Search results for: pen and paper or computer
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26090

Search results for: pen and paper or computer

24890 Multi-Layer Multi-Feature Background Subtraction Using Codebook Model Framework

Authors: Yun-Tao Zhang, Jong-Yeop Bae, Whoi-Yul Kim

Abstract:

Background modeling and subtraction in video analysis has been widely proved to be an effective method for moving objects detection in many computer vision applications. Over the past years, a large number of approaches have been developed to tackle different types of challenges in this field. However, the dynamic background and illumination variations are two of the most frequently occurring issues in the practical situation. This paper presents a new two-layer model based on codebook algorithm incorporated with local binary pattern (LBP) texture measure, targeted for handling dynamic background and illumination variation problems. More specifically, the first layer is designed by block-based codebook combining with LBP histogram and mean values of RGB color channels. Because of the invariance of the LBP features with respect to monotonic gray-scale changes, this layer can produce block-wise detection results with considerable tolerance of illumination variations. The pixel-based codebook is employed to reinforce the precision from the outputs of the first layer which is to eliminate false positives further. As a result, the proposed approach can greatly promote the accuracy under the circumstances of dynamic background and illumination changes. Experimental results on several popular background subtraction datasets demonstrate a very competitive performance compared to previous models.

Keywords: background subtraction, codebook model, local binary pattern, dynamic background, illumination change

Procedia PDF Downloads 209
24889 Exploratory Study of Individual User Characteristics That Predict Attraction to Computer-Mediated Social Support Platforms and Mental Health Apps

Authors: Rachel Cherner

Abstract:

Introduction: The current study investigates several user characteristics that may predict the adoption of digital mental health supports. The extent to which individual characteristics predict preferences for functional elements of computer-mediated social support (CMSS) platforms and mental health (MH) apps is relatively unstudied. Aims: The present study seeks to illuminate the relationship between broad user characteristics and perceived attraction to CMSS platforms and MH apps. Methods: Participants (n=353) were recruited using convenience sampling methods (i.e., digital flyers, email distribution, and online survey forums). The sample was 68% male, and 32% female, with a mean age of 29. Participant racial and ethnic breakdown was 75% White, 7%, 5% Asian, and 5% Black or African American. Participants were asked to complete a 25-minute self-report questionnaire that included empirically validated measures assessing a battery of characteristics (i.e., subjective levels of anxiety/depression via PHQ-9 (Patient Health Questionnaire 9-item) and GAD-7 (Generalized Anxiety Disorder 7-item); attachment style via MAQ (Measure of Attachment Qualities); personality types via TIPI (The 10-Item Personality Inventory); growth mindset and mental health-seeking attitudes via GM (Growth Mindset Scale) and MHSAS (Mental Help Seeking Attitudes Scale)) and subsequent attitudes toward CMSS platforms and MH apps. Results: A stepwise linear regression was used to test if user characteristics significantly predicted attitudes towards key features of CMSS platforms and MH apps. The overall regression was statistically significant (R² =.20, F(1,344)=14.49, p<.000). Conclusion: This original study examines the clinical and sociocultural factors influencing decisions to use CMSS platforms and MH apps. Findings provide valuable insight for increasing adoption and engagement with digital mental health support. Fostering a growth mindset may be a method of increasing participant/patient engagement. In addition, CMSS platforms and MH apps may empower under-resourced and minority groups to gain basic access to mental health support. We do not assume this final model contains the best predictors of use; this is merely a preliminary step toward understanding the psychology and attitudes of CMSS platform/MH app users.

Keywords: computer-mediated social support platforms, digital mental health, growth mindset, health-seeking attitudes, mental health apps, user characteristics

Procedia PDF Downloads 86
24888 Shaheen Bagh Protests: Women, Public Spaces, Citizenship and Dissent

Authors: Priyanka Joshi

Abstract:

The paper traces the evolving relationship between women, public spaces, and citizenship and dissent by analyzing acts of dissent led by women. The paper outlines this relationship in the context of the protests held in Shaheen Bagh, Delhi against the Citizenship Amendment Act (CAA), National Registry of Citizens (NRC), and National Population Register (NPR) in 2019. Additionally, the paper aims to explore how the multiple identities of the protestors in Shaheen Bagh affected the nature, implications, and responses to the protests. To do so, the paper will analyze three key areas in relationship with women, namely, public spaces, citizenship, and dissent. In doing so, it will examine the gendered access to public spaces and its implications on the realization of one’s citizenship rights. Moreover, it will explore the historical notions of citizenship, its contemporary understanding, the exclusionary nature of citizenship, and the conflict between community rights and individual rights with respect to women’s rights. In context of dissent, it will evaluate the understanding of dissent and trace the difference in the experience of dissent based on gender by reviewing social movements led and maintained by women. This paper will utilize secondary data to explore the questions it poses. This includes a study of books and journal articles in conjunction with media reports concerning gender, public spaces, citizenship, and dissent. It will apply an intersectional lens in its analysis.

Keywords: citizenship, dissent, public spaces, Shaheen Bagh, women

Procedia PDF Downloads 147
24887 Social Media as a Tool for Political Communication: A Case Study of India

Authors: Srikanth Bade

Abstract:

This paper discusses how the usage of social media has altered certain discourses and communicated with the political institutions for major actions in Indian scenario. The advent of new technology in the form of social media has engrossed the general public to discuss in the open forum. How they promulgated their ideas into action is captured in this study. Moreover, these discourses happening in the social media is analyzed from certain philosophical traditions by adopting a framework. Hence, this paper analyses the role of social media in political communication and change the political discourse. Also, this paper tries to address the issue that whether the deliberation made through social media had indeed communicated the issue of political matters to the decision making authorities.

Keywords: collective action and social capital, political communication, political discourse, social media

Procedia PDF Downloads 147
24886 A Study on the Difficulties and Countermeasures of Uyghur Students’ English Learning in Hotan District, Xinjiang

Authors: Tingting Zou

Abstract:

This paper firstly presents an overview of the situation of Xinjiang and Hotan, and describes the current status and features of Uyghur students’ English education. Then it summarizes the research on the theories of Third Language Acquisition and Foreign Language Learning Motivation at home and abroad. Further, through the data collected by the questionnaire, the paper points out the three main problems and causes of Uyghur students’ English learning in Hotan, Xinjiang. Finally, the paper draws a conclusion and puts forward some suggestions on how to improve their English learning quality based on the theory of Foreign Language Learning Motivation.

Keywords: countermeasures and difficulties, English learning, Hotan Xinjiang, Uyghur students

Procedia PDF Downloads 87
24885 A Cost Effective Approach to Develop Mid-Size Enterprise Software Adopted the Waterfall Model

Authors: Mohammad Nehal Hasnine, Md Kamrul Hasan Chayon, Md Mobasswer Rahman

Abstract:

Organizational tendencies towards computer-based information processing have been observed noticeably in the third-world countries. Many enterprises are taking major initiatives towards computerized working environment because of massive benefits of computer-based information processing. However, designing and developing information resource management software for small and mid-size enterprises under budget costs and strict deadline is always challenging for software engineers. Therefore, we introduced an approach to design mid-size enterprise software by using the Waterfall model, which is one of the SDLC (Software Development Life Cycles), in a cost effective way. To fulfill research objectives, in this study, we developed mid-sized enterprise software named “BSK Management System” that assists enterprise software clients with information resource management and perform complex organizational tasks. Waterfall model phases have been applied to ensure that all functions, user requirements, strategic goals, and objectives are met. In addition, Rich Picture, Structured English, and Data Dictionary have been implemented and investigated properly in engineering manner. Furthermore, an assessment survey with 20 participants has been conducted to investigate the usability and performance of the proposed software. The survey results indicated that our system featured simple interfaces, easy operation and maintenance, quick processing, and reliable and accurate transactions.

Keywords: end-user application development, enterprise software design, information resource management, usability

Procedia PDF Downloads 430
24884 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime

Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya

Abstract:

Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.

Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident

Procedia PDF Downloads 144
24883 Transcending the Boundary of Traumas: Spatial Trauma in Richard Powers' 'The Echo Maker'

Authors: Nodi Islam

Abstract:

This paper critically reads Richard Powers’ novel The Echo Maker to read and understand the personal traumas of the characters in the novel depending on the various situations they face throughout the story. Also, the paper attempts to read different traumas and disorders due to their different situations. With a focus on the individual experiences, this paper addresses the core issues of trauma, which triggers their reactions and reads the novel through theories of Freud, Caruth, and other critics in this field. While transcending the boundary of personal and collective trauma, this paper suggests that traumas not only arise from the core mental issues, from both past or present memories; it also depends on places too which can be called, according to Yi-Fu Tuan, topophobia. Intimate places such as home provoke not only attachment and expectation but also produce fear in a person. Failure in identifying with such places means losing a central piece of identity of the individual. In order to analyse the traumas in the novel, the characters’ association with homes and places has been provided. This paper attempts to suggest that people are not traumatised because of what Freud explained as unpleasant memories of the past but also intimacy and lost identities related to a place can trigger trauma.

Keywords: spatial trauma, traumatic stress disorder, identity and place, core mental issues

Procedia PDF Downloads 142
24882 Design of Replication System for Computer-Generated Hologram in Optical Component Application

Authors: Chih-Hung Chen, Yih-Shyang Cheng, Yu-Hsin Tu

Abstract:

Holographic optical elements (HOEs) have recently been one of the most suitable components in optoelectronic technology owing to the requirement of the product system with compact size. Computer-generated holography (CGH) is a well-known technology for HOEs production. In some cases, a well-designed diffractive optical element with multifunctional components is also an important issue and needed for an advanced optoelectronic system. Spatial light modulator (SLM) is one of the key components that has great capability to display CGH pattern and is widely used in various applications, such as an image projection system. As mentioned to multifunctional components, such as phase and amplitude modulation of light, high-resolution hologram with multiple-exposure procedure is also one of the suitable candidates. However, holographic recording under multiple exposures, the diffraction efficiency of the final hologram is inevitably lower than that with single exposure process. In this study, a two-step holographic recording method, including the master hologram fabrication and the replicated hologram production, will be designed. Since there exist a reduction factor M² of diffraction efficiency in multiple-exposure holograms (M multiple exposures), so it seems that single exposure would be more efficient for holograms replication. In the second step of holographic replication, a stable optical system with one-shot copying is introduced. For commercial application, one may utilize this concept of holographic copying to obtain duplications of HOEs with higher optical performance.

Keywords: holographic replication, holography, one-shot copying, optical element

Procedia PDF Downloads 151
24881 An Automated Optimal Robotic Assembly Sequence Planning Using Artificial Bee Colony Algorithm

Authors: Balamurali Gunji, B. B. V. L. Deepak, B. B. Biswal, Amrutha Rout, Golak Bihari Mohanta

Abstract:

Robots play an important role in the operations like pick and place, assembly, spot welding and much more in manufacturing industries. Out of those, assembly is a very important process in manufacturing, where 20% of manufacturing cost is wholly occupied by the assembly process. To do the assembly task effectively, Assembly Sequences Planning (ASP) is required. ASP is one of the multi-objective non-deterministic optimization problems, achieving the optimal assembly sequence involves huge search space and highly complex in nature. Many researchers have followed different algorithms to solve ASP problem, which they have several limitations like the local optimal solution, huge search space, and execution time is more, complexity in applying the algorithm, etc. By keeping the above limitations in mind, in this paper, a new automated optimal robotic assembly sequence planning using Artificial Bee Colony (ABC) Algorithm is proposed. In this algorithm, automatic extraction of assembly predicates is done using Computer Aided Design (CAD) interface instead of extracting the assembly predicates manually. Due to this, the time of extraction of assembly predicates to obtain the feasible assembly sequence is reduced. The fitness evaluation of the obtained feasible sequence is carried out using ABC algorithm to generate the optimal assembly sequence. The proposed methodology is applied to different industrial products and compared the results with past literature.

Keywords: assembly sequence planning, CAD, artificial Bee colony algorithm, assembly predicates

Procedia PDF Downloads 233
24880 Implementation of 'Bay Al-Salam' in Agricultural Banking of Bangladesh: An Islamic Banking Perspective

Authors: M. Obydul Haque Kamaly

Abstract:

This paper aims to provide a brief discussion on bay al-salam as a method of implementing Islamic Banking in the agricultural arena of Bangladesh. For this purpose, the nature and conditions of bay al-salam contracts will be first discussed. Next, the paper will focus on the comparison between conventional banks and Islamic banks and should answer how bay al-salam can be used as a popular method in agricultural transactions in the country. The paper is based on secondary data which is to describe bay al-salam as future proceedings for Islamic banking. Evidence suggests Islamic banking is very much practiced like modern conventional banking with certain restrictions imposed by Sharia and addresses a large number of business requirements successfully. Thus, it’s time for us to implement Islamic banking (bay al-salam) on our agricultural arena and to get most benefits from them.

Keywords: bay al-salam, agricultural banking, Islamic banking, implementation

Procedia PDF Downloads 255
24879 Investigating the Abolishment of Virginity Testing in South Africa

Authors: Nqobizwe Mvelo Ngema

Abstract:

This paper argues that the custom of virginity testing has been revived in order to combat against social ills such as unwanted pregnancies, immorality, promiscuity and the spread of HIV/AIDS. However, virginity testing is not free from challenges such as the belief that having sexual intercourse with a virgin can cure men from AIDS, virginity testing is not accurate because there is scientific evidence supporting the fact that there many ways of losing virginity other than sexual intercourse, for example, the usage of tampons and participation in physical activities may tear the hymen. South African parliament took some positive steps in combatting against harm associated with virginity testing by regulating it in the Children’s Act. It is argued, in this paper, that the abolition of virginity testing may lead to paper law and it would be premature to abolish virginity testing in South Africa.

Keywords: equality rights, virginity testing, human rights, interdisciplinary law and legal studies

Procedia PDF Downloads 519
24878 Chatbots as Language Teaching Tools for L2 English Learners

Authors: Feiying Wu

Abstract:

Chatbots are computer programs that attempt to engage a human in a dialogue, which originated in the 1960s with MIT's Eliza. However, they have become widespread more recently as advances in language technology have produced chatbots with increasing linguistic quality and sophistication, leading to their potential to serve as a tool for Computer-Assisted Language Learning(CALL). The aim of this article is to assess the feasibility of using two chatbots, Mitsuku and CleverBot, as pedagogical tools for learning English as a second language by stimulating L2 learners with distinct English proficiencies. Speaking of the input of stimulated learners, they are measured by AntWordProfiler to match the user's expected vocabulary proficiency. Totally, there are four chat sessions as each chatbot will converse with both beginners and advanced learners. For evaluation, it focuses on chatbots' responses from a linguistic standpoint, encompassing vocabulary and sentence levels. The vocabulary level is determined by the vocabulary range and the reaction to misspelled words. Grammatical accuracy and responsiveness to poorly formed sentences are assessed for the sentence level. In addition, the assessment of this essay sets 25% lexical and grammatical incorrect input to determine chatbots' corrective ability towards different linguistic forms. Based on statistical evidence and illustration of examples, despite the small sample size, neither Mitsuku nor CleverBot is ideal as educational tools based on their performance through word range, grammatical accuracy, topic range, and corrective feedback for incorrect words and sentences, but rather as a conversational tool for beginners of L2 English.

Keywords: chatbots, CALL, L2, corrective feedback

Procedia PDF Downloads 73
24877 Motives for Using Electronic Journalism More than Daily Newspapers in Palestine

Authors: Motaz Alshawwa

Abstract:

This current study aims to know journalists' motives for dealing with electronic journalism more than paper journalism in Palestine. The participants of the study were (250) journalists. To achieve the study objective, a questionnaire was used that was composed of (18) questions. The results of the study showed that the motives dealing with electronic journalism were utilitarian motives that were represented by knowing the local news. We find a statistically significant relationship at the level of significance of 0.05 between the uses of electronic journalism and gender, and there are statistically significant differences at the level of 0.05 in the motives of dealing with electronic journalism. The study recommends the daily paper journals in Palestine should meet the various and different needs of the public.

Keywords: electronic journalism, journalist, paper journalism, utilitarian motives

Procedia PDF Downloads 81
24876 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 252
24875 Audio-Visual Co-Data Processing Pipeline

Authors: Rita Chattopadhyay, Vivek Anand Thoutam

Abstract:

Speech is the most acceptable means of communication where we can quickly exchange our feelings and thoughts. Quite often, people can communicate orally but cannot interact or work with computers or devices. It’s easy and quick to give speech commands than typing commands to computers. In the same way, it’s easy listening to audio played from a device than extract output from computers or devices. Especially with Robotics being an emerging market with applications in warehouses, the hospitality industry, consumer electronics, assistive technology, etc., speech-based human-machine interaction is emerging as a lucrative feature for robot manufacturers. Considering this factor, the objective of this paper is to design the “Audio-Visual Co-Data Processing Pipeline.” This pipeline is an integrated version of Automatic speech recognition, a Natural language model for text understanding, object detection, and text-to-speech modules. There are many Deep Learning models for each type of the modules mentioned above, but OpenVINO Model Zoo models are used because the OpenVINO toolkit covers both computer vision and non-computer vision workloads across Intel hardware and maximizes performance, and accelerates application development. A speech command is given as input that has information about target objects to be detected and start and end times to extract the required interval from the video. Speech is converted to text using the Automatic speech recognition QuartzNet model. The summary is extracted from text using a natural language model Generative Pre-Trained Transformer-3 (GPT-3). Based on the summary, essential frames from the video are extracted, and the You Only Look Once (YOLO) object detection model detects You Only Look Once (YOLO) objects on these extracted frames. Frame numbers that have target objects (specified objects in the speech command) are saved as text. Finally, this text (frame numbers) is converted to speech using text to speech model and will be played from the device. This project is developed for 80 You Only Look Once (YOLO) labels, and the user can extract frames based on only one or two target labels. This pipeline can be extended for more than two target labels easily by making appropriate changes in the object detection module. This project is developed for four different speech command formats by including sample examples in the prompt used by Generative Pre-Trained Transformer-3 (GPT-3) model. Based on user preference, one can come up with a new speech command format by including some examples of the respective format in the prompt used by the Generative Pre-Trained Transformer-3 (GPT-3) model. This pipeline can be used in many projects like human-machine interface, human-robot interaction, and surveillance through speech commands. All object detection projects can be upgraded using this pipeline so that one can give speech commands and output is played from the device.

Keywords: OpenVINO, automatic speech recognition, natural language processing, object detection, text to speech

Procedia PDF Downloads 74
24874 Reforming Corporate Criminal Liability in English Law: Lessons and Experiences from Canada

Authors: John Kong Shan Ho

Abstract:

In June 2022, the Law Commission of England and Wales published an options paper to examine how the law on corporate criminal liability can be reformed under the English system. The paper merely details options for reform and does not seek to make recommendations. However, the paper has ruled out the “respondeat superior” approach of the US and “corporate culture” approach of Australia as reform options. On balance, the preferred reform option of the Law Commission is the “senior officer” approach as currently adopted in Canada. This article is written against such background and argues that due to similarities between the English and Canadian systems, the latter’s approach is more ideal to be adopted by the former as a model for reform in this area.

Keywords: corporate criminal liability, identification principle, directing mind and will, England, Canada

Procedia PDF Downloads 99
24873 Textile Cottage Industry: A Facilitator for Capacity Building and Youth Empowerment

Authors: Salihu Maiwada

Abstract:

The large scale textile industry in Nigeria was at one time the second largest employer of labor after government. With recent developments and changing situations, there is a serious decline in this sector which consequently forced the local textile industries to close down and the workers retrenched. the category of people worst hit was the youths and the middle age. This paper examines the potentials of the textile cottage industry as a facilitator for capacity building and economic empowerment among the Nigerian youths. The paper focuses on economic viability, persistence, and above-all, its potentials for poverty reduction as well as self employment. The methodology used in the study is the survey method and the instrument used to collect the necessary information is field interview. The results obtained showed that the textile cottage industries are flourishing and the Nigerian youths are engaged in the practice. In addition, the paper suggests areas that require government's financial intervention which will facilitate the establishment and ensure the sustainability of the textile cottage industry. The paper concludes with some recommendations for the youths and for the government.

Keywords: capacity building, economic, empowerment, persistence, sustainability, youths

Procedia PDF Downloads 580
24872 A Review of Information Systems Development in Developing Countries

Authors: B. N. Asare, O. A. Ajigini

Abstract:

Information systems (IS) are highly important in the operation of private and public organisations in developing and developed countries. Developing countries are saddled with many project failures during the implementation of information systems. However, successful information systems are greatly needed in developing countries in order to enhance their economies. This paper is highly important in view of the high failure rate of information systems in developing countries which needs to be reduced to minimum acceptable levels by means of recommended interventions. This paper centres on a review of IS development in developing countries. The paper presents evidences of the IS successes and failures in developing countries and posits a model to address the IS failures. The proposed model can then be utilised by developing countries to reduce their IS project implementation failure rate. A comparison is drawn between IS development in developing countries and developed countries. The paper provides valuable information to assist in reducing IS failure, and developing IS models and theories on IS development for developing countries.

Keywords: developing countries, information systems, IS development, information systems failure, information systems success, information systems success model

Procedia PDF Downloads 370
24871 Conceptual Model of a Residential Waste Collection System Using ARENA Software

Authors: Bruce G. Wilson

Abstract:

The collection of municipal solid waste at the curbside is a complex operation that is repeated daily under varying circumstances around the world. There have been several attempts to develop Monte Carlo simulation models of the waste collection process dating back almost 50 years. Despite this long history, the use of simulation modeling as a planning or optimization tool for waste collection is still extremely limited in practice. Historically, simulation modeling of waste collection systems has been hampered by the limitations of computer hardware and software and by the availability of representative input data. This paper outlines the development of a Monte Carlo simulation model that overcomes many of the limitations contained in previous models. The model uses a general purpose simulation software program that is easily capable of modeling an entire waste collection network. The model treats the stops on a waste collection route as a queue of work to be processed by a collection vehicle (or server). Input data can be collected from a variety of sources including municipal geographic information systems, global positioning system recorders on collection vehicles, and weigh scales at transfer stations or treatment facilities. The result is a flexible model that is sufficiently robust that it can model the collection activities in a large municipality, while providing the flexibility to adapt to changing conditions on the collection route.

Keywords: modeling, queues, residential waste collection, Monte Carlo simulation

Procedia PDF Downloads 396
24870 The Forensic Analysis of Engravers' Handwriting

Authors: Olivia Rybak-Karkosz

Abstract:

The purpose of this paper is to present the result of scientific research using forensic handwriting analysis. It was conducted to verify the stability and lability of handwriting of engravers and check if gravers transfer their traits from handwriting to plates and other surfaces they rework. This research methodology consisted of completing representative samples of signatures of gravers written on a piece of paper using a ballpen and signatures engraved on other surfaces. The forensic handwriting analysis was conducted using the graphic-comparative method (graphic method), and all traits were analysed. The paper contains a concluding statement of the similarities and differences between the samples.

Keywords: artist’s signatures, engraving, forensic handwriting analysis, graphic-comparative method

Procedia PDF Downloads 95
24869 Leadership, Corruption, and Governance in Nigeria since 1960: The Way Forward

Authors: Reginald Chikere Keke

Abstract:

This paper examined leadership failure consequent on endemic corruption as being the bane of good governance in Nigeria since independence in 1960 and the way forward. Nigeria is lavishly gifted by nature of abundance in human and material resources to be harnessed a strategic, resolute, ingenious, and inventive leadership. For leadership to drive sustainable growth in society, it must be rooted in the cultural values of the people. This, however, is contrary in Nigeria owing to unscrupulous leadership miscarriage, corruption, and bad governance. Using the eclectic approach, the paper scrutinizes the issues of leadership, corruption, and governance to clearly show how bad leadership and governance have destroyed the national fabric and the way out of Nigeria's development quack mire. Furthermore, this paper examined the perplexing nature of corruption in Nigeria that has made it the only lucrative endeavor for politicians and their cronies, leading Nigeria to be regarded as the world's poverty capital. This paper advocate that Nigerians and the international community must endeavor to enshrine effective leadership and good governance through strong institutions, laws, and individuals who have zero tolerance for corruption and mediocrity in the polity. Only then will the fatherland of everyone’s dreams will be realized, and the labors of our hero’s past will not be in vain.

Keywords: corruption, leadership, governance, Nigeria

Procedia PDF Downloads 122
24868 Approximation of Geodesics on Meshes with Implementation in Rhinoceros Software

Authors: Marian Sagat, Mariana Remesikova

Abstract:

In civil engineering, there is a problem how to industrially produce tensile membrane structures that are non-developable surfaces. Nondevelopable surfaces can only be developed with a certain error and we want to minimize this error. To that goal, the non-developable surfaces are cut into plates along to the geodesic curves. We propose a numerical algorithm for finding approximations of open geodesics on meshes and surfaces based on geodesic curvature flow. For practical reasons, it is important to automatize the choice of the time step. We propose a method for automatic setting of the time step based on the diagonal dominance criterion for the matrix of the linear system obtained by discretization of our partial differential equation model. Practical experiments show reliability of this method. Because approximation of the model is made by numerical method based on classic derivatives, it is necessary to solve obstacles which occur for meshes with sharp corners. We solve this problem for big family of meshes with sharp corners via special rotations which can be seen as partial unfolding of the mesh. In practical applications, it is required that the approximation of geodesic has its vertices only on the edges of the mesh. This problem is solved by a specially designed pointing tracking algorithm. We also partially solve the problem of finding geodesics on meshes with holes. We implemented the whole algorithm in Rhinoceros (commercial 3D computer graphics and computer-aided design software ). It is done by using C# language as C# assembly library for Grasshopper, which is plugin in Rhinoceros.

Keywords: geodesic, geodesic curvature flow, mesh, Rhinoceros software

Procedia PDF Downloads 140
24867 Development and Power Characterization of an IoT Network for Agricultural Imaging Applications

Authors: Jacob Wahl, Jane Zhang

Abstract:

This paper describes the development and characterization of a prototype IoT network for use with agricultural imaging and monitoring applications. The sensor and gateway nodes are designed using the ESP32 SoC with integrated Bluetooth Low Energy 4.2 and Wi-Fi. A development board, the Arducam IoTai ESP32, is used for prototyping, testing, and power measurements. Google’s Firebase is used as the cloud storage site for image data collected by the sensor. The sensor node captures images using the OV2640 2MP camera module and transmits the image data to the gateway via Bluetooth Low Energy. The gateway then uploads the collected images to Firebase via a known nearby Wi-Fi network connection. This image data can then be processed and analyzed by computer vision and machine learning pipelines to assess crop growth or other needs. The sensor node achieves a wireless transmission data throughput of 220kbps while consuming 150mA of current; the sensor sleeps at 162µA. The sensor node device lifetime is estimated to be 682 days on a 6600mAh LiPo battery while acquiring five images per day based on the development board power measurements. This network can be utilized by any application that requires high data rates, low power consumption, short-range communication, and large amounts of data to be transmitted at low-frequency intervals.

Keywords: Bluetooth low energy, ESP32, firebase cloud, IoT, smart farming

Procedia PDF Downloads 134
24866 Wave of Islamic Fintech: Revolutionizing Malaysia's Islamic Banking and Finance Regulatory Landscape

Authors: Ho Wen Hui, Azwina Wati Abdull Manaf, Asfarina Kartika Mohd Shakri

Abstract:

The global trend of Fintech had taken the Malaysian shore by storm in recent years, thus making the studies and observations of its impacts more critical than ever. Additionally, Fintech has grown to become an unavoidable subject in the Islamic Banking and Finance (IBF) industry. In relation to that, this paper seeks to analyze the development of Fintech parallel with the IBF industry and its connection to Islamic economics. While the scarcity of studies on this area is apparent, it is found that there is a need to regulate the development of the Fintech Industry and its effects while analyzing the ramifications and positive effects of Fintech towards parties involved in IBF industry. This paper objectively studies the phenomenon of Islamic Fintech around the world as a whole as well as more specifically in Malaysia. The paper will then explore on the existing regulatory instruments in Malaysia, study their boundaries as well as limitations and contribute on possible reform to regulate Islamic Fintech in this jurisdiction. It is aimed that this paper will prompt and encourage more thorough studies to be conducted on the topic of Fintech which would subsequently contribute to a positive growth of the IBF industry worldwide.

Keywords: financial technology, FinTech, Islamic banking & finance, regulation

Procedia PDF Downloads 220
24865 A.T.O.M.- Artificial Intelligent Omnipresent Machine

Authors: R. Kanthavel, R. Yogesh Kumar, T. Narendrakumar, B. Santhosh, S. Surya Prakash

Abstract:

This paper primarily focuses on developing an affordable personal assistant and the implementation of it in the field of Artificial Intelligence (AI) to create a virtual assistant/friend. The problem in existing home automation techniques is that it requires the usage of exact command words present in the database to execute the corresponding task. Our proposed work is ATOM a.k.a ‘Artificial intelligence Talking Omnipresent Machine’. Our inspiration came from an unlikely source- the movie ‘Iron Man’ in which a character called J.A.R.V.I.S has omnipresence, and device controlling capability. This device can control household devices in real time and send the live information to the user. This device does not require the user to utter the exact commands specified in the database as it can capture the keywords from the uttered commands, correlates the obtained keywords and perform the specified task. This ability to compare and correlate the keywords gives the user the liberty to give commands which are not necessarily the exact words provided in the database. The proposed work has a higher flexibility (due to its keyword extracting ability from the user input) comparing to the existing work Intelligent Home automation System (IHAS), is more accurate, and is much more affordable as it makes use of WI-FI module and raspberry pi 2 instead of ZigBee and a computer respectively.

Keywords: home automation, speech recognition, voice control, personal assistant, artificial intelligence

Procedia PDF Downloads 333
24864 The Current And Prospective Legal Regime of Non-Orbital Flights

Authors: Olga Koutsika

Abstract:

The paper deals primarily with the question of the legal framework of non-orbital flights. The submission is based upon two pillars, starting with the ill-defined current legal regime and proceeding to further recommendations for the prospective legal regime for non-orbital flights. For this reason, the paper focuses on certain key legal aspects of the topic, including among other things liability, responsibility, jurisdiction, registration and authorisation. Furthermore, taking into consideration the hybrid nature of both the craft conducting non-orbital flights and of the flights themselves, which exit airspace but do not enter an orbit in outer space, the paper addresses each legal question from the perspective of both air law and space law and concludes to a number of recommendations regarding the applicability of each legal regime for each legal question individually.

Keywords: current regime, legal framework, non-orbital flights, prospective regime

Procedia PDF Downloads 377
24863 'Gender' and 'Gender Equalities': Conceptual Issues

Authors: Moustafa Ali

Abstract:

The aim of this paper is to discuss and question some of the widely accepted concepts within the conceptual framework of gender from terminological, scientific, and Muslim cultural perspectives, and to introduce a new definition and a model of gender in the Arab and Muslim societies. This paper, therefore, uses a generic methodology and document analysis and comes in three sections and a conclusion. The first section discusses some of the terminological issues in the conceptual framework of gender. The second section highlights scientific issues, introduces a definition and a model of gender, whereas the third section offers Muslim cultural perspectives on some issues related to gender in the Muslim world. The paper, then, concludes with findings and recommendations reached so far.

Keywords: gender definition, gender equalities, sex-gender separability, fairness-based model of gender

Procedia PDF Downloads 128
24862 Segmentation of Liver Using Random Forest Classifier

Authors: Gajendra Kumar Mourya, Dinesh Bhatia, Akash Handique, Sunita Warjri, Syed Achaab Amir

Abstract:

Nowadays, Medical imaging has become an integral part of modern healthcare. Abdominal CT images are an invaluable mean for abdominal organ investigation and have been widely studied in the recent years. Diagnosis of liver pathologies is one of the major areas of current interests in the field of medical image processing and is still an open problem. To deeply study and diagnose the liver, segmentation of liver is done to identify which part of the liver is mostly affected. Manual segmentation of the liver in CT images is time-consuming and suffers from inter- and intra-observer differences. However, automatic or semi-automatic computer aided segmentation of the Liver is a challenging task due to inter-patient Liver shape and size variability. In this paper, we present a technique for automatic segmenting the liver from CT images using Random Forest Classifier. Random forests or random decision forests are an ensemble learning method for classification that operate by constructing a multitude of decision trees at training time and outputting the class that is the mode of the classes of the individual trees. After comparing with various other techniques, it was found that Random Forest Classifier provide a better segmentation results with respect to accuracy and speed. We have done the validation of our results using various techniques and it shows above 89% accuracy in all the cases.

Keywords: CT images, image validation, random forest, segmentation

Procedia PDF Downloads 307
24861 Artificial Intelligence in Enterprise Information Systems: A Review

Authors: Danah S. Alabdulmohsin

Abstract:

Due to the fast growth of organizational data as well as the emergence of new technologies such as artificial intelligence (AI), organizations tend to utilize these new technologies in their enterprise information systems (EIS) either to overcome the issues they struggle with or to enhance their functions. The aim of this paper is to review the potential role of AI technologies in EIS, namely: enterprise resource planning systems (ERP), customer relation management systems (CRM), supply chain management systems (SCM), knowledge systems (KM), and human resources management systems (HRM). The paper provided the definitions of these systems as well as the definitions of AI technologies that have been used in EIS. In addition, the paper discussed the challenges that organizations might face while integrating AI with their information systems and explained why some organizations fail in achieving successful implementations of the integration.

Keywords: artificial intelligence, AI, enterprise information system, EIS, integration

Procedia PDF Downloads 90