVC (High Efficient Video Coding) standardin intra and inter frame coding, this paper proposes the fast PU decision algorithm and speed up the algorithm using CUDA (Compute Unified Device Architecture). In intra frame coding, the fast PU decision algorithm uses the texture features to skip intra-frame prediction or terminal the intra-frame prediction for smaller PU size. In inter frame coding of HEVC, the fast PU decision algorithm takes use of the similarity of its own two Nx2N size PU's motion vectors and the hierarchical structure of CU (Coding Unit) partition to skip some modes of PU partition, so as to reduce the motion estimation times. The accelerate algorithm using CUDA is based on the fast PU decision algorithm which uses the GPU to make the motion search and the gradient computation could be parallel computed. The proposed algorithm achieves up to 57% time saving compared to the HM 10.0 with little rate-distortion losses (0.043dB drop and 1.82% bitrate increase on average).

Keywords: HEVC, PU decision, inter prediction, intra prediction, CUDA, parallel

Procedia PDF Downloads 399
594 An Experimental Investigation on Explosive Phase Change of Liquefied Propane During a Bleve Event

Authors: Frederic Heymes, Michael Albrecht Birk, Roland Eyssette

Abstract:

Boiling Liquid Expanding Vapor Explosion (BLEVE) has been a well know industrial accident for over 6 decades now, and yet it is still poorly predicted and avoided. BLEVE is created when a vessel containing a pressure liquefied gas (PLG) is engulfed in a fire until the tank rupture. At this time, the pressure drops suddenly, leading the liquid to be in a superheated state. The vapor expansion and the violent boiling of the liquid produce several shock waves. This works aimed at understanding the contribution of vapor ad liquid phases in the overpressure generation in the near field. An experimental work was undertaken at a small scale to reproduce realistic BLEVE explosions. Key parameters were controlled through the experiments, such as failure pressure, fluid mass in the vessel, and weakened length of the vessel. Thirty-four propane BLEVEs were then performed to collect data on scenarios similar to common industrial cases. The aerial overpressure was recorded all around the vessel, and also the internal pressure changed during the explosion and ground loading under the vessel. Several high-speed cameras were used to see the vessel explosion and the blast creation by shadowgraph. Results highlight how the pressure field is anisotropic around the cylindrical vessel and highlights a strong dependency between vapor content and maximum overpressure from the lead shock. The time chronology of events reveals that the vapor phase is the main contributor to the aerial overpressure peak. A prediction model is built upon this assumption. Secondary flow patterns are observed after the lead. A theory on how the second shock observed in experiments forms is exposed thanks to an analogy with numerical simulation. The phase change dynamics are also discussed thanks to a window in the vessel. Ground loading measurements are finally presented and discussed to give insight into the order of magnitude of the force.

Keywords: phase change, superheated state, explosion, vapor expansion, blast, shock wave, pressure liquefied gas

Procedia PDF Downloads 77
593 Study on Errors in Estimating the 3D Gaze Point for Different Pupil Sizes Using Eye Vergences

Authors: M. Pomianek, M. Piszczek, M. Maciejewski

Abstract:

The binocular eye tracking technology is increasingly being used in industry, entertainment and marketing analysis. In the case of virtual reality, eye tracking systems are already the basis for user interaction with the environment. In such systems, the high accuracy of determining the user's eye fixation point is very important due to the specificity of the virtual reality head-mounted display (HMD). Often, however, there are unknown errors occurring in the used eye tracking technology, as well as those resulting from the positioning of the devices in relation to the user's eyes. However, can the virtual environment itself influence estimation errors? The paper presents mathematical analyses and empirical studies of the determination of the fixation point and errors resulting from the change in the size of the pupil in response to the intensity of the displayed scene. The article contains both static laboratory tests as well as on the real user. Based on the research results, optimization solutions were proposed that would reduce the errors of gaze estimation errors. Studies show that errors in estimating the fixation point of vision can be minimized both by improving the pupil positioning algorithm in the video image and by using more precise methods to calibrate the eye tracking system in three-dimensional space.

Keywords: eye tracking, fixation point, pupil size, virtual reality

Procedia PDF Downloads 132
592 The Use of Facebook as a Social Media by Political Parties in the June 7 Election in Konya

Authors: Yasemin Gülşen Yılmaz, Süleyman Hakan Yılmaz, Muhammet Erbay

Abstract:

Social media is among the most important means of communication. Social media offers individuals and groups with an opportunity for participatory socialization over the internet, which is free of any time and place restrictions. Social media is a kind of interactive communication and bilateral social network. Various communication contents can be shared and put into mass circulation easily and quickly through social media. These sharings are not only limited to individuals but also happen to groups, institutions, and different constitutions. Their contents consist of any type of written message, audio and video files. We are living in the social media era now. It is not surprising that social media which has extensive communication facilities and massive prevalence is used in politics. Therefore, the use of social media (Facebook) by political parties during the Turkish general elections held on June 7, 2015, has been chosen as our research subject. Four parties namely, AKP, CHP, MHP and HDP who have the majority of votes in Turkey and participate in elections in Konya have been selected for our study. Their provincial centers’ and parliamentary candidates` use of social media (Facebook) on the last three days prior to the election have been examined and subjected to a qualitative analysis by means of content analysis.

Keywords: social media, June 7 general elections, politics, Facebook

Procedia PDF Downloads 403