Search results for: identity representation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2769

Search results for: identity representation

1539 'Naming, Blaming, Shaming': Sexual Assault Survivors' Perceptions of the Practice of Shaming

Authors: Anat Peleg, Hadar Dancig-Rosenberg

Abstract:

This interdisciplinary study, to our knowledge the first in this field, is located on the intersection of victimology-law and society-and media literature, and it corresponds both with feminist writing and with cyber literature which explores the techno-social sphere. It depicts the multifaceted dimensions of shaming in the eyes of the survivors through the following research questions: What are the motivations of sexual-assault survivors to publicize the assailants' identity or to refrain from this practice? Is shaming on Facebook perceived by sexual–assault victims as a substitute for the CJS or as a new form of social activism? What positive and negative consequences do survivors experience as a result of shaming their assailants online? The study draws on in-depth semi-structured interviews which we have conducted between 2016-2018 with 20 sexual-assaults survivors who exposed themselves on Facebook. They were sexually attacked in various forms: six participants reported that they had been raped when they were minors; eight women reported that they had been raped as adults; three reported that they had been victims of an indecent act and three reported that they had been harassed either in their workplace or in the public sphere. Most of our interviewees (12) reported to the police and were involved in criminal procedures. More than half of the survivors (11) disclosed the identity of their attackers online. The vocabularies of motives that have emerged from the thematic analysis of the interviews with the survivors consist of both social and personal motivations for using the practice of shaming online. Some survivors maintain that the use of shaming derives from the decline in the public trust in the criminal justice system. It reflects demand for accountability and justice and serves also as a practice of warning other potential victims of the assailants. Other survivors assert that shaming people in a position of privilege is meant to fulfill the public right to know who these privileged men really are. However, these aforementioned moral and practical justifications of the practice of shaming are often mitigated by fear from the attackers' physical or legal actions in response to their allegations. Some interviewees who are feminist activists argue that the practice of shaming perpetuates the social ancient tendency to define women by labels linking them to the men who attacked them, instead of being defined by their own life complexities. The variety of motivations to adopt or resent the practice of shaming by sexual assault victims presented in our study appear to refute the prevailing intuitive stereotype that shaming is an irrational act of revenge, and denote its rationality. The role of social media as an arena for seeking informal justice raises questions about the new power relations created between victims, assailants, the community and the State, outside the formal criminal justice system. At the same time, the survivors' narratives also uncover the risks and pitfalls embedded within the online sphere for sexual assault survivors.

Keywords: criminal justice, gender, Facebook, sexual-assaults

Procedia PDF Downloads 112
1538 Meeting the Challanges of Regulating Artificial Intelligence

Authors: Abdulrahman S. Shryan Aldossary

Abstract:

Globally, artificial intelligence (AI) is already performing legitimate tasks on behalf of humans. In Saudi Arabia, large-scale national projects, primarily based on AI technologies and receiving billions of dollars of funding, are projected for completion by 2030. However, the legal aspect of these projects is seriously vulnerable, given AI’s unprecedented ability to self-learn and act independently. This paper, therefore, identifies the critical legal aspects of AI that authorities and policymakers should be aware of, specifically whether AI can possess identity and be liable for the risk of public harm. The article begins by identifying the problematic characteristics of AI and what should be considered by legal experts when dealing with it. Also discussed are the possible competent institutions that could regulate AI in Saudi Arabia. Finally, a procedural proposal is presented for controlling AI, focused on Saudi Arabia but potentially of interest to other jurisdictions facing similar concerns about AI safety.

Keywords: regulation, artificial intelligence, tech law, automated systems

Procedia PDF Downloads 175
1537 Hydrogeological Study of the Different Aquifers in the Area of Biskra

Authors: A. Sengouga, Y. Imessaoudene, A. Semar, B. Mouhouche, M. Kadir

Abstract:

Biskra or Zibans, is located in a structural transition zone between the chain of the Saharan Atlas Mountains and the Sahara. It is an arid region where the superficial water resource is the mild, hence the importance of the lithological description and the evaluation of aquifers rock’s volumes, which are highly dependent on the mobilized water contained in the various reservoirs (Quaternary, Mio-Pliocene, Eocene and Continental intercalary). Through a data synthesis which is particularly based on stratigraphic logs of drilling, the description of aquifers heterogeneity and the determining of the spatial variability of aquifer appearance became possible, by using geostatistical analysis, which allowed the representation of the aquifer thicknesses mapping and their space variation. The different thematic maps realized focus on drilling position, the substratum shape and finally the aquifers thicknesses of the region. It is found that the high density of water points especially these of drilling points are superposed on the hydrologic reservoirs with significant thicknesses.

Keywords: log stratigraphic ArcGIS 10, geometry of aquifers, rocks reservoir volume, Biskra

Procedia PDF Downloads 460
1536 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

Authors: M. F. Haroun, T. A. Gulliver

Abstract:

In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.

Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA

Procedia PDF Downloads 506
1535 Management Workspaces to Create Value

Authors: Nevruz Zogu, Shpetim Rezniqi

Abstract:

It is very important that a new environment where work shall be constructed in such a strong record to be creative and eligible for workers, can not have success in the workplace. But, is it possible to design the inner-inspire to create and collaborate? By watching and analyzing examples of creativity in business, construction managers can learn ways on how to encourage their imagination inside buildings. We struggle to find and retain talented employees and skilled labor environment is becoming more and always an important tool for recruiting and retaining employees. Managers who recognize the importance are gaining an edge over their competitors. The physical work environment is as important as its quality is often used as a recruiting tool and even to companies with The relationship between the company and the employees between strategy and behavior, between the product and the customer can reincorporated under the light of symbolic mediation of space, as instrument and interpreter of the core values and identity of the organization.

Keywords: strategy, business, quality, productivity, space, offices, assets

Procedia PDF Downloads 389
1534 The Names of the Traditional Motif of Batik Solo

Authors: Annisa D. Febryandini

Abstract:

Batik is a unique cultural heritage that strongly linked with its community. As a product of current culture in Solo, Batik Solo not only has a specific design and color to represent the cultural identity, cultural values, and spirituality of the community, but also has some specific names given by its community which are not arbitrary. This qualitative research paper uses the primary data by interview method as well as the secondary data to support it. Based on the data, this paper concludes that the names consist of a word or words taken from a current name of things in Javanese language. They indicate the cultural meaning such as a specific event, a hope, and the social status of the people who use the motif. Different from the other research, this paper takes a look at the names of traditional motif of Batik Solo which analyzed linguistically to reveal the cultural meaning.

Keywords: traditional motif, Batik, solo, anthropological linguistics

Procedia PDF Downloads 277
1533 Scattered Places in Stories Singularity and Pattern in Geographic Information

Authors: I. Pina, M. Painho

Abstract:

Increased knowledge about the nature of place and the conditions under which space becomes place is a key factor for better urban planning and place-making. Although there is a broad consensus on the relevance of this knowledge, difficulties remain in relating the theoretical framework about place and urban management. Issues related to representation of places are among the greatest obstacles to overcome this gap. With this critical discussion, based on literature review, we intended to explore, in a common framework for geographical analysis, the potential of stories to spell out place meanings, bringing together qualitative text analysis and text mining in order to capture and represent the singularity contained in each person's life history, and the patterns of social processes that shape places. The development of this reasoning is based on the extensive geographical thought about place, and in the theoretical advances in the field of Geographic Information Science (GISc).

Keywords: discourse analysis, geographic information science place, place-making, stories

Procedia PDF Downloads 198
1532 English as a Foreign Language for Deaf Students in the K-12 Schools in Turkey: A Policy Analysis

Authors: Cigdem Fidan

Abstract:

Deaf students in Turkey generally do not have access to foreign language classes. However, the knowledge of foreign languages, especially English, is important for them to access knowledge and other opportunities in the globalizing world. In addition, learning any language including foreign languages is a basic linguistic human right. This study applies critical discourse analysis to examine language ideologies, perceptions of deafness and current language and education policies used for deaf education in Turkey. The findings show that representation of deafness as a disability in policy documents, ignorance the role of sign languages in education and lack of policies that support foreign language education for the deaf may result in inaccessibility of foreign language education for deaf students in Turkey. The paper concludes with recommendations for policymakers, practitioners, and advocates for the deaf.

Keywords: deaf learners, English as a foreign language, language policy, linguistic human rights

Procedia PDF Downloads 381
1531 Prediction of Dubai Financial Market Stocks Movement Using K-Nearest Neighbor and Support Vector Regression

Authors: Abdulla D. Alblooshi

Abstract:

The stock market is a representation of human behavior and psychology, such as fear, greed, and discipline. Those are manifested in the form of price movements during the trading sessions. Therefore, predicting the stock movement and prices is a challenging effort. However, those trading sessions produce a large amount of data that can be utilized to train an AI agent for the purpose of predicting the stock movement. Predicting the stock market price action will be advantageous. In this paper, the stock movement data of three DFM listed stocks are studied using historical price movements and technical indicators value and used to train an agent using KNN and SVM methods to predict the future price movement. MATLAB Toolbox and a simple script is written to process and classify the information and output the prediction. It will also compare the different learning methods and parameters s using metrics like RMSE, MAE, and R².

Keywords: KNN, ANN, style, SVM, stocks, technical indicators, RSI, MACD, moving averages, RMSE, MAE

Procedia PDF Downloads 171
1530 Robust Diagnosis of an Electro-Mechanical Actuators, Bond Graph LFT Approach

Authors: A. Boulanoir, B. Ould Bouamama, A. Debiane, N. Achour

Abstract:

The paper deals with robust Fault Detection and isolation with respect to parameter uncertainties based on linear fractional transformation form (LFT) Bond graph. The innovative interest of the proposed methodology is the use only one representation for systematic generation of robust analytical redundancy relations and adaptive residual thresholds for sensibility analysis. Furthermore, the parameter uncertainties are introduced graphically in the bond graph model. The methodology applied to the nonlinear industrial Electro-Mechanical Actuators (EMA) used in avionic systems, has determined first the structural monitorability analysis (which component can be monitored) with given instrumentation architecture with any need of complex calculation and secondly robust fault indicators for online supervision.

Keywords: bond graph (BG), electro mechanical actuators (EMA), fault detection and isolation (FDI), linear fractional transformation (LFT), mechatronic systems, parameter uncertainties, avionic system

Procedia PDF Downloads 350
1529 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 332
1528 Real-Time Episodic Memory Construction for Optimal Action Selection in Cognitive Robotics

Authors: Deon de Jager, Yahya Zweiri, Dimitrios Makris

Abstract:

The three most important components in the cognitive architecture for cognitive robotics is memory representation, memory recall, and action-selection performed by the executive. In this paper, action selection, performed by the executive, is defined as a memory quantification and optimization process. The methodology describes the real-time construction of episodic memory through semantic memory optimization. The optimization is performed by set-based particle swarm optimization, using an adaptive entropy memory quantification approach for fitness evaluation. The performance of the approach is experimentally evaluated by simulation, where a UAV is tasked with the collection and delivery of a medical package. The experiments show that the UAV dynamically uses the episodic memory to autonomously control its velocity, while successfully completing its mission.

Keywords: cognitive robotics, semantic memory, episodic memory, maximum entropy principle, particle swarm optimization

Procedia PDF Downloads 156
1527 Establishment of Thuja Label: Development Prospects for the Marketing Practices of the Handicraft of Essaouira's Marquetry

Authors: Fatima El Kandoussi, Lamiae El Hdiddioui, Mustapha Bouragba

Abstract:

The woodwork of thuja in Essaouira is one of the main crafts in Morocco. Certainly, marquetry reflects both cultural and artistic identity of the city, considering the talent and ancestral knowledge of craftsman working in marquetry. Yet, the production units encounter a considerable number of difficulties among which insufficiencies within marketing practices. Consequently, it is obvious that major improvements are needed, and supportive solutions must be provided in order to improve the Essaouira’s marquetry, as a symbol of the entire province. Thus, the establishment of Thuja Label is a necessary measure that would be the key to ensuring sustainability of this vital craft. The main purpose of this paper is to study marketing practices’ current state of the production units in the marquetry of Essaouira, therefore to recommend remedial actions likely to raise them up to the required functional level.

Keywords: craft, marketing practices, marquetry, thuja label

Procedia PDF Downloads 198
1526 “Polytic Iconography”: The Sky and Pants of Nicolas-Antoine Taunay (1755-1830)

Authors: Bárbara Dantas

Abstract:

Nicolas-Antoine Taunay had everything to have a quiet life with his numerous family, his colleagues from the Paris Academy of Art, and as a renowned painter of the French Court, but the conjuncture was quite complicated in those final years of the eighteenth century and first decades of the 19th century. The painter had to adapt to various political and social ruptures: from royalty to the French Revolution, from the empire of Napoleon Bonaparte to the empire of King John VI. According to the method of analysis that involves the idea of "political iconography" from Carlo Ginzburg and the concept of "representation" associated with Georges Didi-Huberman, this work wishes to insert Taunay in its context through the analysis of his portrait made by a colleague of the profession and of a Brazilian landscape painted of his own (1816-1821) and, in which he represented himself. Finally, the intention is to find in these two paintings how Nicolas-Antoine Taunay faced himself and in the middle that surrounded him in the traffic that was forced to make it between Paris and Rio de Janeiro.

Keywords: Nicolas-Antoine Taunay, politic iconography, French art, Brazilian art, 19th century

Procedia PDF Downloads 94
1525 Problems and Prospects of Protection of Historical Building as a Corner Stone of Cultural Policy for International Collaboration in New Era: A Study of Fars Province, Iran

Authors: Kiyanoush Ghalavand, Ali Ferydooni

Abstract:

Fars province Fārs or Pārs is a vast land located in the southwest of Iran. All over the province, you can see and feel the glory of Ancient Iranian culture and civilization. There are many monuments from pre-historical to the Islamic era within this province. The existence of ancient cultural and historical monuments in Fars province including the historical complex of Persepolis, the tombs of Persian poets Hafez and Saadi, and dozens of other valuable cultural and historical works of this province as a symbol of Iranian national identity and the manifestation of transcendent cultural values of this national identity. Fars province is quintessentially Persian. Its name is the modern version of ancient Parsa, the homeland, if not the place of origin, of the Persians, one of the great powers of antiquity. From here, the Persian Empire ruled much of Western and Central Asia, receiving ambassadors and messengers at Persepolis. It was here that the Persian kings were buried, both in the mountain behind Persepolis and in the rock face of nearby Naqsh-e Rustam. We have a complex paradox in Persian and Islamic ideology in the age of technology in Iran. The main purpose of the present article is to identify and describe the problems and prospects of origin and development of the modern approach to the conservation and restoration of ancient monuments and historic buildings, the influence that this development has had on international collaboration in the protection and conservation of cultural heritage, and the present consequences worldwide. The definition of objects and structures of the past as heritage, and the policies related to their protection, restoration, and conservation, have evolved together with modernity, and are currently recognized as an essential part of the responsibilities of modern society. Since the eighteenth century, the goal of this protection has been defined as the cultural heritage of humanity; gradually this has included not only ancient monuments and past works of art but even entire territories for a variety of new values generated in recent decades. In its medium-term program of 1989, UNESCO defined the full scope of such heritage. The cultural heritage may be defined as the entire corpus of material signs either artistic or symbolic handed on by the past to each culture and, therefore, to the whole of humankind. As a constituent part of the affirmation and enrichment of cultural identities, as a legacy belonging to all humankind, the cultural heritage gives each particular place its recognizable features and is the storehouse of human experience. The preservation and the presentation of the cultural heritage are therefore a corner-stone of any cultural policy. The process, from which these concepts and policies have emerged, has been identified as the ‘modern conservation movement’.

Keywords: tradition, modern, heritage, historical building, protection, cultural policy, fars province

Procedia PDF Downloads 164
1524 Urban Conservation Methodology for Heritage Areas Case Study "Qabel Street, Old Jeddah"

Authors: Hossam Elborombaly, Nader Y. Azab

Abstract:

The Middle East region is rich with its architecture and urban settings. This makes it viable for exploring and applying different strategies that deal with conservation. Current context characterized by pollution, socioeconomic issues, behavioral problems, etc. affects architectural and urban heritage –literally- in all Middle Eastern countries. Although there have been numerous strategies in place to preserve and/ or rehabilitate heritage, all has been designed and implemented following political more than technical or methodical processes. This only resulted in more deterioration of the targeted areas. This paper explores different approaches in some selected Arab countries and relies on comparative analysis with some successful European experiences. The aim is to establish some solid basis for dealing with heritage areas; an approach that respects heritage and traditions without compromising sustainability or socioeconomic opportunities.

Keywords: conservation, heritage, identity, urban conservation methodology,

Procedia PDF Downloads 393
1523 3D Images Representation to Provide Information on the Type of Castella Beams Hole

Authors: Cut Maisyarah Karyati, Aries Muslim, Sulardi

Abstract:

Digital image processing techniques to obtain detailed information from an image have been used in various fields, including in civil engineering, where the use of solid beam profiles in buildings and bridges has often been encountered since the early development of beams. Along with this development, the founded castellated beam profiles began to be more diverse in shape, such as the shape of a hexagon, triangle, pentagon, circle, ellipse and oval that could be a practical solution in optimizing a construction because of its characteristics. The purpose of this research is to create a computer application to edge detect the profile of various shapes of the castella beams hole. The digital image segmentation method has been used to obtain the grayscale images and represented in 2D and 3D formats. This application has been successfully made according to the desired function, which is to provide information on the type of castella beam hole.

Keywords: digital image, image processing, edge detection, grayscale, castella beams

Procedia PDF Downloads 141
1522 Queer Anti-Urbanism: An Exploration of Queer Space Through Design

Authors: William Creighton, Jan Smitheram

Abstract:

Queer discourse has been tied to a middle-class, urban-centric, white approach to the discussion of queerness. In doing so, the multilayeredness of queer existence has been washed away in favour of palatable queer occupation. This paper uses design to explore a queer anti-urbanist approach to facilitate a more egalitarian architectural occupancy. Scott Herring’s work on queer anti-urbanism is key to this approach. Herring redeploys anti-urbanism from its historical understanding of open hostility, rejection and desire to destroy the city towards a mode of queer critique that counters normative ideals of homonormative metronormative gay lifestyles. He questions how queer identity has been closed down into a more diminutive frame where those who do not fit within this frame are subjected to persecution or silenced through their absence. We extend these ideas through design to ask how a queer anti-urbanist approach facilitates a more egalitarian architectural occupancy. Following a “design as research” methodology, the design outputs allow a vehicle to ask how we might live, otherwise, in architectural space. A design as research methodologically is a process of questioning, designing and reflecting – in a non-linear, iterative approach – establishes itself through three projects, each increasing in scale and complexity. Each of the three scales tackled a different body relationship. The project began exploring the relations between body to body, body to known others, and body to unknown others. Moving through increasing scales was not to privilege the objective, the public and the large scale; instead, ‘intra-scaling’ acts as a tool to re-think how scale reproduces normative ideas of the identity of space. There was a queering of scale. Through this approach, the results were an installation that brings two people together to co-author space where the installation distorts the sensory experience and forces a more intimate and interconnected experience challenging our socialized proxemics: knees might touch. To queer the home, the installation was used as a drawing device, a tool to study and challenge spatial perception, drawing convention, and as a way to process practical information about the site and existing house – the device became a tool to embrace the spontaneous. The final design proposal operates as a multi-scalar boundary-crossing through “private” and “public” to support kinship through communal labour, queer relationality and mooring. The resulting design works to set adrift bodies in a sea of sensations through a mix of pleasure programmes. To conclude, through three design proposals, this design research creates a relationship between queer anti-urbanism and design. It asserts that queering the design process and outcome allows a more inclusive way to consider place, space and belonging. The projects lend to a queer relationality and interdependence by making spaces that support the unsettled, out-of-place, but is it queer enough?

Keywords: queer, queer anti-urbanism, design as research, design

Procedia PDF Downloads 176
1521 A Theoretical and Corpus-Based Analysis of English and Spanish Syntax Derived from Método de Los Relojes Verb Types According to Systemic-Functional Grammar as a Foundation for Methodological Adaption

Authors: Timothy William Lawrence

Abstract:

The goal of this paper is to research and categorize the four basic verb types found in the Spanish descriptive grammar book Método de los Relojes using verb clauses as representation as found in M.A.K. Halliday's Systemic-Functional Grammar with the purpose of establishing theoretical along with syntactical parallels and deviations between English and Spanish. Results confirm theoretical correlations exist therefore leading to an analysis of English grammar syntax resulting in delineating commonalities and differences from Spanish. Corpora searches were carried out on different patterns of syntactical structures confirming divergences in verb syntax, making it possible to establish parameters to adapt English verbs to the criteria of the four basic Método de los Relojes verb types.

Keywords: corpus studies, Método de los Relojes, structural-functional grammar, verb syntax

Procedia PDF Downloads 196
1520 Behavioral Experiments of Small Societies in Social Media: Facebook Expressions of Anchored Relationships

Authors: Nuran Öze

Abstract:

Communities and societies have been changing towards computer mediated communication. This paper explores online and offline identities and how relationships are formed and negotiated within internet environments which offer opportunities for people who know each other offline and move into relationships online. The expectations and norms of behavior within everyday life cause people to be embodied self. According to the age categories of Turkish Cypriots, their measurements of attitudes in Facebook will be investigated. Face-to-face field research and semi-structured interview methods are used in the study. Face-to-face interview has been done with Turkish Cypriots who are using Facebook already. According to the study, in constructing a linkage between real and virtual identities mostly affected from societal relations serves as a societal grooming tool for Turkish Cypriots.

Keywords: facebook, identity, social media, virtual reality

Procedia PDF Downloads 302
1519 Trapped in Hegemonic Binaries: Performing the Body

Authors: Bitopi Dutta

Abstract:

This paper attempts to understand the constructs of binaries while taking into account the politics of the body. It delves into how these constructs get fashioned and recreated while performing the same across normative and non-normative discourses. While it may be almost mundane and commonplace to see the performance of body within binary constructs across the normative discourses, this is to a great extent also true for those queer discourses that have challenged the conventional/normative. With a queer feminist perspective, the paper challenges this performativity while simultaneously engaging with the subtle nuances of blurring the borders of gender markers. The problem with this polarization within binary constructs is that there remains a tendency to reinstate patriarchy within queerness. To substantiate this argument further, the paper will draw from narratives and accounts of identities with alternate sexualities and genders. The paper concludes with problematising this hegemony within queer discourses locating the question of acceptance and visibility of fluidities.

Keywords: binary, body, gender, identity, performativity, queer

Procedia PDF Downloads 291
1518 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 756
1517 Portuguese Influence on Minas Gerais Dessert Culinary During Brazil Colonization Period

Authors: Silvania M. P. Silva, Ricardo A. Mazaro, Gemilde M. Queiroz, Josefa Barbosa, Lucas S. Victorino, Grasiela J. Silva

Abstract:

The Minas Gerais sweets have a remarkable personality, perceived on the original usage of fruits, sweets, and cheeses in the Brazilian gastronomic landscape, as a unique representation of Minas Gerais. This memory-related and feeling-oriented food is one of the treasures common to all Brazilians. It is mandatory to mention its Portuguese roots for the use of honey, as well as sugar cane and its countless possibilities. This work will show that this heritage is predominantly Portuguese, born in Portuguese convents and that it crossed the Atlantic. Through a historical survey, visits to mining towns known for their sweet culture and material collected in these places, we present the protagonists of this journey of flavors: the Portuguese cake makers (boleiras), who brought the knowledge, ingredients, and the dream of a better life in the crowded mines of gold and opportunities, helping to form a new Minas Gerais knowledge with their delicacies.

Keywords: sweets from portugal, convent sweets, minas gerais, brazil

Procedia PDF Downloads 169
1516 Development of the Structure of the Knowledgebase for Countermeasures in the Knowledge Acquisition Process for Trouble Prediction in Healthcare Processes

Authors: Shogo Kato, Daisuke Okamoto, Satoko Tsuru, Yoshinori Iizuka, Ryoko Shimono

Abstract:

Healthcare safety has been perceived important. It is essential to prevent troubles in healthcare processes for healthcare safety. Trouble prevention is based on trouble prediction using accumulated knowledge on processes, troubles, and countermeasures. However, information on troubles has not been accumulated in hospitals in the appropriate structure, and it has not been utilized effectively to prevent troubles. In the previous study, though a detailed knowledge acquisition process for trouble prediction was proposed, the knowledgebase for countermeasures was not involved. In this paper, we aim to propose the structure of the knowledgebase for countermeasures in the knowledge acquisition process for trouble prediction in healthcare process. We first design the structure of countermeasures and propose the knowledge representation form on countermeasures. Then, we evaluate the validity of the proposal, by applying it into an actual hospital.

Keywords: trouble prevention, knowledge structure, structured knowledge, reusable knowledge

Procedia PDF Downloads 367
1515 Exploring the Landscape of Information Visualization through a Mark Lombardi Lens

Authors: Alon Friedman, Antonio Sanchez Chinchon

Abstract:

This bibliometric study takes an artistic and storytelling approach to explore the term ”information visualization.” Analyzing over 1008 titles collected from databases that specialize in data visualization research, we examine the titles of these publications to report on the characteristics and development trends in the field. Employing a qualitative methodology, we delve into the titles of these publications, extracting leading terms and exploring the cooccurrence of these terms to gain deeper insights. By systematically analyzing the leading terms and their relationships within the titles, we shed light on the prevailing themes that shape the landscape of ”information visualization” by employing the artist Mark Lombardi’s techniques to visualize our findings. By doing so, this study provides valuable insights into bibliometrics visualization while also opening new avenues for leveraging art and storytelling to enhance data representation.

Keywords: bibliometrics analysis, Mark Lombardi design, information visualization, qualitative methodology

Procedia PDF Downloads 90
1514 Clicking Based Graphical Password Scheme Resistant to Spyware

Authors: Bandar Alahmadi

Abstract:

The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks.

Keywords: security, password, authentication, attack, applications

Procedia PDF Downloads 165
1513 Features Valuation of Intellectual Capital in the Organization

Authors: H. M. Avanesyan

Abstract:

Economists have been discussing the importance of intangible assets for the success of organization for many years. The term intellectual capital was popularized in the 1990s by Thomas Stewart. “Intellectual capital is the knowledge, applied experience, enterprise processes and technology customer relationship and professional skills which are valuable assets to an organization.” Human capital – includes employee brainpower, competence, skills, experience and knowledge. Customer capital – includes relations and networks with partners, suppliers, distributors, and customers. The objective of the article is to assess one of the key components of organizational culture – organizational values. The focus of the survey was on assessing how intellectual capital presented in these values of the organization. In the conclusion section the article refers to underestimation of intellectual capital by the organization management and the various possible negative effects of the latter.

Keywords: human capital, intellectual capital, organizational culture, management, social identity, organization

Procedia PDF Downloads 466
1512 A Collaborative Platform for Multilingual Ontology Development

Authors: Ahmed Tawfik, Fausto Giunchiglia, Vincenzo Maltese

Abstract:

Ontologies provide a common understanding of a specific domain of interest that can be communicated between people and used as background knowledge for automated reasoning in a wide range of applications. In this paper we address the design of multilingual ontologies following well-defined knowledge engineering methodologies with the support of novel collaborative development approaches. In particular, we present a collaborative platform which allows ontologies to be developed incrementally in multiple languages. This is made possible via an appropriate mapping between language independent concepts and one lexicalization per language (or a lexical gap in case such lexicalization does not exist). The collaborative platform has been designed to support the development of the Universal Knowledge Core, a multilingual ontology currently in English, Italian, Chinese, Mongolian, Hindi, and Bangladeshi. Its design follows a workflow-based development methodology that models resources as a set of collaborative objects and assigns customizable workflows to build and maintain each collaborative object in a community driven manner, with extensive support of modern web 2.0 social and collaborative features.

Keywords: knowledge diversity, knowledge representation, ontology, development

Procedia PDF Downloads 392
1511 Algorithm for Information Retrieval Optimization

Authors: Kehinde K. Agbele, Kehinde Daniel Aruleba, Eniafe F. Ayetiran

Abstract:

When using Information Retrieval Systems (IRS), users often present search queries made of ad-hoc keywords. It is then up to the IRS to obtain a precise representation of the user’s information need and the context of the information. This paper investigates optimization of IRS to individual information needs in order of relevance. The study addressed development of algorithms that optimize the ranking of documents retrieved from IRS. This study discusses and describes a Document Ranking Optimization (DROPT) algorithm for information retrieval (IR) in an Internet-based or designated databases environment. Conversely, as the volume of information available online and in designated databases is growing continuously, ranking algorithms can play a major role in the context of search results. In this paper, a DROPT technique for documents retrieved from a corpus is developed with respect to document index keywords and the query vectors. This is based on calculating the weight (

Keywords: information retrieval, document relevance, performance measures, personalization

Procedia PDF Downloads 241
1510 A Design of an Augmented Reality Based Virtual Heritage Application

Authors: Stephen Barnes, Ian Mills, Frances Cleary

Abstract:

Augmented and virtual reality-based applications offer many benefits for the heritage and tourism sector. This technology provides a platform to showcase the regions of interest to people without the need for them to be physically present, which has had a positive impact on enticing tourists to visit those locations. However, the technology also provides the opportunity to present historical artefacts in a form that accurately represents their original, intended appearance. Three sites of interest were identified in the Lingaun Valley in South East Ireland, wherein virtual representations of site-specific artefacts of interest were created via a multidisciplinary team encompassing archaeology, art history, 3D modelling, design, and software development. The collated information has been presented to users via an augmented reality mobile-based application that provides information in an engaging manner that encourages an interest in history as well as visits to the sites in the Lingaun Valley.

Keywords: augmented reality, virtual heritage, 3D modelling, archaeology, virtual representation

Procedia PDF Downloads 81