Search results for: computing with words
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2221

Search results for: computing with words

1141 Managing the Cloud Procurement Process: Findings from a Case Study

Authors: Andreas Jede, Frank Teuteberg

Abstract:

Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.

Keywords: cloud procurement process, IT-organization, event-driven process chain, in-depth case study

Procedia PDF Downloads 388
1140 The Role of Metacognitive Strategy Intervention through Dialogic Interaction on Listeners’ Level of Cognitive Load

Authors: Ali Babajanzade, Hossein Bozorgian

Abstract:

Cognitive load plays an important role in learning in general and L2 listening comprehension in particular. This study is an attempt to investigate the effect of metacognitive strategy intervention through dialogic interaction (MSIDI) on L2 listeners’ cognitive load. A mixed-method design with 50 participants of male and female Iranian lower-intermediate learners between 20 to 25 years of age was used. An experimental group (n=25) received weekly interventions based on metacognitive strategy intervention through dialogic interaction for ten sessions. The second group, which was control (n=25), had the same listening samples with the regular procedure without a metacognitive intervention program in each session. The study used three different instruments: a) a modified version of the cognitive load questionnaire, b) digit span tests, and c) focused group interviews to investigate listeners’ level of cognitive load throughout the process. Results testified not only improvements in listening comprehension in MSIDI but a radical shift of cognitive load rate within this group. In other words, listeners experienced a lower level of cognitive load in MSIDI in comparison with their peers in the control group.

Keywords: cognitive load theory, human mental functioning, metacognitive theory, listening comprehension, sociocultural theory

Procedia PDF Downloads 142
1139 The Role of Community Forestry to Combat Climate Change Impacts in Nepal

Authors: Ravi Kumar Pandit

Abstract:

Climate change is regarded as one of the most fundamental threats to sustainable livelihood and global development. There is growing a global concern in linking community-managed forests as potential climate change mitigation projects. This study was conducted to explore the local people’s perception on climate change and the role of community forestry (CF) to combat climate change impacts. Two active community forest user groups (CFUGs) from Kaski and Syangja Districts in Nepal were selected as study sites, and various participatory tools were applied to collect primary data. Although most of the respondents were unaware about the words “Climate Change” in study sites, they were quite familiar with the irregularities in rainfall season and other weather extremities. 60% of the respondents had the idea that, due to increase in precipitation, there is a frequent occurrence of erosion, floods and landslide. Around 85% of the people agreed that community forests help in stabilizing soil, reducing the natural hazards like erosion, landslide. Biogas as an alternative source of cooking energy, and changes in crops and their varieties are the common adaptation measures that local people start practicing in both CFUGs in Nepal.

Keywords: climate change, community forestry, global warming, adaptation in Nepal

Procedia PDF Downloads 248
1138 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 384
1137 Turkey’s Ideological and Identity Politics towards Iran in the Arab Uprising: The Case of Syrian Civil War

Authors: Cangul Altundas Akcay

Abstract:

With the beginning of the mass movement called as the Arab Uprising, Middle Eastern politics has demonstrated an influential shift which has been threatening the existence of the ruling regimes. In this environment, in particular, regional powers have desired to control regional politics, and to expand their regional influence. Bearing that in mind, Turkey and Iran, two significant regional powers, have engaged in competition so as to affect the shifted regional geopolitics. In this context, this paper aims to investigate how regional powers, especially non-Arab ones, have viewed each other in the Arab Uprising, whereby focusing on Turkish perspectives towards Iran. In other words, it will shed light on how Turkey has conducted foreign policy towards Iran during the Arab Uprising. To analyse this, Turkey’s ideological and identity politics towards Iran will be examined as one of its foreign policy approaches. The question is thus that how ideological and identity politics have determined Turkish foreign policy towards Iran in the Arab Uprising. To answer that, the Syrian civil war will be analysed as the case study in this qualitative study, hypothesising that Turkey, which has both Turkish identity and Sunni sect, has competed with Iran, which has both Farsi identity and Shia sect, over the Syrian civil war.

Keywords: Arab uprising, ideological and identity politics, Iran, Turkey, Syrian civil war

Procedia PDF Downloads 302
1136 Frequency Transformation with Pascal Matrix Equations

Authors: Phuoc Si Nguyen

Abstract:

Frequency transformation with Pascal matrix equations is a method for transforming an electronic filter (analogue or digital) into another filter. The technique is based on frequency transformation in the s-domain, bilinear z-transform with pre-warping frequency, inverse bilinear transformation and a very useful application of the Pascal’s triangle that simplifies computing and enables calculation by hand when transforming from one filter to another. This paper will introduce two methods to transform a filter into a digital filter: frequency transformation from the s-domain into the z-domain; and frequency transformation in the z-domain. Further, two Pascal matrix equations are derived: an analogue to digital filter Pascal matrix equation and a digital to digital filter Pascal matrix equation. These are used to design a desired digital filter from a given filter.

Keywords: frequency transformation, bilinear z-transformation, pre-warping frequency, digital filters, analog filters, pascal’s triangle

Procedia PDF Downloads 541
1135 State of the Science: Digital Therapies in Pediatric Mental Health

Authors: Billy Zou

Abstract:

Statement of the Problem: The burden of mental illness and problem behaviors in adolescence has risen worldwide. While less than 50% of teens have access to traditional mental health care, more than 73% have smartphones. Internet-based interventions offer advantages such as cost-effectiveness, availability, and flexibility. Methodology & Theoretical Orientation: A literature review was done using a PubMed search with the words mental health app yielding 2113 results. 103 articles that met inclusion criteria were reviewed, and findings were then described and synthesized. Findings: 1. Computer-based CBT was found to be effective for OCD, depression, social phobia, and panic disorder. 2. Web-based psychoeducation reduced problem behavior and improved parental well-being. 3. There is limited evidence for mobile-phone-based apps, but preliminary results suggest computer-based interventions are transferrable to mobile apps. 4. Adherence to app-based treatment was correlated with impressions about the user interface Conclusion & Significance: There is evidence for the effectiveness of computer-based programs in filling the significant gaps that currently exist in mental health delivery in the United States and internationally. There is also potential and theoretical validity for mobile-based apps to do the same, though more data is needed.

Keywords: children's mental health, mental health app, child and adolecent psychiatry, digital therapy

Procedia PDF Downloads 66
1134 Dysphemism vs Euphemism in a South African Soap Opera: The Case of the Queen

Authors: Maropeng Maponya, Mawethu Nhlabathi

Abstract:

Euphemistic expressions, as part of showing respect and ubuntu, are naturally embedded in the African Languages. These expressions are solely used to soothe the impact which dysphemistic words may have on an individual or the society at large. Conversely, the script producers of one of the well-known soap operas in South Africa, The Queen–Mzansi, seem to have turned a blind eye on that, mostly when they use dysphemistic reference to human genitals. As a result, such practice tends to deteriorate the ethicality of the African languages and the beliefs held by African society in general. They also give less meaning to the promotion of African language concepts. This paper is aimed at explaining and analyzing the impact of dysphemism on language growth, basing the argument on the fact that subtitled texts in the soap opera never reflect the actual dysphemistic sourced text uttered by the character/s. This is a clear indication that the production crew of this soap opera is aware of the impact that these utterances may have on society, yet they do not mind the characters saying them as is in African Languages whilst euphemizing them through English subtitles. The paper adopted a descriptive qualitative method with an embedded case study in it, whereby dysphemistic clips from three characters of the soap opera were selected and analyzed.

Keywords: euphemism, dysphemism, soap opera, The Queen

Procedia PDF Downloads 136
1133 Etymological Studies and their Role in Consolidating the Identity of the Cultural Heritage; Terminology Related to the Traditional Dagger Making in the Sultanate of Oman as a Model

Authors: Muhammed Muvaffak Alhasan, Ali Alriyami, Ali Almanei

Abstract:

Despite the extreme importance of etymological studies in documenting the linguistic heritage, and showing its roots and connections in the classical language; However, etymological dictionaries are still rare in the Arab library in general. Etymology is the science of etymology that investigates how vocabulary is reproduced and reproduced, by exploring the origin of words and the phonetic and semantic changes that occurred in them over time, trying to reconfigure an identity card for the word showing its origin and the path it took through time until it reached its current state. This research seeks to make an etymological study on the terminology used in the traditional dagger making in the Sultanate of Oman through the following steps: 1. Collecting the terms relating to traditional dagger making and recording them in order to document and preserve them. 2. Arranging them alphabetically in order to facilitate searching and dealing with them. 3. Setting up a historical identification card for each word by applying an etymological study that shows its source from which they descended its links with standard and the phonological and semantic changes it underwent until it reached its current form.

Keywords: cultural heritage, etymology, Omani dagger, Oman

Procedia PDF Downloads 74
1132 Solving Linear Systems Involved in Convex Programming Problems

Authors: Yixun Shi

Abstract:

Many interior point methods for convex programming solve an (n+m)x(n+m)linear system in each iteration. Many implementations solve this system in each iteration by considering an equivalent mXm system (4) as listed in the paper, and thus the job is reduced into solving the system (4). However, the system(4) has to be solved exactly since otherwise the error would be entirely passed onto the last m equations of the original system. Often the Cholesky factorization is computed to obtain the exact solution of (4). One Cholesky factorization is to be done in every iteration, resulting in higher computational costs. In this paper, two iterative methods for solving linear systems using vector division are combined together and embedded into interior point methods. Instead of computing one Cholesky factorization in each iteration, it requires only one Cholesky factorization in the entire procedure, thus significantly reduces the amount of computation needed for solving the problem. Based on that, a hybrid algorithm for solving convex programming problems is proposed.

Keywords: convex programming, interior point method, linear systems, vector division

Procedia PDF Downloads 396
1131 Optimal Design of Redundant Hybrid Manipulator for Minimum Singularity

Authors: Arash Rahmani, Ahmad Ghanbari, Abbas Baghernezhad, Babak Safaei

Abstract:

In the design of parallel manipulators, usually mean value of a dexterity measure over the workspace volume is considered as the objective function to be used in optimization algorithms. The mentioned indexes in a hybrid parallel manipulator (HPM) are quite complicated to solve thanks to infinite solutions for every point within the workspace of the redundant manipulators. In this paper, spatial isotropic design axioms are extended as a well-known method for optimum design of manipulators. An upper limit for the isotropy measure of HPM is calculated and instead of computing and minimizing isotropy measure, minimizing the obtained limit is considered. To this end, two different objective functions are suggested which are obtained from objective functions of comprising modules. Finally, by using genetic algorithm (GA), the best geometric parameters for a specific hybrid parallel robot which is composed of two modified Gough-Stewart platforms (MGSP) are achieved.

Keywords: hybrid manipulator, spatial isotropy, genetic algorithm, optimum design

Procedia PDF Downloads 330
1130 Exploring Syntactic and Semantic Features for Text-Based Authorship Attribution

Authors: Haiyan Wu, Ying Liu, Shaoyun Shi

Abstract:

Authorship attribution is to extract features to identify authors of anonymous documents. Many previous works on authorship attribution focus on statistical style features (e.g., sentence/word length), content features (e.g., frequent words, n-grams). Modeling these features by regression or some transparent machine learning methods gives a portrait of the authors' writing style. But these methods do not capture the syntactic (e.g., dependency relationship) or semantic (e.g., topics) information. In recent years, some researchers model syntactic trees or latent semantic information by neural networks. However, few works take them together. Besides, predictions by neural networks are difficult to explain, which is vital in authorship attribution tasks. In this paper, we not only utilize the statistical style and content features but also take advantage of both syntactic and semantic features. Different from an end-to-end neural model, feature selection and prediction are two steps in our method. An attentive n-gram network is utilized to select useful features, and logistic regression is applied to give prediction and understandable representation of writing style. Experiments show that our extracted features can improve the state-of-the-art methods on three benchmark datasets.

Keywords: authorship attribution, attention mechanism, syntactic feature, feature extraction

Procedia PDF Downloads 131
1129 A Safety Analysis Method for Multi-Agent Systems

Authors: Ching Louis Liu, Edmund Kazmierczak, Tim Miller

Abstract:

Safety analysis for multi-agent systems is complicated by the, potentially nonlinear, interactions between agents. This paper proposes a method for analyzing the safety of multi-agent systems by explicitly focusing on interactions and the accident data of systems that are similar in structure and function to the system being analyzed. The method creates a Bayesian network using the accident data from similar systems. A feature of our method is that the events in accident data are labeled with HAZOP guide words. Our method uses an Ontology to abstract away from the details of a multi-agent implementation. Using the ontology, our methods then constructs an “Interaction Map,” a graphical representation of the patterns of interactions between agents and other artifacts. Interaction maps combined with statistical data from accidents and the HAZOP classifications of events can be converted into a Bayesian Network. Bayesian networks allow designers to explore “what it” scenarios and make design trade-offs that maintain safety. We show how to use the Bayesian networks, and the interaction maps to improve multi-agent system designs.

Keywords: multi-agent system, safety analysis, safety model, integration map

Procedia PDF Downloads 413
1128 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 82
1127 Influence of Parenting Styles on Adolescents Self-Esteem

Authors: Olubukola Ajayi

Abstract:

INFLUENCE OF PARANTING STYLES ON ADOLECENST’ SELF-ESTEEM BY AJAYI OLUBUKOLA (PhD) DEPARTMRNT OF PSYCHOLOGY & BEHAVIOURAL STUDIES FACULTY OF THE SOCIAL SCIENCES EKITI STATE UNIVERSITY [email protected] , [email protected] ABSTRACT This study was designed to assess the influence of parenting styles on adolescents’ self-esteem. The study population comprised of adolescents selected from two secondary schools (Bishop Philip Academy and T.L. Oyeshina Model School) in Ibadan, Oyo State. A total number of 300 students whose ages range from 13-19 were used. Rosenberg Self-Esteem Scale (RSE) developed by Rosenberg (1965) was used to measure Adolescents’ Self-Esteem. While Robinson (2001) Parenting Styles and Dimensions Questionnaire was used to measure how adolescents perceive their parents on four sub scales (Authoritative, Authoritarian, Uninvolved, Permissiveness).Three hypotheses were tested using Regression, One way ANOVA and Independent t-test. Result showed that parenting styles do not significantly influence Self-Esteem. Parents Work Status did not have a significant influence on Self-Esteem. The result also revealed no significant difference between Male and Female Self-Esteem. The findings were discussed in line with relevant empirical literatures, while conclusions and recommendations subsequently followed. Key Words: Parenting style, Adolescents, Self- esteem,

Keywords: AUTHORITATIVE, AUTHORITARIAN, UNINVOLVED, PERMISSIVENESS

Procedia PDF Downloads 193
1126 Porul: Option Generation and Selection and Scoring Algorithms for a Tamil Flash Card Game

Authors: Anitha Narasimhan, Aarthy Anandan, Madhan Karky, C. N. Subalalitha

Abstract:

Games can be the excellent tools for teaching a language. There are few e-learning games in Indian languages like word scrabble, cross word, quiz games etc., which were developed mainly for educational purposes. This paper proposes a Tamil word game called, “Porul”, which focuses on education as well as on players’ thinking and decision-making skills. Porul is a multiple choice based quiz game, in which the players attempt to answer questions correctly from the given multiple options that are generated using a unique algorithm called the Option Selection algorithm which explores the semantics of the question in various dimensions namely, synonym, rhyme and Universal Networking Language semantic category. This kind of semantic exploration of the question not only increases the complexity of the game but also makes it more interesting. The paper also proposes a Scoring Algorithm which allots a score based on the popularity score of the question word. The proposed game has been tested using 20,000 Tamil words.

Keywords: Porul game, Tamil word game, option selection, flash card, scoring, algorithm

Procedia PDF Downloads 397
1125 Adapting an Accurate Reverse-time Migration Method to USCT Imaging

Authors: Brayden Mi

Abstract:

Reverse time migration has been widely used in the Petroleum exploration industry to reveal subsurface images and to detect rock and fluid properties since the early 1980s. The seismic technology involves the construction of a velocity model through interpretive model construction, seismic tomography, or full waveform inversion, and the application of the reverse-time propagation of acquired seismic data and the original wavelet used in the acquisition. The methodology has matured from 2D, simple media to present-day to handle full 3D imaging challenges in extremely complex geological conditions. Conventional Ultrasound computed tomography (USCT) utilize travel-time-inversion to reconstruct the velocity structure of an organ. With the velocity structure, USCT data can be migrated with the “bend-ray” method, also known as migration. Its seismic application counterpart is called Kirchhoff depth migration, in which the source of reflective energy is traced by ray-tracing and summed to produce a subsurface image. It is well known that ray-tracing-based migration has severe limitations in strongly heterogeneous media and irregular acquisition geometries. Reverse time migration (RTM), on the other hand, fully accounts for the wave phenomena, including multiple arrives and turning rays due to complex velocity structure. It has the capability to fully reconstruct the image detectable in its acquisition aperture. The RTM algorithms typically require a rather accurate velocity model and demand high computing powers, and may not be applicable to real-time imaging as normally required in day-to-day medical operations. However, with the improvement of computing technology, such a computational bottleneck may not present a challenge in the near future. The present-day (RTM) algorithms are typically implemented from a flat datum for the seismic industry. It can be modified to accommodate any acquisition geometry and aperture, as long as sufficient illumination is provided. Such flexibility of RTM can be conveniently implemented for the application in USCT imaging if the spatial coordinates of the transmitters and receivers are known and enough data is collected to provide full illumination. This paper proposes an implementation of a full 3D RTM algorithm for USCT imaging to produce an accurate 3D acoustic image based on the Phase-shift-plus-interpolation (PSPI) method for wavefield extrapolation. In this method, each acquired data set (shot) is propagated back in time, and a known ultrasound wavelet is propagated forward in time, with PSPI wavefield extrapolation and a piece-wise constant velocity model of the organ (breast). The imaging condition is then applied to produce a partial image. Although each image is subject to the limitation of its own illumination aperture, the stack of multiple partial images will produce a full image of the organ, with a much-reduced noise level if compared with individual partial images.

Keywords: illumination, reverse time migration (RTM), ultrasound computed tomography (USCT), wavefield extrapolation

Procedia PDF Downloads 69
1124 Optimizing Water Consumption of a Washer-Dryer Which Contains Water Condensation Technology under a Constraint of Energy Consumption and Drying Performance

Authors: Aysegul Sarac

Abstract:

Washer-dryers are the machines which can either wash the laundries or can dry them. In other words, we can define a washer-dryer as a washing machine and a dryer in one machine. Washing machines are characterized by the loading capacity, cabinet depth and spin speed. Dryers are characterized by the drying technology. On the other hand, energy efficiency, water consumption, and noise levels are main characteristics that influence customer decisions to buy washers. Water condensation technology is the most common drying technology existing in the washer-dryer market. Water condensation technology uses water to dry the laundry inside the machine. Thus, in this type of the drying technology water consumption is at high levels comparing other technologies. Water condensation technology sprays cold water in the drum to condense the humidity of hot weather in order to dry the laundry inside. Thus, water consumption influences the drying performance. The scope of this study is to optimize water consumption during drying process under a constraint of energy consumption and drying performance. We are using 6-Sigma methodology to find the optimum water consumption by comparing drying performances of different drying algorithms.

Keywords: optimization, 6-Sigma methodology, washer-dryers, water condensation technology

Procedia PDF Downloads 354
1123 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment

Authors: Arslan Murtaza

Abstract:

RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.

Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient

Procedia PDF Downloads 325
1122 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 391
1121 A Qualitative Study of Children's Growth in Creative Dance: An Example of Cloud Gate Dance School in Taiwan

Authors: Chingwen Yeh, Yu Ru Chen

Abstract:

This paper aims to explore the growth and development of children in the creative dance class of Cloud Gate Dance School in Taichung Taiwan. Professor Chingwen Yeh’s qualitative research method was applied in this study. First of all, application of Dalcroze Eurhythmic teaching materials such as music, teaching aids, speaking language through classroom situation was collected and exam. Second, the in-class observation on the participation of the young children's learning situation was recorded both by words and on video screen as the research data. Finally, data analysis was categorized into the following aspects: children's body movement coordination, children’s mind concentration and imagination and children’s verbal expression. Through the in-depth interviews with the in-class teachers, parents of participating children and other in class observers were conducted from time to time; this research found the children's body rhythm, language skills, and social learning growth were improved in certain degree through the creative dance training. These authors hope the study can contribute as the further research reference on the related topic.

Keywords: Cloud Gate Dance School, creative dance, Dalcroze, Eurhythmic

Procedia PDF Downloads 293
1120 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management

Authors: Arjmand Khaliq, Pemra Sohaib

Abstract:

There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.

Keywords: cellular networks, energy management, renewable energy source, smart grid technology

Procedia PDF Downloads 405
1119 Evaluation of Features Extraction Algorithms for a Real-Time Isolated Word Recognition System

Authors: Tomyslav Sledevič, Artūras Serackis, Gintautas Tamulevičius, Dalius Navakauskas

Abstract:

This paper presents a comparative evaluation of features extraction algorithm for a real-time isolated word recognition system based on FPGA. The Mel-frequency cepstral, linear frequency cepstral, linear predictive and their cepstral coefficients were implemented in hardware/software design. The proposed system was investigated in the speaker-dependent mode for 100 different Lithuanian words. The robustness of features extraction algorithms was tested recognizing the speech records at different signals to noise rates. The experiments on clean records show highest accuracy for Mel-frequency cepstral and linear frequency cepstral coefficients. For records with 15 dB signal to noise rate the linear predictive cepstral coefficients give best result. The hard and soft part of the system is clocked on 50 MHz and 100 MHz accordingly. For the classification purpose, the pipelined dynamic time warping core was implemented. The proposed word recognition system satisfies the real-time requirements and is suitable for applications in embedded systems.

Keywords: isolated word recognition, features extraction, MFCC, LFCC, LPCC, LPC, FPGA, DTW

Procedia PDF Downloads 486
1118 Simulation and Modeling of High Voltage Pulse Transformer

Authors: Zahra Emami, H. Reza Mesgarzade, A. Morad Ghorbami, S. Reza Motahari

Abstract:

This paper presents a method for calculation of parasitic elements consisting of leakage inductance and parasitic capacitance in a high voltage pulse transformer. The parasitic elements of pulse transformers significantly influence the resulting pulse shape of a power modulator system. In order to prevent the effects on the pulse shape before constructing the transformer an electrical model is needed. The technique procedures for computing these elements are based on finite element analysis. The finite element model of pulse transformer is created using software "Ansys Maxwell 3D". Finally, the transformer parasitic elements is calculated and compared with the value obtained from the actual test and pulse modulator is simulated and results is compared with actual test of pulse modulator. The results obtained are very similar with the test values.

Keywords: pulse transformer, simulation, modeling, Maxwell 3D, modulator

Procedia PDF Downloads 452
1117 Theology and Music in the XXI. Century: An Exploratory Study of Current Interrelation

Authors: Andrzej Kesiak

Abstract:

Contemporary theology is often accused of answering questions that nobody is asking, and of employing hermetic language that has lost its communication capacity. There is also a question that theology is asking itself: how theological discourse can still be influential on other disciplines and, how to overcome the separation of theology and belief. Undoubtedly, in the wider spectrum, the theological discourse has been and will be needed. The difficulty is how to find the right model of it, the model that would help theology to enter in dialogue with culture, art, science, and politics. Presumably, there is no only one such model, theology constantly needs to seek such models, and this is probably a never-ending journey; in other words, theology should adopt a profile of ‘a restless being’ if it wants to remain influential. Music, on the other hand, has always been very close to theology; in fact, a huge part of classical music is either sacred or religious. Many composers sought inspiration in religion, liturgy, religious painting and sacred texts. This paper will argue that despite all that it seems that a proper and factual dialogue is still in a starting phase. Such a thing as a reciprocal relationship between theology and music definitely exists, but it has not yet been theoretically developed enough. Correlation between musical and theological disciplines constitutes a very broad and complex discourse. Therefore this study would rather narrow the subject and put it in a specific context: Theology and Music in the XXI. Century. This paper is a text-based study; therefore it will be based on textual-analysis with elements of the text hermeneutics.

Keywords: music, theology, reciprocal relationship between theology and music, XXI Century

Procedia PDF Downloads 154
1116 Empowering a New Frontier in Heart Disease Detection: Unleashing Quantum Machine Learning

Authors: Sadia Nasrin Tisha, Mushfika Sharmin Rahman, Javier Orduz

Abstract:

Machine learning is applied in a variety of fields throughout the world. The healthcare sector has benefited enormously from it. One of the most effective approaches for predicting human heart diseases is to use machine learning applications to classify data and predict the outcome as a classification. However, with the rapid advancement of quantum technology, quantum computing has emerged as a potential game-changer for many applications. Quantum algorithms have the potential to execute substantially faster than their classical equivalents, which can lead to significant improvements in computational performance and efficiency. In this study, we applied quantum machine learning concepts to predict coronary heart diseases from text data. We experimented thrice with three different features; and three feature sets. The data set consisted of 100 data points. We pursue to do a comparative analysis of the two approaches, highlighting the potential benefits of quantum machine learning for predicting heart diseases.

Keywords: quantum machine learning, SVM, QSVM, matrix product state

Procedia PDF Downloads 89
1115 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 133
1114 Cross-Dialectal Study of Issues in Dagbanli Phonology

Authors: Abdul-Razak Inusah

Abstract:

The study is a cross-sectional investigation of issues in Dagbanli Phonology, a Mabia language spoken in the Northern Region of Ghana. The issues investigated and assessed for the purpose of Dagbanli phonology are the status of the velar fricatives [x, ɣ] and the flap [ɾ] across Dagbanli dialects. The ethnographic approach is employed to solicit the primary data from bucolic Dagbanli speech communities. The descriptive method is engaged for the analysis of the primary data available. The investigation reveals that the dialects have the velar fricatives [x, ɣ] confined to specific segmental contexts with a particular inventory stricture. The flap[ɾ] is noticed to occur mostly in intervocalic but entirely missing in Dagbanli indigenous words in word-initial. The velar fricatives [x, ɣ] and the flap[ɾ] are observed to be non-contrastive and only suffice as dialectal allophones in the language. The paper shows evidence of coalesce of non-coronal labial /m/ and coronal fricative /s/ to produce dorsal fricative [x] in intervocalic and coalesce of stem final stop /ɡ/ and suffix onset fricative /s/ to yield the dorsal fricative [x], a finding which shows the status of the segment [x] in Dagbanli phonology. The paper concludes that the segments [x], [ɣ] and [ɾ] are positional variants of /ɡ+s/ or /m+s/, /ɡ/ and /d/.

Keywords: Dagbani, phonology, dialect, segment, fricatives, coalesce

Procedia PDF Downloads 45
1113 Linguistic Insights Improve Semantic Technology in Medical Research and Patient Self-Management Contexts

Authors: William Michael Short

Abstract:

Semantic Web’ technologies such as the Unified Medical Language System Metathesaurus, SNOMED-CT, and MeSH have been touted as transformational for the way users access online medical and health information, enabling both the automated analysis of natural-language data and the integration of heterogeneous healthrelated resources distributed across the Internet through the use of standardized terminologies that capture concepts and relationships between concepts that are expressed differently across datasets. However, the approaches that have so far characterized ‘semantic bioinformatics’ have not yet fulfilled the promise of the Semantic Web for medical and health information retrieval applications. This paper argues within the perspective of cognitive linguistics and cognitive anthropology that four features of human meaning-making must be taken into account before the potential of semantic technologies can be realized for this domain. First, many semantic technologies operate exclusively at the level of the word. However, texts convey meanings in ways beyond lexical semantics. For example, transitivity patterns (distributions of active or passive voice) and modality patterns (configurations of modal constituents like may, might, could, would, should) convey experiential and epistemic meanings that are not captured by single words. Language users also naturally associate stretches of text with discrete meanings, so that whole sentences can be ascribed senses similar to the senses of words (so-called ‘discourse topics’). Second, natural language processing systems tend to operate according to the principle of ‘one token, one tag’. For instance, occurrences of the word sound must be disambiguated for part of speech: in context, is sound a noun or a verb or an adjective? In syntactic analysis, deterministic annotation methods may be acceptable. But because natural language utterances are typically characterized by polyvalency and ambiguities of all kinds (including intentional ambiguities), such methods leave the meanings of texts highly impoverished. Third, ontologies tend to be disconnected from everyday language use and so struggle in cases where single concepts are captured through complex lexicalizations that involve profile shifts or other embodied representations. More problematically, concept graphs tend to capture ‘expert’ technical models rather than ‘folk’ models of knowledge and so may not match users’ common-sense intuitions about the organization of concepts in prototypical structures rather than Aristotelian categories. Fourth, and finally, most ontologies do not recognize the pervasively figurative character of human language. However, since the time of Galen the widespread use of metaphor in the linguistic usage of both medical professionals and lay persons has been recognized. In particular, metaphor is a well-documented linguistic tool for communicating experiences of pain. Because semantic medical knowledge-bases are designed to help capture variations within technical vocabularies – rather than the kinds of conventionalized figurative semantics that practitioners as well as patients actually utilize in clinical description and diagnosis – they fail to capture this dimension of linguistic usage. The failure of semantic technologies in these respects degrades the efficiency and efficacy not only of medical research, where information retrieval inefficiencies can lead to direct financial costs to organizations, but also of care provision, especially in contexts of patients’ self-management of complex medical conditions.

Keywords: ambiguity, bioinformatics, language, meaning, metaphor, ontology, semantic web, semantics

Procedia PDF Downloads 126
1112 Effects of Closed-Caption Programs on EFL Learners' Listening Comprehension and Vocabulary Learning

Authors: Bahman Gorjian

Abstract:

This study investigated the effects of closed-captioning on vocabulary learning and listening comprehension of English-language movies. Captioning is thus an effective language-learning tool for persons learning English as a second language. Because students may learn a foreign language "passively," utilizing subtitles on television could make learning English enjoyable for them. Closed captioning is an electrical technique that converts spoken words from a television program's audio into written text that mimics subtitles in another language. The findings of this study showed the importance of using closed-captioning software when learning a foreign language. As a result, these must be considered when teaching EFL/ESL. The influence of watching movies with closed captions on vocabulary and hearing is compared in this study. This goal can be reached by employing a closed-captioned movie as a teaching tool in the classroom. This research was critical because it demonstrates the advantages of closed-captioning programs in EFL classrooms for both teachers and students. The study's findings assisted teachers in better understanding how to employ closed captioning as a teaching tool in the classroom. The effects will be seen as even more significant for language learners who use the method.

Keywords: closed-captions, listening, comprehension, vcabulary

Procedia PDF Downloads 80