Search results for: building information modeling
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 16853

Search results for: building information modeling

3983 Early Detection of Instability in Emulsions via Diffusing Wave Spectroscopy

Authors: Coline Bretz, Andrea Vaccaro, Dario Leumann

Abstract:

The food, personal care, and cosmetic industries are seeing increased consumer demand for more sustainable and innovative ingredients. When developing new formulations incorporating such ingredients, stability is one of the first criteria that must be assessed, and it is thus of great importance to have a method that can detect instabilities early and quickly. Diffusing Wave Spectroscopy (DWS) is a light scattering technique that probes the motion,i.e., the mean square displacement (MSD), of colloids, such as nanoparticles in a suspension or droplets in emulsions. From the MSD, the rheological properties of the surrounding medium can be determined via the so-called microrheology approach. In the case of purely viscous media, it is also possible to obtain information about particle size. DWS can thus be used to monitor the size evolution of particles, droplets, or bubbles in aging dispersions, emulsions, or foams. In the context of early instability detection in emulsions, DWS offers considerable advantages, as the samples are measured in a contact-free manner, using only small quantities of samples loaded in a sealable cuvette. The sensitivity and rapidity of the technique are key to detecting and following the ageing of emulsions reliably. We present applications of DWS focused on the characterization of emulsions. In particular, we demonstrate the ability to record very subtle changes in the structural properties early on. We also discuss the various mechanisms at play in the destabilization of emulsions, such as coalescence or Ostwald ripening, and how to identify them through this technique.

Keywords: instrumentation, emulsions, stability, DWS

Procedia PDF Downloads 48
3982 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021

Authors: Nkosingiphile Mbusozayo Zungu

Abstract:

The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.

Keywords: phishing, cybersecurity, informetrics, information security

Procedia PDF Downloads 90
3981 Video Text Information Detection and Localization in Lecture Videos Using Moments

Authors: Belkacem Soundes, Guezouli Larbi

Abstract:

This paper presents a robust and accurate method for text detection and localization over lecture videos. Frame regions are classified into text or background based on visual feature analysis. However, lecture video shows significant degradation mainly related to acquisition conditions, camera motion and environmental changes resulting in low quality videos. Hence, affecting feature extraction and description efficiency. Moreover, traditional text detection methods cannot be directly applied to lecture videos. Therefore, robust feature extraction methods dedicated to this specific video genre are required for robust and accurate text detection and extraction. Method consists of a three-step process: Slide region detection and segmentation; Feature extraction and non-text filtering. For robust and effective features extraction moment functions are used. Two distinct types of moments are used: orthogonal and non-orthogonal. For orthogonal Zernike Moments, both Pseudo Zernike moments are used, whereas for non-orthogonal ones Hu moments are used. Expressivity and description efficiency are given and discussed. Proposed approach shows that in general, orthogonal moments show high accuracy in comparison to the non-orthogonal one. Pseudo Zernike moments are more effective than Zernike with better computation time.

Keywords: text detection, text localization, lecture videos, pseudo zernike moments

Procedia PDF Downloads 130
3980 Corpus-Assisted Study of Gender Related Tiger Metaphors in the Chinese Context

Authors: Na Xiao

Abstract:

Animal metaphors have many different connotations, ranging from loving emotions to derogatory epithets, but gender expressions using animal metaphors are often imbalanced. Generally, animal metaphors related to females tend to be negative. Little known about the reasons for the negative expressions of animal female metaphors in Chinese contexts still have not been quantified. The Modern Chinese Corpus at the Center for Chinese Linguistics at Peking University (CCL Corpus) provided the data for this research, which aims to identify the influencing variables of gender differences in the description of animal metaphors mapping humans in Chinese by observing the percentage of "tiger" metaphor, which is based on the conceptual metaphor theory. A quantitative research method was used in this study to statistically examine the gender attitude percentage of the "tiger" metaphor using corpus data. This study has proved that the tiger metaphors associated with humans in the Chinese context tend to be negative. Importantly, this study has also shown that the high proportion of tiger metaphorical idioms is what causes the high proportion of negative tiger metaphors that are related to women. This finding can be used as crucial information for future studies on other gender-related animal metaphorical idioms and can offer additional insights for understanding trends in other animal metaphors.

Keywords: Chinese, CCL corpus, gender differences, metaphorical idioms, tigers

Procedia PDF Downloads 89
3979 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 430
3978 Forecasting Optimal Production Program Using Profitability Optimization by Genetic Algorithm and Neural Network

Authors: Galal H. Senussi, Muamar Benisa, Sanja Vasin

Abstract:

In our business field today, one of the most important issues for any enterprises is cost minimization and profit maximization. Second issue is how to develop a strong and capable model that is able to give us desired forecasting of these two issues. Many researches deal with these issues using different methods. In this study, we developed a model for multi-criteria production program optimization, integrated with Artificial Neural Network. The prediction of the production cost and profit per unit of a product, dealing with two obverse functions at same time can be extremely difficult, especially if there is a great amount of conflict information about production parameters. Feed-Forward Neural Networks are suitable for generalization, which means that the network will generate a proper output as a result to input it has never seen. Therefore, with small set of examples the network will adjust its weight coefficients so the input will generate a proper output. This essential characteristic is of the most important abilities enabling this network to be used in variety of problems spreading from engineering to finance etc. From our results as we will see later, Feed-Forward Neural Networks has a strong ability and capability to map inputs into desired outputs.

Keywords: project profitability, multi-objective optimization, genetic algorithm, Pareto set, neural networks

Procedia PDF Downloads 419
3977 Retro-Reflectivity and Diffuse Reflectivity Degradation of Thermoplastic Pavement Marking: A Case Study on Asphaltic Road in Thailand

Authors: Kittichai Thanasupsin, Satis Sukniam

Abstract:

Pavement marking is an essential task of road construction and maintenance. One of several benefits of pavement markings has been used to provide information about road alignment and road conditions ahead. In some cases, retro-reflectivity of road marking at night may not meet the standard. This degradation may be caused by internal factors such as the size of glass beads and the number of glass beads or external factors such as traffic volume, lane width, vehicle weight, and so on. This research aims to investigate the reflective efficiency of thermoplastic road marking with the glass beads. Ratios of glass beads, ranging from 359 to 553 grams per square meter on an asphaltic concrete, have been tested. The reflective efficiency data was collected at the beginning and at a specific time interval for a total of 8 months. It was found that the difference in glass beads quantity affects the rate of retro-reflectivity but does not affect the diffuse reflectivity. It was also found that other factors affect retro-reflectivity, such as duration, the position of road marking, traffic density, the quantity of glass beads, and dirt coating on top. The dirt coating on top is the most crucial factor that deteriorating retro-reflectivity.

Keywords: thermoplastic pavement marking, retro-reflectivity, diffuse reflectivity, asphalt concrete

Procedia PDF Downloads 110
3976 Indium-Gallium-Zinc Oxide Photosynaptic Device with Alkylated Graphene Oxide for Optoelectronic Spike Processing

Authors: Seyong Oh, Jin-Hong Park

Abstract:

Recently, neuromorphic computing based on brain-inspired artificial neural networks (ANNs) has attracted huge amount of research interests due to the technological abilities to facilitate massively parallel, low-energy consuming, and event-driven computing. In particular, research on artificial synapse that imitate biological synapses responsible for human information processing and memory is in the spotlight. Here, we demonstrate a photosynaptic device, wherein a synaptic weight is governed by a mixed spike consisting of voltage and light spikes. Compared to the device operated only by the voltage spike, ∆G in the proposed photosynaptic device significantly increased from -2.32nS to 5.95nS with no degradation of nonlinearity (NL) (potentiation/depression values were changed from 4.24/8 to 5/8). Furthermore, the Modified National Institute of Standards and Technology (MNIST) digit pattern recognition rates improved from 36% and 49% to 50% and 62% in ANNs consisting of the synaptic devices with 20 and 100 weight states, respectively. We expect that the photosynaptic device technology processed by optoelectronic spike will play an important role in implementing the neuromorphic computing systems in the future.

Keywords: optoelectronic synapse, IGZO (Indium-Gallium-Zinc Oxide) photosynaptic device, optoelectronic spiking process, neuromorphic computing

Procedia PDF Downloads 153
3975 Sinhala Sign Language to Grammatically Correct Sentences using NLP

Authors: Anjalika Fernando, Banuka Athuraliya

Abstract:

This paper presents a comprehensive approach for converting Sinhala Sign Language (SSL) into grammatically correct sentences using Natural Language Processing (NLP) techniques in real-time. While previous studies have explored various aspects of SSL translation, the research gap lies in the absence of grammar checking for SSL. This work aims to bridge this gap by proposing a two-stage methodology that leverages deep learning models to detect signs and translate them into coherent sentences, ensuring grammatical accuracy. The first stage of the approach involves the utilization of a Long Short-Term Memory (LSTM) deep learning model to recognize and interpret SSL signs. By training the LSTM model on a dataset of SSL gestures, it learns to accurately classify and translate these signs into textual representations. The LSTM model achieves a commendable accuracy rate of 94%, demonstrating its effectiveness in accurately recognizing and translating SSL gestures. Building upon the successful recognition and translation of SSL signs, the second stage of the methodology focuses on improving the grammatical correctness of the translated sentences. The project employs a Neural Machine Translation (NMT) architecture, consisting of an encoder and decoder with LSTM components, to enhance the syntactical structure of the generated sentences. By training the NMT model on a parallel corpus of Sinhala wrong sentences and their corresponding grammatically correct translations, it learns to generate coherent and grammatically accurate sentences. The NMT model achieves an impressive accuracy rate of 98%, affirming its capability to produce linguistically sound translations. The proposed approach offers significant contributions to the field of SSL translation and grammar correction. Addressing the critical issue of grammar checking, it enhances the usability and reliability of SSL translation systems, facilitating effective communication between hearing-impaired and non-sign language users. Furthermore, the integration of deep learning techniques, such as LSTM and NMT, ensures the accuracy and robustness of the translation process. This research holds great potential for practical applications, including educational platforms, accessibility tools, and communication aids for the hearing-impaired. Furthermore, it lays the foundation for future advancements in SSL translation systems, fostering inclusive and equal opportunities for the deaf community. Future work includes expanding the existing datasets to further improve the accuracy and generalization of the SSL translation system. Additionally, the development of a dedicated mobile application would enhance the accessibility and convenience of SSL translation on handheld devices. Furthermore, efforts will be made to enhance the current application for educational purposes, enabling individuals to learn and practice SSL more effectively. Another area of future exploration involves enabling two-way communication, allowing seamless interaction between sign-language users and non-sign-language users.In conclusion, this paper presents a novel approach for converting Sinhala Sign Language gestures into grammatically correct sentences using NLP techniques in real time. The two-stage methodology, comprising an LSTM model for sign detection and translation and an NMT model for grammar correction, achieves high accuracy rates of 94% and 98%, respectively. By addressing the lack of grammar checking in existing SSL translation research, this work contributes significantly to the development of more accurate and reliable SSL translation systems, thereby fostering effective communication and inclusivity for the hearing-impaired community

Keywords: Sinhala sign language, sign Language, NLP, LSTM, NMT

Procedia PDF Downloads 78
3974 Enablers of Total Quality Management for Social Enterprises: A Study of UAE Social Organizations

Authors: Farhat Sultana

Abstract:

Originality: TQM principles are considered the tools to enhance organizational performance for most organizations. The paper contributes to the literature on the social enterprise because social organizations are still far behind in implementing TQM as compared to other private, public, and nonprofit organizations. Study design: The study is based on the data and information provided by two case studies and one focus group of social enterprises. Purpose: The purpose of the study is to get a deep understating of TQM implementation and to recognize the enablers of TQM in social enterprises that enhance the organizational performance of social enterprises located in UAE. Findings: As per the findings of the study, key enablers of Total Quality management in the case enterprises are leadership support, strategic approach for quality, continuous improvement, process improvement, employee empowerment and customer focus practices, though some inhibitors for TQM implementation such as managerial structure for quality assurance and performance appraisal mechanism are also pointed out by the study. Research limitations: The study findings are only based on two case studies and one focus group, which is not enough to generalize the findings to all social organizations. Practical Implications: Identified TQM enablers can help management to implement TQM successfully in social enterprises. Social implications: The study provides enabling path for Social enterprises to implement TQM to seek quality output to build a better society.

Keywords: TQM, social enterprise, enablers of TQM, UAE

Procedia PDF Downloads 88
3973 The Influence of Intellectual Capital Disclosures on Market Capitalization Growth

Authors: Nyoman Wijana, Chandra Arha

Abstract:

Disclosures of Intellectual Capital (IC) is a presentation of corporate information assets that are not recorded in the financial statements. This disclosures is very helpful because it provides inform corporate assets are intangible. In the new economic era, the company's intangible assets will determine company's competitive advantage. This study aimed to examine the effect of IC disclosures on market capitalization growth. Observational studies conducted over ten years in 2002-2011. The purpose of this study was to determine the effect for last ten years. One hundred samples of the company's largest market capitalization in 2011 traced back to last ten years. Data that used, are in 2011, 2008, 2005, and 2002 Method that’s used for acquiring the data is content analysis. The analytical method used is Ordinanary Least Square (OLS) and analysis tools are e views 7 This software using Pooled Least Square estimation parameters are specifically designed for panel data. The results of testing analysis showed inconsistent expression levels affect the growth of the market capitalization in each year of observation. The results of this study are expected to motivate the public company in Indonesia to do more voluntary IC disclosures and encourage regulators to make regulations in a comprehensive manner so that all categories of the IC must be disclosed by the company.

Keywords: IC disclosures, market capitalization growth, analytical method, OLS

Procedia PDF Downloads 323
3972 A Holographic Infotainment System for Connected and Driverless Cars: An Exploratory Study of Gesture Based Interaction

Authors: Nicholas Lambert, Seungyeon Ryu, Mehmet Mulla, Albert Kim

Abstract:

In this paper, an interactive in-car interface called HoloDash is presented. It is intended to provide information and infotainment in both autonomous vehicles and ‘connected cars’, vehicles equipped with Internet access via cellular services. The research focuses on the development of interactive avatars for this system and its gesture-based control system. This is a case study for the development of a possible human-centred means of presenting a connected or autonomous vehicle’s On-Board Diagnostics through a projected ‘holographic’ infotainment system. This system is termed a Holographic Human Vehicle Interface (HHIV), as it utilises a dashboard projection unit and gesture detection. The research also examines the suitability for gestures in an automotive environment, given that it might be used in both driver-controlled and driverless vehicles. Using Human Centred Design methods, questions were posed to test subjects and preferences discovered in terms of the gesture interface and the user experience for passengers within the vehicle. These affirm the benefits of this mode of visual communication for both connected and driverless cars.

Keywords: gesture, holographic interface, human-computer interaction, user-centered design

Procedia PDF Downloads 290
3971 Understanding Factor Influence in Mask-Wearing Intention Onboard Airplanes during COVID-19: Attitude as a Mediator

Authors: Jing Yu Pan, Dahai Liu

Abstract:

Airlines in the US have taken protective measures to battle the COVID-19 pandemic, with a mask mandate being the most important one, especially in the aircraft cabin. As the industry is recovering from the pandemic, mask-wearing will eventually become a personal choice during flight. Nevertheless, COVID-19 will continue to create uncertainty for a long time into the future, making it necessary to understand the attitude and voluntary use of masks by air travelers on airplanes even after masks are no longer mandatory. This study aimed to understand the relationship between demographic characteristics and mask-wearing intention in the US. For age, gender, income, educational, and ethnicity groups, this study examined three factors – subjective norms, risk avoidance, and information seeking and their influence on the mask-wearing intention onboard airplanes during COVID-19 and whether or not attitude toward masks was an important mediator. The results show that all demographic factors except gender could help to explain the group variations in factor impact and the mediating effect in mask-wearing intentions. In particular, Asian travelers had mask-wearing intentions that were not affected by attitude either directly or indirectly. These findings provide useful implications to enhance the health and safety of air travelers, especially in the US, where opposing views toward mask-wearing still widely exist.

Keywords: COVID-19, passenger demographics, aircraft cabin, mask-wearing intention, attitude as mediator

Procedia PDF Downloads 72
3970 Response of Chickpea (Cicer arietinum L.) Genotypes to Drought Stress at Different Growth Stages

Authors: Ali. Marjani, M. Farsi, M. Rahimizadeh

Abstract:

Chickpea (Cicer arietinum L.) is one of the important grain legume crops in the world. However, drought stress is a serious threat to chickpea production, and development of drought-resistant varieties is a necessity. Field experiments were conducted to evaluate the response of 8 chickpea genotypes (MCC* 696, 537, 80, 283, 392, 361, 252, 397) and drought stress (S1: non-stress, S2: stress at vegetative growth stage, S3: stress at early bloom, S4: stress at early pod visible) at different growth stages. Experiment was arranged in split plot design with four replications. Difference among the drought stress time was found to be significant for investigated traits except biological yield. Differences were observed for genotypes in flowering time, pod information time, physiological maturation time and yield. Plant height reduced due to drought stress in vegetative growth stage. Stem dry weight reduced due to drought stress in pod visibly. Flowering time, maturation time, pod number, number of seed per plant and yield cause of drought stress in flowering was also reduced. The correlation between yield and number of seed per plant and biological yield was positive. The MCC283 and MCC696 were the high-tolerance genotypes. These results demonstrated that drought stress delayed phonological growth in chickpea and that flowering stage is sensitive.

Keywords: chickpea, drought stress, growth stage, tolerance

Procedia PDF Downloads 240
3969 Germination Behavior of Tricholaena teneriffae L. a perennial Grass Species

Authors: Imed Mezghani, Yousra Ben Salah, Mohamed Chaieb

Abstract:

Tricholaena teneriffae L. is a xerophytic perennial herb that belongs to the Poaceae family likely to be used for ecological restoration programs. It's a dominant and economically important species widely distributed in the Bou-Hedma National Park, Tunisia. Reintroduction and expansion of T. teneriffae depend solely on sexual reproduction. This makes the understanding of its germination requirements vital for conservation and management. To provide basic information for its conservation and reintroduction, we studied the influence of environmental factors on seed germination patterns. The germination responses of seeds were determined over a wide range of constant temperatures (15–35°C), polyethylene glycol solutions of different osmotic potentials (0 to −2 MPa) and salt solution (0 to 150 mM of NaCl). Results indicated that the optimum temperature germination was attained at 25°C which corresponds to temperatures prevailing during mid spring season in the Mediterranean area. Seeds germinated in Polyethylene Glycol solutions exhibited significantly lower germination than control especially when water potential fell below -0.6 MPa. Germination percentage and rate decreased with an increase NaCl concentration. Seeds germination was substantially delayed and reduced with an increase in NaCl to levels above 50 mM. T. teneriffae is moderately salt tolerant at germination stage.

Keywords: germination, temperature, Tricholaena teneriffae L., salt stress, water stress, rehabilitation

Procedia PDF Downloads 272
3968 Autogenous Diabetic Retinopathy Censor for Ophthalmologists - AKSHI

Authors: Asiri Wijesinghe, N. D. Kodikara, Damitha Sandaruwan

Abstract:

The Diabetic Retinopathy (DR) is a rapidly growing interrogation around the world which can be annotated by abortive metabolism of glucose that causes long-term infection in human retina. This is one of the preliminary reason of visual impairment and blindness of adults. Information on retinal pathological mutation can be recognized using ocular fundus images. In this research, we are mainly focused on resurrecting an automated diagnosis system to detect DR anomalies such as severity level classification of DR patient (Non-proliferative Diabetic Retinopathy approach) and vessel tortuosity measurement of untwisted vessels to assessment of vessel anomalies (Proliferative Diabetic Retinopathy approach). Severity classification method is obtained better results according to the precision, recall, F-measure and accuracy (exceeds 94%) in all formats of cross validation. In ROC (Receiver Operating Characteristic) curves also visualized the higher AUC (Area Under Curve) percentage (exceeds 95%). User level evaluation of severity capturing is obtained higher accuracy (85%) result and fairly better values for each evaluation measurements. Untwisted vessel detection for tortuosity measurement also carried out the good results with respect to the sensitivity (85%), specificity (89%) and accuracy (87%).

Keywords: fundus image, exudates, microaneurisms, hemorrhages, tortuosity, diabetic retinopathy, optic disc, fovea

Procedia PDF Downloads 321
3967 Ranking of Inventory Policies Using Distance Based Approach Method

Authors: Gupta Amit, Kumar Ramesh, P. C. Tewari

Abstract:

Globalization is putting enormous pressure on the business organizations specially manufacturing one to rethink the supply chain in innovative manners. Inventory consumes major portion of total sale revenue. Effective and efficient inventory management plays a vital role for the successful functioning of any organization. Selection of inventory policy is one of the important purchasing activities. This paper focuses on selection and ranking of alternative inventory policies. A deterministic quantitative model-based on Distance Based Approach (DBA) method has been developed for evaluation and ranking of inventory policies. We have employed this concept first time for this type of the selection problem. Four inventory policies Economic Order Quantity (EOQ), Just in Time (JIT), Vendor Managed Inventory (VMI) and monthly policy are considered. Improper selection could affect a company’s competitiveness in terms of the productivity of its facilities and quality of its products. The ranking of inventory policies is a multi-criteria problem. There is a need to first identify the selection criteria and then processes the information with reference to relative importance of attributes for comparison. Criteria values for each inventory policy can be obtained either analytically or by using a simulation technique or they are linguistic subjective judgments defined by fuzzy sets, like, for example, the values of criteria. A methodology is developed and applied to rank the inventory policies.

Keywords: inventory policy, ranking, DBA, selection criteria

Procedia PDF Downloads 362
3966 Impact Factor Analysis for Spatially Varying Aerosol Optical Depth in Wuhan Agglomeration

Authors: Wenting Zhang, Shishi Liu, Peihong Fu

Abstract:

As an indicator of air quality and directly related to concentration of ground PM2.5, the spatial-temporal variation and impact factor analysis of Aerosol Optical Depth (AOD) have been a hot spot in air pollution. This paper concerns the non-stationarity and the autocorrelation (with Moran’s I index of 0.75) of the AOD in Wuhan agglomeration (WHA), in central China, uses the geographically weighted regression (GRW) to identify the spatial relationship of AOD and its impact factors. The 3 km AOD product of Moderate Resolution Imaging Spectrometer (MODIS) is used in this study. Beyond the economic-social factor, land use density factors, vegetable cover, and elevation, the landscape metric is also considered as one factor. The results suggest that the GWR model is capable of dealing with spatial varying relationship, with R square, corrected Akaike Information Criterion (AICc) and standard residual better than that of ordinary least square (OLS) model. The results of GWR suggest that the urban developing, forest, landscape metric, and elevation are the major driving factors of AOD. Generally, the higher AOD trends to located in the place with higher urban developing, less forest, and flat area.

Keywords: aerosol optical depth, geographically weighted regression, land use change, Wuhan agglomeration

Procedia PDF Downloads 343
3965 Geomechanical Technologies for Assessing Three-Dimensional Stability of Underground Excavations Utilizing Remote-Sensing, Finite Element Analysis, and Scientific Visualization

Authors: Kwang Chun, John Kemeny

Abstract:

Light detection and ranging (LiDAR) has been a prevalent remote-sensing technology applied in the geological fields due to its high precision and ease of use. One of the major applications is to use the detailed geometrical information of underground structures as a basis for the generation of a three-dimensional numerical model that can be used in a geotechnical stability analysis such as FEM or DEM. To date, however, straightforward techniques in reconstructing the numerical model from the scanned data of the underground structures have not been well established or tested. In this paper, we propose a comprehensive approach integrating all the various processes, from LiDAR scanning to finite element numerical analysis. The study focuses on converting LiDAR 3D point clouds of geologic structures containing complex surface geometries into a finite element model. This methodology has been applied to Kartchner Caverns in Arizona, where detailed underground and surface point clouds can be used for the analysis of underground stability. Numerical simulations were performed using the finite element code Abaqus and presented by 3D computing visualization solution, ParaView. The results are useful in studying the stability of all types of underground excavations including underground mining and tunneling.

Keywords: finite element analysis, LiDAR, remote-sensing, scientific visualization, underground stability

Procedia PDF Downloads 146
3964 Performance Analysis in 5th Generation Massive Multiple-Input-Multiple-Output Systems

Authors: Jihad S. Daba, Jean-Pierre Dubois, Georges El Soury

Abstract:

Fifth generation wireless networks guarantee significant capacity enhancement to suit more clients and services at higher information rates with better reliability while consuming less power. The deployment of massive multiple-input-multiple-output technology guarantees broadband wireless networks with the use of base station antenna arrays to serve a large number of users on the same frequency and time-slot channels. In this work, we evaluate the performance of massive multiple-input-multiple-output systems (MIMO) systems in 5th generation cellular networks in terms of capacity and bit error rate. Several cases were considered and analyzed to compare the performance of massive MIMO systems while varying the number of antennas at both transmitting and receiving ends. We found that, unlike classical MIMO systems, reducing the number of transmit antennas while increasing the number of antennas at the receiver end provides a better solution to performance enhancement. In addition, enhanced orthogonal frequency division multiplexing and beam division multiple access schemes further improve the performance of massive MIMO systems and make them more reliable.

Keywords: beam division multiple access, D2D communication, enhanced OFDM, fifth generation broadband, massive MIMO

Procedia PDF Downloads 238
3963 Exploring Individual and Team Approaches in Crafting Workplace Inclusivity for Deaf and Hard of Hearing Employees in Malaysia

Authors: Nor Wahiza Abdul Wahat, Nor Haniza Abdul Wahat, Siti Noormi Alias, Mohamad Sazali Shaari

Abstract:

This study prepares the groundwork for the development of a strategic model and instrument for workplace inclusivity for deaf and hard-of-hearing employees in Malaysia. In the past, scholars have discussed inclusivity of workplaces to the extent to which employees feel they are significantly part of the organizational processes. Such processes include access to information, connectedness to colleagues and team members as well as their ability to participate in and influence decision-making processes. A qualitative study was conducted to explore on experiences of employed deaf and hard-of-hearing employees in a few Malaysian organizations. Data were collected from two focus group discussions involving male and female deaf and hard of hearing employees. Three in-depth interviews were also conducted with employer representatives. Generated themes highlighted individual, and team approaches towards crafting workplace inclusivity for deaf and hard of hearing employees in Malaysia. The adaptiveness of deaf and hard-of-hearing employees and social inclusion by colleagues were among the emerged sub-themes. This study allowed the researchers to further develop workplace inclusivity instruments and models for the benefit of deaf and hard of hearing Malaysian employees, as well as their employers.

Keywords: deaf, hard of hearing, workplace inclusivity, disabilities

Procedia PDF Downloads 159
3962 Parasitological Study and Its Role in Fisheries Management and Stock Assessment of Boops boops (Lineauses, 1758) along the Tunisian Coast

Authors: I. Chebbi, L. Boudaya, L. Neifar

Abstract:

The bogue, Boops boops is an economically important fishery resource and commonly captured in the Mediterranean, and its diversity in parasites has been used as a tool to differentiate between stocks along with Tunisia since it is widely acceptable in fisheries management. In this study, a total of 90 fish are investigated from three localities off Tunisia, including Kelibia, Mahdia, and Zarzis. Fifteen species of parasites totaling 1270 individuals were harvested from B. boops, whereas ten parasites were used as biological tags. Based on Mahalanobis distance, each parasite species shows a great importance in the discrimination between groups. Tetraphyllidea larvae are the most influential parasites in determining the position of samples belonging to Kelibia. Monogenean species and Hysterothylacium sp. are the most important species for determining the position of samples from Mahdia. Specimens from Zarzis are characterized by the absence of the four Monogenean species and the Tetraphyllidea larvae. Parasites allocate B. boops population correctly to their origin communities with an accuracy of 83.3%. These results were corroborated by the discriminant analyses, highlighted the presence of three stocks, and improved that the parasitological method can be considered as a reliable key to provide imperative information for discriminating among B. boops stocks in Tunisian waters.

Keywords: biological marker, Boops boops, parasite, population structure

Procedia PDF Downloads 108
3961 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 413
3960 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 323
3959 A Quantitative Analysis for the Correlation between Corporate Financial and Social Performance

Authors: Wafaa Salah, Mostafa A. Salama, Jane Doe

Abstract:

Recently, the corporate social performance (CSP) is not less important than the corporate financial performance (CFP). Debate still exists about the nature of the relationship between the CSP and CFP, whether it is a positive, negative or a neutral correlation. The objective of this study is to explore the relationship between corporate social responsibility (CSR) reports and CFP. The study uses the accounting-based and market-based quantitative measures to quantify the financial performance of seven organizations listed on the Egyptian Stock Exchange in 2007-2014. Then uses the information retrieval technologies to quantify the contribution of each of the three dimensions of the corporate social responsibility report (environmental, social and economic). Finally, the correlation between these two sets of variables is viewed together in a model to detect the correlations between them. This model is applied on seven firms that generate social responsibility reports. The results show a positive correlation between the Earnings per share (market based measure) and the economical dimension in the CSR report. On the other hand, total assets and property, plant and equipment (accounting-based measure) are positively correlated to the environmental and social dimensions of the CSR reports. While there is not any significant relationship between ROA, ROE, Operating income and corporate social responsibility. This study contributes to the literature by providing more clarification of the relationship between CFP and the isolated CSR activities in a developing country.

Keywords: financial, social, machine learning, corporate social performance, corporate social responsibility

Procedia PDF Downloads 290
3958 Epistemic Stance in Chinese Medicine Translation: A Systemic Functional Perspective

Authors: Yan Yue

Abstract:

Epistemic stance refers to the writer’s judgement about the certainty of the proposition, which demonstrates writer’s degree of commitment and confidence to the status of the information. Epistemic stance can exert great consequence to the validity or reliability of the values of a statement, however, to date, it receives little attention in translations studies, especially from the perspective of systemic functional linguistics (SFL) and with the relation to translator’s domain knowledge. This study is corpus-based research carried out in SFL perspective, which investigates translator’s epistemic stance pattern in Chinese medicine discourse translations by translators with and without medical domain knowledge. Overall, our findings show that all translators tend to be neither too assertive nor too doubted about Chinese medicine statements, and they all tend to express their epistemic stance in a subjective rather than objective way. Individually, there is a clear pattern of epistemic stance marked off by translators’ medical expertise, which further consolidates the previous finding that epistemic asymmetry is found most salient between lay people and professionals. However, contrary to our hypothesis, translators as clinicians who have more medical knowledge are found to be more tentative to TCM statements than translators as non-clinicians. This finding could serve to refine the statements about the relation between writer’s domain knowledge and epistemic stance-taking and the current debate whether Chinese medicine texts should only be translated by clinicians.

Keywords: epistemic stance, domain knowledge, SFL, medical translation

Procedia PDF Downloads 132
3957 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 165
3956 Trends of Cutaneous Melanoma in New Zealand: 2010 to 2020

Authors: Jack S. Pullman, Daniel Wen, Avinash Sharma, Bert Van Der Werf, Richard Martin

Abstract:

Background: New Zealand (NZ) melanoma incidence rates are amongst the highest in the world. Previous studies investigating the incidence of melanoma in NZ were performed for the periods 1995 – 1999 and 2000 – 2004 and suggested increasing melanoma incidence rates. Aim: The aim of the study is to provide an up-to-date review of trends in cutaneous melanoma in NZ from the New Zealand Cancer Registry (NZCR) 2010 – 2020. Methods: De-identified data were obtained from the NZCR, and relevant demographic and histopathologic information was extracted. Statistical analyses were conducted to calculate age-standardized incidence rates for invasive melanoma (IM) and melanoma in situ (MIS). Secondary results included Breslow thickness and melanoma subtype analysis. Results: There was a decline in the IM age-standardized incidence rate from 30.4 to 23.9 per 100,000 person-years between 2010 to 2020, alongside an increase in MIS incidence rate from 37.1 to 50.3 per 100,000 person-years. Men had a statistically significant higher IM incidence rate (p <0.001) and Breslow thickness (p <0.001) compared with women. Increased age was associated with a higher incidence of IM, presentation with melanoma of greater Breslow thickness and more advanced T stage. Conclusion: The incidence of IM in NZ has decreased in the last decade and was associated with an increase in MIS incidence over the same period. This can be explained due to earlier detection, dermoscopy, the maturity of prevention campaigns and/or a change in skin protection behavior.

Keywords: melanoma, incidence, epidemiology, New Zealand

Procedia PDF Downloads 45
3955 Objective vs. Perceived Quality in the Cereal Industry

Authors: Albena Ivanova, Jill Kurp, Austin Hampe

Abstract:

Cereal products in the US contain rich information on the front of the package (FOP) as well as point-of-purchase (POP) summaries provided by the store. These summaries frequently are confusing and misleading to the consumer. This study explores the relationship between perceived quality, objective quality, price, and value in the cold cereal industry. A total of 270 cold cereal products were analyzed and the price, quality and value for different summaries were compared using ANOVA tests. The results provide evidence that the United States Department of Agriculture Organic FOP/POP are related to higher objective quality, higher price, but not to a higher value. Whole grain FOP/POP related to a higher objective quality, lower or similar price, and higher value. Heart-healthy POP related to higher objective quality, similar price, and higher value. Gluten-free FOP/POP related to lower objective quality, higher price, and lower value. Kid's cereals were of lower objective quality, same price, and lower value compared to family and adult markets. The findings point to a disturbing tendency of companies to continue to produce lower quality products for the kids’ market, pricing them the same as high-quality products. The paper outlines strategies that marketers and policymakers can utilize to contribute to the increased objective quality and value of breakfast cereal products in the United States.

Keywords: cereals, certifications, front-of-package claims, consumer health.

Procedia PDF Downloads 106
3954 The Corona is a Double Virus: The Effect of the Corona on Domestic Violence

Authors: B. Waked Najar

Abstract:

Since the spread of Covid- 19, Israel and other countries suffer from lockdowns and social distance, which impose different kinds of restrictions. On the one side, many organization closed and unemployment increased, bringing about economic problems and distress. On the other side, family ties were damaged due to inability to sustain close relations with some family members and too frequent interactions with others. Unfortunately, conflicts within families, controlling behavior and domestic violence appear more often. Purpose: to examine the phenomenon of domestic violence and its expansion during the Covid-19 crisis, to propose and classify strategies of dealing with it, including encouragement of public systems providing more information and support to domestic violence victims. Methodology: the author strives to reveal methods of supporting domestic violence victims through public and private treatment organizations. The author interviewed battered women and families who experienced violence during the Covid-19 crisis. Findings: victims of domestic violence often feel isolated and helpless. It is a real challenge to track and support them, especially in the traditional minorities’ communities. Research limitations: Many families refused to be interviewed because they did not want to be exposed to the community, especially religious families. Originality: research is aimed to examine a phenomenon of domestic violence during the Covid-19 crisis and methods of help and support the victims, which is not a common theme of research during the pandemic.

Keywords: violence, coronavirus, domestic violence, influence

Procedia PDF Downloads 70