Search results for: client identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3292

Search results for: client identification

3202 Specific Emitter Identification Based on Refined Composite Multiscale Dispersion Entropy

Authors: Shaoying Guo, Yanyun Xu, Meng Zhang, Weiqing Huang

Abstract:

The wireless communication network is developing rapidly, thus the wireless security becomes more and more important. Specific emitter identification (SEI) is an vital part of wireless communication security as a technique to identify the unique transmitters. In this paper, a SEI method based on multiscale dispersion entropy (MDE) and refined composite multiscale dispersion entropy (RCMDE) is proposed. The algorithms of MDE and RCMDE are used to extract features for identification of five wireless devices and cross-validation support vector machine (CV-SVM) is used as the classifier. The experimental results show that the total identification accuracy is 99.3%, even at low signal-to-noise ratio(SNR) of 5dB, which proves that MDE and RCMDE can describe the communication signal series well. In addition, compared with other methods, the proposed method is effective and provides better accuracy and stability for SEI.

Keywords: cross-validation support vector machine, refined com- posite multiscale dispersion entropy, specific emitter identification, transient signal, wireless communication device

Procedia PDF Downloads 129
3201 Therapeutic Power of Words through Reading Writing and Storytelling

Authors: Sakshi Kaul, Sundeep Verma

Abstract:

The focus of the current paper is to evaluate the therapeutic power of words. This will be done by critically evaluating the impact reading, writing and storytelling have on individuals. When we read, tell or listen to a story we are exercising our imagination. Imagination becomes the source of activation of thoughts and actions. This enables and helps the reader, writer or the listener to express the suppressed emotions or desires. The stories told, untold may bring various human emotions and attributes to forth such as hope, optimism, fear, happiness. Each story narrated evokes different emotions, at times they help us unravel ourselves in the world of the teller thereby bringing solace. Stories heard or told add to individual’s life by creating a community around, giving wings of thoughts that enable individual to be more imaginative and creative thereby fostering positively and happiness. Reading if looked at from the reader’s point of view can broaden the horizon of information and ideas about facts and life laws giving more meaning to life. From ‘once upon a time’ to ‘to happily ever after’, all that stories talk about is life’s learning. The power of words sometimes may be negated, this paper would reiterate the power of words by critically evaluating how words can become powerful and therapeutic in various structures and forms in the society. There is a story behind every situation, action and reaction. Hence it is of prime importance to understand each story, to enable a person to deal with whatever he or she may be going through. For example, if a client is going through some trauma in his or her life, the counsellor needs to know exactly what is the turmoil that is being faced so that the client can be assisted accordingly. Counselling is considered a process of healing through words or as Talk therapy, where merely through words we try to heal the client. In a counselling session, the counsellor focuses on working with the clients to bring a positive change. The counsellor allows the client to express themselves which is referred to as catharsis. The words spoken, written or heard transcend to heal and can be therapeutic. The therapeutic power of words has been seen in various cultural practices and belief systems. The underlining belief that words have the power to heal, save and bring change has existed from ages. Many religious and spiritual practices also acclaim the power of the words. Through this empirical paper, we have tried to bring to light how reading, writing, and storytelling have been used as mediums of healing and have been therapeutic in nature.

Keywords: reading, storytelling, therapeutic, words

Procedia PDF Downloads 269
3200 Protocol for Dynamic Load Distributed Low Latency Web-Based Augmented Reality and Virtual Reality

Authors: Rohit T. P., Sahil Athrij, Sasi Gopalan

Abstract:

Currently, the content entertainment industry is dominated by mobile devices. As the trends slowly shift towards Augmented/Virtual Reality applications the computational demands on these devices are increasing exponentially and we are already reaching the limits of hardware optimizations. This paper proposes a software solution to this problem. By leveraging the capabilities of cloud computing we can offload the work from mobile devices to dedicated rendering servers that are way more powerful. But this introduces the problem of latency. This paper introduces a protocol that can achieve high-performance low latency Augmented/Virtual Reality experience. There are two parts to the protocol, 1) In-flight compression The main cause of latency in the system is the time required to transmit the camera frame from client to server. The round trip time is directly proportional to the amount of data transmitted. This can therefore be reduced by compressing the frames before sending. Using some standard compression algorithms like JPEG can result in minor size reduction only. Since the images to be compressed are consecutive camera frames there won't be a lot of changes between two consecutive images. So inter-frame compression is preferred. Inter-frame compression can be implemented efficiently using WebGL but the implementation of WebGL limits the precision of floating point numbers to 16bit in most devices. This can introduce noise to the image due to rounding errors, which will add up eventually. This can be solved using an improved interframe compression algorithm. The algorithm detects changes between frames and reuses unchanged pixels from the previous frame. This eliminates the need for floating point subtraction thereby cutting down on noise. The change detection is also improved drastically by taking the weighted average difference of pixels instead of the absolute difference. The kernel weights for this comparison can be fine-tuned to match the type of image to be compressed. 2) Dynamic Load distribution Conventional cloud computing architectures work by offloading as much work as possible to the servers, but this approach can cause a hit on bandwidth and server costs. The most optimal solution is obtained when the device utilizes 100% of its resources and the rest is done by the server. The protocol balances the load between the server and the client by doing a fraction of the computing on the device depending on the power of the device and network conditions. The protocol will be responsible for dynamically partitioning the tasks. Special flags will be used to communicate the workload fraction between the client and the server and will be updated in a constant interval of time ( or frames ). The whole of the protocol is designed so that it can be client agnostic. Flags are available to the client for resetting the frame, indicating latency, switching mode, etc. The server can react to client-side changes on the fly and adapt accordingly by switching to different pipelines. The server is designed to effectively spread the load and thereby scale horizontally. This is achieved by isolating client connections into different processes.

Keywords: 2D kernelling, augmented reality, cloud computing, dynamic load distribution, immersive experience, mobile computing, motion tracking, protocols, real-time systems, web-based augmented reality application

Procedia PDF Downloads 74
3199 ECG Based Reliable User Identification Using Deep Learning

Authors: R. N. Begum, Ambalika Sharma, G. K. Singh

Abstract:

Identity theft has serious ramifications beyond data and personal information loss. This necessitates the implementation of robust and efficient user identification systems. Therefore, automatic biometric recognition systems are the need of the hour, and ECG-based systems are unquestionably the best choice due to their appealing inherent characteristics. The CNNs are the recent state-of-the-art techniques for ECG-based user identification systems. However, the results obtained are significantly below standards, and the situation worsens as the number of users and types of heartbeats in the dataset grows. As a result, this study proposes a highly accurate and resilient ECG-based person identification system using CNN's dense learning framework. The proposed research explores explicitly the calibre of dense CNNs in the field of ECG-based human recognition. The study tests four different configurations of dense CNN which are trained on a dataset of recordings collected from eight popular ECG databases. With the highest FAR of 0.04 percent and the highest FRR of 5%, the best performing network achieved an identification accuracy of 99.94 percent. The best network is also tested with various train/test split ratios. The findings show that DenseNets are not only extremely reliable but also highly efficient. Thus, they might also be implemented in real-time ECG-based human recognition systems.

Keywords: Biometrics, Dense Networks, Identification Rate, Train/Test split ratio

Procedia PDF Downloads 161
3198 Person Re-Identification using Siamese Convolutional Neural Network

Authors: Sello Mokwena, Monyepao Thabang

Abstract:

In this study, we propose a comprehensive approach to address the challenges in person re-identification models. By combining a centroid tracking algorithm with a Siamese convolutional neural network model, our method excels in detecting, tracking, and capturing robust person features across non-overlapping camera views. The algorithm efficiently identifies individuals in the camera network, while the neural network extracts fine-grained global features for precise cross-image comparisons. The approach's effectiveness is further accentuated by leveraging the camera network topology for guidance. Our empirical analysis on benchmark datasets highlights its competitive performance, particularly evident when background subtraction techniques are selectively applied, underscoring its potential in advancing person re-identification techniques.

Keywords: camera network, convolutional neural network topology, person tracking, person re-identification, siamese

Procedia PDF Downloads 73
3197 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 40
3196 Application of Low-order Modeling Techniques and Neural-Network Based Models for System Identification

Authors: Venkatesh Pulletikurthi, Karthik B. Ariyur, Luciano Castillo

Abstract:

The system identification from the turbulence wakes will lead to the tactical advantage to prepare and also, to predict the trajectory of the opponents’ movements. A low-order modeling technique, POD, is used to predict the object based on the wake pattern and compared with pre-trained image recognition neural network (NN) to classify the wake patterns into objects. It is demonstrated that low-order modeling, POD, is able to predict the objects better compared to pretrained NN by ~30%.

Keywords: the bluff body wakes, low-order modeling, neural network, system identification

Procedia PDF Downloads 180
3195 Identifying Promoters and Their Types Based on a Two-Layer Approach

Authors: Bin Liu

Abstract:

Prokaryotic promoter, consisted of two short DNA sequences located at in -35 and -10 positions, is responsible for controlling the initiation and expression of gene expression. Different types of promoters have different functions, and their consensus sequences are similar. In addition, their consensus sequences may be different for the same type of promoter, which poses difficulties for promoter identification. Unfortunately, all existing computational methods treat promoter identification as a binary classification task and can only identify whether a query sequence belongs to a specific promoter type. It is desired to develop computational methods for effectively identifying promoters and their types. Here, a two-layer predictor is proposed to try to deal with the problem. The first layer is designed to predict whether a given sequence is a promoter and the second layer predicts the type of promoter that is judged as a promoter. Meanwhile, we also analyze the importance of feature and sequence conversation in two aspects: promoter identification and promoter type identification. To the best knowledge of ours, it is the first computational predictor to detect promoters and their types.

Keywords: promoter, promoter type, random forest, sequence information

Procedia PDF Downloads 184
3194 Homosexuality and Culture: A Case Study Depicting the Struggles of a Married Lady

Authors: Athulya Jayakumar, M. Manjula

Abstract:

Though there has been a shift in the understanding of homosexuality from being a sin, crime or pathology in the medical and legal perspectives, the acceptance of homosexuality still remains very scanty in the Indian subcontinent. The present case study is a 24-year-old female who has completed a diploma in polytechnic engineering and residing in the state of Kerala. She initially presented with her husband with complaints of lack of sexual desire and non-cooperation from the index client. After an initial few sessions, the client revealed, in an individual session, about her homosexual orientation which was unknown to her family. She has had multiple short-term relations with females and never had any heterosexual orientation/interest. During her adolescence, she was wondering if she could change herself into a male. However, currently, she accepts her gender. She never wanted a heterosexual marriage; but, had to succumb to the pressure of mother, as a result of a series of unexpected incidents at home and had to agree for the marriage, also with a hope that she may change herself into a bi-sexual. The client was able to bond with the husband emotionally but the multiple attempts at sexual intercourse, at the insistence of the husband, had always been non-pleasurable and induced a sense of disgust. Currently, for several months, there has not been any sexual activity. Also, she actively avoids any chance to have a warm communication with him so that she can avoid chances of him approaching her in a sexual manner. The case study is an attempt to highlight the culture and the struggles of a homosexual individual who comes to therapy for wanting to be a ‘normal wife’ despite having knowledge of legal rights and scenario. There is a scarcity of Indian literature that has systematically investigated issues related to homosexuality. Data on prevalence, emotional problems faced and clinical services available are sparse though it is crucial for increasing understanding of sexual behaviour, orientation and difficulties faced in India.

Keywords: case study, culture, cognitive behavior therapy, female homosexuality

Procedia PDF Downloads 345
3193 Robotic Solution for Nuclear Facility Safety and Monitoring System

Authors: Altab Hossain, Shakerul Islam, Golamur R. Khan, Abu Zafar M. Salahuddin

Abstract:

An effective identification of breakdowns is of premier importance for the safe and reliable operation of Nuclear Power Plants (NPP) and its associated facilities. A great number of monitoring and diagnosis methodologies are applied and used worldwide in areas such as industry, automobiles, hospitals, and power plant to detect and reduce human disasters. The potential consequences of several hazardous activities may harm the society using nuclear and its associated facilities. Hence, one of the most popular and effective methods to ensure safety and monitor the entire nuclear facility and imply risk-free operation without human interference during the hazardous situation is using a robot. Therefore, in this study, an advanced autonomous robot has been designed and developed that can monitor several parameters in the NPP to ensure the safety and do some risky job in case of nuclear disaster. The robot consisted of autonomous track following unit, data processing and transmitting unit can follow a straight line and take turn as the bank greater than 90 degrees. The developed robot can analyze various parameters such as temperature, altitude, radiation, obstacle, humidity, detecting fire, measuring distance, ultrasonic scan and taking the heat of any particular object. It has an ability to broadcast live stream and can record the document to its own server memory. There is a separate control unit constructed with a baseboard which processes the recorded data and a transmitter which transmits the processed data. To make the robot user-friendly, the code is developed such a way that a user can control any of robotic arm as per types of work. To control at any place and without the track, there is an advanced code has been developed to take manual overwrite. Through this process, administrator who has logged in permission to Dynamic Host Client Protocol (DHCP) can make the handover of the control of the robot. In this process, this robot is provided maximum nuclear security from being hacked. Not only NPP, this robot can be used to maximize the real-time monitoring system of any nuclear facility as well as nuclear material transportation and decomposition system.

Keywords: nuclear power plant, radiation, dynamic host client protocol, nuclear security

Procedia PDF Downloads 209
3192 Speech Identification Test for Individuals with High-Frequency Sloping Hearing Loss in Telugu

Authors: S. B. Rathna Kumar, Sandya K. Varudhini, Aparna Ravichandran

Abstract:

Telugu is a south central Dravidian language spoken in Andhra Pradesh, a southern state of India. The available speech identification tests in Telugu have been developed to determine the communication problems of individuals having a flat frequency hearing loss. These conventional speech audiometric tests would provide redundant information when used on individuals with high-frequency sloping hearing loss because of better hearing sensitivity in the low- and mid-frequency regions. Hence, conventional speech identification tests do not indicate the true nature of the communication problem of individuals with high-frequency sloping hearing loss. It is highly possible that a person with a high-frequency sloping hearing loss may get maximum scores if conventional speech identification tests are used. Hence, there is a need to develop speech identification test materials that are specifically designed to assess the speech identification performance of individuals with high-frequency sloping hearing loss. The present study aimed to develop speech identification test for individuals with high-frequency sloping hearing loss in Telugu. Individuals with high-frequency sloping hearing loss have difficulty in perception of voiceless consonants whose spectral energy is above 1000 Hz. Hence, the word lists constructed with phonemes having mid- and high-frequency spectral energy will estimate speech identification performance better for such individuals. The phonemes /k/, /g/, /c/, /ṭ/ /t/, /p/, /s/, /ś/, /ṣ/ and /h/are preferred for the construction of words as these phonemes have spectral energy distributed in the frequencies above 1000 KHz predominantly. The present study developed two word lists in Telugu (each word list contained 25 words) for evaluating speech identification performance of individuals with high-frequency sloping hearing loss. The performance of individuals with high-frequency sloping hearing loss was evaluated using both conventional and high-frequency word lists under recorded voice condition. The results revealed that the developed word lists were found to be more sensitive in identifying the true nature of the communication problem of individuals with high-frequency sloping hearing loss.

Keywords: speech identification test, high-frequency sloping hearing loss, recorded voice condition, Telugu

Procedia PDF Downloads 419
3191 The Structure of the Intangible Capital

Authors: Kolesnikova Julia, Fakhrutdinova Elena, Zagidullina Venera, Kamasheva Anastasia

Abstract:

The article deals with the structure of intangible capital. A significant share of intangible capital is associated with a person as such and can be considered as human capital, which in turn also has a complex structure, including intellectual, social, organizational, client, reputational capital. We have allocated a separate category of intangible capital - unidentifiable capital, including a variety of synergistic interaction effects, etc. the structure of intangible capital. A significant share of intangible capital is associated with a person as such and can be considered as human capital, which in turn also has a complex structure, including intellectual, social, organizational, client, reputational capital. We have allocated unidentifiable capital as a separate category of intangible capital, including a variety of synergistic interaction effects and other.

Keywords: intangible capital, intangible property, object of intangible property, reputation capital

Procedia PDF Downloads 535
3190 Harnessing the Power of Loss: On the Discriminatory Dynamic of Non-Emancipatory Organization Identity

Authors: Rickard Grassman

Abstract:

In this paper, Lacanian theory will be used to illustrate the way discourses interact with the material by way of reifying antagonisms to shape our sense of identities in and around organizations. The ability to ‘sustain the loss’ is, in this view, the common structure here discerned in the very texture of a discourse, which reifies ‘lack’ as an ontological condition into something contingently absent (loss) that the subject hopes to overcome (desire). These fundamental human tendencies of identification are illustrated in the paper by examples drawn from history, cinema, and literature. Turning to a select sample of empirical accounts from a management consultancy firm, it is argued that this ‘sustaining the loss’ operates in discourse to enact identification in an organizational context.

Keywords: Lacan, identification, discourse, desire, loss

Procedia PDF Downloads 96
3189 Identification of Impact Load and Partial System Parameters Using 1D-CNN

Authors: Xuewen Yu, Danhui Dan

Abstract:

The identification of impact load and some hard-to-obtain system parameters is crucial for the activities of analysis, validation, and evaluation in the engineering field. This paper proposes a method that utilizes neural networks based on 1D-CNN to identify the impact load and partial system parameters from measured responses. To this end, forward computations are conducted to provide datasets consisting of the triples (parameter θ, input u, output y). Then neural networks are trained to learn the mapping from input to output, fu|{θ} : y → u, as well as from input and output to parameter, fθ : (u, y) → θ. Afterward, feeding the trained neural networks the measured output response, the input impact load and system parameter can be calculated, respectively. The method is tested on two simulated examples and shows sound accuracy in estimating the impact load (waveform and location) and system parameters.

Keywords: convolutional neural network, impact load identification, system parameter identification, inverse problem

Procedia PDF Downloads 123
3188 Regional Disparities in Microfinance Distribution: Evidence from Indian States

Authors: Sunil Sangwan, Narayan Chandra Nayak

Abstract:

Over the last few decades, Indian banking system has achieved remarkable growth in its credit volume. However, one of the most disturbing facts about this growth is the uneven distribution of financial services across regions. Having witnessed limited success from all the earlier efforts towards financial inclusion targeting the rural poor and the underprivileged, provision of microfinance, of late, has emerged as a supplementary mechanism. There are two prominent modes of microfinance distribution in India namely Bank-SHG linkage (SBLP) and private Microfinance Institutions (MFIs). Ironically, such efforts also seem to have failed to achieve the desired targets as the microfinance services have witnessed skewed distribution across the states of the country. This study attempts to make a comparative analysis of the geographical skew of the SBLP and MFI in India and examine the factors influencing their regional distribution. The results indicate that microfinance services are largely concentrated in the southern region, accounting for about 50% of all microfinance clients and 49% of all microfinance loan portfolios. This is distantly followed by an eastern region where client outreach is close to 25% only. The north-eastern, northern, central, and western regions lag far behind in microfinance sectors, accounting for only 4%, 4%, 10%, and 7 % client outreach respectively. The penetration of SHGs is equally skewed, with the southern region accounting for 46% of client outreach and 70% of loan portfolios followed by an eastern region with 21% of client outreach and 13% of the loan portfolio. Contrarily, north-eastern, northern, central, western and eastern regions account for 5%, 5%, 10%, and 13% of client outreach and 3%, 3%, 7%, and 4% of loan portfolios respectively. The study examines the impact of literacy rate, rural poverty, population density, primary sector share, non-farm activities, loan default behavior and bank penetration on the microfinance penetration. The study is limited to 17 major states of the country over the period 2008-2014. The results of the GMM estimation indicate the significant positive impact of literacy rate, non-farm activities and population density on microfinance penetration across the states, while the rise in loan default seems to deter it. Rural poverty shows the significant negative impact on the spread of SBLP, while it has a positive impact on MFI penetration, hence indicating the policy of exclusion being adhered to by the formal financial system especially towards the poor. However, MFIs seem to be working as substitute mechanisms to banks to fill the gap. The findings of the study are a pointer towards enhancing financial literacy, non-farm activities, rural bank penetration and containing loan default for achieving greater microfinance prevalence.

Keywords: bank penetration, literacy rate, microfinance, primary sector share, rural non-farm activities, rural poverty

Procedia PDF Downloads 232
3187 An Implementation of a Configurable UART-to-Ethernet Converter

Authors: Jungho Moon, Myunggon Yoon

Abstract:

This paper presents an implementation of a configurable UART-to-Ethernet converter using an ARM-based 32-bit microcontroller as well as a dedicated configuration program running on a PC for configuring the operating parameters of the converter. The program was written in Python. Various parameters pertaining to the operation of the converter can be modified by the configuration program through the Ethernet interface of the converter. The converter supports 3 representative asynchronous serial communication protocols, RS-232, RS-422, and RS-485 and supports 3 network modes, TCP/IP server, TCP/IP client, and UDP client. The TCP/IP and UDP protocols were implemented on the microcontroller using an open source TCP/IP protocol stack called lwIP (A lightweight TCP/IP) and FreeRTOS, a free real-time operating system for embedded systems. Due to the use of a real-time operating system, the firmware of the converter was implemented as a multi-thread application and as a result becomes more modular and easier to develop. The converter can provide a seamless bridge between a serial port and an Ethernet port, thereby allowing existing legacy apparatuses with no Ethernet connectivity to communicate using the Ethernet protocol.

Keywords: converter, embedded systems, ethernet, lwIP, UART

Procedia PDF Downloads 706
3186 Timely Detection and Identification of Abnormalities for Process Monitoring

Authors: Hyun-Woo Cho

Abstract:

The detection and identification of multivariate manufacturing processes are quite important in order to maintain good product quality. Unusual behaviors or events encountered during its operation can have a serious impact on the process and product quality. Thus they should be detected and identified as soon as possible. This paper focused on the efficient representation of process measurement data in detecting and identifying abnormalities. This qualitative method is effective in representing fault patterns of process data. In addition, it is quite sensitive to measurement noise so that reliable outcomes can be obtained. To evaluate its performance a simulation process was utilized, and the effect of adopting linear and nonlinear methods in the detection and identification was tested with different simulation data. It has shown that the use of a nonlinear technique produced more satisfactory and more robust results for the simulation data sets. This monitoring framework can help operating personnel to detect the occurrence of process abnormalities and identify their assignable causes in an on-line or real-time basis.

Keywords: detection, monitoring, identification, measurement data, multivariate techniques

Procedia PDF Downloads 236
3185 Assessment Client Satisfaction with Family Physician in Health Care Centers of Jiroft County and Its Relationship with Physician’ Demographic Variables

Authors: Babak Nemat Shahrbabaki, Arezo Fallahi, Masoomeh Hashemian

Abstract:

Introduction: Health and safety are basic components of civil right. Health care systems in different countries were influenced by political, economic and cultural circumstances. In order to health services to people, these systems are organized with different forms, methods such as: prevention, treatment and rehabilitation and in this among, public satisfaction with the services provided is important. This study aimed to determine client satisfaction with family physician and relationship with physician’ demographic variables in health care centers of Jiroft county, Iran. Methods: This is a descriptive-analytical study. The collective data tool was a self-made questionnaire with two parts. The first part comprised demographic characteristics, and the second part contained 11 items for the assessment of satisfaction with family physician from different aspects. In addition, questionnaire, reliability and validity were confirmed. Random simple sampling method was used to determine samples. 234 people referred to the health centers filled questionnaire. The data were analyzed using SPSS software, and inferential statistical analysis was performed. Findings: The majority of the study population were women, married, and aged between 18 and 62 years (mean= 30.09±10.71). Total average satisfaction score was 42.63±3.68. Overall satisfaction averages were 9.47% very high, 30.04% high, 33.09% moderate, 15.12% low, and 12.28% very low. Except lodge on of family physician none of physician’ demographic variables did not effect on satisfaction index. Discussion & Conclusion: The Results showed that mean of satisfaction indexes of family physicians was high and lodge on of family physician effected on this index. Informing people about the main goals of family-doctor program will help to promote the quality of program and increase people satisfaction.

Keywords: family physician program, satisfaction, health-care centers, client

Procedia PDF Downloads 444
3184 Narrative Therapy as a Way of Terrorist Rehabilitation at Mohammad Bin Naif Counselling and Care Center: A Case Study

Authors: Yasser Almazrua

Abstract:

Terrorism is a multidimensional phenomenon that has increased recently. Many countries started combating terrorism through security forces; however, there has been relatively little attention given to rehabilitation programs for people involved in such terrorism acts. In Saudi Arabia, after facing so many terrorist attacks, they started understanding and countering terrorism differently by establishing Mohammad bin Naif Counselling and Care Center in 2006. The center now is considered one of the top experience centers in the world for terrorist rehabilitation and ideology correction. The center offers different programs such as training, educational, social, art and psychological programs. One of the approaches that have been used by psychological experts at the center is Narrative Therapy. It is a therapeutic approach that focuses on the ability of the client to identify their personal life story. The client during therapy works as a storyteller where he or she gets insight, meaning and better understanding of their own lives. Because each client at the center had a story, it can be better fit method for rehabilitation towards healing and personal development. The case describes a 34-years-old man who was involved in some terrorism activities locally by technically and financially supporting a terrorist group related to Al-Qaida. The beneficiary joined Mohammad bin Naif Counseling and Care Center after serving his sentence. Informed of consent has been given to the beneficiary before starting the therapeutic program. Both qualitative and quantitative data on the beneficiary are collected by self-reporting during the initial session, and by using a psychological measurement. The result found that the beneficiary was not insightful about himself, and he had a high level of repression which relatedly moved him to be targeted for recruitment in the terrorist group. With rehabilitation and by using the therapeutic approach, the beneficiary improved on the level of insight, specifically about himself and also about the experience. This case illustrates the importance of considering the effect of Narrative Therapy in terrorist rehabilitation programs.

Keywords: narrative therapy, rehabilitation, Saudi Arabia, terrorism

Procedia PDF Downloads 296
3183 Credibility and Personal Social Media Use of Health Professionals: A Field Study

Authors: Abrar Al-Hasan

Abstract:

Objectives: There is ongoing discourse regarding the potential risks to health professionals' reputations and credibility arising from their personal social media use. However, the specific impacts on professional credibility and the health professional-client relationship remain largely unexplored. This study aims to investigate the type and frequency of the content posted by health professionals on their Instagram accounts and its influence on their credibility and the professional-client relationship. Methodology: In a controlled field study, participants reviewed randomly assigned mock Instagram profiles of health professionals. Mock profiles were constructed according to gender (female/male), social media usage (high/low), and social media richness (high/ low), with richness increasing from posts to stories to reels and personal content type (high /low). Participants then rated the profile owners’ credibility on a visual analog scale. An analysis of variance compared these ratings, and mediation analyses assessed the influence of credibility ratings on participants' willingness to become clients of the mock health professional. Results: Results from 315 participants showed that health professionals with personal Instagram profiles displaying high social media richness were perceived as more credible than those with lower social media richness. Low social media usage is perceived as more credible than high social media usage. Personal content type is perceived as less credible as compared to those with low personal content type. Contributions: These findings provide initial evidence of the impact of health professionals' personal online disclosures on credibility and the health professional-client relationship. Understanding public perceptions of professionalism and credibility is essential for informing e-professionalism guidelines and promoting best practices in social media use among health professionals.

Keywords: credibility, consumer behavior, social media, media richness, healthcare professionals

Procedia PDF Downloads 42
3182 Parameters Identification and Sensitivity Study for Abrasive WaterJet Milling Model

Authors: Didier Auroux, Vladimir Groza

Abstract:

This work is part of STEEP Marie-Curie ITN project, and it focuses on the identification of unknown parameters of the proposed generic Abrasive WaterJet Milling (AWJM) PDE model, that appears as an ill-posed inverse problem. The necessity of studying this problem comes from the industrial milling applications where the possibility to predict and model the final surface with high accuracy is one of the primary tasks in the absence of any knowledge of the model parameters that should be used. In this framework, we propose the identification of model parameters by minimizing a cost function, measuring the difference between experimental and numerical solutions. The adjoint approach based on corresponding Lagrangian gives the opportunity to find out the unknowns of the AWJM model and their optimal values that could be used to reproduce the required trench profile. Due to the complexity of the nonlinear problem and a large number of model parameters, we use an automatic differentiation software tool (TAPENADE) for the adjoint computations. By adding noise to the artificial data, we show that in fact the parameter identification problem is highly unstable and strictly depends on input measurements. Regularization terms could be effectively used to deal with the presence of data noise and to improve the identification correctness. Based on this approach we present results in 2D and 3D of the identification of the model parameters and of the surface prediction both with self-generated data and measurements obtained from the real production. Considering different types of model and measurement errors allows us to obtain acceptable results for manufacturing and to expect the proper identification of unknowns. This approach also gives us the ability to distribute the research on more complex cases and consider different types of model and measurement errors as well as 3D time-dependent model with variations of the jet feed speed.

Keywords: Abrasive Waterjet Milling, inverse problem, model parameters identification, regularization

Procedia PDF Downloads 316
3181 Inadequate Requirements Engineering Process: A Key Factor for Poor Software Development in Developing Nations: A Case Study

Authors: K. Adu Michael, K. Alese Boniface

Abstract:

Developing a reliable and sustainable software products is today a big challenge among up–coming software developers in Nigeria. The inability to develop a comprehensive problem statement needed to execute proper requirements engineering process is missing. The need to describe the ‘what’ of a system in one document, written in a natural language is a major step in the overall process of Software Engineering. Requirements Engineering is a process use to discover, analyze and validate system requirements. This process is needed in reducing software errors at the early stage of the development of software. The importance of each of the steps in Requirements Engineering is clearly explained in the context of using detailed problem statement from client/customer to get an overview of an existing system along with expectations from the new system. This paper elicits inadequate Requirements Engineering principle as the major cause of poor software development in developing nations using a case study of final year computer science students of a tertiary-education institution in Nigeria.

Keywords: client/customer, problem statement, requirements engineering, software developers

Procedia PDF Downloads 406
3180 Investigation of Compliance of the Prevailing Import Murabah'a to Sharia

Authors: Aqeel Akhtar

Abstract:

One of prevailing modes of finance in emerging Islamic banking system is Murabah’a; a financial transaction in which cost and profit both must be recognized by buyer. Otherwise the transaction would become invalid. In this mainstream, import Murabah’a transaction is divergent in such a way that the cost is not recognized and identified due to execution of import transaction in foreign currency i.e. US Dollar and the next transaction of Murabaha’a with the client is executed in local currency. Since this transaction is executed in dual currency i.e. bank pays supplier in foreign currency and executes Murabah’a with its client in local currency and it is not allowed in according to Islamic Injunctions as mentioned in hadith narrated by Hazrat Ibn-e-Umar (May Allah be pleased with them) used to sell his camels with Dirhams and take dinars instead and vice versa. Upon revealing before the Prophet (SAW), he was advised that it must not be contingent in the agreement and the ready rate would be applied and possession of one of the consideration is compulsory. The solution in this regard is that the import Murabah’a transaction should be in single currency, however, other currency can be paid in payment at the time of payment in a very indispensable situation provided that ready rate would be applied. Moreover, some of other solutions have also been given in this regard.

Keywords: shariah compliance, import murabaha, islamic banking, product development

Procedia PDF Downloads 237
3179 Analysis of the Current and Ideal Situation of Iran’s Football Talent Management Process from the Perspective of the Elites

Authors: Mehran Nasiri, Ardeshir Poornemat

Abstract:

The aim of this study was to investigate the current and ideal situations of the process of talent identification in Iranian football from the point of view of Iranian instructors of the Asian Football Confederation (AFC). This research was a descriptive-analytical study; in data collection phase a questionnaire was used, whose face validity was confirmed by experts of Physical Education and Sports Science. The reliability of questionnaire was estimated through the use of Cronbach's alpha method (0.91). This study involved 122 participants of Iranian instructors of the AFC who were selected based on stratified random sampling method. Descriptive statistics were used to describe the variables and inferential statistics (Chi-square) were used to test the hypotheses of the study at significant level (p ≤ 0.05). The results of Chi-square test related to the point of view of Iranian instructors of the AFC showed that the grass-roots scientific method was the best way to identify football players (0.001), less than 10 years old were the best ages for talent identification (0.001), the Football Federation was revealed to be the most important organization in talent identification (0.002), clubs were shown to be the most important institution in developing talents (0.001), trained scouts of Football Federation were demonstrated to be the best and most appropriate group for talent identification (0.001), and being referred by the football academy coaches was shown to be the best way to attract talented football players in Iran (0.001). It was also found that there was a huge difference between the current and ideal situation of the process of talent identification in Iranian football from the point of view of Iranian instructors of the AFC. Hence, it is recommended that the policy makers of talent identification for Iranian football provide a comprehensive, clear and systematic model of talent identification and development processes for the clubs and football teams, so that the talent identification process helps to nurture football talents more efficiently.

Keywords: current situation, talent finding, ideal situation, instructors (AFC)

Procedia PDF Downloads 213
3178 Intelligent Rheumatoid Arthritis Identification System Based Image Processing and Neural Classifier

Authors: Abdulkader Helwan

Abstract:

Rheumatoid joint inflammation is characterized as a perpetual incendiary issue which influences the joints by hurting body tissues Therefore, there is an urgent need for an effective intelligent identification system of knee Rheumatoid arthritis especially in its early stages. This paper is to develop a new intelligent system for the identification of Rheumatoid arthritis of the knee utilizing image processing techniques and neural classifier. The system involves two principle stages. The first one is the image processing stage in which the images are processed using some techniques such as RGB to gryascale conversion, rescaling, median filtering, background extracting, images subtracting, segmentation using canny edge detection, and features extraction using pattern averaging. The extracted features are used then as inputs for the neural network which classifies the X-ray knee images as normal or abnormal (arthritic) based on a backpropagation learning algorithm which involves training of the network on 400 X-ray normal and abnormal knee images. The system was tested on 400 x-ray images and the network shows good performance during that phase, resulting in a good identification rate 97%.

Keywords: rheumatoid arthritis, intelligent identification, neural classifier, segmentation, backpropoagation

Procedia PDF Downloads 532
3177 Identification of Lactic Acid Bacteria Isolated from Raw Camel Milk Produced in South of Morocco

Authors: Maha Alaoui Ismaili, Bouchta Saidi, Mohamed Zahar, Abed Hamama

Abstract:

112 lactic isolates were obtained from 15 samples of camel raw milk produced in Laayoune Boujdour Sakia-El Hamra region (South of Morocco). The main objective was the identification of species of lactic flora belonging to Lactococcus, Lactobacillus and Leuconostoc. Data obtained showed predominance of cocci among lactic isolates (86.6%) while lactic rods represented only 13.4%. With regard to genera identified, Enterococcus was the mostly found out (53.57%), followed by Lactococcus (28.57%), Lactobacillus (13.4%) and Leuconostoc (4.4 %). Identification of the lactic isolates according to their morphological, physiological, and biochemical characteristics led to differentiating 11 species with Lactococcus lactis ssp lactis biovar diacetylactis being the mostly encountered (24.1%) followed by Lactobacillus brevis (3.57%), Lactobacillus plantarum (3.57%), Lactobacillus delbrueckii subsp lactis (3.57%) and Lactococcus lactis subsp cremoris (2.67%).

Keywords: raw camel milk, south of morocco, lactic acid bacteria, identification

Procedia PDF Downloads 492
3176 An Image Processing Scheme for Skin Fungal Disease Identification

Authors: A. A. M. A. S. S. Perera, L. A. Ranasinghe, T. K. H. Nimeshika, D. M. Dhanushka Dissanayake, Namalie Walgampaya

Abstract:

Nowadays, skin fungal diseases are mostly found in people of tropical countries like Sri Lanka. A skin fungal disease is a particular kind of illness caused by fungus. These diseases have various dangerous effects on the skin and keep on spreading over time. It becomes important to identify these diseases at their initial stage to control it from spreading. This paper presents an automated skin fungal disease identification system implemented to speed up the diagnosis process by identifying skin fungal infections in digital images. An image of the diseased skin lesion is acquired and a comprehensive computer vision and image processing scheme is used to process the image for the disease identification. This includes colour analysis using RGB and HSV colour models, texture classification using Grey Level Run Length Matrix, Grey Level Co-Occurrence Matrix and Local Binary Pattern, Object detection, Shape Identification and many more. This paper presents the approach and its outcome for identification of four most common skin fungal infections, namely, Tinea Corporis, Sporotrichosis, Malassezia and Onychomycosis. The main intention of this research is to provide an automated skin fungal disease identification system that increase the diagnostic quality, shorten the time-to-diagnosis and improve the efficiency of detection and successful treatment for skin fungal diseases.

Keywords: Circularity Index, Grey Level Run Length Matrix, Grey Level Co-Occurrence Matrix, Local Binary Pattern, Object detection, Ring Detection, Shape Identification

Procedia PDF Downloads 232
3175 The Way We Express vs. What We Express

Authors: Brendan Mooney

Abstract:

We often do not consider the quality of the way we express ourselves as being fundamental to well-being. Society focuses predominantly on what we do, not the way we do it, to our great detriment. For example, those who have experienced domestic violence often comment that it was not what was said that hurt the most but the way it was said. In other words, the quality in the way the words were used communicated far more than the actual words themselves. This is an important area of focus for practitioners who may be inclined to emphasize who said what but not bring equal, if not more, focus to the quality of one’s expression. The aim of this study is to highlight how and why the way we express ourselves is more important than what we express, which includes words and all behaviors. Given we are a sensitive species it matters to pay attention to the communication that is not said. For example, we have the ability to recognize that a person is upset or angry by the way they walk into a room, even if they do not say anything or look at anyone. Our sensitivity allows us to detect even the slightest change in another’s emotional state, irrespective of what their exterior behaviors may be exhibiting. This study will focus on the importance of recognizing the quality in the way we express as being fundamental to wellbeing, as it allows us to easily and simply navigate life and relationships without needing to experience the usual pitfalls that otherwise prevail. This research utilizes clinical experience, client observations and client feedback, and several case studies were utilized to illustrate real-life examples of the above. This study is not so much a model of life but a way of life that confirms our deepest nature, that we are incredibly sensitive and far more so than we appreciate or utilize in everyday practical human life.

Keywords: communication, integrity, quality, sensitivity, wellbeing

Procedia PDF Downloads 35
3174 Estimation of Structural Parameters in Time Domain Using One Dimensional Piezo Zirconium Titanium Patch Model

Authors: N. Jinesh, K. Shankar

Abstract:

This article presents a method of using the one dimensional piezo-electric patch on beam model for structural identification. A hybrid element constituted of one dimensional beam element and a PZT sensor is used with reduced material properties. This model is convenient and simple for identification of beams. Accuracy of this element is first verified against a corresponding 3D finite element model (FEM). The structural identification is carried out as an inverse problem whereby parameters are identified by minimizing the deviation between the predicted and measured voltage response of the patch, when subjected to excitation. A non-classical optimization algorithm Particle Swarm Optimization is used to minimize this objective function. The signals are polluted with 5% Gaussian noise to simulate experimental noise. The proposed method is applied on beam structure and identified parameters are stiffness and damping. The model is also validated experimentally.

Keywords: inverse problem, particle swarm optimization, PZT patches, structural identification

Procedia PDF Downloads 309
3173 Evidence of the Effect of the Structure of Social Representations on Group Identification

Authors: Eric Bonetto, Anthony Piermatteo, Fabien Girandola, Gregory Lo Monaco

Abstract:

The present contribution focuses on the effect of the structure of social representations on group identification. A social representation (SR) is defined as an organized and structured set of cognitions, produced and shared by members of a same group about a same social object. Within this framework, the central core theory establishes a structural distinction between central cognitions – or 'core' – and peripheral ones: the former are theoretically considered as more connected than the later to group members’ social identity and may play a greater role in SRs’ ability to allow group identification by means of a common vision of the object of representation. Indeed, the central core provides a reference point for the in-group as it constitutes a consensual vision that gives meaning to a social object particularly important to individuals and to the group. However, while numerous contributions clearly refer to the underlying role of SRs in group identification, there are only few empirical evidences of this aspect. Thus, we hypothesize an effect of the structure of SRs on group identification. More precisely, central cognitions (vs. peripheral ones) will lead to a stronger group identification. In addition, we hypothesize that the refutation of a cognition will lead to a stronger group identification than its activation. The SR mobilized here is that of 'studying' among a population of first-year undergraduate psychology students. Thus, a pretest (N = 82), using an Attribute-Challenge Technique, was designed in order to identify the central and the peripheral cognitions to use in the primings of our main study. The results of this pretest are in line with previous studies. Then, the main study (online; N = 184), using a social priming methodology, was based on a 2 (Structural status of the cognitions belonging to the prime: central vs. peripheral) x 2 (Type of prime: activation vs. refutation) experimental design in order to test our hypotheses. Results revealed, as expected, the main effect of the structure of the SR on group identification. Indeed, central cognitions trigger a higher level of identification than the peripheral ones. However, we observe neither effect of the type of prime, nor interaction effect. These results experimentally demonstrate for the first time the effect of the structure of SRs on group identification and indicate that central cognitions are more connected than peripheral ones to group members’ social identity. These results will be discussed considering the importance of understanding identity as a function of SRs and on their ability to potentially solve the lack of consideration of the definition of the group in Social Representations Theory.

Keywords: group identification, social identity, social representations, structural approach

Procedia PDF Downloads 191