Search results for: distant named entity recognition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2791

Search results for: distant named entity recognition

1741 Forensic Detection of Errors Permitted by the Witnesses in Their Testimony

Authors: Lev Bertovsky

Abstract:

The purpose of this study was to determine the reasons for the formation of false testimony from witnesses and make recommendations on the recognition of such cases. During the studies, which were based on the achievements of professionals in the field of psychology, as well as personal investigative practice, the stages of perception of the information were studied, as well as the process of its reclaim from the memory and transmission to the communicator upon request. Based on the principles of the human brain, kinds of conscientious witness mistakes were systematized. Proposals were formulated for the optimization of investigative actions in cases where the witnesses make an honest mistake with respect to the effects previously observed by them.

Keywords: criminology, eyewitness testimony, honest mistake, information, investigator, investigation, questioning

Procedia PDF Downloads 185
1740 The Queer Language: A Case Study of the Hyderabadi Queers

Authors: Sreerakuvandana Vandana

Abstract:

Although the term third gender is relatively new, the language that is in use has already made its way to the concept of identity. With the vast recognition and the transparency in expressing their identity without a tint of embarrassment, it is highly essential to take into account the idea of “identity” and “language”. The community however picks up language as a tool to assert their presence in the “mainstream”, albeit contradictory practices. The paper is an attempt to see how Koti claims and tries to be a language just like any other language. With that, it also identifies how the community wants to be identified as a unique group, but yet want to remain grounded to the ‘mainstream’. The work is an attempt to bring out the secret language of the LGBT community and understand their desire to be recognized as "main stream." The paper is also an attempt to bring into light this language and see if it qualifies to be a language at all.

Keywords: identity, language, queer, transgender

Procedia PDF Downloads 541
1739 Extraction of Text Subtitles in Multimedia Systems

Authors: Amarjit Singh

Abstract:

In this paper, a method for extraction of text subtitles in large video is proposed. The video data needs to be annotated for many multimedia applications. Text is incorporated in digital video for the motive of providing useful information about that video. So need arises to detect text present in video to understanding and video indexing. This is achieved in two steps. First step is text localization and the second step is text verification. The method of text detection can be extended to text recognition which finds applications in automatic video indexing; video annotation and content based video retrieval. The method has been tested on various types of videos.

Keywords: video, subtitles, extraction, annotation, frames

Procedia PDF Downloads 601
1738 Determination of the CCR5Δ32 Frequency in Emiratis and Tunisians and Screening of the CCR5 Gene for Novel Alleles in Emiratis

Authors: Sara A. Al-Jaberi, Salma Ben-Salem, Meriam Messedi, Fatma Ayadi, Lihadh Al-Gazali, Bassam R. Ali

Abstract:

Background: The chemokine receptor components play crucial roles in the immune system and some of them serve as co-receptors for the HIV virus. Several studies have documented those variants in chemokine receptors are correlated with susceptibility and resistance to infection with HIV virus. For example, mutations in the chemokine receptor 5 gene (CCR5) resulting in loss-of-function (such as the homozygous CCR5Δ32) confer high degree of resistance to HIV infection. Heterozygotes for these variants exhibit slow progression to AIDS. The prevalence of CCR5 polymorphisms varies among ethnic and geographical groups. For example, the CCR5 Δ32 variant is present in 10–15% of north Europeans but is rarely encountered among Africans. This study aims to identify the prevalence of some CCR5 variants in two geographically distant Arab populations (namely Emiratis and Tunisians). Methodology: The prevalence of CCR5 gene variants including CCR5Δ32, FS299, C101X, A29S and C178R has been determined using PCR and direct DNA sequencing. A total of 403 unrelated healthy individuals (253 Emiratis and 150 Tunisians) were genotyped for the CCR5Δ32 variant using PCR amplification and gel electrophoresis. In addition, 200 Emiratis have been screened for other SNPs using Sanger DNA sequencing. Results: Among Emiratis, the allele frequency of the CCR5Δ32 variant has been found to be 0.002. In addition, two variants L55Q and A159 were found at a frequency of 0.002.Moreover, the prevalence of the CCR5Δ32 variant in Tunisians was estimated to be 0.013 which is relatively higher than its frequency in Emiratis but lower than Europeans. Conclusion: We conclude that the allele frequency of the most critical CCR5 polymorphism (Δ32) is extremely low among Emiratis compared to other Arabs and North Europeans. In addition, very low allele frequencies of other CCR5 polymorphisms have been detected among Emiratis.

Keywords: chemokine receptors, CCR5Δ32, CCR5 polymorphisms, Emiratis, Arab populations

Procedia PDF Downloads 378
1737 A Discourse Completion Test Analysis of Email Request Strategies as Used by Tunisian Postgraduate Students

Authors: Imen Aribi Ben Amor

Abstract:

The aim of the present study is to analyze the performance of requests in emails among a group of Tunisian postgraduate students. It also seeks to determine the influence of the social factors on the participants’ requests performance. For this purpose, the data were collected using a discourse completion test (DCT). Accordingly, 42 Tunisian postgraduate students were asked to respond in English to eight different situations in which they carried out the speech act of request in emails. The data were analyzed based on the degree of directness. A detailed analysis of the head acts found in the DCT revealed that Tunisian Postgraduate students use a varied repertoire of request strategies (direct, conventionally indirect and non-conventionally indirect) but at the same time rely heavily on direct request strategies. They tended to address their requestees directly except for distant superiors. DCT results suggest that the participants are to some extent aware of the influence of the ranking of imposition and social distance but fail to acknowledge the weight of social power when performing requests in emails. The preference of the participants to use direct strategies may be the result of the effect of Tunisian culture and the negative transfer of Tunisian communicative strategies. Accordingly, this study suggests some pedagogical implications and suggestions for Tunisian EFL (English as a Foreign Language) instructors. They are required to pay closer attention to the pragmalinguistic nuances of the ways in which requests in emails are realized. Teachers can also help students understand academic email etiquettes by explicitly explaining what they expect in the student email. Thus, EFL teachers and syllabus designers should devote more attention to developing EFL learners’ pragmatic competence through teaching L2 pragmatics.

Keywords: directness, ranking of imposition, request strategies, social distance, social power

Procedia PDF Downloads 231
1736 A Social Network Analysis for Formulating Construction Defect Generation Mechanisms

Authors: Hamad Aljassmi, Sangwon Han

Abstract:

Various solutions for preventing construction defects have been suggested. However, a construction company may have difficulties adopting all these suggestions due to financial and practical constraints. Based on this recognition, this paper aims to identify the most significant defect causes and formulate their defect generation mechanism in order to help a construction company to set priorities of its defect prevention strategies. For this goal, we conducted a questionnaire survey of 106 industry professionals and identified five most significant causes including: (1) organizational culture, (2) time pressure and constraints, (3) workplace quality system, (4) financial constraints upon operational expenses and (5) inadequate employee training or learning opportunities.

Keywords: defect, quality, failure, risk

Procedia PDF Downloads 627
1735 Reconstruction of the 'Bakla' as an Identity

Authors: Oscar H. Malaco Jr.

Abstract:

Homosexuality has been adapted as the universal concept that defines the deviations from the heteronormative parameters of society. Sexual orientation and gender identities have been used in a concretely separate manner the same way as the dynamics between man and woman, male and female, gender and sex operate. These terms are all products of human beings’ utilization of language. Language has proven its power to define and determine the status and the categories of the subjects in society. This tool developed by human beings provides a definition of their own specific cultural community and their individual selves that either claim or oppugn their space in the social hierarchy. The label ‘bakla’ is reasoned as an identity which is a reaction to the spectral disposition of gender and sexuality in the Philippine society. To expose the Filipino constitutes of bakla is the major attempt of this study. Through the methods of Sikolohiyang Pilipino (Filipino Psychology), namely Pagtatanung-tanong (asking questions) and Pakikipagkuwentuhan (story-telling), the utterances of the bakla were gathered and analyzed in a rhetorical and ideological manner. Furthermore, the Dramatistic Pentad of Kenneth Burke was adapted as a methodology and also utilized as a perspective of analysis. The results suggest that the bakla as an identity carries the hurdles of class. The performativity of the bakla is proven to be a cycle propelled by their guilt to be identified and recognized as subjects in a society where heteronormative power contests their gender and sexual expressions as relatively aberrational to the binary gender and sexual roles. The labels, hence, are potent structures that control the disposition of the bakla in the society, reflecting an aspect of the disposition of Filipino identities. After all, performing kabaklaan in the Philippine society is interplay between resistance and conformity to the hegemonic dominions as a result of imperial attempts to universalize the concept of homosexuality between and among distant cultural communities.

Keywords: gender identity, sexual orientation, rhetoric, performativity

Procedia PDF Downloads 444
1734 In-Situ Redevelopment in Urban India: Two Case Studies from Delhi and Mumbai

Authors: Ashok Kumar, Anjali Sharma

Abstract:

As cities grow and expand spatially, redevelopment in urban India is beginning to emerge as a new mode of urban expansion sweeping low-income informal settlements. This paper examines the extent and nature of expanding urban frontier before examining implications for the families living in these settlements. Displacement of these families may appear to be an obvious consequence. However, we have conducted ethnographic studies over the past several months in a Delhi slum named Kathputli Colony, Delhi. In depth analysis of the study for this slum appears to present a variegated set of consequences for the residents of informal settlements including loss of livelihoods, dismantling of family ties, and general anxiety arising out of uncertainty about resettlement. Apart from Delhi case study, we also compare and contrast another redevelopment case from Mumbai located at Bhendi Bazar. These examples from the two mega cities of Mumbai and Delhi are analysed to understand and explore expanding urban frontiers and their consequences for informing future public policy.

Keywords: informal settlements, policy, redevelopment, urban

Procedia PDF Downloads 331
1733 Electronic Properties Study of Ni/MgO Nanoparticles by X-Ray Photoemission Spectroscopy (XPS)

Authors: Ouafek Nora, Keghouche Nassira, Dehdouh Heider, Untidt Carlos

Abstract:

A lot of knowledge has been accumulated on the metal clusters supported on oxide surfaces because of their multiple applications in microelectronics, heterogeneous catalysis, and magnetic devices. In this work, the surface state of Ni / MgO has been studied by XPS (X-ray Photoemission Spectroscopy). The samples were prepared by impregnation with ion exchange Ni²⁺ / MgO, followed by either a thermal treatment in air (T = 100 -350 ° C) or a gamma irradiation (dose 100 kGy, 25 kGy dose rate h -1). The obtained samples are named after impregnation NMI, NMR after irradiation, and finally NMC(T) after calcination at the temperature T (T = 100-600 °C). A structural study by XRD and HRTEM reveals the presence of nanoscaled Ni-Mg intermetallic phases (Mg₂Ni, MgNi₂, and Mg₆Ni) and magnesium hydroxide. Mg(OH)₂ in nanometric range (2- 4 nm). Mg-Ni compounds are of great interest in energy fields (hydrogen storage…). XPS spectra show two Ni2p peaks at energies of about 856.1 and 861.9 eV, indicating that the nickel is primarily in an oxidized state on the surface. The shift of the main peak relative to the pure NiO (856.1 instead of 854.0 eV) suggests that in addition to oxygen, nickel is engaged in another link with magnesium. This is in agreement with the O1s spectra which present an overlap of peaks corresponds to NiO and MgO, at a calcination temperature T ≤ 300 °C.

Keywords: XPS, XRD, nanoparticules, Ni-MgO

Procedia PDF Downloads 209
1732 A Rare Case of Metastatic Basal Cell Carcinoma

Authors: Nitesh Kumar, Eoin Twohig, jasparl cheema, Sadiq mawji, Yousif al najjar

Abstract:

Basal cell carcinoma (BCC) is the commonest cutaneous malignancy affecting humans. Despite this, distant spread is exceptionally rare. Metastatic BCC (mBCC) is estimated to occur in 0.0028 - 0.5%. it aim to illustrate with the aid of histological slides, a case of mBCC occurring in a fit and well 67-year-old. Initial diagnosis of desmoplastic BCC was made in 2006 from a scalp biopsy with the lesion then being excised. Re-excision of local recurrence was undertaken the following year. In 2014 the patient presented with an ipsilateral level 2a mass. Fine Needle Aspiration raised the suspicion of metastatic carcinoma. The patient had excision of two nodes from the left neck alongside pharyngeal tonsillectomy and tongue base biopsies. Histologically, the nodes closely resembled the immunophenotype of the initial scalp lesion. The patient subsequently had a modified radical neck dissection, and residual mBCC was excised from the left Sternocleidomastoid muscle. In 2023 the patient developed haematuria. On further investigation bilateral lung lesions on CT were noted with subsequent biopsy confirming mBCC. Spinal and renal lesions have also been found. Histopathology showed clear resemblance of the lung metastases to both those in the neck and the primary (scalp BCC) – with no squamous differentiation seen. The time span from primary to occurrence of lung metastasis (18 years) affirms the indolent and slow growing nature of BCC.  This case fulfils Lattes and Kessler diagnostic criteria. High risk cases are described as those with advanced local presentation, primary tumour on the Head and Neck and locally recurrent lesions.

Keywords: BCC, metastasis, rare, skin cancer

Procedia PDF Downloads 57
1731 Analysis of Pangasinan State University: Bayambang Students’ Concerns Through Social Media Analytics and Latent Dirichlet Allocation Topic Modelling Approach

Authors: Matthew John F. Sino Cruz, Sarah Jane M. Ferrer, Janice C. Francisco

Abstract:

COVID-19 pandemic has affected more than 114 countries all over the world since it was considered a global health concern in 2020. Different sectors, including education, have shifted to remote/distant setups to follow the guidelines set to prevent the spread of the disease. One of the higher education institutes which shifted to remote setup is the Pangasinan State University (PSU). In order to continue providing quality instructions to the students, PSU designed Flexible Learning Model to still provide services to its stakeholders amidst the pandemic. The model covers the redesigning of delivering instructions in remote setup and the technology needed to support these adjustments. The primary goal of this study is to determine the insights of the PSU – Bayambang students towards the remote setup implemented during the pandemic and how they perceived the initiatives employed in relation to their experiences in flexible learning. In this study, the topic modelling approach was implemented using Latent Dirichlet Allocation. The dataset used in the study. The results show that the most common concern of the students includes time and resource management, poor internet connection issues, and difficulty coping with the flexible learning modality. Furthermore, the findings of the study can be used as one of the bases for the administration to review and improve the policies and initiatives implemented during the pandemic in relation to remote service delivery. In addition, further studies can be conducted to determine the overall sentiment of the other stakeholders in the policies implemented at the University.

Keywords: COVID-19, topic modelling, students’ sentiment, flexible learning, Latent Dirichlet allocation

Procedia PDF Downloads 122
1730 Optimizing the Probabilistic Neural Network Training Algorithm for Multi-Class Identification

Authors: Abdelhadi Lotfi, Abdelkader Benyettou

Abstract:

In this work, a training algorithm for probabilistic neural networks (PNN) is presented. The algorithm addresses one of the major drawbacks of PNN, which is the size of the hidden layer in the network. By using a cross-validation training algorithm, the number of hidden neurons is shrunk to a smaller number consisting of the most representative samples of the training set. This is done without affecting the overall architecture of the network. Performance of the network is compared against performance of standard PNN for different databases from the UCI database repository. Results show an important gain in network size and performance.

Keywords: classification, probabilistic neural networks, network optimization, pattern recognition

Procedia PDF Downloads 262
1729 Youth Intelligent Personal Decision Aid

Authors: Norfiza Ibrahim, Norshuhada Shiratuddin, Siti Mahfuzah Sarif

Abstract:

Decision-making system is used to facilitate people in making the right choice for their important daily activities. For the youth, proper guidance in making important decisions is needed. Their skills in decision-making aid decisions will indirectly affect their future. For that reason, this study focuses on the intelligent aspects in the development of intelligent decision support application. The aid apparently integrates Personality Traits (PT) and Multiple Intelligence (MI) data in development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (Youth PDA). This study is concerned with the aid’s helpfulness based on the hybrid intelligent process. There are four main items involved which are reliability, decision making effort, confidence, as well as decision process awareness. Survey method was applied to the actual user of this system, namely the school and the Institute of Higher Education (IPT)’s students. An establish instrument was used to evaluate the study. The results of the analysis and findings in the assessment indicates a high mean value of the four dimensions in helping Youth PDA to be accepted as a useful tool for the youth in decision-making.

Keywords: decision support, multiple intelligent, personality traits, youth personal decision aid

Procedia PDF Downloads 632
1728 A Generic Approach to Reuse Unified Modeling Language Components Following an Agile Process

Authors: Rim Bouhaouel, Naoufel Kraïem, Zuhoor Al Khanjari

Abstract:

Unified Modeling Language (UML) is considered as one of the widespread modeling language standardized by the Object Management Group (OMG). Therefore, the model driving engineering (MDE) community attempts to provide reuse of UML diagrams, and do not construct it from scratch. The UML model appears according to a specific software development process. The existing method generation models focused on the different techniques of transformation without considering the development process. Our work aims to construct an UML component from fragments of UML diagram basing on an agile method. We define UML fragment as a portion of a UML diagram, which express a business target. To guide the generation of fragments of UML models using an agile process, we need a flexible approach, which adapts to the agile changes and covers all its activities. We use the software product line (SPL) to derive a fragment of process agile method. This paper explains our approach, named RECUP, to generate UML fragments following an agile process, and overviews the different aspects. In this paper, we present the approach and we define the different phases and artifacts.

Keywords: UML, component, fragment, agile, SPL

Procedia PDF Downloads 397
1727 Supervised-Component-Based Generalised Linear Regression with Multiple Explanatory Blocks: THEME-SCGLR

Authors: Bry X., Trottier C., Mortier F., Cornu G., Verron T.

Abstract:

We address component-based regularization of a Multivariate Generalized Linear Model (MGLM). A set of random responses Y is assumed to depend, through a GLM, on a set X of explanatory variables, as well as on a set T of additional covariates. X is partitioned into R conceptually homogeneous blocks X1, ... , XR , viewed as explanatory themes. Variables in each Xr are assumed many and redundant. Thus, Generalised Linear Regression (GLR) demands regularization with respect to each Xr. By contrast, variables in T are assumed selected so as to demand no regularization. Regularization is performed searching each Xr for an appropriate number of orthogonal components that both contribute to model Y and capture relevant structural information in Xr. We propose a very general criterion to measure structural relevance (SR) of a component in a block, and show how to take SR into account within a Fisher-scoring-type algorithm in order to estimate the model. We show how to deal with mixed-type explanatory variables. The method, named THEME-SCGLR, is tested on simulated data.

Keywords: Component-Model, Fisher Scoring Algorithm, GLM, PLS Regression, SCGLR, SEER, THEME

Procedia PDF Downloads 395
1726 Analysis of Histogram Asymmetry for Waste Recognition

Authors: Janusz Bobulski, Kamila Pasternak

Abstract:

Despite many years of effort and research, the problem of waste management is still current. So far, no fully effective waste management system has been developed. Many programs and projects improve statistics on the percentage of waste recycled every year. In these efforts, it is worth using modern Computer Vision techniques supported by artificial intelligence. In the article, we present a method of identifying plastic waste based on the asymmetry analysis of the histogram of the image containing the waste. The method is simple but effective (94%), which allows it to be implemented on devices with low computing power, in particular on microcomputers. Such de-vices will be used both at home and in waste sorting plants.

Keywords: waste management, environmental protection, image processing, computer vision

Procedia PDF Downloads 119
1725 Our Shared Humanity: Bridging the Great Divide of Different Religions

Authors: Aida Raissi, Holly Wong, Elma Raissi

Abstract:

Background: Connection is a primal need established during infancy and reiterated in many forms of social interaction. When we make connections with others we experience growth, continuity, and gain an understanding of the other’s sense of the world. Feeling socially connected to another individual or community has been shown to increase self-esteem, happiness, and meaning. However, feeling connected to another individual or a specific community may also decrease the motivation to seek connection with more distant individuals or communities. Furthermore, we allow ourselves to interact with those in other communities as apart from us, and in some cases, to dehumanize their existence. Objective: The aim of this project is to bridge the gap between different communities, specifically religious communities and foster feelings of connection as one with all members through the medium of art, specifically photography. Method: Members of all major faiths including Agnosticism, Atheism, Buddhism, Catholicism, Christianity, Ismaili, Jewish, Ja’far Shia, Sunni will be interviewed. Participants will be asked to partake in a brief interview of two parts: A. Answering two questions: 1. What are you most looking forward to in the future, and why? 2. What does religion mean to you? B. Having their picture taken. Our questions aim to elicit individual stories that together, show that we have more in common, than differences, despite our faiths. With the completion of the interviews, the responses will be compiled together and major themes will be identified. Impact: The resulting stories and corresponding individual pictures provide an excellent opportunity to encourage and inspire people to get to know those of other beliefs and values, participate in each other’s communities and develop a sense of oneness within our shared humanity. Knowledge translation: The personal stories, and the common themes they illustrate, will be shared with various audiences, including the general public, academia and targeted groups such as students. This will be done through displaying the photographs and responses at art galleries, conferences, in print and online.

Keywords: social justice, religion, connection, understanding, community

Procedia PDF Downloads 398
1724 Studying the Linguistics of Hungarian Luxurious Brands: Analysing the Sound Effects from a non-Hungarian Consumer’s Perspective

Authors: Syrine Bassi

Abstract:

Sound symbolism has been able to give us an exciting new tool to target consumers’ brand perception. It acts on a subconscious level making them less likely to reject the implicit message delivered by the sound of the brand name. Most of the research conducted in the field was focused on the English language as it is the language used for international branding campaigns and global companies. However, more research is examining the sound symbolism in other languages and comparing it to the English language findings. Besides, researchers have been able to study luxury brand names and spot out the patterns used in them to provoke luxury and sophistication. It stands to a reason to connect the luxury brand names and the local language’s sound effects since a considerable number of these brands are promoting the origin of the Maison, therefore, have names in foreign languages. This study was established around the Hungarian luxury brand names. It aims to spot out the patterns used in these names that connect to the previous findings of luxury sound effects and also the differences. We worked with a non-Hungarian speaking sample who had some basic knowledge of the language just to make sure they were able to correctly pronounce the names. The results have shown both similarities and differences when it comes to perceiving luxury based on the brand name. As the Hungarian language can be qualified as a saturated language, consonant wise, it was easy to feed the luxury feeling only by using designers' names, however, some complicated names were too difficult and repulsive to consider as luxurious. On the other hand, oversimplifying some names did not convey the desired image as it was too simple and easy. Overall, some sounds have been proved to be linked to luxury as the literature suggests, the difficulty of pronunciation has also proved effective since it highlights the distant feeling consumers crave when looking for luxury. These results suggest that sound symbolism can set up an aura of luxury when used properly, leveraging each languages’ convenient assets.

Keywords: hungarian language, linguistics, luxury brands, sound symbolism

Procedia PDF Downloads 116
1723 Application of Low-order Modeling Techniques and Neural-Network Based Models for System Identification

Authors: Venkatesh Pulletikurthi, Karthik B. Ariyur, Luciano Castillo

Abstract:

The system identification from the turbulence wakes will lead to the tactical advantage to prepare and also, to predict the trajectory of the opponents’ movements. A low-order modeling technique, POD, is used to predict the object based on the wake pattern and compared with pre-trained image recognition neural network (NN) to classify the wake patterns into objects. It is demonstrated that low-order modeling, POD, is able to predict the objects better compared to pretrained NN by ~30%.

Keywords: the bluff body wakes, low-order modeling, neural network, system identification

Procedia PDF Downloads 180
1722 Laban Movement Analysis Using Kinect

Authors: Bernstein Ran, Shafir Tal, Tsachor Rachelle, Studd Karen, Schuster Assaf

Abstract:

Laban Movement Analysis (LMA), developed in the dance community over the past seventy years, is an effective method for observing, describing, notating, and interpreting human movement to enhance communication and expression in everyday and professional life. Many applications that use motion capture data might be significantly leveraged if the Laban qualities will be recognized automatically. This paper presents an automated recognition method of Laban qualities from motion capture skeletal recordings and it is demonstrated on the output of Microsoft’s Kinect V2 sensor.

Keywords: Laban movement analysis, multitask learning, Kinect sensor, machine learning

Procedia PDF Downloads 341
1721 Partial Privatization, Control Rights of Large Shareholders and Privatized Shares Transfer: Evidence from Chinese State-Owned Listed Companies

Authors: Tingting Zhou

Abstract:

The partial privatization of state-owned enterprises (SOEs) is a dynamic process. The main features of this process lie in not only gradual and sequential privatizations, but also privatized shares transfer. For partially privatized SOEs, the introduction of private sector ownership is not the end of the story because the previously introduced private owners may choose to leave the SOEs by transferring the privatized shares after privatization, a process that is called “privatized shares transfer”. This paper investigates the determinants of privatized shares transfer from the perspective of large shareholders’ control rights. The results captures the fact that the higher control rights of large shareholders lead to more privatized shares transfer. After exploring the impacts of excessive control rights, the results provide evidence supporting the idea that firms with excessive numbers of directors, senior managers or supervisors who also have positions in the largest controlling shareholder’s entity are more likely to transfer privatized shares owned by private owners. In addition, the largest shareholders’ ownership also plays a role in privatized shares transfer. This evidence suggests that the large shareholders’ control rights should be limited to an appropriate range during the process of privatization, thereby giving private shareholders more opportunity to participate in the operation of firms, strengthen the state and enhance the competitiveness of state capital.

Keywords: control rights of large shareholders, partial privatization, privatized shares transfer, state-owned listed companies

Procedia PDF Downloads 284
1720 The 'Saudade' Market and the Development of Tourism in the Azores: An Analysis of Travel Preferences of Azorean Emigrants

Authors: Silvia Rocha, Flavio Tiago, Maria Teresa Tiago, Sandra Faria, Joao Couto

Abstract:

The Azores have a tourist potential that has been developing, especially after an increase in promotion and the liberalization of airspace. However, there is still a gap with regard to the understanding of tourists from North America. Previous studies referred to the existence of two basic types of touristic flows: Emigrants and locals. Looking to help fill this gap, a study of travelers from North America was conducted. Using cluster analysis, it was determined the existence of three segments: nostalgic, regular and frequent. The recognition of these three segments is important to determine the necessary adjustments in tourist offerings to this market.

Keywords: tourism, diaspora, nostalgia, culture

Procedia PDF Downloads 193
1719 Review on Effective Texture Classification Techniques

Authors: Sujata S. Kulkarni

Abstract:

Effective and efficient texture feature extraction and classification is an important problem in image understanding and recognition. This paper gives a review on effective texture classification method. The objective of the problem of texture representation is to reduce the amount of raw data presented by the image, while preserving the information needed for the task. Texture analysis is important in many applications of computer image analysis for classification include industrial and biomedical surface inspection, for example for defects and disease, ground classification of satellite or aerial imagery and content-based access to image databases.

Keywords: compressed sensing, feature extraction, image classification, texture analysis

Procedia PDF Downloads 434
1718 Improvements in OpenCV's Viola Jones Algorithm in Face Detection–Skin Detection

Authors: Jyoti Bharti, M. K. Gupta, Astha Jain

Abstract:

This paper proposes a new improved approach for false positives filtering of detected face images on OpenCV’s Viola Jones Algorithm In this approach, for Filtering of False Positives, Skin Detection in two colour spaces i.e. HSV (Hue, Saturation and Value) and YCrCb (Y is luma component and Cr- red difference, Cb- Blue difference) is used. As a result, it is found that false detection has been reduced. Our proposed method reaches the accuracy of about 98.7%. Thus, a better recognition rate is achieved.

Keywords: face detection, Viola Jones, false positives, OpenCV

Procedia PDF Downloads 406
1717 The Role of Cultural Expectations in Emotion Regulation among Nepali Adolescents

Authors: Martha Berg, Megan Ramaiya, Andi Schmidt, Susanna Sharma, Brandon Kohrt

Abstract:

Nepali adolescents report tension and negative emotion due to perceived expectations of both academic and social achievement. These societal goals, which are internalized through early-life socialization, drive the development of self-regulatory processes such as emotion regulation. Emotion dysregulation is linked with adverse psychological outcomes such as depression, self-harm, and suicide, which are public health concerns for organizations working with Nepali adolescents. This study examined the relation among socialization, internalized cultural goals, and emotion regulation to inform interventions for reducing depression and suicide in this population. Participants included 102 students in grades 7 through 9 in a post-earthquake school setting in rural Kathmandu valley. All participants completed a tablet-based battery of quantitative measures, comprising transculturally adapted assessments of emotion regulation, depression, and self-harm/suicide ideation and behavior. Qualitative measures included two focus groups and semi-structured interviews with 22 students and 3 parents. A notable proportion of the sample reported depression symptoms in the past 2 weeks (68%), lifetime self-harm ideation (28%), and lifetime suicide attempts (13%). Students who lived with their nuclear family reported lower levels of difficulty than those who lived with more distant relatives (z=2.16, p=.03), which suggests a link between family environment and adolescent emotion regulation, potentially mediated by socialization and internalization of cultural goals. These findings call for further research into the aspects of nuclear versus extended family environments that shape the development of emotion regulation.

Keywords: adolescent mental health, emotion regulation, Nepal, socialization

Procedia PDF Downloads 272
1716 Track and Evaluate Cortical Responses Evoked by Electrical Stimulation

Authors: Kyosuke Kamada, Christoph Kapeller, Michael Jordan, Mostafa Mohammadpour, Christy Li, Christoph Guger

Abstract:

Cortico-cortical evoked potentials (CCEP) refer to responses generated by cortical electrical stimulation at distant brain sites. These responses provide insights into the functional networks associated with language or motor functions, and in the context of epilepsy, they can reveal pathological networks. Locating the origin and spread of seizures within the cortex is crucial for pre-surgical planning. This process can be enhanced by employing cortical stimulation at the seizure onset zone (SOZ), leading to the generation of CCEPs in remote brain regions that may be targeted for disconnection. In the case of a 24-year-old male patient suffering from intractable epilepsy, corpus callosotomy was performed as part of the treatment. DTI-MRI imaging, conducted using a 3T MRI scanner for fiber tracking, along with CCEP, is used as part of an assessment for surgical planning. Stimulation of the SOZ, with alternating monophasic pulses of 300µs duration and 15mA current intensity, resulted in CCEPs on the contralateral frontal cortex, reaching a peak amplitude of 206µV with a latency of 31ms, specifically in the left pars triangularis. The related fiber tracts were identified with a two-tensor unscented Kalman filter (UKF) technique, showing transversal fibers through the corpus callosum. The CCEPs were monitored through the progress of the surgery. Notably, the SOZ-associated CCEPs exhibited a reduction following the resection of the anterior portion of the corpus callosum, reaching the identified connecting fibers. This intervention demonstrated a potential strategy for mitigating the impact of intractable epilepsy through targeted disconnection of identified cortical regions.

Keywords: CCEP, SOZ, Corpus callosotomy, DTI

Procedia PDF Downloads 66
1715 Saudi Women Facing Challenges in a Mixed-Gender Work Environment

Authors: A. Aldawsari

Abstract:

The complex issue of women working in a mixed-gender work environment has its roots in social and cultural factors. This research was done to identify and explore the social and cultural challenges Saudi women face in a mixed-gender work environment in Saudi Arabia. Over the years, Saudi women in mixed-gender work environments in Saudi Arabia have been of interest in various research areas, especially within the context of a hospital work environment. This research, which involves a female researcher interacting one-on-one with Saudi women, will address this issue as well as the effect of the 2030 Vision in Saudi Arabia, and it will aim to include several new fields of work environments for women in Saudi Arabia. The aim of this research is to examine the perceptions of Saudi women who work in a mixed gender environment regarding the general empowerment of women in these settings. The objective of this research is to explore the cultural and social challenges that influence Saudi women's rights to work in a mixed-gender environment in Saudi Arabia. The significance of this research lies in the fact that there is an urgency to resolve issue of female employment in Saudi Arabia, where Saudi women still suffer from inequality in employment opportunity. Although the Saudi government is seeking to empower women by integrating them into a mixed-gender work environment, which is a key goal and prominent social change advocated for in the 2030 Vision, this same goal is one of the main challenges in the face of achieving female empowerment. The methodology section focuses on appropriate methods that can be used to study the effect of social and cultural challenges on the employment of women. It then determines the conditions and limitations of the research by applying a qualitative research approach to the investigation and analysing the data collected from the interviews. A statistical analysis tool, such as NVivo, will be used for the qualitative analysis of the interviews. The study found that the factor most responsible for creating social and cultural challenges is family—whether close family or distant family—more so than tribe or community.

Keywords: women, work, mixed-gender, environment

Procedia PDF Downloads 132
1714 Adversarial Attacks and Defenses on Deep Neural Networks

Authors: Jonathan Sohn

Abstract:

Deep neural networks (DNNs) have shown state-of-the-art performance for many applications, including computer vision, natural language processing, and speech recognition. Recently, adversarial attacks have been studied in the context of deep neural networks, which aim to alter the results of deep neural networks by modifying the inputs slightly. For example, an adversarial attack on a DNN used for object detection can cause the DNN to miss certain objects. As a result, the reliability of DNNs is undermined by their lack of robustness against adversarial attacks, raising concerns about their use in safety-critical applications such as autonomous driving. In this paper, we focus on studying the adversarial attacks and defenses on DNNs for image classification. There are two types of adversarial attacks studied which are fast gradient sign method (FGSM) attack and projected gradient descent (PGD) attack. A DNN forms decision boundaries that separate the input images into different categories. The adversarial attack slightly alters the image to move over the decision boundary, causing the DNN to misclassify the image. FGSM attack obtains the gradient with respect to the image and updates the image once based on the gradients to cross the decision boundary. PGD attack, instead of taking one big step, repeatedly modifies the input image with multiple small steps. There is also another type of attack called the target attack. This adversarial attack is designed to make the machine classify an image to a class chosen by the attacker. We can defend against adversarial attacks by incorporating adversarial examples in training. Specifically, instead of training the neural network with clean examples, we can explicitly let the neural network learn from the adversarial examples. In our experiments, the digit recognition accuracy on the MNIST dataset drops from 97.81% to 39.50% and 34.01% when the DNN is attacked by FGSM and PGD attacks, respectively. If we utilize FGSM training as a defense method, the classification accuracy greatly improves from 39.50% to 92.31% for FGSM attacks and from 34.01% to 75.63% for PGD attacks. To further improve the classification accuracy under adversarial attacks, we can also use a stronger PGD training method. PGD training improves the accuracy by 2.7% under FGSM attacks and 18.4% under PGD attacks over FGSM training. It is worth mentioning that both FGSM and PGD training do not affect the accuracy of clean images. In summary, we find that PGD attacks can greatly degrade the performance of DNNs, and PGD training is a very effective way to defend against such attacks. PGD attacks and defence are overall significantly more effective than FGSM methods.

Keywords: deep neural network, adversarial attack, adversarial defense, adversarial machine learning

Procedia PDF Downloads 194
1713 The Third Islamic Defend Action: The Completeness Model of Islamic Peace Movement in Indonesia

Authors: Husnul Isa Harahap

Abstract:

On December 2, 2016 occurred mass movements in Indonesia, led by the National Movement of Fatwa Guard, Indonesian Ulema Council (GNPF MUI). This movement is named 212 in accordance with the date, and also called The Third Islamic Defend Action, a continued movement of Islamic defend earlier (November 4, 2016 and October 14, 2016). All three movements have raised the issue of the demand that Basuki Tjahaja Purnama (Jakarta governor) also known as Ahok put on trial for allegedly insulting the Quran. The interesting view of this movement is that: first, the great social movement could emerge from a small but sensitive issues. Second, although this movement followed by radical Islamic groups, that movement known as the largest and most peaceful Islamic Movement in Indonesia. Third, the movement succeeded in answer the doubts of many parties that the social movements with large masses can not maintain security, order, and even the cleanliness of the site action. What causes all this happen? First, the emphasis on the use of basic religious elements that Islam is love for peace. Second, the role of leadership that is trusted and based on religious relationship. Third, this movement is well organized and trying reflect Islamic values.

Keywords: Islamic values, social movement, peaceful group, sensitive issue

Procedia PDF Downloads 334
1712 Consumers’ Willingness to Pay for Organic Vegetables in Oyo State

Authors: Olanrewaju Kafayat, O., Salman Kabir, K.

Abstract:

The role of organic agriculture in providing food and income is now gaining wider recognition (Van Elzakker et al 2007). The increasing public concerns about food safety issues on the use of fertilizers, pesticide residues, growth hormones, GM organisms, and increasing awareness of environmental quality issues have led to an expanding demand for environmentally friendly products (Thompson, 1998; Rimal et al., 2005). As a result national governments are concerned about diet and health, and there has been renewed recognition of the role of public policy in promoting healthy diets, thus to provide healthier, safer, more confident citizens (Poole et al., 2007), With these benefits, a study into organic vegetables is very vital to all the major stakeholders. This study analyzed the willingness of consumers to pay for organic vegetables in Oyo state, Nigeria. Primary data was collected with the aid of structured questionnaire administered to 168 respondents. These were selected using multistage random sampling. The first stage involved the selection two (2) ADP zones out of the three (3) ADP zones in Oyo state, The second stage involved the random selection of two (2) local government areas each out of the two (2) ADP zones which are; Ibadan South West and Ogbomoso North and random selection of 4 wards each from the local government areas. The third stage involved random selection of 42 household each from of the local government areas. Descriptive statistics, the principal component analysis, and the logistic regression were used to analyze the data. Results showed 55 percent of the respondents were female while 80 percent were  50 years. 74 percent of the respondents agreed that organic vegetables are of better quality. 31 percent of the respondents were aware of organic vegetables as against 69 percent who were not aware. From the logistic model, educational attainment, amount spent on organic vegetables monthly, better quality of organic vegetables and accessibility to organic vegetables were significant and had a positive relationship on willingness to pay for organic vegetable. The variables that were significant and had a negative relationship with WTP are less attractiveness of organic vegetables and household size of the respondents. This study concludes that consumers with higher level of education were more likely to be aware and willing to pay for organic vegetables than those with low levels of education, the study therefore recommends creation of awareness on the relevance of consuming organic vegetables through effective marketing and educational campaigns.

Keywords: consumers awareness, willingness to pay, organic vegetables, Oyo State

Procedia PDF Downloads 271