Search results for: inherent feature
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2162

Search results for: inherent feature

1112 Applications of Evolutionary Optimization Methods in Reinforcement Learning

Authors: Rahul Paul, Kedar Nath Das

Abstract:

The paradigm of Reinforcement Learning (RL) has become prominent in training intelligent agents to make decisions in environments that are both dynamic and uncertain. The primary objective of RL is to optimize the policy of an agent in order to maximize the cumulative reward it receives throughout a given period. Nevertheless, the process of optimization presents notable difficulties as a result of the inherent trade-off between exploration and exploitation, the presence of extensive state-action spaces, and the intricate nature of the dynamics involved. Evolutionary Optimization Methods (EOMs) have garnered considerable attention as a supplementary approach to tackle these challenges, providing distinct capabilities for optimizing RL policies and value functions. The ongoing advancement of research in both RL and EOMs presents an opportunity for significant advancements in autonomous decision-making systems. The convergence of these two fields has the potential to have a transformative impact on various domains of artificial intelligence (AI) applications. This article highlights the considerable influence of EOMs in enhancing the capabilities of RL. Taking advantage of evolutionary principles enables RL algorithms to effectively traverse extensive action spaces and discover optimal solutions within intricate environments. Moreover, this paper emphasizes the practical implementations of EOMs in the field of RL, specifically in areas such as robotic control, autonomous systems, inventory problems, and multi-agent scenarios. The article highlights the utilization of EOMs in facilitating RL agents to effectively adapt, evolve, and uncover proficient strategies for complex tasks that may pose challenges for conventional RL approaches.

Keywords: machine learning, reinforcement learning, loss function, optimization techniques, evolutionary optimization methods

Procedia PDF Downloads 60
1111 Transfer Learning for Protein Structure Classification at Low Resolution

Authors: Alexander Hudson, Shaogang Gong

Abstract:

Structure determination is key to understanding protein function at a molecular level. Whilst significant advances have been made in predicting structure and function from amino acid sequence, researchers must still rely on expensive, time-consuming analytical methods to visualise detailed protein conformation. In this study, we demonstrate that it is possible to make accurate (≥80%) predictions of protein class and architecture from structures determined at low (>3A) resolution, using a deep convolutional neural network trained on high-resolution (≤3A) structures represented as 2D matrices. Thus, we provide proof of concept for high-speed, low-cost protein structure classification at low resolution, and a basis for extension to prediction of function. We investigate the impact of the input representation on classification performance, showing that side-chain information may not be necessary for fine-grained structure predictions. Finally, we confirm that high resolution, low-resolution and NMR-determined structures inhabit a common feature space, and thus provide a theoretical foundation for boosting with single-image super-resolution.

Keywords: transfer learning, protein distance maps, protein structure classification, neural networks

Procedia PDF Downloads 116
1110 Classification System for Soft Tissue Injuries of Face: Bringing Objectiveness to Injury Severity

Authors: Garg Ramneesh, Uppal Sanjeev, Mittal Rajinder, Shah Sheerin, Jain Vikas, Singla Bhupinder

Abstract:

Introduction: Despite advances in trauma care, a classification system for soft tissue injuries of the face still needs to be objectively defined. Aim: To develop a classification system for soft tissue injuries of the face; that is objective, easy to remember, reproducible, universally applicable, aids in surgical management and helps to develop a structured data that can be used for future use. Material and Methods: This classification system includes those patients that need surgical management of facial injuries. Associated underlying bony fractures have been intentionally excluded. Depending upon the severity of soft tissue injury, these can be graded from 0 to IV (O-Abrasions, I-lacerations, II-Avulsion injuries with no skin loss, III-Avulsion injuries with skin loss that would need graft or flap cover, and IV-complex injuries). Anatomically, the face has been divided into three zones (Zone 1/2/3), as per aesthetic subunits. Zone 1e stands for injury of eyebrows; Zones 2 a/b/c stand for nose, upper eyelid and lower eyelid respectively; Zones 3 a/b/c stand for upper lip, lower lip and cheek respectively. Suffices R and L stand for right or left involved side, B for presence of foreign body like glass or pellets, C for extensive contamination and D for depth which can be graded as D 1/2/3 if depth is still fat, muscle or bone respectively. I is for damage to facial nerve or parotid duct. Results and conclusions: This classification system is easy to remember, clinically applicable and would help in standardization of surgical management of soft tissue injuries of face. Certain inherent limitations of this classification system are inability to classify sutured wounds, hematomas and injuries along or against Langer’s lines.

Keywords: soft tissue injuries, face, avulsion, classification

Procedia PDF Downloads 369
1109 Islamic Banking: A New Trend towards the Development of Banking Law

Authors: Inese Tenberga

Abstract:

Undoubtedly, the focus of the present capitalist system of finance has shifted from the concept of productivity of money to the ‘cult of money’, which is characterized by such notions as speculative activity, squander, self-profit, vested interest, etc. The author is certain that a civilized society cannot follow this economic path any longer and therefore suggests that one solution would be to integrate the Islamic financial model in the banking sector of the EU to overcome its economic vulnerability and structurally transform its economies or build resilience against shocks and crisis. The researcher analyses the Islamic financial model, which is providing the basis for the concept of non-productivity of money, and proposes to consider it as a new paradigm of economic thinking. The author argues that it seeks to establish a broad-based economic well-being with an optimum rate of economic growth, socio-economic justice, equitable distribution of income and wealth. Furthermore, the author analyses and proposes to use the experience of member states of the Islamic Development Bank for the formation of a new EU interest free banking. It is offered to create within the EU banking system a credit sector and investment sector respectively. As a part of the latter, it is recommended to separate investment banks specializing in speculative investments and non­speculative investment banks. Meanwhile, understanding of the idea of Islamic banking exclusively from the perspective of the manner of yielding profit that differs from credit banking, without considering the legal, social, ethical guidelines of Islam impedes to value objectively the advantages of this type of financial activities at the non-Islamic jurisdictions. However, the author comes to the conclusion the imperative of justice and virtue, which is inherent to all of us, exists regardless of religion. The author concludes that the global community should adopt the experience of the Muslim countries and focus on the Islamic banking model.

Keywords: credit sector, EU banking system, investment sector, Islamic banking

Procedia PDF Downloads 160
1108 Protein Remote Homology Detection by Using Profile-Based Matrix Transformation Approaches

Authors: Bin Liu

Abstract:

As one of the most important tasks in protein sequence analysis, protein remote homology detection has been studied for decades. Currently, the profile-based methods show state-of-the-art performance. Position-Specific Frequency Matrix (PSFM) is widely used profile. However, there exists noise information in the profiles introduced by the amino acids with low frequencies. In this study, we propose a method to remove the noise information in the PSFM by removing the amino acids with low frequencies called Top frequency profile (TFP). Three new matrix transformation methods, including Autocross covariance (ACC) transformation, Tri-gram, and K-separated bigram (KSB), are performed on these profiles to convert them into fixed length feature vectors. Combined with Support Vector Machines (SVMs), the predictors are constructed. Evaluated on two benchmark datasets, and experimental results show that these proposed methods outperform other state-of-the-art predictors.

Keywords: protein remote homology detection, protein fold recognition, top frequency profile, support vector machines

Procedia PDF Downloads 108
1107 A Comparative Analysis of (De)legitimation Strategies in Selected African Inaugural Speeches

Authors: Lily Chimuanya, Ehioghae Esther

Abstract:

Language, a versatile and sophisticated tool, is fundamentally sacrosanct to mankind especially within the realm of politics. In this dynamic world, political leaders adroitly use language to engage in a strategic show aimed at manipulating or mechanising the opinion of discerning people. This nuanced synergy is marked by different rhetorical strategies, meticulously synced with contextual factors ranging from cultural, ideological, and political to achieve multifaceted persuasive objectives. This study investigates the (de)legitimation strategies inherent in African presidential inaugural speeches, as African leaders not only state their policy agenda through inaugural speeches but also subtly indulge in a dance of legitimation and delegitimation, performing a twofold objective of strengthening the credibility of their administration and, at times, undermining the performance of the past administration. Drawing insights from two different legitimation models and a dataset of 4 African presidential inaugural speeches obtained from authentic websites, the study describes the roles of authorisation, rationalisation, moral evaluation, altruism, and mythopoesis in unmasking the structure of political discourse. The analysis takes a mixed-method approach to unpack the (de)legitimation strategy embedded in the carefully chosen speeches. The focus extends beyond a superficial exploration and delves into the linguistic elements that form the basis of presidential discourse. In conclusion, this examination goes beyond the nuanced landscape of language as a potent tool in politics, with each strategy contributing to the overall rhetorical impact and shaping the narrative. From this perspective, the study argues that presidential inaugural speeches are not only linguistic exercises but also viable weapons that influence perceptions and legitimise authority.

Keywords: CDA, legitimation, inaugural speeches, delegitmation

Procedia PDF Downloads 42
1106 Registration of Multi-Temporal Unmanned Aerial Vehicle Images for Facility Monitoring

Authors: Dongyeob Han, Jungwon Huh, Quang Huy Tran, Choonghyun Kang

Abstract:

Unmanned Aerial Vehicles (UAVs) have been used for surveillance, monitoring, inspection, and mapping. In this paper, we present a systematic approach for automatic registration of UAV images for monitoring facilities such as building, green house, and civil structures. The two-step process is applied; 1) an image matching technique based on SURF (Speeded up Robust Feature) and RANSAC (Random Sample Consensus), 2) bundle adjustment of multi-temporal images. Image matching to find corresponding points is one of the most important steps for the precise registration of multi-temporal images. We used the SURF algorithm to find a quick and effective matching points. RANSAC algorithm was used in the process of finding matching points between images and in the bundle adjustment process. Experimental results from UAV images showed that our approach has a good accuracy to be applied to the change detection of facility.

Keywords: building, image matching, temperature, unmanned aerial vehicle

Procedia PDF Downloads 277
1105 Anomalous Behaviors of Visible Luminescence from Graphene Quantum Dots

Authors: Hyunho Shin, Jaekwang Jung, Jeongho Park, Sungwon Hwang

Abstract:

For the application of graphene quantum dots (GQDs) to optoelectronic nanodevices, it is of critical importance to understand the mechanisms which result in novel phenomena of their light absorption/emission. The optical transitions are known to be available up to ~6 eV in GQDs, especially useful for ultraviolet (UV) photodetectors (PDs). Here, we present size-dependent shape/edge-state variations of GQDs and visible photoluminescence (PL) showing anomalous size dependencies. With varying the average size (da) of GQDs from 5 to 35 nm, the peak energy of the absorption spectra monotonically decreases, while that of the visible PL spectra unusually shows nonmonotonic behaviors having a minimum at diameter ∼17 nm. The PL behaviors can be attributed to the novel feature of GQDs, that is, the circular-to-polygonal-shape and corresponding edge-state variations of GQDs at diameter ∼17 nm as the GQD size increases, as demonstrated by high resolution transmission electron microscopy. We believe that such a comprehensive scheme in designing device architecture and the structural formulation of GQDs provides a device for practical realization of environmentally benign, high performance flexible devices in the future.

Keywords: graphene, quantum dot, size, photoluminescence

Procedia PDF Downloads 275
1104 Unfolding the Social Clash between Online and Non-Online Transportation Providers in Bandung

Authors: Latifah Putti Tiananda, Sasti Khoirunnisa, Taniadiana Yapwito, Jessica Noviena

Abstract:

Innovations are often met with two responses, acceptance or rejection. In the past few years, Indonesia is experiencing a revolution of transportation service, which utilizes online platform for its operation. Such improvement is welcomed by consumers and challenged by conventional or ‘non-online’ transportation providers simultaneously. Conflicts arise as the existence of this online transportation mode results in declining income of non-online transportation workers. Physical confrontations and demonstrations demand policing from central authority. However, the obscurity of legal measures from the government persists the social instability. Bandung, a city in West Java with the highest rate of online transportation usage, has recently issued a recommendation withholding the operation of online transportation services to maintain peace and order. Thus, this paper seeks to elaborate the social unrest between the two contesting transportation actors in Bandung and explore community-based approaches to solve this problem. Using qualitative research method, this paper will also feature in-depth interviews with directly involved sources from Bandung.

Keywords: Bandung, market competition, online transportation services, social unrest

Procedia PDF Downloads 257
1103 Excavations in the Maadi Area Maadi-West the Stone House

Authors: Mohamed Bekheit Gad Khaleil

Abstract:

The Maadi was a civilization .It is considered one of the oldest civilizations in the world and an area of prehistoric times, especially the civilization (Nakada 1&2 ) It contains the oldest stone house in the history. Many excavations have been done in this area. This report was prepared under my supervision and in cooperation with the German institute .The stone building was redocumented, photographed and drawn once again . The stone building has been built carefully. The measurements for this building are (8m x 4m).and the depth of this building is 2m underground and an entrance located at the eastern part of the northern wall and it has three huge pits in the middle of the building seem to have contained wooden posts, most probably to support the roof. The use of the building is unclear. Circular impressions in front of the north wall and in the south-eastern part of the floor indicate that much of it was a storehouse for numerous vessels such as unique feature may have not only served for private domestic purposes. Before starting work in any site, instruction must be followed :- 1-Gather as much information about this place as possible . (Historical background - previous excavations - maps - pictures) 2-Writing, recording, describing and documenting 3- Draw a map of the site showing the place’s division system (trenches) 4- Safe ( Workers & The Place )

Keywords: photographing, excavations, documentation, registration

Procedia PDF Downloads 22
1102 User Modeling from the Perspective of Improvement in Search Results: A Survey of the State of the Art

Authors: Samira Karimi-Mansoub, Rahem Abri

Abstract:

Currently, users expect high quality and personalized information from search results. To satisfy user’s needs, personalized approaches to web search have been proposed. These approaches can provide the most appropriate answer for user’s needs by using user context and incorporating information about query provided by combining search technologies. To carry out personalized web search, there is a need to make different techniques on whole of user search process. There are the number of possible deployment of personalized approaches such as personalized web search, personalized recommendation, personalized summarization and filtering systems and etc. but the common feature of all approaches in various domains is that user modeling is utilized to provide personalized information from the Web. So the most important work in personalized approaches is user model mining. User modeling applications and technologies can be used in various domains depending on how the user collected information may be extracted. In addition to, the used techniques to create user model is also different in each of these applications. Since in the previous studies, there was not a complete survey in this field, our purpose is to present a survey on applications and techniques of user modeling from the viewpoint of improvement in search results by considering the existing literature and researches.

Keywords: filtering systems, personalized web search, user modeling, user search behavior

Procedia PDF Downloads 264
1101 Rescaled Range Analysis of Seismic Time-Series: Example of the Recent Seismic Crisis of Alhoceima

Authors: Marina Benito-Parejo, Raul Perez-Lopez, Miguel Herraiz, Carolina Guardiola-Albert, Cesar Martinez

Abstract:

Persistency, long-term memory and randomness are intrinsic properties of time-series of earthquakes. The Rescaled Range Analysis (RS-Analysis) was introduced by Hurst in 1956 and modified by Mandelbrot and Wallis in 1964. This method represents a simple and elegant analysis which determines the range of variation of one natural property (the seismic energy released in this case) in a time interval. Despite the simplicity, there is complexity inherent in the property measured. The cumulative curve of the energy released in time is the well-known fractal geometry of a devil’s staircase. This geometry is used for determining the maximum and minimum value of the range, which is normalized by the standard deviation. The rescaled range obtained obeys a power-law with the time, and the exponent is the Hurst value. Depending on this value, time-series can be classified in long-term or short-term memory. Hence, an algorithm has been developed for compiling the RS-Analysis for time series of earthquakes by days. Completeness time distribution and locally stationarity of the time series are required. The interest of this analysis is their application for a complex seismic crisis where different earthquakes take place in clusters in a short period. Therefore, the Hurst exponent has been obtained for the seismic crisis of Alhoceima (Mediterranean Sea) of January-March, 2016, where at least five medium-sized earthquakes were triggered. According to the values obtained from the Hurst exponent for each cluster, a different mechanical origin can be detected, corroborated by the focal mechanisms calculated by the official institutions. Therefore, this type of analysis not only allows an approach to a greater understanding of a seismic series but also makes possible to discern different types of seismic origins.

Keywords: Alhoceima crisis, earthquake time series, Hurst exponent, rescaled range analysis

Procedia PDF Downloads 304
1100 Dual-Channel Reliable Breast Ultrasound Image Classification Based on Explainable Attribution and Uncertainty Quantification

Authors: Haonan Hu, Shuge Lei, Dasheng Sun, Huabin Zhang, Kehong Yuan, Jian Dai, Jijun Tang

Abstract:

This paper focuses on the classification task of breast ultrasound images and conducts research on the reliability measurement of classification results. A dual-channel evaluation framework was developed based on the proposed inference reliability and predictive reliability scores. For the inference reliability evaluation, human-aligned and doctor-agreed inference rationals based on the improved feature attribution algorithm SP-RISA are gracefully applied. Uncertainty quantification is used to evaluate the predictive reliability via the test time enhancement. The effectiveness of this reliability evaluation framework has been verified on the breast ultrasound clinical dataset YBUS, and its robustness is verified on the public dataset BUSI. The expected calibration errors on both datasets are significantly lower than traditional evaluation methods, which proves the effectiveness of the proposed reliability measurement.

Keywords: medical imaging, ultrasound imaging, XAI, uncertainty measurement, trustworthy AI

Procedia PDF Downloads 75
1099 Solvent-Free Conductive Coatings Containing Chemically Coupled Particles for Functional Textiles

Authors: Jagadeshvaran P. L., Kamlesh Panwar, Indumathi Ramakrishnan, Suryasarathi Bose

Abstract:

The surge in the usage of wireless electronics and communication devices has engendered a different form of pollution, viz. the electromagnetic (EM) pollution and yet another serious issue, electromagnetic interference (EMI). There is a legitimate need to develop strategies and materials to combat this issue, otherwise leading to dreadful consequences. Functional textiles have emerged as the modern materials to help attenuate EM waves due to the numerous advantages – flexibility being the most important. In addition to this, there is an inherent advantage of multiple interfaces in coated fabrics that can engender significant attenuation. Herein we report a coating having multifunctional properties – capable of blocking both UV and EM radiation (predominantly of the microwave frequencies) with flame-retarding properties. The layer described here comprises iron titanate(FT) synthesized from its sustainable precursor – ilmenite sand and carbon nanotubes (CNT) dispersed in waterborne polyurethane. It is worth noting that FT's use as a multifunctional material is being reported for the first time. It was observed that a single layer of coated fabric shows EMI shielding effectiveness of -40 dB translating to 99.99% attenuation and similarly a UV blocking of 99.99% in the wavelength ranging from 200-400 nm. The microwave shielding properties of the fabric were demonstrated using a Bluetooth module – where the coated fabric was able to block the incoming Bluetooth signals to the module from a mobile phone. Besides, the coated fabrics exhibited phenomenal enhancement in thermal stability - a five percent increase in the limiting oxygen index (LOI) was observed upon the application of the coating. Such exceptional properties complement cotton fabrics' existing utility, thereby extending their use to specialty applications.

Keywords: multifunctional coatings, EMI shielding, UV blocking, iron titanate, CNT, waterborne polyurethane, cotton fabrics

Procedia PDF Downloads 99
1098 Tectonics of Out-of-Sequence Thrusting in Higher Himalaya- Example from Jhakri-Chaura-Sarahan Region, Himachal Pradesh

Authors: Rajkumar Ghosh

Abstract:

The Out-of-Sequence Thrust (OOST) is a common phenomenon in collisional tectonic settings like the Himalayas. These OOSTs are activated in different locations at different time frames. These OOST are linked with the multiple Himalayan Thrusts. Apart from minimal documentation in geological mapping for OOST, there exists a lack of field data to establish OOST in the field. This work has considered three thrusts from NW Himalaya in Himachal Pradesh with published data from other sources, allowing a re-examination for correlation of OOST. For the Sutlej section, the approach has been to do fieldwork and microstructural studies. The information related to the cross-cut signature of S/C- and relative time relation could help to predict the nature of OOST. The activation timing, along with the basis of identification of OOST in Higher Himalayan, was documented in various literature. Compilation of the Grain Boundary Migration (GBM) associated temperature range (400–750 °C) was documented from microstructural studies along the Jhakri-Chaura section. No such significant temperature variation across thrusts was observed. Strain variation paths using S Ʌ C angle measurement were carried out along the Jeori-Wangtu transect to distinguish overprinting structures for OOSTs. Near the Chaura Thrust (CT), angular variation of S Ʌ C was documented, and it varies within a range of 15° - 28 °. Along the NH22 (National Highway, 22), all tectonic units of the orogen are exposed in NW Himalaya, INDIA. But there are inherent difficulties in finding field evidence of OOST, largely due to the lack of adequate surface morphology, including topography and drainage pattern.

Keywords: out-of-sequence thrust (OOST), main central thrust (MCT), south tibetan detachment system (STDS), jhakri thrust (JT), sarahan thrust (ST), chaura thrust (CT), higher himalaya (HH), greater himalayan crystalline (GHC)

Procedia PDF Downloads 66
1097 Improved Feature Extraction Technique for Handling Occlusion in Automatic Facial Expression Recognition

Authors: Khadijat T. Bamigbade, Olufade F. W. Onifade

Abstract:

The field of automatic facial expression analysis has been an active research area in the last two decades. Its vast applicability in various domains has drawn so much attention into developing techniques and dataset that mirror real life scenarios. Many techniques such as Local Binary Patterns and its variants (CLBP, LBP-TOP) and lately, deep learning techniques, have been used for facial expression recognition. However, the problem of occlusion has not been sufficiently handled, making their results not applicable in real life situations. This paper develops a simple, yet highly efficient method tagged Local Binary Pattern-Histogram of Gradient (LBP-HOG) with occlusion detection in face image, using a multi-class SVM for Action Unit and in turn expression recognition. Our method was evaluated on three publicly available datasets which are JAFFE, CK, SFEW. Experimental results showed that our approach performed considerably well when compared with state-of-the-art algorithms and gave insight to occlusion detection as a key step to handling expression in wild.

Keywords: automatic facial expression analysis, local binary pattern, LBP-HOG, occlusion detection

Procedia PDF Downloads 156
1096 Kant’s Conception of Human Dignity and the Importance of Singularity within Commonality

Authors: Francisco Lobo

Abstract:

Kant’s household theory of human dignity as a common feature of all rational beings is the starting point of any intellectual endeavor to unravel the implications of this normative notion. Yet, it is incomplete, as it neglects considering the importance of the singularity or uniqueness of the individual. In a first, deconstructive stage, this paper describes the Kantian account of human dignity as one among many conceptions of human dignity. It reads carefully into the original wording used by Kant in German and its English translations, as well as the works of modern commentators, to identify its shortcomings. In a second, constructive stage, it then draws on the theories of Aristotle, Alexis de Tocqueville, John Stuart Mill, and Hannah Arendt to try and enhance the Kantian conception, in the sense that these authors give major importance to the singularity of the individual. The Kantian theory can be perfected by including elements from the works of these authors, while at the same time being mindful of the dangers entailed in focusing too much on singularity. The conclusion of this paper is that the Kantian conception of human dignity can be enhanced if it acknowledges that not only morality has dignity, but also the irreplaceable human individual to the extent that she is a narrative, original creature with the potential to act morally.

Keywords: commonality, dignity, Kant, singularity

Procedia PDF Downloads 266
1095 Recurrent Neural Networks with Deep Hierarchical Mixed Structures for Chinese Document Classification

Authors: Zhaoxin Luo, Michael Zhu

Abstract:

In natural languages, there are always complex semantic hierarchies. Obtaining the feature representation based on these complex semantic hierarchies becomes the key to the success of the model. Several RNN models have recently been proposed to use latent indicators to obtain the hierarchical structure of documents. However, the model that only uses a single-layer latent indicator cannot achieve the true hierarchical structure of the language, especially a complex language like Chinese. In this paper, we propose a deep layered model that stacks arbitrarily many RNN layers equipped with latent indicators. After using EM and training it hierarchically, our model solves the computational problem of stacking RNN layers and makes it possible to stack arbitrarily many RNN layers. Our deep hierarchical model not only achieves comparable results to large pre-trained models on the Chinese short text classification problem but also achieves state of art results on the Chinese long text classification problem.

Keywords: nature language processing, recurrent neural network, hierarchical structure, document classification, Chinese

Procedia PDF Downloads 49
1094 Under the ‘Fourth World’: A Discussion to the Transformation of Character-Settings in Chinese Ethnic Minority Films

Authors: Sicheng Liu

Abstract:

Based on the key issue of the current fourth world studies, the article aims to analyze the features of character-settings in Chinese ethnic minority films. As a generalizable transformation, this feature progresses from a microcosmic representation. It argues that, as the mediation, films note down the current state of people and their surroundings, while the ‘fourth world’ theorization (or the fourth cinema) provides a new perspective to ethnic minority topics in China. Like the ‘fourth cinema’ focusing on the depiction of indigeneity groups, the ethnic minority films portrait the non-Han nationalities in China. Both types possess the motif of returning history-writing to the minority members’ own hand. In this article, the discussion entirely involves three types of cinematic role-settings in Chinese minority themed films, which illustrates that, similar to the creative principle of the fourth film, the themes and narratives of these films are becoming more individualized, with more concern to minority grassroots.

Keywords: 'fourth world', Chinese ethnic minority films, ethnicity and culture reflection, 'mother tongue' (muyu), highlighting to individual spiritual

Procedia PDF Downloads 175
1093 Automated Machine Learning Algorithm Using Recurrent Neural Network to Perform Long-Term Time Series Forecasting

Authors: Ying Su, Morgan C. Wang

Abstract:

Long-term time series forecasting is an important research area for automated machine learning (AutoML). Currently, forecasting based on either machine learning or statistical learning is usually built by experts, and it requires significant manual effort, from model construction, feature engineering, and hyper-parameter tuning to the construction of the time series model. Automation is not possible since there are too many human interventions. To overcome these limitations, this article proposed to use recurrent neural networks (RNN) through the memory state of RNN to perform long-term time series prediction. We have shown that this proposed approach is better than the traditional Autoregressive Integrated Moving Average (ARIMA). In addition, we also found it is better than other network systems, including Fully Connected Neural Networks (FNN), Convolutional Neural Networks (CNN), and Nonpooling Convolutional Neural Networks (NPCNN).

Keywords: automated machines learning, autoregressive integrated moving average, neural networks, time series analysis

Procedia PDF Downloads 78
1092 Obsession Unveiled: A Freud’s Psychoanalytical Analysis of Protagonist Fixations in Nabokov’s Lolita and Pamuk’s The Museum of Innocence

Authors: Kamilya Khamitova

Abstract:

This study analyzes the overarching theme of obsession as portrayed through the two protagonists, Humbert Humbert and Kemal, in Vladimir Nabokov's Lolita and Orhan Pamuk's The Museum of Innocence through the lens of Freudian psychoanalytical theory of “transference.” Their obsessions are channeled into various forms of artistic expression following the loss of their beloved Lolita and Füsun. Employing psychoanalytical literary criticism, firmly grounded in the classical era of psychoanalysis, as pioneered by Sigmund Freud, this research explores the characters' psyches, revealing the concealed desires, conflicts, and symbolic manifestations within their relentless obsessions. The aim of this study is to unravel the psychological complexities of obsession, shedding light on the motivations and behaviors of Humbert and Kemal within the context of their respective narratives. Methodologically, this research employs close textual analysis of the novels, dissecting the protagonists' thoughts, actions, and artistic expressions. Through the lens of Freud's fundamental concept of “transference,” this analysis uncovers the protagonists' mechanisms of projecting their desires onto unattainable objects of desire—Lolita and Füsun. Humbert's pursuit of Lolita mirrors his unresolved emotional traumas and attempts to recapture the lost object of his childhood. In contrast, Kemal's fixation on Füsun is a desperate desire to fill an existential void, address a sense of inadequacy, and construct a semblance of immortality through the meticulous preservation of his memories with her. By adopting a psychoanalytic lens, this research provides a richer understanding of the characters, themes, and symbolism inherent in their artistic expressions of devotion.

Keywords: artistic expression, psychoanalysis of obsession, Sigmund Freud, transference

Procedia PDF Downloads 141
1091 Modern Hybrid of Older Black Female Stereotypes in Hollywood Film

Authors: Frederick W. Gooding, Jr., Mark Beeman

Abstract:

Nearly a century ago, the groundbreaking 1915 film ‘The Birth of a Nation’ popularized the way Hollywood made movies with its avant-garde, feature-length style. The movie's subjugating and demeaning depictions of African American women (and men) reflected popular racist beliefs held during the time of slavery and the early Jim Crow era. Although much has changed concerning race relations in the past century, American sociologist Patricia Hill Collins theorizes that the disparaging images of African American women originating in the era of plantation slavery are adaptable and endure as controlling images today. In this context, a comparative analysis of the successful contemporary film, ‘Bringing Down the House’ starring Queen Latifah is relevant as this 2004 film was designed to purposely defy and ridicule classic stereotypes of African American women. However, the film is still tied to the controlling images from the past, although in a modern hybrid form. Scholars of race and film have noted that the pervasive filmic imagery of the African American woman as the loyal mammy stereotype faded from the screen in the post-civil rights era in favor of more sexualized characters (i.e., the Jezebel trope). Analyzing scenes and dialogue through the lens of sociological and critical race theory, the troubling persistence of African American controlling images in film stubbornly emerge in a movie like ‘Bringing Down the House.’ Thus, these controlling images, like racism itself, can adapt to new social and economic conditions. Although the classic controlling images appeared in the first feature length film focusing on race relations a century ago, ‘The Birth of a Nation,’ this black and white rendition of the mammy figure was later updated in 1939 with the classic hit, ‘Gone with the Wind’ in living color. These popular controlling images have loomed quite large in the minds of international audiences, as ‘Gone with the Wind’ is still shown in American theaters currently, and experts at the British Film Institute in 2004 rated ‘Gone with the Wind’ as the number one movie of all time in UK movie history based upon the total number of actual viewings. Critical analysis of character patterns demonstrate that images that appear superficially benign contribute to a broader and quite persistent pattern of marginalization within the aggregate. This approach allows experts and viewers alike to detect more subtle and sophisticated strands of racial discrimination that are ‘hidden in plain sight’ despite numerous changes in the Hollywood industry that appear to be more voluminous and diverse than three or four decades ago. In contrast to white characters, non-white or minority characters are likely to be subtly compromised or marginalized relative to white characters if and when seen within mainstream movies, rather than be subjected to obvious and offensive racist tropes. The hybrid form of both the older Jezebel and Mammy stereotypes exhibited by lead actress Queen Latifah in ‘Bringing Down the House’ represents a more suave and sophisticated merging of past imagery ideas deemed problematic in the past as well as the present.

Keywords: African Americans, Hollywood film, hybrid, stereotypes

Procedia PDF Downloads 161
1090 Human Identification and Detection of Suspicious Incidents Based on Outfit Colors: Image Processing Approach in CCTV Videos

Authors: Thilini M. Yatanwala

Abstract:

CCTV (Closed-Circuit-Television) Surveillance System is being used in public places over decades and a large variety of data is being produced every moment. However, most of the CCTV data is stored in isolation without having integrity. As a result, identification of the behavior of suspicious people along with their location has become strenuous. This research was conducted to acquire more accurate and reliable timely information from the CCTV video records. The implemented system can identify human objects in public places based on outfit colors. Inter-process communication technologies were used to implement the CCTV camera network to track people in the premises. The research was conducted in three stages and in the first stage human objects were filtered from other movable objects available in public places. In the second stage people were uniquely identified based on their outfit colors and in the third stage an individual was continuously tracked in the CCTV network. A face detection algorithm was implemented using cascade classifier based on the training model to detect human objects. HAAR feature based two-dimensional convolution operator was introduced to identify features of the human face such as region of eyes, region of nose and bridge of the nose based on darkness and lightness of facial area. In the second stage outfit colors of human objects were analyzed by dividing the area into upper left, upper right, lower left, lower right of the body. Mean color, mod color and standard deviation of each area were extracted as crucial factors to uniquely identify human object using histogram based approach. Color based measurements were written in to XML files and separate directories were maintained to store XML files related to each camera according to time stamp. As the third stage of the approach, inter-process communication techniques were used to implement an acknowledgement based CCTV camera network to continuously track individuals in a network of cameras. Real time analysis of XML files generated in each camera can determine the path of individual to monitor full activity sequence. Higher efficiency was achieved by sending and receiving acknowledgments only among adjacent cameras. Suspicious incidents such as a person staying in a sensitive area for a longer period or a person disappeared from the camera coverage can be detected in this approach. The system was tested for 150 people with the accuracy level of 82%. However, this approach was unable to produce expected results in the presence of group of people wearing similar type of outfits. This approach can be applied to any existing camera network without changing the physical arrangement of CCTV cameras. The study of human identification and suspicious incident detection using outfit color analysis can achieve higher level of accuracy and the project will be continued by integrating motion and gait feature analysis techniques to derive more information from CCTV videos.

Keywords: CCTV surveillance, human detection and identification, image processing, inter-process communication, security, suspicious detection

Procedia PDF Downloads 168
1089 Extraction, Synthesis, Characterization and Antioxidant Properties of Oxidized Starch from an Abundant Source in Nigeria

Authors: Okafor E. Ijeoma, Isimi C. Yetunde, Okoh E. Judith, Kunle O. Olobayo, Emeje O. Martins

Abstract:

Starch has gained interest as a renewable and environmentally compatible polymer due to the increase in its use. However, starch by itself could not be satisfactorily applied in industrial processes due to some inherent disadvantages such as its hydrophilic character, poor mechanical properties, its inability to withstand processing conditions such as extreme temperatures, diverse pH, high shear rate, freeze-thaw variation and dimensional stability. The range of physical properties of parent starch can be enlarged by chemical modification which invariably enhances their use in a number of applications found in industrial processes and food manufacture. In this study, Manihot esculentus starch was subjected to modification by oxidation. Fourier Transmittance Infra- Red (FTIR) and Raman spectroscopies were used to confirm the synthesis while Scanning Electron Microscopy (SEM) and X- Ray Diffraction (XRD) were used to characterize the new polymer. DPPH (2, 2-diphenyl-1-picryl-hydrazyl-hydrate) free radical assay was used to determine the antioxidant property of the oxidized starch. Our results show that the modification had no significant effect on the foaming capacity as well as on the emulsion capacity. Scanning electron microscopy revealed that oxidation did not alter the predominantly circular-shaped starch granules, while the X-ray pattern of both starch, native and modified were similar. FTIR results revealed a new band at 3007 and 3283cm-1. Differential scanning calorimetry returned two new endothermic peaks in the oxidized starch with an improved gelation capacity and increased enthalpy of gelatinization. The IC50 of oxidized starch was notably higher than that of the reference standard, ascorbic acid.

Keywords: antioxidant activity, DPPH, M. esculentus, oxidation, starch

Procedia PDF Downloads 280
1088 Playing Safely: An Exploration of Irish Parental Attitudes Towards Risky Play and Its Impact on Play Opportunities for Children

Authors: Fiona Armstrong, David Gaul, Michael Barrett, Lorraine D'Arcy

Abstract:

Playing is an instinctive and universal human behavior, is a child’s way of learning and an outlet for their innate need of activity. Risky play can be defined as any play that is thrilling or exciting involving the risk of injury. The benefits of risky play have been acknowledged as helping children to explore and conquer fears, develop confidence, reduce anxiety, and develop risk-management skills. Studies indicate that children learn sound judgment by assessing and confronting risks in relation to their own capabilities through exposure to carefully managed play experiences. Risky play has been associated with danger and increased risk of injury, with families focusing on risk aversion and protecting children from the risks inherent in the modern world. Despite children needing cultural, social, emotional, physical, and geographical space to play, the opportunity for children to play is diminishing. Aim: This study explores play behaviors and risky play in an Irish context by investigating parental attitudes to risky play. Methodology: This is a mixed methods study involving the State of Play survey and semi-structured interviews exploring parental attitudes to risky play. Data will be quantitatively analyzed using descriptive and inferential statistics using IBM SPSS and qualitatively analyzed via thematic analysis using NVivo. Conclusion: The information gathered could advise stakeholders regarding the creation and provision of developmentally appropriate, challenging, stimulating, adaptable, accessible, and safe as necessary outdoor play areas. This research can inform parents, planners, architects, and authorities involved in creating environments for play and contribute to policy development.

Keywords: child development, parental attitudes, play opportunities, risky play

Procedia PDF Downloads 44
1087 Learners and Teachers Experiences in Collaborative Learning

Authors: Bengi Sonyel, Kheder Kasem

Abstract:

Nowadays technology is growing so fast. Everybody agrees that technology should be enhanced more in educational field in order to achieve maximum level of teaching and learning effectiveness. Collaborative learning is one of the most important subjects that have been discussed widely in the last 20 years. In this growing of technology and the widely spread of e-learning systems most of face-to-face processes are changing to be completely online base. Online collaborative learning considered one of the new feature that applied recently in some e-Learning systems but still there are much differences between face-to-face instance of collaborative learning and what really occur and happen in networked online environment.In this research we will compare face-to-face collaborative learning with online collaborative learning to define the key success for achieving course’s outcomes. We will also study the current teachers and students experience in today e-Learning systems, more specifically in online collaborative system and study them interaction to today’s technology that related to education. We will apply quantitative and qualitative research method in order to get accurate results. Finally we will gather all of our findings, analyze it and try to find the advantages and disadvantages as well as the current problems and possible solutions.

Keywords: collaborative learning, learning by doing, technology, teachers, learners experiences

Procedia PDF Downloads 506
1086 Emotiv EPOC BCI Matrix Speller Based on Single Emokey

Authors: S. M. Abdullah Al Mamun

Abstract:

Human Computer Interaction (HCI) is an excellent area for the researchers to make daily life more simple and fast. Necessary hardware equipments for any BCI are generally expensive and not affordable for most of the people. Emotiv is one of the solutions for this problem, which can provide electroencephalograph (EEG) signal and explain the brain activities. BCI virtual speller was one of the important applications for the people who have lost their hand or speaking ability because of diseases or unexpected accident. In this paper, a matrix speller has been designed for the first time for Bengali speaking people around the world. Bengali is one of the most commonly spoken languages. Among them, a lot of disabled person will be able to express their desire in their mother tongue. This application is also usable for the social networks and daily life communications. For this virtual keyboard, the well-known matrix speller method with column flashing is applied and controlled by single Emokey only. Emokey is a great feature which translates emotional state for application inputs. In this paper, it is presented that the ITR (Information Transfer Rate) were 29.4 bits/min and typing speed achieved up to 7.43 char/per min.

Keywords: brain computer interface, Emotiv EPOC, EEG, virtual keyboard, matrix speller

Procedia PDF Downloads 288
1085 Mobile Learning: Toward Better Understanding of Compression Techniques

Authors: Farouk Lawan Gambo

Abstract:

Data compression shrinks files into fewer bits then their original presentation. It has more advantage on internet because the smaller a file, the faster it can be transferred but learning most of the concepts in data compression are abstract in nature therefore making them difficult to digest by some students (Engineers in particular). To determine the best approach toward learning data compression technique, this paper first study the learning preference of engineering students who tend to have strong active, sensing, visual and sequential learning preferences, the paper also study the advantage that mobility of learning have experienced; Learning at the point of interest, efficiency, connection, and many more. A survey is carried out with some reasonable number of students, through random sampling to see whether considering the learning preference and advantages in mobility of learning will give a promising improvement over the traditional way of learning. Evidence from data analysis using Ms-Excel as a point of concern for error-free findings shows that there is significance different in the students after using learning content provided on smart phone, also the result of the findings presented in, bar charts and pie charts interpret that mobile learning has to be promising feature of learning.

Keywords: data analysis, compression techniques, learning content, traditional learning approach

Procedia PDF Downloads 336
1084 Transmission Design That Eliminates Gradual System Problems in Gearboxes

Authors: Ömer Ateş, Atilla Savaş

Abstract:

Reducers and transmission systems are power and speed transfer tools that have been used for many years in the technology world and in all engineering fields. Since today's transmissions have a threaded tap system, torque interruption occurs during tap change. besides, breakdown and manufacturing costs are high. Another problem is the limited torque and rpm setting in stepped gearbox systems. In this study, a new type of transmission system is designed to solve these problems. This new type of transmission system has been called the Continuously Variable Pulley. The most important feature of the transmission system in the study is that it can be adjusted Revolutions Per Minute-wise and torque-wise at the millimeter (precision) adjustment level. In order to make adjustments at this level, an adjustable pulley with the help of hydraulic piston is designed. The efficiency of the designed transmission system is 97 percent, the efficiency of today's transmissions is in the range of 85-95 percent. examined at the analysis and calculations, it is seen that the designed system gives realistic results and can be compared with today's transmissions and reducers. Therefore, this new type of transmission has been proven to be usable in production areas and the world of technology.

Keywords: gearbox, reducer, transmission, torque

Procedia PDF Downloads 111
1083 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 246