Search results for: recognizing textual entailment (RTE)
552 A Text Classification Approach Based on Natural Language Processing and Machine Learning Techniques
Authors: Rim Messaoudi, Nogaye-Gueye Gning, François Azelart
Abstract:
Automatic text classification applies mostly natural language processing (NLP) and other AI-guided techniques to automatically classify text in a faster and more accurate manner. This paper discusses the subject of using predictive maintenance to manage incident tickets inside the sociality. It focuses on proposing a tool that treats and analyses comments and notes written by administrators after resolving an incident ticket. The goal here is to increase the quality of these comments. Additionally, this tool is based on NLP and machine learning techniques to realize the textual analytics of the extracted data. This approach was tested using real data taken from the French National Railways (SNCF) company and was given a high-quality result.Keywords: machine learning, text classification, NLP techniques, semantic representation
Procedia PDF Downloads 100551 Image Segmentation of Visual Markers in Robotic Tracking System Based on Differential Evolution Algorithm with Connected-Component Labeling
Authors: Shu-Yu Hsu, Chen-Chien Hsu, Wei-Yen Wang
Abstract:
Color segmentation is a basic and simple way for recognizing the visual markers in a robotic tracking system. In this paper, we propose a new method for color segmentation by incorporating differential evolution algorithm and connected component labeling to autonomously preset the HSV threshold of visual markers. To evaluate the effectiveness of the proposed algorithm, a ROBOTIS OP2 humanoid robot is used to conduct the experiment, where five most commonly used color including red, purple, blue, yellow, and green in visual markers are given for comparisons.Keywords: color segmentation, differential evolution, connected component labeling, humanoid robot
Procedia PDF Downloads 605550 Numerical Simulation and Laboratory Tests for Rebar Detection in Reinforced Concrete Structures using Ground Penetrating Radar
Authors: Maha Al-Soudani, Gilles Klysz, Jean-Paul Balayssac
Abstract:
The aim of this paper is to use Ground Penetrating Radar (GPR) as a non-destructive testing (NDT) method to increase its accuracy in recognizing the geometric reinforced concrete structures and in particular, the position of steel bars. This definition will help the managers to assess the state of their structures on the one hand vis-a-vis security constraints and secondly to quantify the need for maintenance and repair. Several configurations of acquisition and processing of the simulated signal were tested to propose and develop an appropriate imaging algorithm in the propagation medium to locate accurately the rebar. A subsequent experimental validation was used by testing the imaging algorithm on real reinforced concrete structures. The results indicate that, this algorithm is capable of estimating the reinforcing steel bar position to within (0-1) mm.Keywords: GPR, NDT, Reinforced concrete structures, Rebar location.
Procedia PDF Downloads 504549 Application of Fuzzy Logic to Design and Coordinate Parallel Behaviors for a Humanoid Mobile Robot
Authors: Nguyen Chan Hung, Mai Ngoc Anh, Nguyen Xuan Ha, Tran Xuan Duc, Dang Bao Lam, Nguyen Hoang Viet
Abstract:
This paper presents a design and implementation of a navigation controller for a humanoid mobile robot platform to operate in indoor office environments. In order to fulfil the requirement of recognizing and approaching human to provide service while avoiding random obstacles, a behavior-based fuzzy logic controller was designed to simultaneously coordinate multiple behaviors. Experiments in real office environment showed that the fuzzy controller deals well with complex scenarios without colliding with random objects and human.Keywords: behavior control, fuzzy logic, humanoid robot, mobile robot
Procedia PDF Downloads 420548 Resource Framework Descriptors for Interestingness in Data
Authors: C. B. Abhilash, Kavi Mahesh
Abstract:
Human beings are the most advanced species on earth; it's all because of the ability to communicate and share information via human language. In today's world, a huge amount of data is available on the web in text format. This has also resulted in the generation of big data in structured and unstructured formats. In general, the data is in the textual form, which is highly unstructured. To get insights and actionable content from this data, we need to incorporate the concepts of text mining and natural language processing. In our study, we mainly focus on Interesting data through which interesting facts are generated for the knowledge base. The approach is to derive the analytics from the text via the application of natural language processing. Using semantic web Resource framework descriptors (RDF), we generate the triple from the given data and derive the interesting patterns. The methodology also illustrates data integration using the RDF for reliable, interesting patterns.Keywords: RDF, interestingness, knowledge base, semantic data
Procedia PDF Downloads 162547 Kant on Lying to God: The Intention to Deceive
Authors: James E. Mahon
Abstract:
This paper addresses the important question in the philosophy of lies and deception of whether all lying requires an intention to deceive. It does by examining a recent attempt by two philosophers to argue that Immanuel Kant abandoned the view that all lying requires an intention to deceive, in order to be able to claim that lying to God was possible. Ian Proops and Roy Sorensen have recently argued that although Kant always held that it was impossible for anyone to intend to deceive God, late in his life he came to believe that it was possible to lie to God. Kant came to believe that this was possible, they argue, because Kant came to believe that lying is not always deceptive, and that it was possible to tell non-deceptive lies, including non-deceptive lies to God. In this paper their arguments will be broken down and analyzed. Based on a close textual reading of the published works and the Kant’s lectures on ethics, it will be argued that Proops and Sorensen are wrong about what Kant believed about lying in general and lying to God in particular. This paper concludes that Kant never did abandon the Deceptionist position that all lying requires an intention to deceive.Keywords: Kant, lie, deception, intention, God, ethics, belief, assertion
Procedia PDF Downloads 41546 A Review: Recycled Materials Used in Construction
Authors: Oghenerukome Akponovo, Lynda I. Onyebuchukwu
Abstract:
Construction waste, along with that of many other industries, contributes significantly to the world's annual solid waste totals. Most of these materials, such as ash from rice hulls, slags, cement kiln dust, tire ash, plastic waste (PW), and silica fumes, end up in landfills or waterways. Some of them might even end up polluting the air from high in the atmosphere. It's sustainable, cheap, and environmentally friendly to recycle these items into new building supplies. When constructing a "Green" structure, the materials employed have the potential to either exacerbate environmental imbalance or maintain a stable ecosystem. The purpose of this research is to take stock of what is already known about recycling's potential in the construction industry and to identify its deficiencies. Therefore, this study systematically reviews the wide range of recycled materials that go into building construction. Recognizing that the construction industry's use of recycled materials has an influence on the environment and that investigating these materials may have a substantial economic impact if they were discoveredKeywords: building, construction, recycled materials, waste management
Procedia PDF Downloads 107545 A Case of Postpartum Pulmonary Edema Induced by Oxytocin
Authors: May Zaw, Amber Latif, William Lim
Abstract:
Postpartum dyspnea can be due to many causes, such as pulmonary embolism, amniotic fluid embolism, and peripartum cardiomyopathy, but less frequently due to acute pulmonary edema. The incidence of acute pulmonary edema during pregnancy and in the postpartum period has been estimated to be around 0.08%. About half of the cases are attributed to tocolytic therapy. Herein, we present a case of a young woman presenting with acute hypoxia after induction of labor with oxytocin and found to have acute pulmonary edema. This case aims to illustrate and add to a growing body of literature regarding oxytocin-induced acute pulmonary edema and highlights the importance of recognizing the rare complication of oxytocin and necessary interventions to avoid complications. Oxytocin-induced pulmonary edema is a relatively uncommon condition, but physicians should have a high index of suspicion to initiate timely intervention and avoid fetal complications.Keywords: pulmonary, pregnancy, oxytocin, postpartum
Procedia PDF Downloads 90544 Sinhala Sign Language to Grammatically Correct Sentences using NLP
Authors: Anjalika Fernando, Banuka Athuraliya
Abstract:
This paper presents a comprehensive approach for converting Sinhala Sign Language (SSL) into grammatically correct sentences using Natural Language Processing (NLP) techniques in real-time. While previous studies have explored various aspects of SSL translation, the research gap lies in the absence of grammar checking for SSL. This work aims to bridge this gap by proposing a two-stage methodology that leverages deep learning models to detect signs and translate them into coherent sentences, ensuring grammatical accuracy. The first stage of the approach involves the utilization of a Long Short-Term Memory (LSTM) deep learning model to recognize and interpret SSL signs. By training the LSTM model on a dataset of SSL gestures, it learns to accurately classify and translate these signs into textual representations. The LSTM model achieves a commendable accuracy rate of 94%, demonstrating its effectiveness in accurately recognizing and translating SSL gestures. Building upon the successful recognition and translation of SSL signs, the second stage of the methodology focuses on improving the grammatical correctness of the translated sentences. The project employs a Neural Machine Translation (NMT) architecture, consisting of an encoder and decoder with LSTM components, to enhance the syntactical structure of the generated sentences. By training the NMT model on a parallel corpus of Sinhala wrong sentences and their corresponding grammatically correct translations, it learns to generate coherent and grammatically accurate sentences. The NMT model achieves an impressive accuracy rate of 98%, affirming its capability to produce linguistically sound translations. The proposed approach offers significant contributions to the field of SSL translation and grammar correction. Addressing the critical issue of grammar checking, it enhances the usability and reliability of SSL translation systems, facilitating effective communication between hearing-impaired and non-sign language users. Furthermore, the integration of deep learning techniques, such as LSTM and NMT, ensures the accuracy and robustness of the translation process. This research holds great potential for practical applications, including educational platforms, accessibility tools, and communication aids for the hearing-impaired. Furthermore, it lays the foundation for future advancements in SSL translation systems, fostering inclusive and equal opportunities for the deaf community. Future work includes expanding the existing datasets to further improve the accuracy and generalization of the SSL translation system. Additionally, the development of a dedicated mobile application would enhance the accessibility and convenience of SSL translation on handheld devices. Furthermore, efforts will be made to enhance the current application for educational purposes, enabling individuals to learn and practice SSL more effectively. Another area of future exploration involves enabling two-way communication, allowing seamless interaction between sign-language users and non-sign-language users.In conclusion, this paper presents a novel approach for converting Sinhala Sign Language gestures into grammatically correct sentences using NLP techniques in real time. The two-stage methodology, comprising an LSTM model for sign detection and translation and an NMT model for grammar correction, achieves high accuracy rates of 94% and 98%, respectively. By addressing the lack of grammar checking in existing SSL translation research, this work contributes significantly to the development of more accurate and reliable SSL translation systems, thereby fostering effective communication and inclusivity for the hearing-impaired communityKeywords: Sinhala sign language, sign Language, NLP, LSTM, NMT
Procedia PDF Downloads 104543 Act East Policy and the Politics of the Non-Recognized Thai-Indian Diasporic Community in Thailand
Authors: Ruchi Agarwal
Abstract:
The Indian diaspora in Thailand is as ethnically diverse as any other country. Although a relatively small community, the Indian diaspora has long established its roots, some with their fifth generation now living in Thailand. The community has a solid social and economic standing recognized by the host country but lacks connections with its ethnic roots in the home country. The biggest dilemma faced by the younger generation of the Indian diasporic community is the identity crisis. Regardless of being born and brought up in Thailand and possessing Thai citizenship, they do not get recognition as Thais by their Thai counterparts. However, with the Act Asia Policy of the Indian government, there has been an increase in social and political activities organized by old and new Indian associations, bringing new hopes of recognizing the Thai-Indian diasporic community.Keywords: Indian, Thailand, diaspora, Act East Policy, Thai
Procedia PDF Downloads 152542 The Expansion of Buddhism from India to Nepal Himalaya and Beyond
Authors: Umesh Regmi
Abstract:
This paper explores the expansion of Buddhism from India geographically to the Himalayan region of Nepal, Tibet, India, and Bhutan in chronological historical sequence. The Buddhism practiced in Tibet is the spread of the Mahayana-Vajrayana form appropriately designed by Indian Mahasiddhas, who were the practitioners of the highest form of tantra and meditation. Vajrayana Buddhism roots in the esoteric practices incorporating the teachings of Buddha, mantras, dharanis, rituals, and sadhana for attaining enlightenment. This form of Buddhism spread from India to Nepal after the 5th Century AD and Tibet after the 7th century AD and made a return journey to the Himalayan region of Nepal, India, and Bhutan after the 8th century. The first diffusion of this form of Buddhism from India to Nepal and Tibet is partially proven through Buddhist texts and the archaeological existence of monasteries historically and at times relied on mythological traditions. The second diffusion of Buddhism in Tibet was institutionalized through the textual translations and interpretations of Indian Buddhist masters and their Tibetan disciples and the establishment of different monasteries in various parts of Tibet, later resulting in different schools and their traditions: Nyingma, Kagyu, Sakya, Gelug, and their sub-schools. The first return journey of Buddhism from Tibet to the Himalayan region of Nepal, India, and Bhutan in the 8th century is mythologically recorded in local legends of the arrival of Padmasambhava, and the second journey in the 11th century and afterward flourished by many Indian masters who practiced continuously till date. This return journey of Tibetan Buddhism has been intensified after 1959 with the Chinese occupation of Tibet, resulting in the Tibetan Buddhist masters living in exile in major locations like Kathmandu, Dharmasala, Dehradun, Sikkim, Kalimpong, and beyond. The historic-cultural-critical methodology for the recognition of the qualities of cultural expressions analysis presents the Buddhist practices of the Himalayan region, explaining the concepts of Ri (mountain as spiritual symbols), yul-lha (village deities), dhar-lha (spiritual concept of mountain passes), dharchhog-lungdhar (prayer flags), rig-sum gonpo (small stupas), Chenresig, asura (demi gods), etc. Tibetan Buddhist history has preserved important textual and practical aspects of Vajrayana from Buddhism historically in the form of arrival, advent, and development, including rising and fall. Currently, Tibetan Buddhism has influenced a great deal in the contemporary Buddhist practices of the world. The exploratory findings conducted over seven years of field visits and research in the Himalayan regions of Nepal, India, and Bhutan have demonstrated the fact that Buddhism in the Himalayan region is a return journey from Tibet and lately been popularized globally after 1959 by major monasteries and their Buddhist masters, lamas, nuns and other professionals, who have contributed in different periods of time.Keywords: Buddhism, expansion, Himalayan region, India, Nepal, Bhutan, return, Tibet, Vajrayana Buddhism
Procedia PDF Downloads 108541 Video Based Automatic License Plate Recognition System
Authors: Ali Ganoun, Wesam Algablawi, Wasim BenAnaif
Abstract:
Video based traffic surveillance based on License Plate Recognition (LPR) system is an essential part for any intelligent traffic management system. The LPR system utilizes computer vision and pattern recognition technologies to obtain traffic and road information by detecting and recognizing vehicles based on their license plates. Generally, the video based LPR system is a challenging area of research due to the variety of environmental conditions. The LPR systems used in a wide range of commercial applications such as collision warning systems, finding stolen cars, controlling access to car parks and automatic congestion charge systems. This paper presents an automatic LPR system of Libyan license plate. The performance of the proposed system is evaluated with three video sequences.Keywords: license plate recognition, localization, segmentation, recognition
Procedia PDF Downloads 464540 Peat Soil Stabilization Methods: A Review
Authors: Mohammad Saberian, Mohammad Ali Rahgozar, Reza Porhoseini
Abstract:
Peat soil is formed naturally through the accumulation of organic matter under water and it consists of more than 75% organic substances. Peat is considered to be in the category of problematic soil, which is not suitable for construction, due to its high compressibility, high moisture content, low shear strength, and low bearing capacity. Since this kind of soil is generally found in many countries and different regions, finding desirable techniques for stabilization of peat is absolutely essential. The purpose of this paper is to review the various techniques applied for stabilizing peat soil and discuss outcomes of its improved mechanical parameters and strength properties. Recognizing characterization of stabilized peat is one of the most significant factors for architectural structures; as a consequence, various strategies for stabilization of this susceptible soil have been examined based on the depth of peat deposit.Keywords: peat soil, stabilization, depth, strength, unconfined compressive strength (USC)
Procedia PDF Downloads 573539 RoboWeedSupport-Semi-Automated Unmanned Aerial System for Cost Efficient High Resolution in Sub-Millimeter Scale Acquisition of Weed Images
Authors: Simon L. Madsen, Mads Dyrmann, Morten S. Laursen, Rasmus N. Jørgensen
Abstract:
Recent advances in the Unmanned Aerial System (UAS) safety and perception systems enable safe low altitude autonomous terrain following flights recently demonstrated by the consumer DJI Mavic PRO and Phamtom 4 Pro drones. This paper presents the first prototype system utilizing this functionality in form of semi-automated UAS based collection of crop/weed images where the embedded perception system ensures a significantly safer and faster gathering of weed images with sub-millimeter resolution. The system is to be used when the weeds are at cotyledon stage and prior to the harvest recognizing the grass weed species, which cannot be discriminated at the cotyledon stage.Keywords: weed mapping, UAV, DJI SDK, automation, cotyledon plants
Procedia PDF Downloads 309538 The Code-Mixing of Japanese, English, and Thai in Line Chat
Authors: Premvadee Na Nakornpanom
Abstract:
Language mixing in spontaneous speech has been widely discussed, but not in virtual situations; especially in context of the third language learning students. Thus, this study was an attempt to explore the characteristics of the mixing of Japanese, English and Thai in a mobile chat room by students with their background of Japanese, English, and Thai. The result found that Insertion of Thai and English content words was a very common linguistic phenomenon embedded in the utterances. As chatting is to be ‘relational’ or ‘interactional’, it affected the style of lexical choices to be speech-like, more personal and emotional-related. A Japanese sentence-final question particle“か”(ka) was added to the end of the sentence based on Thai grammar rule. Moreover, some unique characteristics were created. The non-verbal cues were represented in personal, Thai styles by inserting textual representations of images or feelings available on the websites into streams of conversations.Keywords: code-mixing, Japanese, English, Thai, line chat
Procedia PDF Downloads 652537 Topology-Based Character Recognition Method for Coin Date Detection
Authors: Xingyu Pan, Laure Tougne
Abstract:
For recognizing coins, the graved release date is important information to identify precisely its monetary type. However, reading characters in coins meets much more obstacles than traditional character recognition tasks in the other fields, such as reading scanned documents or license plates. To address this challenging issue in a numismatic context, we propose a training-free approach dedicated to detection and recognition of the release date of the coin. In the first step, the date zone is detected by comparing histogram features; in the second step, a topology-based algorithm is introduced to recognize coin numbers with various font types represented by binary gradient map. Our method obtained a recognition rate of 92% on synthetic data and of 44% on real noised data.Keywords: coin, detection, character recognition, topology
Procedia PDF Downloads 253536 The Nation in Turmoil: A Post - Colonial Critique of Mqapheli Mngdi's Cartoons
Authors: Sizwe Dlamini
Abstract:
There seems to be little that has been done to investigate cartoons from a literary criticism point of view. Cartoons have been given attention mostly in semiotics as compared to other scholarly perspectives. The aim of this article is to attempt to bridge this gap by observing cartoons through the post-colonial approach as a literary theory. Even though the post-colonial approach has been previously adopted to critique the prose genre and other genres in the African indigenous languages of South Africa, there seems to be no study that has used this approach to analyse the cartoon genre. This study is thus believed to be valuable to scientific knowledge in this sense. The study adopts textual analysis as a qualitative research technique since cartoons are the primary sources of data collection. Through the application of the post-colonial theory, the findings of the study demonstrate that there are depicted socio-cultural, socio-economic, and political issues in Mngadi’s editorial cartoons. These include.Keywords: editorial cartoons, post-colonial theory, literary criticism, turmoil
Procedia PDF Downloads 19535 The Effect of Contemporary Islamic Thought Liberalization to the Development of Science
Authors: Ibrahim Malik, Vita Fathimah Silondae, Askoning
Abstract:
The liberalization of Islamic thought is not only an impact on the views of Muslim community regarding worldview, but has touched the stage reconstruction of contemporary science. It can be seen from the emergence of Western and Eastern intellectual movements that try to reconstruct contemporary science arguing that scientific culture is not currently able to deliver audiences to change the order of the better society. Such Islamic thought liberalization has a huge influence on the multi-dimensional crisis in various sectors such as the economic, culture, politic, ecology, and other sectors. Therefore, this paper examines the effects of the liberalization of contemporary Islamic thought towards on the development of modern science. The method used in this paper is based on textual study of Al-Qur'an, Hadith (prophetic tradition), and the history of contemporary Islamic thought and comparing it with the reality of the development of science today. So, the influence of Islamic thought liberalization has created a crisis and stagnation of the development of scientific disciplines can be found.Keywords: liberalization, science, Islam, development of science
Procedia PDF Downloads 428534 Analysis of Cracked Beams with Spalling Having Different Arrangements of the Reinforcement Bars Using Finite Element Analysis (FEA)
Authors: Rishabh Shukla, Achin Agrawal, Anupam Saxena, S. Mandal
Abstract:
The existence of a crack, affects the mechanical behaviour and various properties of a structure to a great degree. This paper focuses on recognizing the parameters that gets changed due to the formation of cracks and have a great impact on the performance of the structure. Spalling is a major concern as it leaves the reinforcement bars more susceptible to environmental attacks. Beams of cross section 300 mm × 500 mm are designed and for a calculated area of steel, two different arrangements of reinforced bars are analysed. Results are prepared for different stages of cracking for each arrangement of rebars. The parameters for both arrangements are then compared. The Finite Element Analysis (FEA) is carried out and changes in the properties like flexural strength, Elasticity and modal frequency are reported. The conclusions have been drawn by comparing the results.Keywords: cracks, elasticity, spalling, FEA
Procedia PDF Downloads 279533 Automated Recognition of Still’s Murmur in Children
Authors: Sukryool Kang, James McConnaughey, Robin Doroshow, Raj Shekhar
Abstract:
Still’s murmur, a vibratory heart murmur, is the most common normal innocent murmur of childhood. Many children with this murmur are unnecessarily referred for cardiology consultation and testing, which exacts a high cost financially and emotionally on the patients and their parents. Pediatricians to date are not successful at distinguishing Still’s murmur from murmurs of true heart disease. In this paper, we present a new algorithmic approach to distinguish Still’s murmur from pathological murmurs in children. We propose two distinct features, spectral width and signal power, which describe the sharpness of the spectrum and the signal intensity of the murmur, respectively. Seventy pediatric heart sound recordings of 41 Still’s and 29 pathological murmurs were used to develop and evaluate our algorithm that achieved a true positive rate of 97% and false positive rate of 0%. This approach would meet clinical standards in recognizing Still’s murmur.Keywords: AR modeling, auscultation, heart murmurs, Still's murmur
Procedia PDF Downloads 368532 A Descriptive Study of Translated Texts from Socio-Cultural Aspects through Polysystem Theory and Patronage Framework
Authors: Reza Nozadheravi, Masoud Hasanzade Novin
Abstract:
Those techniques of translation which are engaged with short textual segments and mostly are prescriptive can be considered as micro level elements. Macro levels, however, refer to those translation strategies and those external factors that affect the translator’s decisions and have descriptive nature. What was scrutinized in details in the paper reveals the macro-elements which are crucial in canonized translated texts, moreover, different aspects of the patronage, which can be considered as the important factors from having the texts chosen to the final translation products, have been observed in translated texts of Najaf Darya-Bandarie, the well-known Iranian Translator. What is probed in this paper reveals that marco-elements along with the linguistic aspects of the texts, micro-elements, are considered as the significant aspects in translation process and even final translated texts.Keywords: canolized translated texts, culture, macro-elements, patronage
Procedia PDF Downloads 610531 “Student Veterans’ Transition to Nursing Education: Barriers and Facilitators
Authors: Bruce Hunter
Abstract:
Background: The transition for student veterans from military service to higher education can be a challenging endeavor, especially for those pursuing an education in nursing. While the experiences and perspectives of each student veteran is unique, their successful integration into an academic environment can be influenced by a complex array of barriers and facilitators. This mixed-methods study aims to explore the themes and concepts that can be found in the transition experiences of student veterans in nursing education, with a focus on identifying the barriers they face and the facilitators that support their success. Methods: This study utilizes an explanatory mixed-methods approach. The research participants include student veterans enrolled in nursing programs across three academic institutions in the Southeastern United States. Quantitative Phase: A Likert scale instrument is distributed to a sample of student veterans in nursing programs. The survey assesses demographic information, academic experiences, social experiences, and perceptions of institutional support. Quantitative data is analyzed using descriptive statistics to assess demographics and to identify barriers and facilitators to the transition. Qualitative Phase: Two open-ended questions were posed to student veterans to explore their lived experiences, barriers, and facilitators during the transition to nursing education and to further explain the quantitative findings. Thematic analysis with line-by-line coding is employed to identify recurring themes and narratives that may shed light on the barriers and facilitators encountered. Results: This study found that the successful academic integration of student veterans lies in recognizing the diversity of values and attitudes among student veterans, understanding the potential challenges they face, and engaging in initiative-taking steps to create an inclusive and supportive academic environment that accommodates the unique experiences of this demographic. Addressing these academic and social integration concerns can contribute to a more understanding environment for student veterans in the BSN program. Conclusion: Providing support during this transitional period is crucial not only for retaining veterans, but also for bolstering their success in achieving the status of registered nurses. Acquiring an understanding of military culture emerges as an essential initial step for nursing faculty in student veteran retention and for successful completion of their programs. Participants found that their transition experience lacked meaningful social interactions, which could foster a positive learning environment, enhance their emotional well-being, and could contribute significantly to their overall success and satisfaction in their nursing education journey. Recognizing and promoting academic and social integration is important in helping veterans experience a smooth transition into and through the unfamiliar academic environment of nursing education.Keywords: nursing, education, student veterans, barriers, facilitators
Procedia PDF Downloads 49530 Radical Web Text Classification Using a Composite-Based Approach
Authors: Kolade Olawande Owoeye, George R. S. Weir
Abstract:
The widespread of terrorism and extremism activities on the internet has become a major threat to the government and national securities due to their potential dangers which have necessitated the need for intelligence gathering via web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult or time-consuming. In response to this challenge, an automated classification system called composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a web. We implemented the framework on a set of extremist webpages dataset that has been subjected to the manual classification process. Therein, we developed a classification model on the data using J48 decision algorithm, this is to generate a measure of how well each page can be classified into their appropriate classes. The classification result obtained from our method when compared with other states of arts, indicated a 96% success rate in classifying overall webpages when matched against the manual classification.Keywords: extremist, web pages, classification, semantics, posit
Procedia PDF Downloads 145529 Analyzing the Effects of Adding Bitcoin to Portfolio
Authors: Shashwat Gangwal
Abstract:
This paper analyses the effect of adding Bitcoin, to the portfolio (stocks, bonds, Baltic index, MXEF, gold, real estate and crude oil) of an international investor by using daily data available from 2nd of July, 2010 to 2nd of August, 2016. We conclude that adding Bitcoin to portfolio, over the course of the considered period, always yielded a higher Sharpe ratio. This means that Bitcoin’s returns offset its high volatility. This paper, recognizing the fact that Bitcoin is a relatively new asset class, gives the readers a basic idea about the working of the virtual currency, the increasing number developments in the financial industry revolving around it, its unique features and the detailed look into its continuously growing acceptance across different fronts (Banks, Merchants and Countries) globally. We also construct optimal portfolios to reflect the highly lucrative and largely unexplored opportunities associated with investment in Bitcoin.Keywords: bitcoin, financial instruments, portfolio management, risk adjusted return
Procedia PDF Downloads 231528 A Review on Predictive Sound Recognition System
Authors: Ajay Kadam, Ramesh Kagalkar
Abstract:
The proposed research objective is to add to a framework for programmed recognition of sound. In this framework the real errand is to distinguish any information sound stream investigate it & anticipate the likelihood of diverse sounds show up in it. To create and industrially conveyed an adaptable sound web crawler a flexible sound search engine. The calculation is clamor and contortion safe, computationally productive, and hugely adaptable, equipped for rapidly recognizing a short portion of sound stream caught through a phone microphone in the presence of frontal area voices and other predominant commotion, and through voice codec pressure, out of a database of over accessible tracks. The algorithm utilizes a combinatorial hashed time-recurrence group of stars examination of the sound, yielding ordinary properties, for example, transparency, in which numerous tracks combined may each be distinguished.Keywords: fingerprinting, pure tone, white noise, hash function
Procedia PDF Downloads 322527 Efficiency of DMUs in Presence of New Inputs and Outputs in DEA
Authors: Esmat Noroozi, Elahe Sarfi, Farha Hosseinzadeh Lotfi
Abstract:
Examining the impacts of data modification is considered as sensitivity analysis. A lot of studies have considered the data modification of inputs and outputs in DEA. The issues which has not heretofore been considered in DEA sensitivity analysis is modification in the number of inputs and (or) outputs and determining the impacts of this modification in the status of efficiency of DMUs. This paper is going to present systems that show the impacts of adding one or multiple inputs or outputs on the status of efficiency of DMUs and furthermore a model is presented for recognizing the minimum number of inputs and (or) outputs from among specified inputs and outputs which can be added whereas an inefficient DMU will become efficient. Finally the presented systems and model have been utilized for a set of real data and the results have been reported.Keywords: data envelopment analysis, efficiency, sensitivity analysis, input, out put
Procedia PDF Downloads 450526 SLAPP Suits: An Encroachment On Human Rights Of A Global Proportion And What Can Be Done About It
Authors: Laura Lee Prather
Abstract:
A functioning democracy is defined by various characteristics, including freedom of speech, equality, human rights, rule of law and many more. Lawsuits brought to intimidate speakers, drain the resources of community members, and silence journalists and others who speak out in support of matters of public concern are an abuse of the legal system and an encroachment of human rights. The impact can have a broad chilling effect, deterring others from speaking out against abuse. This article aims to suggest ways to address this form of judicial harassment. In 1988, University of Denver professors George Pring and Penelope Canan coined the term “SLAPP” when they brought to light a troubling trend of people getting sued for speaking out about matters of public concern. Their research demonstrated that thousands of people engaging in public debate and citizen involvement in government have been and will be the targets of multi-million-dollar lawsuits for the purpose of silencing them and dissuading others from speaking out in the future. SLAPP actions chill information and harm the public at large. Professors Pring and Canan catalogued a tsunami of SLAPP suits filed by public officials, real estate developers and businessmen against environmentalists, consumers, women’s rights advocates and more. SLAPPs are now seen in every region of the world as a means to intimidate people into silence and are viewed as a global affront to human rights. Anti-SLAPP laws are the antidote to SLAPP suits and while commonplace in the United States are only recently being considered in the EU and the UK. This researcher studied more than thirty years of Anti-SLAPP legislative policy in the U.S., the call for evidence and resultant EU Commission’s Anti-SLAPP Directive and Member States Recommendations, the call for evidence by the UK Ministry of Justice, response and Model Anti-SLAPP law presented to UK Parliament, as well as, conducted dozens of interviews with NGO’s throughout the EU, UK, and US to identify varying approaches to SLAPP lawsuits, public policy, and support for SLAPP victims. This paper identifies best practices taken from the US, EU and UK that can be implemented globally to help combat SLAPPs by: (1) raising awareness about SLAPPs, how to identify them, and recognizing habitual abusers of the court system; (2) engaging governments in the policy discussion in combatting SLAPPs and supporting SLAPP victims; (3) educating judges in recognizing SLAPPs an general training on encroachment of human rights; (4) and holding lawyers accountable for ravaging the rule of law.Keywords: Anti-SLAPP Laws and Policy, Comparative media law and policy, EU Anti-SLAPP Directive and Member Recommendations, International Human Rights of Freedom of Expression
Procedia PDF Downloads 68525 The Construction Women Self in Law: A Case of Medico-Legal Jurisprudence Textbooks in Rape Cases
Authors: Rahul Ranjan
Abstract:
Using gender as a category to cull out historical analysis, feminist scholars have produced plethora of literature on the sexual symbolics and carnal practices of modern European empires. At a symbolic level, the penetration and conquest of faraway lands was charged with sexual significance and intrigue. The white male’s domination and possession of dark and fertile lands in Africa, Asia and the Americas offered, in Anne McClintock’s words, ‘a fantastic magic lantern of the mind onto which Europe projected its forbidden sexual desires and fears’. The politics of rape were also symbolically a question significant to the politics of empire. To the colonized subject, rape was a fearsome factor, a language that spoke of violent and voracious nature of imperial exploitation. The colonized often looked at rape as an act which colonizers used as tool of oppression. The rape as act of violence got encoded into the legal structure under the helm of Lord Macaulay in the so called ‘Age of Reform’ in 1860 under IPC (Indian penal code). Initially Lord Macaulay formed Indian Law Commission in 1837 in which he drafted a bill and defined the ‘crime of rape as sexual intercourse by a man to a woman against her will and without her consent , except in cases involving girls under nine years of age where consent was immaterial’. The modern English law of rape formulated under the colonial era introduced twofold issues to the forefront. On the one hand it deployed ‘technical experts’ who wrote textbooks of medical jurisprudence that were used as credential citation to make case more ‘objective’, while on the other hand the presumptions about barbaric subjects, the colonized women’s body that was docile which is prone to adultery reflected in cases. The untrustworthiness of native witness also remained an imperative for British jurists to put extra emphasis making ‘objective’ and ‘presumptuous’. This sort of formulation put women down on the pedestrian of justice because it disadvantaged her doubly through British legality and their thinking about the rape. The Imperial morality that acted as vanguards of women’s chastity coincided language of science propagated in the post-enlightenment which not only annulled non-conformist ideas but also made itself a hegemonic language, was often used as a tool and language in encoding of law. The medico-legal understanding of rape in the colonial India has its clear imprints in the post-colonial legality. The onus on the part of rape’s victim was dictated for the longest time and still continues does by widely referred idea that ‘there should signs, marks of resistance on the body of the victim’ otherwise it is likely to be considered consensual. Having said so, this paper looks at the textual continuity that had prolonged the colonial construct of women’s body and the self.Keywords: body, politics, textual construct, phallocentric
Procedia PDF Downloads 377524 Proposed Alternative System for Existing Traffic Signal System
Authors: Alluri Swaroopa, L. V. N. Prasad
Abstract:
Alone with fast urbanization in world, traffic control problem became a big issue in urban construction. Having an efficient and reliable traffic control system is crucial to macro-traffic control. Traffic signal is used to manage conflicting requirement by allocating different sets of mutually compatible traffic movement during distinct time interval. Many approaches have been made proposed to solve this discrete stochastic problem. Recognizing the need to minimize right-of-way impacts while efficiently handling the anticipated high traffic volumes, the proposed alternative system gives effective design. This model allows for increased traffic capacity and reduces delays by eliminating a step in maneuvering through the freeway interchange. The concept proposed in this paper involves construction of bridges and ramps at intersection of four roads to control the vehicular congestion and to prevent traffic breakdown.Keywords: bridges, junctions, ramps, urban traffic control
Procedia PDF Downloads 553523 Structural Analysis of Username Segment in E-Mail Addresses of Engineering Institutes of Gujarat State of India
Authors: Jatinderkumar R. Saini
Abstract:
E-mail has become a key mechanism of electronic communication. This is truer for professional organizations that like to communicate with their subjects online and are slowly shifting to paper-less office. The current paper focuses specifically on academic institutions offering Engineering course in Gujarat state and attempts for textual analysis of the usernames of the institutional e-mail addresses. We found that the institutions tend to design the username segment of their e-mail addresses by choosing words or combination of words from specific categories. The paper also highlights the use of special characters, digits and random words in designing the usernames. On the sidelines, the paper lists the style of employing department names and designations for the design process. To the best of our knowledge, this is the first formal attempt to analyze the selection of words employed for designing username segment of e-mail addresses of Engineering institutions.Keywords: e-mail address, institute, engineering, username
Procedia PDF Downloads 336