Search results for: computers
236 Learn through AR (Augmented Reality)
Authors: Prajakta Musale, Bhargav Parlikar, Sakshi Parkhi, Anshu Parihar, Aryan Parikh, Diksha Parasharam, Parth Jadhav
Abstract:
AR technology is basically a development of VR technology that harnesses the power of computers to be able to read the surroundings and create projections of digital models in the real world for the purpose of visualization, demonstration, and education. It has been applied to education, fields of prototyping in product design, development of medical models, battle strategy in the military and many other fields. Our Engineering Design and Innovation (EDAI) project focuses on the usage of augmented reality, visual mapping, and 3d-visualization along with animation and text boxes to help students in fields of education get a rough idea of the concepts such as flow and mechanical movements that may be hard to visualize at first glance.Keywords: spatial mapping, ARKit, depth sensing, real-time rendering
Procedia PDF Downloads 63235 On Dialogue Systems Based on Deep Learning
Authors: Yifan Fan, Xudong Luo, Pingping Lin
Abstract:
Nowadays, dialogue systems increasingly become the way for humans to access many computer systems. So, humans can interact with computers in natural language. A dialogue system consists of three parts: understanding what humans say in natural language, managing dialogue, and generating responses in natural language. In this paper, we survey deep learning based methods for dialogue management, response generation and dialogue evaluation. Specifically, these methods are based on neural network, long short-term memory network, deep reinforcement learning, pre-training and generative adversarial network. We compare these methods and point out the further research directions.Keywords: dialogue management, response generation, deep learning, evaluation
Procedia PDF Downloads 167234 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages
Authors: Okike Benjamin, E. J. D. Garba
Abstract:
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.Keywords: information security, message splitting, pattern, sequence
Procedia PDF Downloads 288233 Designing a Cyclic Redundancy Checker-8 for 32 Bit Input Using VHDL
Authors: Ankit Shai
Abstract:
CRC or Cyclic Redundancy Check is one of the most common, and one of the most powerful error-detecting codes implemented on modern computers. Most of the modern communication protocols use some error detection algorithms in digital networks and storage devices to detect accidental changes to raw data between transmission and reception. Cyclic Redundancy Check, or CRC, is the most popular one among these error detection codes. CRC properties are defined by the generator polynomial length and coefficients. The aim of this project is to implement an efficient FPGA based CRC-8 that accepts a 32 bit input, taking into consideration optimal chip area and high performance, using VHDL. The proposed architecture is implemented on Xilinx ISE Simulator. It is designed while keeping in mind the hardware design, complexity and cost factor.Keywords: cyclic redundancy checker, CRC-8, 32-bit input, FPGA, VHDL, ModelSim, Xilinx
Procedia PDF Downloads 292232 Information and Communication Technology in Architectural Education: The Challenges
Authors: Oluropo Stephen Ilesanmi, Oluwole Ayodele Alejo
Abstract:
Architectural education, beyond training the students to become architects, impacts in them the appreciation of the responsibilities relating to public health, safety, and welfare. Architecture is no longer a personal philosophical or aesthetic pursuit by individuals, rather, it has to consider everyday needs of the people and use technology to give a liveable environment. In the present age, architectural education must have to grapple with the recent integration of technology, in particular, facilities offered by information and communication technology. Electronic technologies have moved architecture from the drawing board to cyberspace. The world is now a global village in which new information and methods are easily and quickly available to people at different poles of the globe. It is the position of this paper that in order to remain relevant in the ever-competing forces within the building industry, architectural education must show the impetus to continue to draw from technological advancements associated with the use of computers.Keywords: architecture, education, communication, information, technology
Procedia PDF Downloads 209231 Stochastic Simulation of Random Numbers Using Linear Congruential Method
Authors: Melvin Ballera, Aldrich Olivar, Mary Soriano
Abstract:
Digital computers nowadays must be able to have a utility that is capable of generating random numbers. Usually, computer-generated random numbers are not random given predefined values such as starting point and end points, making the sequence almost predictable. There are many applications of random numbers such business simulation, manufacturing, services domain, entertainment sector and other equally areas making worthwhile to design a unique method and to allow unpredictable random numbers. Applying stochastic simulation using linear congruential algorithm, it shows that as it increases the numbers of the seed and range the number randomly produced or selected by the computer becomes unique. If this implemented in an environment where random numbers are very much needed, the reliability of the random number is guaranteed.Keywords: stochastic simulation, random numbers, linear congruential algorithm, pseudorandomness
Procedia PDF Downloads 316230 New HCI Design Process Education
Authors: Jongwan Kim
Abstract:
Human Computer Interaction (HCI) is a subject covering the study, plan, and design of interactions between humans and computers. The prevalent use of digital mobile devices is increasing the need for education and research on HCI. This work is focused on a new education method geared towards reducing errors while developing application programs that incorporate role-changing brainstorming techniques during HCI design process. The proposed method has been applied to a capstone design course in the last spring semester. Students discovered some examples about UI design improvement and their error discovering and reducing capability was promoted. An UI design improvement, PC voice control for people with disabilities as an assistive technology examplar, will be presented. The improvement of these students' design ability will be helpful to the real field work.Keywords: HCI, design process, error reducing education, role-changing brainstorming, assistive technology
Procedia PDF Downloads 490229 Improvement Image Summarization using Image Processing and Particle swarm optimization Algorithm
Authors: Hooman Torabifard
Abstract:
In the last few years, with the progress of technology and computers and artificial intelligence entry into all kinds of scientific and industrial fields, the lifestyles of human life have changed and in general, the way of humans live on earth has many changes and development. Until now, some of the changes has occurred in the context of digital images and image processing and still continues. However, besides all the benefits, there have been disadvantages. One of these disadvantages is the multiplicity of images with high volume and data; the focus of this paper is on improving and developing a method for summarizing and enhancing the productivity of these images. The general method used for this purpose in this paper consists of a set of methods based on data obtained from image processing and using the PSO (Particle swarm optimization) algorithm. In the remainder of this paper, the method used is elaborated in detail.Keywords: image summarization, particle swarm optimization, image threshold, image processing
Procedia PDF Downloads 133228 Cyber Security in Nigeria: A Collaboration between Communities and Professionals
Authors: Alese Boniface K., Adu Michael K., Owa Victor K.
Abstract:
Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.Keywords: security, cybercrime, internet, government, stakeholders, partnerships
Procedia PDF Downloads 538227 Recovery of Polymers from Electronic Waste - An Analysis
Authors: Anis A. Ansari, Syed Javed Arif
Abstract:
From the last two-three decades, all countries are continuously generating huge quantities of electronic waste in the form of obsolete computers, gadgets and other discarded electronic instruments mainly due to evolution of newer technologies as a result of constant efforts in research and development in this area. This is the primary reason why waste from the electronic industry is increasing exponentially day by day. Thermoset and thermoplastic polymers, which are the major constituents in every electronic waste, may create a new business opportunity if these are recovered and recycled properly. This may reduce our directly dependency on petroleum and petro-products for polymer materials and also create a potential market for recycled polymers to improve economy. The main theme of this paper is to evolve the potential of recovery and recycling of polymers from the waste being generated globally in the form of discarded electronic products.Keywords: polymer recovery, electronic waste, petroleum, thermoplastics
Procedia PDF Downloads 504226 Sampled-Data Control for Fuel Cell Systems
Authors: H. Y. Jung, Ju H. Park, S. M. Lee
Abstract:
A sampled-data controller is presented for solid oxide fuel cell systems which is expressed by a sector bounded nonlinear model. The sector bounded nonlinear systems, which have a feedback connection with a linear dynamical system and nonlinearity satisfying certain sector type constraints. Also, the sampled-data control scheme is very useful since it is possible to handle digital controller and increasing research efforts have been devoted to sampled-data control systems with the development of modern high-speed computers. The proposed control law is obtained by solving a convex problem satisfying several linear matrix inequalities. Simulation results are given to show the effectiveness of the proposed design method.Keywords: sampled-data control, fuel cell, linear matrix inequalities, nonlinear control
Procedia PDF Downloads 565225 Revolutionizing Healthcare Communication: The Transformative Role of Natural Language Processing and Artificial Intelligence
Authors: Halimat M. Ajose-Adeogun, Zaynab A. Bello
Abstract:
Artificial Intelligence (AI) and Natural Language Processing (NLP) have transformed computer language comprehension, allowing computers to comprehend spoken and written language with human-like cognition. NLP, a multidisciplinary area that combines rule-based linguistics, machine learning, and deep learning, enables computers to analyze and comprehend human language. NLP applications in medicine range from tackling issues in electronic health records (EHR) and psychiatry to improving diagnostic precision in orthopedic surgery and optimizing clinical procedures with novel technologies like chatbots. The technology shows promise in a variety of medical sectors, including quicker access to medical records, faster decision-making for healthcare personnel, diagnosing dysplasia in Barrett's esophagus, boosting radiology report quality, and so on. However, successful adoption requires training for healthcare workers, fostering a deep understanding of NLP components, and highlighting the significance of validation before actual application. Despite prevailing challenges, continuous multidisciplinary research and collaboration are critical for overcoming restrictions and paving the way for the revolutionary integration of NLP into medical practice. This integration has the potential to improve patient care, research outcomes, and administrative efficiency. The research methodology includes using NLP techniques for Sentiment Analysis and Emotion Recognition, such as evaluating text or audio data to determine the sentiment and emotional nuances communicated by users, which is essential for designing a responsive and sympathetic chatbot. Furthermore, the project includes the adoption of a Personalized Intervention strategy, in which chatbots are designed to personalize responses by merging NLP algorithms with specific user profiles, treatment history, and emotional states. The synergy between NLP and personalized medicine principles is critical for tailoring chatbot interactions to each user's demands and conditions, hence increasing the efficacy of mental health care. A detailed survey corroborated this synergy, revealing a remarkable 20% increase in patient satisfaction levels and a 30% reduction in workloads for healthcare practitioners. The poll, which focused on health outcomes and was administered to both patients and healthcare professionals, highlights the improved efficiency and favorable influence on the broader healthcare ecosystem.Keywords: natural language processing, artificial intelligence, healthcare communication, electronic health records, patient care
Procedia PDF Downloads 76224 Analysis of Various Copy Move Image Forgery Techniques for Better Detection Accuracy
Authors: Grishma D. Solanki, Karshan Kandoriya
Abstract:
In modern era of information age, digitalization has revolutionized like never before. Powerful computers, advanced photo editing software packages and high resolution capturing devices have made manipulation of digital images incredibly easy. As per as image forensics concerns, one of the most actively researched area are detection of copy move forgeries. Higher computational complexity is one of the major component of existing techniques to detect such tampering. Moreover, copy move forgery is usually performed in three steps. First, copying of a region in an image then pasting the same one in the same respective image and finally doing some post-processing like rotation, scaling, shift, noise, etc. Consequently, pseudo Zernike moment is used as a features extraction method for matching image blocks and as a primary factor on which performance of detection algorithms depends.Keywords: copy-move image forgery, digital forensics, image forensics, image forgery
Procedia PDF Downloads 288223 Low Power CNFET SRAM Design
Authors: Pejman Hosseiniun, Rose Shayeghi, Iman Rahbari, Mohamad Reza Kalhor
Abstract:
CNFET has emerged as an alternative material to silicon for high performance, high stability and low power SRAM design in recent years. SRAM functions as cache memory in computers and many portable devices. In this paper, a new SRAM cell design based on CNFET technology is proposed. The proposed SRAM cell design for CNFET is compared with SRAM cell designs implemented with the conventional CMOS and FinFET in terms of speed, power consumption, stability, and leakage current. The HSPICE simulation and analysis show that the dynamic power consumption of the proposed 8T CNFET SRAM cell’s is reduced about 48% and the SNM is widened up to 56% compared to the conventional CMOS SRAM structure at the expense of 2% leakage power and 3% write delay increase.Keywords: SRAM cell, CNFET, low power, HSPICE
Procedia PDF Downloads 414222 Evaluation of Introductory Programming Course for Non-Computer Science Majored Students
Authors: H. Varol
Abstract:
Although students’ interest level in pursuing Computer Science and related degrees are lower than previous decade, fundamentals of computers, specifically introductory level programming courses are either listed as core or elective courses for a number of non-computer science majors. Universities accommodate these non-computer science majored students either via creating separate sections of a class for them or simply offering mixed-body classroom solutions, in which both computer science and non-computer science students take the courses together. In this work, we demonstrated how we handle introductory level programming course at Sam Houston State University and also provide facts about our observations on students’ success during the coursework. Moreover, we provide suggestions and methodologies that are based on students’ major and skills to overcome the deficiencies of mix-body type of classes.Keywords: computer science, non-computer science major, programming, programming education
Procedia PDF Downloads 333221 Extended Arithmetic Precision in Meshfree Calculations
Authors: Edward J. Kansa, Pavel Holoborodko
Abstract:
Continuously differentiable radial basis functions (RBFs) are meshfree, converge faster as the dimensionality increases, and is theoretically spectrally convergent. When implemented on current single and double precision computers, such RBFs can suffer from ill-conditioning because the systems of equations needed to be solved to find the expansion coefficients are full. However, the Advanpix extended precision software package allows computer mathematics to resemble asymptotically ideal Platonic mathematics. Additionally, full systems with extended precision execute faster graphical processors units and field-programmable gate arrays because no branching is needed. Sparse equation systems are fast for iterative solvers in a very limited number of cases.Keywords: partial differential equations, Meshfree radial basis functions, , no restrictions on spatial dimensions, Extended arithmetic precision.
Procedia PDF Downloads 149220 Teachers’ Awareness of the Significance of Lifelong Learning: A Case Study of Secondary School Teachers of Batna - Algeria
Authors: Bahloul Amel
Abstract:
This study is an attempt to raise the awareness of the stakeholders and the authorities on the sensitivity of Algerian secondary school teachers of English as a Foreign Language about the students’ loss of English language skills learned during formal schooling with effort and at expense and the supposed measures to arrest that loss. Data was collected from secondary school teachers of EFL and analyzed quantitatively using a questionnaire containing open-ended and close-ended questions. The results advocate a consensus about the need for actions to be adopted to make assessment techniques outcome-oriented. Most of the participants were in favor of including curricular activities involving contextualized learning, problem-solving learning critical self-awareness, self and peer-assisted learning, use of computers and internet so as to make learners autonomous.Keywords: lifelong learning, EFL, contextualized learning, Algeria
Procedia PDF Downloads 348219 Recent Development of Materials for Proton Exchange Membrane Fuel Cell (PEMFC)
Authors: Mohammed Jourdani, Hamid Mounir, Abdellatif El Marjani
Abstract:
Proton exchange membrane fuel cells (PEMFCs) have been developed as a promising power source for transportation and stationary applications, and power devices for computers and mobile telephones. This paper discusses and summarizes the latest developments of materials and remaining challenges of PEMFC. The different contributions to the material of all components and the efficiencies are analyzed. Many technical advances are introduced to increase the PEMFC fuel cell efficiency and life time for transportation, stationary and portable utilization. By the last years the total cost of this system is decreasing. However, the remaining challenges that need to be overcome mean that it will be several years before full commercialization can take place.Keywords: PEMFC fuel cell, materials, recent development, efficiency, life time, commercialization possibility
Procedia PDF Downloads 311218 Exploring the Factors Affecting the Dependability of Mobile Devices in the Current World
Authors: Mayowa A. Sofowora, Seraphim D. Eyono Obono
Abstract:
In recent times the level of advancement in electronics and manufacturing technologies for portable electronic devices, especially for mobile devices such as cell phones, smartphones, personal digital assistants and tablet computers is unprecedented. Mobile devices have become indispensable to individuals, and businesses all over the world. The high level of manufacturing and production of mobile devices has led to the rapid release of newer and sleeker models with new features and capabilities. However, these newer models therefore render older models obsolete, and this pushes people to frequently replace their devices. The drawback of such frequent replacements is that a large number of devices are disposed and they end up as e-waste. The fact that e-waste constitutes a major hazard to human health and to the environment is the motivation behind this study whose aim is to develop a model of possible factors that affects the dependability of mobile devices which in turn leads to the obsolescence of these devices.Keywords: dependability, mobile devices, obsolescence, e-waste
Procedia PDF Downloads 314217 Parallelization by Domain Decomposition for 1-D Sugarcane Equation with Message Passing Interface
Authors: Ewedafe Simon Uzezi
Abstract:
In this paper we presented a method based on Domain Decomposition (DD) for parallelization of 1-D Sugarcane Equation on parallel platform with parallel paradigms on Master-Slave platform using Message Passing Interface (MPI). The 1-D Sugarcane Equation was discretized using explicit method of discretization requiring evaluation nof temporal and spatial distribution of temperature. This platform gives better predictions of the effects of temperature distribution of the sugarcane problem. This work presented parallel overheads with overlapping communication and communication across parallel computers with numerical results across different block sizes with scalability. However, performance improvement strategies from the DD on various mesh sizes were compared experimentally and parallel results show speedup and efficiency for the parallel algorithms design.Keywords: sugarcane, parallelization, explicit method, domain decomposition, MPI
Procedia PDF Downloads 21216 Web-Based Paperless Campus: An Approach to Reduce the Cost and Complexity of Education Administration
Authors: Yekini N. Asafe, Haastrup A. Victor, Lawal N. Olawale, Okikiola F. Mercy
Abstract:
Recent increase in access to personal computer and networking systems have made it feasible to perform much of cumbersome and costly paper-based administration in all organization. Desktop computers, networking systems, high capacity storage devices and telecommunications system is currently allowing the transfer of various format of data to be processed, stored and dissemination for the purpose of decision making. Going paperless is more of benefits compare to full paper-based office. This paper proposed a model for design and implementation of e-administration system (paperless campus) for an institution of learning. If this model is design and implemented it will reduced cost and complexity of educational administration also eliminate menaces and environmental hazards attributed to paper-based administration within schools and colleges.Keywords: e-administration, educational administration, paperless campus, paper-based administration
Procedia PDF Downloads 379215 Numerical Modeling for Water Engineering and Obstacle Theory
Authors: Mounir Adal, Baalal Azeddine, Afifi Moulay Larbi
Abstract:
Numerical analysis is a branch of mathematics devoted to the development of iterative matrix calculation techniques. We are searching for operations optimization as objective to calculate and solve systems of equations of order n with time and energy saving for computers that are conducted to calculate and analyze big data by solving matrix equations. Furthermore, this scientific discipline is producing results with a margin of error of approximation called rates. Thus, the results obtained from the numerical analysis techniques that are held on computer software such as MATLAB or Simulink offers a preliminary diagnosis of the situation of the environment or space targets. By this we can offer technical procedures needed for engineering or scientific studies exploitable by engineers for water.Keywords: numerical analysis methods, obstacles solving, engineering, simulation, numerical modeling, iteration, computer, MATLAB, water, underground, velocity
Procedia PDF Downloads 462214 Hand Detection and Recognition for Malay Sign Language
Authors: Mohd Noah A. Rahman, Afzaal H. Seyal, Norhafilah Bara
Abstract:
Developing a software application using an interface with computers and peripheral devices using gestures of human body such as hand movements keeps growing in interest. A review on this hand gesture detection and recognition based on computer vision technique remains a very challenging task. This is to provide more natural, innovative and sophisticated way of non-verbal communication, such as sign language, in human computer interaction. Nevertheless, this paper explores hand detection and hand gesture recognition applying a vision based approach. The hand detection and recognition used skin color spaces such as HSV and YCrCb are applied. However, there are limitations that are needed to be considered. Almost all of skin color space models are sensitive to quickly changing or mixed lighting circumstances. There are certain restrictions in order for the hand recognition to give better results such as the distance of user’s hand to the webcam and the posture and size of the hand.Keywords: hand detection, hand gesture, hand recognition, sign language
Procedia PDF Downloads 306213 Using the Cluster Computing to Improve the Computational Speed of the Modular Exponentiation in RSA Cryptography System
Authors: Te-Jen Chang, Ping-Sheng Huang, Shan-Ten Cheng, Chih-Lin Lin, I-Hui Pan, Tsung- Hsien Lin
Abstract:
RSA system is a great contribution for the encryption and the decryption. It is based on the modular exponentiation. We call this system as “a large of numbers for calculation”. The operation of a large of numbers is a very heavy burden for CPU. For increasing the computational speed, in addition to improve these algorithms, such as the binary method, the sliding window method, the addition chain method, and so on, the cluster computer can be used to advance computational speed. The cluster system is composed of the computers which are installed the MPICH2 in laboratory. The parallel procedures of the modular exponentiation can be processed by combining the sliding window method with the addition chain method. It will significantly reduce the computational time of the modular exponentiation whose digits are more than 512 bits and even more than 1024 bits.Keywords: cluster system, modular exponentiation, sliding window, addition chain
Procedia PDF Downloads 522212 Developing a Viral Artifact to Improve Employees’ Security Behavior
Authors: Stefan Bauer, Josef Frysak
Abstract:
According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.Keywords: information security awareness, delivery methods, viral videos, employee security behavior
Procedia PDF Downloads 542211 A Survey of Response Generation of Dialogue Systems
Authors: Yifan Fan, Xudong Luo, Pingping Lin
Abstract:
An essential task in the field of artificial intelligence is to allow computers to interact with people through natural language. Therefore, researches such as virtual assistants and dialogue systems have received widespread attention from industry and academia. The response generation plays a crucial role in dialogue systems, so to push forward the research on this topic, this paper surveys various methods for response generation. We sort out these methods into three categories. First one includes finite state machine methods, framework methods, and instance methods. The second contains full-text indexing methods, ontology methods, vast knowledge base method, and some other methods. The third covers retrieval methods and generative methods. We also discuss some hybrid methods based knowledge and deep learning. We compare their disadvantages and advantages and point out in which ways these studies can be improved further. Our discussion covers some studies published in leading conferences such as IJCAI and AAAI in recent years.Keywords: deep learning, generative, knowledge, response generation, retrieval
Procedia PDF Downloads 134210 Evaluation of Computer Usage and Related Health Hazards
Authors: B. O. Adegoke, B. O. Ola, D. T. Ademiluyi
Abstract:
This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.Keywords: computer-related health hazard, musculoskeletal disorders, computer usage, work ability index
Procedia PDF Downloads 489209 Optimization of Roster Construction In Sports
Authors: Elijah Cavan
Abstract:
In Major League Sports (MLB, NBA, NHL, NFL), it is the Front Office Staff (FOS) who make decisions about who plays for their respective team. The FOS bear the brunt of the responsibility for acquiring players through drafting, trading and signing players in free agency while typically contesting with maximum roster salary constraints. The players themselves are volatile assets of these teams- their value fluctuates with age and performance. A simple comparison can be made when viewing players as assets. The problem here is similar to that of optimizing your investment portfolio. The The goal is ultimately to maximize your periodic returns while tolerating a fixed risk (degree of uncertainty/ potential loss). Each franchise may value assets differently, and some may only tolerate lower risk levels- these are examples of factors that introduce additional constraints into the model. In this talk, we will detail the mathematical formulation of this problem as a constrained optimization problem- which can be solved with classical machine learning methods but is also well posed as a problem to be solved on quantum computersKeywords: optimization, financial mathematics, sports analytics, simulated annealing
Procedia PDF Downloads 122208 The Determinants of Senior Students, Behavioral Intention on the Blended E-Learning for the Ceramics Teaching Course at the Active Aging University
Authors: Horng-Jyh Chen, Yi-Fang Chen, Chien-Liang Lin
Abstract:
In this paper, the authors try to investigate the determinants of behavioral intention of the blended e-learning course for senior students at the Active Ageing University in Taiwan. Due to lower proficiency in the use of computers and less experience on learning styles of the blended e-learning course for senior students will be expected quite different from those for most young students. After more than five weeks course for two years the questionnaire survey is executed to collect data for statistical analysis in order to understand the determinants of the behavioral intention for senior students. The object of this study is at one of the Active Ageing University in Taiwan total of 84 senior students in the blended e-learning for the ceramics teaching course. The research results show that only the perceived usefulness of the blended e-learning course has significant positive relationship with the behavioral intention.Keywords: Active Aging University, blended e-learning, ceramics teaching course, behavioral intention
Procedia PDF Downloads 410207 DURAFILE: A Collaborative Tool for Preserving Digital Media Files
Authors: Santiago Macho, Miquel Montaner, Raivo Ruusalepp, Ferran Candela, Xavier Tarres, Rando Rostok
Abstract:
During our lives, we generate a lot of personal information such as photos, music, text documents and videos that link us with our past. This data that used to be tangible is now digital information stored in our computers, which implies a software dependence to make them accessible in the future. Technology, however, constantly evolves and goes through regular shifts, quickly rendering various file formats obsolete. The need for accessing data in the future affects not only personal users but also organizations. In a digital environment, a reliable preservation plan and the ability to adapt to fast changing technology are essential for maintaining data collections in the long term. We present in this paper the European FP7 project called DURAFILE that provides the technology to preserve media files for personal users and organizations while maintaining their quality.Keywords: artificial intelligence, digital preservation, social search, digital preservation plans
Procedia PDF Downloads 445