Search results for: about computer vision
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3160

Search results for: about computer vision

2140 Set-point Performance Evaluation of Robust ‎Back-Stepping Control Design for a Nonlinear ‎Electro-‎Hydraulic Servo System

Authors: Maria Ahmadnezhad, Seyedgharani Ghoreishi ‎

Abstract:

Electrohydraulic servo system have been used in industry in a wide ‎number of applications. Its ‎dynamics are highly nonlinear and also ‎have large extent of model uncertainties and external ‎disturbances. ‎In this thesis, a robust back-stepping control (RBSC) scheme is ‎proposed to overcome ‎the problem of disturbances and system ‎uncertainties effectively and to improve the set-point ‎performance ‎of EHS systems. In order to implement the proposed control ‎scheme, the system ‎uncertainties in EHS systems are considered as ‎total leakage coefficient and effective oil volume. In ‎addition, in ‎order to obtain the virtual controls for stabilizing system, the ‎update rule for the ‎system uncertainty term is induced by the ‎Lyapunov control function (LCF). To verify the ‎performance and ‎robustness of the proposed control system, computer simulation of ‎the ‎proposed control system using Matlab/Simulink Software is ‎executed. From the computer ‎simulation, it was found that the ‎RBSC system produces the desired set-point performance and ‎has ‎robustness to the disturbances and system uncertainties of ‎EHS systems.‎

Keywords: electro hydraulic servo system, back-stepping control, robust back-‎stepping control, Lyapunov redesign‎

Procedia PDF Downloads 1004
2139 Numerical Study on Parallel Rear-Spoiler on Super Cars

Authors: Anshul Ashu

Abstract:

Computers are applied to the vehicle aerodynamics in two ways. One of two is Computational Fluid Dynamics (CFD) and other is Computer Aided Flow Visualization (CAFV). Out of two CFD is chosen because it shows the result with computer graphics. The simulation of flow field around the vehicle is one of the important CFD applications. The flow field can be solved numerically using panel methods, k-ε method, and direct simulation methods. The spoiler is the tool in vehicle aerodynamics used to minimize unfavorable aerodynamic effects around the vehicle and the parallel spoiler is set of two spoilers which are designed in such a manner that it could effectively reduce the drag. In this study, the standard k-ε model of the simplified version of Bugatti Veyron, Audi R8 and Porsche 911 are used to simulate the external flow field. Flow simulation is done for variable Reynolds number. The flow simulation consists of three different levels, first over the model without a rear spoiler, second for over model with single rear spoiler, and third over the model with parallel rear-spoiler. The second and third level has following parameter: the shape of the spoiler, the angle of attack and attachment position. A thorough analysis of simulations results has been found. And a new parallel spoiler is designed. It shows a little improvement in vehicle aerodynamics with a decrease in vehicle aerodynamic drag and lift. Hence, it leads to good fuel economy and traction force of the model.

Keywords: drag, lift, flow simulation, spoiler

Procedia PDF Downloads 501
2138 Randomness in Cybertext: A Study on Computer-Generated Poetry from the Perspective of Semiotics

Authors: Hongliang Zhang

Abstract:

The use of chance procedures and randomizers in poetry-writing can be traced back to surrealist works, which, by appealing to Sigmund Freud's theories, were still logocentrism. In the 1960s, random permutation and combination were extensively used by the Oulipo, John Cage and Jackson Mac Low, which further deconstructed the metaphysical presence of writing. Today, the randomly-generated digital poetry has emerged as a genre of cybertext which should be co-authored by readers. At the same time, the classical theories have now been updated by cybernetics and media theories. N· Katherine Hayles put forward the concept of ‘the floating signifiers’ by Jacques Lacan to be the ‘the flickering signifiers’ , arguing that the technology per se has become a part of the textual production. This paper makes a historical review of the computer-generated poetry in the perspective of semiotics, emphasizing that the randomly-generated digital poetry which hands over the dual tasks of both interpretation and writing to the readers demonstrates the intervention of media technology in literature. With the participation of computerized algorithm and programming languages, poems randomly generated by computers have not only blurred the boundary between encoder and decoder, but also raises the issue of human-machine. It is also a significant feature of the cybertext that the productive process of the text is full of randomness.

Keywords: cybertext, digital poetry, poetry generator, semiotics

Procedia PDF Downloads 175
2137 Identification of EEG Attention Level Using Empirical Mode Decompositions for BCI Applications

Authors: Chia-Ju Peng, Shih-Jui Chen

Abstract:

This paper proposes a method to discriminate electroencephalogram (EEG) signals between different concentration states using empirical mode decomposition (EMD). Brain-computer interface (BCI), also called brain-machine interface, is a direct communication pathway between the brain and an external device without the inherent pathway such as the peripheral nervous system or skeletal muscles. Attention level is a common index as a control signal of BCI systems. The EEG signals acquired from people paying attention or in relaxation, respectively, are decomposed into a set of intrinsic mode functions (IMF) by EMD. Fast Fourier transform (FFT) analysis is then applied to each IMF to obtain the frequency spectrums. By observing power spectrums of IMFs, the proposed method has the better identification of EEG attention level than the original EEG signals between different concentration states. The band power of IMF3 is the most obvious especially in β wave, which corresponds to fully awake and generally alert. The signal processing method and results of this experiment paves a new way for BCI robotic system using the attention-level control strategy. The integrated signal processing method reveals appropriate information for discrimination of the attention and relaxation, contributing to a more enhanced BCI performance.

Keywords: biomedical engineering, brain computer interface, electroencephalography, rehabilitation

Procedia PDF Downloads 391
2136 Support Vector Machine Based Retinal Therapeutic for Glaucoma Using Machine Learning Algorithm

Authors: P. S. Jagadeesh Kumar, Mingmin Pan, Yang Yung, Tracy Lin Huan

Abstract:

Glaucoma is a group of visual maladies represented by the scheduled optic nerve neuropathy; means to the increasing dwindling in vision ground, resulting in loss of sight. In this paper, a novel support vector machine based retinal therapeutic for glaucoma using machine learning algorithm is conservative. The algorithm has fitting pragmatism; subsequently sustained on correlation clustering mode, it visualizes perfect computations in the multi-dimensional space. Support vector clustering turns out to be comparable to the scale-space advance that investigates the cluster organization by means of a kernel density estimation of the likelihood distribution, where cluster midpoints are idiosyncratic by the neighborhood maxima of the concreteness. The predicted planning has 91% attainment rate on data set deterrent on a consolidation of 500 realistic images of resolute and glaucoma retina; therefore, the computational benefit of depending on the cluster overlapping system pedestal on machine learning algorithm has complete performance in glaucoma therapeutic.

Keywords: machine learning algorithm, correlation clustering mode, cluster overlapping system, glaucoma, kernel density estimation, retinal therapeutic

Procedia PDF Downloads 254
2135 On the Implementation of The Pulse Coupled Neural Network (PCNN) in the Vision of Cognitive Systems

Authors: Hala Zaghloul, Taymoor Nazmy

Abstract:

One of the great challenges of the 21st century is to build a robot that can perceive and act within its environment and communicate with people, while also exhibiting the cognitive capabilities that lead to performance like that of people. The Pulse Coupled Neural Network, PCNN, is a relative new ANN model that derived from a neural mammal model with a great potential in the area of image processing as well as target recognition, feature extraction, speech recognition, combinatorial optimization, compressed encoding. PCNN has unique feature among other types of neural network, which make it a candid to be an important approach for perceiving in cognitive systems. This work show and emphasis on the potentials of PCNN to perform different tasks related to image processing. The main drawback or the obstacle that prevent the direct implementation of such technique, is the need to find away to control the PCNN parameters toward perform a specific task. This paper will evaluate the performance of PCNN standard model for processing images with different properties, and select the important parameters that give a significant result, also, the approaches towards find a way for the adaptation of the PCNN parameters to perform a specific task.

Keywords: cognitive system, image processing, segmentation, PCNN kernels

Procedia PDF Downloads 281
2134 Use of the Gas Chromatography Method for Hydrocarbons' Quality Evaluation in the Offshore Fields of the Baltic Sea

Authors: Pavel Shcherban, Vlad Golovanov

Abstract:

Currently, there is an active geological exploration and development of the subsoil shelf of the Kaliningrad region. To carry out a comprehensive and accurate assessment of the volumes and degree of extraction of hydrocarbons from open deposits, it is necessary to establish not only a number of geological and lithological characteristics of the structures under study, but also to determine the oil quality, its viscosity, density, fractional composition as accurately as possible. In terms of considered works, gas chromatography is one of the most capacious methods that allow the rapid formation of a significant amount of initial data. The aspects of the application of the gas chromatography method for determining the chemical characteristics of the hydrocarbons of the Kaliningrad shelf fields are observed in the article, as well as the correlation-regression analysis of these parameters in comparison with the previously obtained chemical characteristics of hydrocarbon deposits located on the land of the region. In the process of research, a number of methods of mathematical statistics and computer processing of large data sets have been applied, which makes it possible to evaluate the identity of the deposits, to specify the amount of reserves and to make a number of assumptions about the genesis of the hydrocarbons under analysis.

Keywords: computer processing of large databases, correlation-regression analysis, hydrocarbon deposits, method of gas chromatography

Procedia PDF Downloads 157
2133 Enhanced Multi-Scale Feature Extraction Using a DCNN by Proposing Dynamic Soft Margin SoftMax for Face Emotion Detection

Authors: Armin Nabaei, M. Omair Ahmad, M. N. S. Swamy

Abstract:

Many facial expression and emotion recognition methods in the traditional approaches of using LDA, PCA, and EBGM have been proposed. In recent years deep learning models have provided a unique platform addressing by automatically extracting the features for the detection of facial expression and emotions. However, deep networks require large training datasets to extract automatic features effectively. In this work, we propose an efficient emotion detection algorithm using face images when only small datasets are available for training. We design a deep network whose feature extraction capability is enhanced by utilizing several parallel modules between the input and output of the network, each focusing on the extraction of different types of coarse features with fined grained details to break the symmetry of produced information. In fact, we leverage long range dependencies, which is one of the main drawback of CNNs. We develop this work by introducing a Dynamic Soft-Margin SoftMax.The conventional SoftMax suffers from reaching to gold labels very soon, which take the model to over-fitting. Because it’s not able to determine adequately discriminant feature vectors for some variant class labels. We reduced the risk of over-fitting by using a dynamic shape of input tensor instead of static in SoftMax layer with specifying a desired Soft- Margin. In fact, it acts as a controller to how hard the model should work to push dissimilar embedding vectors apart. For the proposed Categorical Loss, by the objective of compacting the same class labels and separating different class labels in the normalized log domain.We select penalty for those predictions with high divergence from ground-truth labels.So, we shorten correct feature vectors and enlarge false prediction tensors, it means we assign more weights for those classes with conjunction to each other (namely, “hard labels to learn”). By doing this work, we constrain the model to generate more discriminate feature vectors for variant class labels. Finally, for the proposed optimizer, our focus is on solving weak convergence of Adam optimizer for a non-convex problem. Our noteworthy optimizer is working by an alternative updating gradient procedure with an exponential weighted moving average function for faster convergence and exploiting a weight decay method to help drastically reducing the learning rate near optima to reach the dominant local minimum. We demonstrate the superiority of our proposed work by surpassing the first rank of three widely used Facial Expression Recognition datasets with 93.30% on FER-2013, and 16% improvement compare to the first rank after 10 years, reaching to 90.73% on RAF-DB, and 100% k-fold average accuracy for CK+ dataset, and shown to provide a top performance to that provided by other networks, which require much larger training datasets.

Keywords: computer vision, facial expression recognition, machine learning, algorithms, depp learning, neural networks

Procedia PDF Downloads 75
2132 Research Study on the Environmental Conditions in the Foreign

Authors: Vahid Bairami Rad, Shapoor Norazar, Moslem Talebi Asl

Abstract:

The fast growing accessibility and capability of emerging technologies have fashioned enormous possibilities of designing, developing and implementing innovative teaching methods in the classroom. Using teaching methods and technology together have a fantastic results, because the global technological scenario has paved the way to new pedagogies in teaching-learning process. At the other side methods by focusing on students and the ways of learning in them, that can demonstrate logical ways of improving student achievement in English as a foreign language in Iran. The sample of study was 90 students of 10th grade of high school located in Ardebil. A pretest-posttest equivalent group designed to compare the achievement of groups. Students divided to 3 group, Control base, computer base, method and technology base. Pretest and post test contain 30 items each from English textbook were developed and administrated, then obtained data were analyzed. The results showed that there was an important difference. The 3rd group performance was better than other groups. On the basis of this result it was obviously counseled that teaching-learning capabilities.

Keywords: method, technology based environment, computer based environment, english as a foreign language, student achievement

Procedia PDF Downloads 474
2131 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca

Authors: Asmaa Sokrat, Aykut Karaman

Abstract:

Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.

Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca

Procedia PDF Downloads 139
2130 Tracking Performance Evaluation of Robust Back-Stepping Control Design for a ‎Nonlinear Electro-Hydraulic Servo System

Authors: Maria Ahmadnezhad, Mohammad Reza Soltanpour

Abstract:

Electrohydraulic servo systems have been used in industry in a wide number of applications. Its dynamics ‎are highly nonlinear and also have large extent of model uncertainties and external disturbances. In this ‎thesis, a robust back-stepping control (RBSC) scheme is proposed to overcome the problem of ‎disturbances and system uncertainties effectively and to improve the tracking performance of EHS ‎systems. In order to implement the proposed control scheme, the system uncertainties in EHS systems ‎are considered as total leakage coefficient and effective oil volume. In addition, in order to obtain the ‎virtual controls for stabilizing system, the update rule for the system uncertainty term is induced by the ‎Lyapunov control function (LCF). To verify the performance and robustness of the proposed control ‎system, computer simulation of the proposed control system using Matlab/Simulink Software is ‎executed. From the computer simulation, it was found that the RBSC system produces the desired ‎tracking performance and has robustness to the disturbances and system uncertainties of EHS systems.‎

Keywords: electro hydraulic servo system, back-stepping control, robust back-stepping control, Lyapunov redesign

Procedia PDF Downloads 297
2129 The Role of Intermediaries in E-Government Adoption in India: Bridging the Digital Divide

Authors: Rajiv Kumar, Amit Sachan, Arindam Mukherjee

Abstract:

Despite the transparency and benefits of e-government, and its potential to serve citizens better, there is low diffusion and adoption of e-government services in India. Limited access to computer and internet, lack of computer and internet skills, low trust in technology, and risk associated in using e-government services are major hindrances in e-government adoption in India. Despite a large number of citizens belonging to the non-adopter category, the government has made some services mandatory to be accessed online where citizens have no other choice. Also despite the digital divide, a large number of citizens prefer online access to government services. In such cases intermediaries like common service centers, internet café and services agents’ roles are significant for accessing e-government services. Hence research is needed to explore this. The study aims to investigate the role of intermediaries in online access to public services by citizens. Qualitative research methodology using semi-structured interview was used. The results show that intermediaries play an important role in bridging the digital divide. The study also highlights on what circumstances citizens are taking help of these intermediaries. The study then highlights its limitations and discusses scope for future study.

Keywords: adoption, digital divide, e-government, India, intermediaries

Procedia PDF Downloads 297
2128 Study on the Impact of Size and Position of the Shear Field in Determining the Shear Modulus of Glulam Beam Using Photogrammetry Approach

Authors: Niaz Gharavi, Hexin Zhang

Abstract:

The shear modulus of a timber beam can be determined using torsion test or shear field test method. The shear field test method is based on shear distortion measurement of the beam at the zone with the constant transverse load in the standardized four-point bending test. The current code of practice advises using two metallic arms act as an instrument to measure the diagonal displacement of the constructing square. The size and the position of the constructing square might influence the shear modulus determination. This study aimed to investigate the size and the position effect of the square in the shear field test method. A binocular stereo vision system has been employed to determine the 3D displacement of a grid of target points. Six glue laminated beams were produced and tested. Analysis of Variance (ANOVA) was performed on the acquired data to evaluate the significance of the size effect and the position effect of the square. The results have shown that the size of the square has a noticeable influence on the value of shear modulus, while, the position of the square within the area with the constant shear force does not affect the measured mean shear modulus.

Keywords: shear field test method, structural-sized test, shear modulus of Glulam beam, photogrammetry approach

Procedia PDF Downloads 293
2127 Advanced Eales’ Disease with Neovascular Glaucoma at First Presentation: Case Report

Authors: Mohammed A. Alfayyadh, Halla A. AlAbdulhadi, Mahdi H. Almubarak

Abstract:

Purpose: Eales’ disease is an idiopathic vasculitis that affects the peripheral retina. It is characterized by recurrent vitreous hemorrhage as a complication of retinal neovascularization. It is more prevalent in India and affects young males. Here we present a patient with neovascular glaucoma as a rare first presentation of Eales’ disease. Observations: This is a 24-year-old Indian gentleman, who complained of a sudden decrease in vision in the left eye over less than 24 hours, along with frontal headache and eye pain for the last three weeks. Ocular examination revealed peripheral retinal ischemia in the right eye, very high intraocular pressure, rubeosis iridis, vitreous hemorrhage and extensive retinal ischemia in the left eye, vascular sheathing and neovascularization in both eyes. Purified protein derivative skin test was positive. The patient was managed with anti-glaucoma, intravitreal anti-vascular endothelial growth factor and laser photocoagulation. Systemic steroids and anti-tuberculous therapy were also initiated. Conclusions: Neovascular glaucoma is an infrequent complication of Eales’ disease. However, the lack of early detection of the disease in the early stages might lead to such serious complication.

Keywords: case report, Eales’ disease, mycobacterium tuberculosis, neovascular glaucoma

Procedia PDF Downloads 129
2126 Internet Optimization by Negotiating Traffic Times

Authors: Carlos Gonzalez

Abstract:

This paper describes a system to optimize the use of the internet by clients requiring downloading of videos at peak hours. The system consists of a web server belonging to a provider of video contents, a provider of internet communications and a software application running on a client’s computer. The client using the application software will communicate to the video provider a list of the client’s future video demands. The video provider calculates which videos are going to be more in demand for download in the immediate future, and proceeds to request the internet provider the most optimal hours to do the downloading. The times of the downloading will be sent to the application software, which will use the information of pre-established hours negotiated between the video provider and the internet provider to download those videos. The videos will be saved in a special protected section of the user’s hard disk, which will only be accessed by the application software in the client’s computer. When the client is ready to see a video, the application will search the list of current existent videos in the area of the hard disk; if it does exist, it will use this video directly without the need for internet access. We found that the best way to optimize the download traffic of videos is by negotiation between the internet communication provider and the video content provider.

Keywords: internet optimization, video download, future demands, secure storage

Procedia PDF Downloads 136
2125 Measuring Delay Using Software Defined Networks: Limitations, Challenges, and Suggestions for Openflow

Authors: Ahmed Alutaibi, Ganti Sudhakar

Abstract:

Providing better Quality-of-Service (QoS) to end users has been a challenging problem for researchers and service providers. Building applications relying on best effort network protocols hindered the adoption of guaranteed service parameters and, ultimately, Quality of Service. The introduction of Software Defined Networking (SDN) opened the door for a new paradigm shift towards a more controlled programmable configurable behavior. Openflow has been and still is the main implementation of the SDN vision. To facilitate better QoS for applications, the network must calculate and measure certain parameters. One of those parameters is the delay between the two ends of the connection. Using the power of SDN and the knowledge of application and network behavior, SDN networks can adjust to different conditions and specifications. In this paper, we use the capabilities of SDN to implement multiple algorithms to measure delay end-to-end not only inside the SDN network. The results of applying the algorithms on an emulated environment show that we can get measurements close to the emulated delay. The results also show that depending on the algorithm, load on the network and controller can differ. In addition, the transport layer handshake algorithm performs best among the tested algorithms. Out of the results and implementation, we show the limitations of Openflow and develop suggestions to solve them.

Keywords: software defined networking, quality of service, delay measurement, openflow, mininet

Procedia PDF Downloads 166
2124 A Novel Breast Cancer Detection Algorithm Using Point Region Growing Segmentation and Pseudo-Zernike Moments

Authors: Aileen F. Wang

Abstract:

Mammography has been one of the most reliable methods for early detection and diagnosis of breast cancer. However, mammography misses about 17% and up to 30% of breast cancers due to the subtle and unstable appearances of breast cancer in their early stages. Recent computer-aided diagnosis (CADx) technology using Zernike moments has improved detection accuracy. However, it has several drawbacks: it uses manual segmentation, Zernike moments are not robust, and it still has a relatively high false negative rate (FNR)–17.6%. This project will focus on the development of a novel breast cancer detection algorithm to automatically segment the breast mass and further reduce FNR. The algorithm consists of automatic segmentation of a single breast mass using Point Region Growing Segmentation, reconstruction of the segmented breast mass using Pseudo-Zernike moments, and classification of the breast mass using the root mean square (RMS). A comparative study among the various algorithms on the segmentation and reconstruction of breast masses was performed on randomly selected mammographic images. The results demonstrated that the newly developed algorithm is the best in terms of accuracy and cost effectiveness. More importantly, the new classifier RMS has the lowest FNR–6%.

Keywords: computer aided diagnosis, mammography, point region growing segmentation, pseudo-zernike moments, root mean square

Procedia PDF Downloads 453
2123 Digital Privacy Legislation Awareness

Authors: Henry Foulds, Magda Huisman, Gunther R. Drevin

Abstract:

Privacy is regarded as a fundamental human right and it is clear that the study of digital privacy is an important field. Digital privacy is influenced by new and constantly evolving technologies and this continuous change makes it hard to create legislation to protect people’s privacy from being exploited by misuse of these technologies.

This study aims to benefit digital privacy legislation efforts by evaluating the awareness and perceived importance of digital privacy legislation among computer science students. The chosen fixed variables for the population are study year and gamer classification.

The use of location based services in mobile applications and games are a concern for digital privacy. For this reason the study focused on computer science students as they have a high likelihood to use and develop this type of software. Surveys were used to evaluate awareness and perceived importance of digital privacy legislation.

The results of the study show that privacy legislation and awareness of privacy legislation are important to people. The perception of the importance of privacy legislation increases with academic experience. Awareness of privacy legislation increases from non-gamers to pro gamers. 

Keywords: digital privacy, legislation awareness, gaming, privacy legislation

Procedia PDF Downloads 355
2122 Analysis of Thermal Comfort in Educational Buildings Using Computer Simulation: A Case Study in Federal University of Parana, Brazil

Authors: Ana Julia C. Kfouri

Abstract:

A prerequisite of any building design is to provide security to the users, taking the climate and its physical and physical-geometrical variables into account. It is also important to highlight the relevance of the right material elements, which arise between the person and the agent, and must provide improved thermal comfort conditions and low environmental impact. Furthermore, technology is constantly advancing, as well as computational simulations for projects, and they should be used to develop sustainable building and to provide higher quality of life for its users. In relation to comfort, the more satisfied the building users are, the better their intellectual performance will be. Based on that, the study of thermal comfort in educational buildings is of relative relevance, since the thermal characteristics in these environments are of vital importance to all users. Moreover, educational buildings are large constructions and when they are poorly planned and executed they have negative impacts to the surrounding environment, as well as to the user satisfaction, throughout its whole life cycle. In this line of thought, to evaluate university classroom conditions, it was accomplished a detailed case study on the thermal comfort situation at Federal University of Parana (UFPR). The main goal of the study is to perform a thermal analysis in three classrooms at UFPR, in order to address the subjective and physical variables that influence thermal comfort inside the classroom. For the assessment of the subjective components, a questionnaire was applied in order to evaluate the reference for the local thermal conditions. Regarding the physical variables, it was carried out on-site measurements, which consist of performing measurements of air temperature and air humidity, both inside and outside the building, as well as meteorological variables, such as wind speed and direction, solar radiation and rainfall, collected from a weather station. Then, a computer simulation based on results from the EnergyPlus software to reproduce air temperature and air humidity values of the three classrooms studied was conducted. The EnergyPlus outputs were analyzed and compared with the on-site measurement results to be possible to come out with a conclusion related to the local thermal conditions. The methodological approach included in the study allowed a distinct perspective in an educational building to better understand the classroom thermal performance, as well as the reason of such behavior. Finally, the study induces a reflection about the importance of thermal comfort for educational buildings and propose thermal alternatives for future projects, as well as a discussion about the significant impact of using computer simulation on engineering solutions, in order to improve the thermal performance of UFPR’s buildings.

Keywords: computer simulation, educational buildings, EnergyPlus, humidity, temperature, thermal comfort

Procedia PDF Downloads 388
2121 Blogging vs Paper-and-Pencil Writing: Evidences from an Iranian Academic L2 Setting

Authors: Mehran Memari, Bita Asadi

Abstract:

Second language (L2) classrooms in academic contexts usually consist of learners with diverse L2 proficiency levels. One solution for managing such heterogeneous classes and addressing individual needs of students is to improve learner autonomy by using technological innovations such as blogging. The focus of this study is on investigating the effects of blogging on improving the quality of Iranian university students' writings. For this aim, twenty-six Iranian university students participated in the study. Students in the experimental group (n=13) were required to blog daily while the students in the control group (n=13) were asked to write a daily schedule using paper and pencil. After a 3-month period of instruction, the five last writings of the students from both groups were rated by two experienced raters. Also, students' attitudes toward the traditional method and blogging were surveyed using a questionnaire and a semi-structured interview. The research results showed evidences in favor of the students who used blogging in their writing program. Also, although students in the experimental group found blogging more demanding than the traditional method, they showed an overall positive attitude toward the use of blogging as a way of improving their writing skills. The findings of the study have implications for the incorporation of computer-assisted learning in L2 academic contexts.

Keywords: blogging, computer-assisted learning, paper and pencil, writing

Procedia PDF Downloads 402
2120 Investigating Teachers’ Perceptions about the Use of Technology in Second Language Learning at Universities in Pakistan

Authors: Nadir Ali Mugheri

Abstract:

This study has explored the perceptions of English language teachers (ELT) regarding use of technology in learning English as a second language (L2) at Universities in Pakistan. In this regard, 200 ELT teachers from 80 leading universities were selected through a judgmental sampling method. Results established that most of the teachers supported integration and incorporation of technology in the language classroom so as to teach L2 in an effective and efficient way. This study unearthed that the teachers termed the use of technology in learning English as a second language (ESL) as a positive step towards enhancing the learning capabilities and improving the personal traits of the students or learners. Findings suggest that the integration of technology in the language learning makes the learners within the classroom active and enthusiastic, and the teachers need to be equipped with the latest knowledge of mobile assisted language learning (MALL) and computer assisted language learning (CALL) so that they may ensure use of this innovative technology in their teaching practices. Results also indicated that the technology has proved itself a stimulus for improving language in the ELT milieu. The use of technology helps teachers develop themselves professionally. This study discovered that there are many determinants that make teaching and learning within the classroom efficacious, while the use of technology is one of them. Data was collected through qualitative design in order to get a complete depiction. Semi-structured interviews were conducted and analyzed through thematic analysis.

Keywords: english language teaching, computer assisted language learning, use of technology, thematic analysis

Procedia PDF Downloads 70
2119 Ocular Complications, Adverse Effects of the Procedure, Side-effects of Medications Used for Graft Survival, and Preventable Vision Loss in Live-related Renal Transplant Recipients: Experience at a Transplant Centre in Pakistan

Authors: Fatema Ali Lanewala, Akhtar Jamal Khan

Abstract:

The ocular complications in renal transplant recipients at the biggest transplant center in Pakistan were seen to be diverse, multiple, and sight-threatening. These complications could mainly be due to the primary disease causing renal failure, the process of transplantation, and/or the medications used pre and post-transplantation. A retrospective case series recently published in the Journal of Pakistan Medical Association highlights the common ocular pathologies encountered in renal transplant population. Majority of the patients suffered from cataract, which is a known side-effect of long-term steroids routinely used for graft survival. There was a unique finding in Pakistani population, never reported before from any other transplant centre world over; a large number of recipients was reported to be suffering from night blindness, which significantly improved on vitamin A supplementation. There were a variety of other ocular complications seen which emphasizes the necessity of ocular care and routine examination of transplant recipient’s eyes by an ophthalmologist in order to avoid visual compromise and improve the quality of life of the transplant recipient.

Keywords: cataract, night blindness, ocular complications, renal transplantation

Procedia PDF Downloads 107
2118 Giftedness Cloud Model: A Psychological and Ecological Vision of Giftedness Concept

Authors: Rimeyah H. S. Almutairi, Alaa Eldin A. Ayoub

Abstract:

The aim of this study was to identify empirical and theoretical studies that explored giftedness theories and identification. In order to assess and synthesize the mechanisms, outcomes, and impacts of gifted identification models. Thus, we sought to provide an evidence-informed answer to how does current giftedness theories work and effectiveness. In order to develop a model that incorporates the advantages of existing models and avoids their disadvantages as much as possible. We conducted a systematic literature review (SLR). The disciplined analysis resulted in a final sample consisting of 30 appropriate searches. The results indicated that: (a) there is no uniform and consistent definition of Giftedness; (b) researchers are using several non-consistent criteria to detect gifted, and (d) The detection of talent is largely limited to early ages, and there is obvious neglect of adults. This study contributes to the development of Giftedness Cloud Model (GCM) which defined as a model that attempts to interpretation giftedness within an interactive psychological and ecological framework. GCM aims to help a talented to reach giftedness core and manifestation talent in creative productivity or invention. Besides that, GCM suggests classifying giftedness into four levels of mastery, excellence, creative productivity, and manifestation. In addition, GCM presents an idea to distinguish between talent and giftedness.

Keywords: giftedness cloud model, talent, systematic literature review, giftedness concept

Procedia PDF Downloads 167
2117 Identification System for Grading Banana in Food Processing Industry

Authors: Ebenezer O. Olaniyi, Oyebade K. Oyedotun, Khashman Adnan

Abstract:

In the food industry high quality production is required within a limited time to meet up with the demand in the society. In this research work, we have developed a model which can be used to replace the human operator due to their low output in production and slow in making decisions as a result of an individual differences in deciding the defective and healthy banana. This model can perform the vision attributes of human operators in deciding if the banana is defective or healthy for food production based. This research work is divided into two phase, the first phase is the image processing where several image processing techniques such as colour conversion, edge detection, thresholding and morphological operation were employed to extract features for training and testing the network in the second phase. These features extracted in the first phase were used in the second phase; the classification system phase where the multilayer perceptron using backpropagation neural network was employed to train the network. After the network has learned and converges, the network was tested with feedforward neural network to determine the performance of the network. From this experiment, a recognition rate of 97% was obtained and the time taken for this experiment was limited which makes the system accurate for use in the food industry.

Keywords: banana, food processing, identification system, neural network

Procedia PDF Downloads 471
2116 An Ethnographic Study: Ineffective Management of a Social Enterprise

Authors: Sylvia Acquah

Abstract:

The assumption that social enterprises are empowering has strong theoretical support, but empirical verification is anecdotal at best. Social enterprises blend social goal with an enterprising idea and therefore in theory these enterprises should provide meaningful jobs that are empowering. Whether jobs created are meaningful, or whether these organizations are practicing social entrepreneurship remains unexplored key questions. This paper addresses these key questions through a comprehensive literature review and an ethnographical study of a Domiciliary Home Care Social Enterprise in the UK. The social entrepreneurs, management and 9 staff members were observed, interviewed and achieves were reviewed and analyzed. In this study, the social entrepreneur’s vision was lost in transition during management change and the organization was only identified as a social enterprise by name. The organization that was set up to tackle lack of continuity in care and create a family of independent carers, was eventually closed down overnight and subjected to investigation by social services and the local council. Also, the ineffectiveness of the organization led to staff being stressed and without the support of the management to help rectify the issues; staff started displaying symptoms of burnout. Social enterprise managers should not only focus on profit maximization or generation, but should equally live up to the core tenets of the enterprise and effectively communicate and gain buy-in of all employees for any changes. Further, there ought to be an independent organization that regulates social enterprises to ensure that they are adhering to their social goals.

Keywords: ethnography, carer, social, enterprise

Procedia PDF Downloads 318
2115 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 358
2114 Mailchimp AI Application For Marketing Employees

Authors: Alia El Akhrass, Raheed Al Jifri, Sara Babalghoum, Jana Bushnag

Abstract:

This project delves into exploring the functionalities of Mailchimp, an artificial intelligence application. The objective is to comprehend its operations through the AI tools it offers. To achieve this, a survey was conducted among peers, seeking insights into Mailchimp's functionality, accessibility, efficiency, and overall benefits. The survey aimed to gather valuable feedback for analysis. Subsequently, a thorough analysis of the collected data was performed to identify trends, patterns, and areas of improvement. Visual representations were then crafted to effectively summarize the findings, aiding in conveying the research outcomes clearly. Founded in 2001, Mailchimp initially provided email marketing services but has since expanded into a comprehensive marketing platform. Its focus on simplicity and accessibility has contributed to its success among businesses of all sizes. Alternative platforms such as Constant Contact, AWeber, and GetResponse offer similar services with their own unique strengths. Mailchimp's journey exemplifies the importance of vision and adaptability in the ever-evolving digital marketing landscape. By prioritizing innovation, user-centricity, and customer service, Mailchimp has established itself as a trusted partner in the field of digital marketing, enabling businesses to effectively connect with their customers and achieve their marketing goals.

Keywords: email marketing, ai tool, connect, communicate, generate

Procedia PDF Downloads 42
2113 The Effect of the Base Computer Method on Repetitive Behaviors and Communication Skills

Authors: Hoorieh Darvishi, Rezaei

Abstract:

Introduction: This study investigates the efficacy of computer-based interventions for children with Autism Spectrum Disorder , specifically targeting communication deficits and repetitive behaviors. The research evaluates novel software applications designed to enhance narrative capabilities and sensory integration through structured, progressive intervention protocols Method: The study evaluated two intervention software programs designed for children with autism, focusing on narrative speech and sensory integration. Twelve children aged 5-11 participated in the two-month intervention, attending three 45-minute weekly sessions, with pre- and post-tests measuring speech, communication, and behavioral outcomes. The narrative speech software incorporated 14 stories using the Cohen model. It progressively reduced software assistance as children improved their storytelling abilities, ultimately enabling independent narration. The process involved story comprehension questions and guided story completion exercises. The sensory integration software featured approximately 100 exercises progressing from basic classification to complex cognitive tasks. The program included attention exercises, auditory memory training (advancing from single to four-syllable words), problem-solving, decision-making, reasoning, working memory, and emotion recognition activities. Each module was accompanied by frequency and pitch-adjusted music that child enjoys it to enhance learning through multiple sensory channels (visual, auditory, and tactile). Conclusion: The results indicated that the use of these software programs significantly improved communication and narrative speech scores in children, while also reducing scores related to repetitive behaviors. Findings: These findings highlight the positive impact of computer-based interventions on enhancing communication skills and reducing repetitive behaviors in children with autism.

Keywords: autism, communication_skills, repetitive_behaviors, sensory_integration

Procedia PDF Downloads 14
2112 The Effect of the Base Computer Method on Repetitive Behaviors and Communication Skills

Authors: Hoorieh Darvishi, Rezaei

Abstract:

Introduction: This study investigates the efficacy of computer-based interventions for children with Autism Spectrum Disorder , specifically targeting communication deficits and repetitive behaviors. The research evaluates novel software applications designed to enhance narrative capabilities and sensory integration through structured, progressive intervention protocols Method: The study evaluated two intervention software programs designed for children with autism, focusing on narrative speech and sensory integration. Twelve children aged 5-11 participated in the two-month intervention, attending three 45-minute weekly sessions, with pre- and post-tests measuring speech, communication, and behavioral outcomes. The narrative speech software incorporated 14 stories using the Cohen model. It progressively reduced software assistance as children improved their storytelling abilities, ultimately enabling independent narration. The process involved story comprehension questions and guided story completion exercises. The sensory integration software featured approximately 100 exercises progressing from basic classification to complex cognitive tasks. The program included attention exercises, auditory memory training (advancing from single to four-syllable words), problem-solving, decision-making, reasoning, working memory, and emotion recognition activities. Each module was accompanied by frequency and pitch-adjusted music that child enjoys it to enhance learning through multiple sensory channels (visual, auditory, and tactile). Conclusion: The results indicated that the use of these software programs significantly improved communication and narrative speech scores in children, while also reducing scores related to repetitive behaviors. Findings: These findings highlight the positive impact of computer-based interventions on enhancing communication skills and reducing repetitive behaviors in children with autism.

Keywords: autism, narrative speech, persian, SI, repetitive behaviors, communication

Procedia PDF Downloads 15
2111 Closed-Loop Audit of the Degree of the Management of Thrombocytosis in Accordance with Nice Guidance at Roseneath General Practice

Authors: Georgia Mills, Rachel Parsonage

Abstract:

Thrombocytosis is a platelet count above the upper limit of the normal range. An urgent referral is advised for counts over 1000 x109 and if the count is between 600-1000 x109 with certain conditions/age. A non-urgent referral is warranted when the level is above 450 × 109/L (for more than 3 months) or over 600 × 109/L on at least two occasions (4–6 weeks apart) or within the range 450–600 × 109/L with other haematological abnormalities. The aim of this audit is the assess how well Roseneath's general practice has adhered to the National Institute for Health and Care Excellence (NICE) guidelines for investigations and management of high platelet counts. Through the filtering tool on Vision, all blood results in the surgery were filtered to only show those with a platelet count above 450 x 109 /L. These patients were then analyzed individually to see where they fall on the current NICE guidance pathway for management. The investigations and management of thrombocytosis were generally poor. 60% of those who needed an urgent referral did not have it done. 30% of those who needed a follow-up blood test did not have it done. 60% of those needing a routine referral from complete investigations did not have it done. To improve the knowledge of NICE guidelines within the practice, a teaching session was delivered. Percentages then reached 100% in the 2nd audit. There is a lack of awareness of guidelines and education on thrombocytosis in primary care. Teaching sessions will benefit outcomes greatly

Keywords: platelets, thrombocytosis, management, referral

Procedia PDF Downloads 65