Search results for: hybrid identity
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3358

Search results for: hybrid identity

1318 Construction of a Supply Chain Model Using the PREVA Method: The Case of Innovative Sargasso Recovery Projects in Ther Lesser Antilles

Authors: Maurice Bilioniere, Katie Lanneau

Abstract:

Suddenly appeared in 2011, invasions of sargasso seaweeds Fluitans and Natans are a climatic hazard which causes many problems in the Caribbean. Faced with the growth and frequency of the phenomenon of massive sargasso stranding on their coasts, the French West Indies are moving towards the path of industrial recovery. In this context of innovative projects, we will analyze the necessary requirements for the management and performance of the supply chain, taking into account the observed volatility of the sargasso input. Our prospective approach will consist in studying the theoretical framework of modeling a hybrid supply chain by coupling the discreet event simulation (DES) with a valuation of the process costs according to the "activity-based costing" method (ABC). The PREVA approach (PRocess EVAluation) chosen for our modeling has the advantage of evaluating the financial flows of the logistic process using an analytical model chained with an action model for the evaluation or optimization of physical flows.

Keywords: sargasso, PREVA modeling, supply chain, ABC method, discreet event simulation (DES)

Procedia PDF Downloads 179
1317 Between Dark and Light: The Construction and the Exclusion of Memory of Prison Heritage in Post-Soviet Period

Authors: Guo Cyuan Deng

Abstract:

This study represents how the Soviet-occupied dark memory in Baltic countries were interpreted and represented by examining the way of management of prison heritage. Based on the formulation of a dark-tourism spectrum which Philip Stone proposed, the Patarei prison in Estonia and the Karosta prison in Latvia are compared, and it is thought that both prisons, which had experienced similar colonial history, face different tourism operation in the present. The former is being run by NGO and remain the situation of “empty" by art intervening. However, the Estonia government attempt to get the operation of museum and transform it to anti-Soviet museum in order show national identity. By contrast, the latter is being managed by private company, whom transformed the prison to "dark fun factories" by entertainment activities in order to private capital accumulation. Moreover, it is not only indicated that both prisons exclude the minority's memory, but also the flaws of dark-tourism spectrum which divide the dark and light are discussed. Finally, given the nature and function of dark heritage, the concept "le métro" is used to supplement Stone's spectrum.

Keywords: dark tourism, prison heritage, Post-Soviet, Baltic countries, national identities

Procedia PDF Downloads 309
1316 A Hybrid Digital Watermarking Scheme

Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif

Abstract:

Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.

Keywords: watermarking, image processing, DCT, LSB, PSNR

Procedia PDF Downloads 58
1315 Lowering Error Floors by Concatenation of Low-Density Parity-Check and Array Code

Authors: Cinna Soltanpur, Mohammad Ghamari, Behzad Momahed Heravi, Fatemeh Zare

Abstract:

Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.

Keywords: concatenated coding, low–density parity–check codes, array code, error floors

Procedia PDF Downloads 358
1314 Relation between Physical and Mechanical Properties of Concrete Paving Stones Using Neuro-Fuzzy Approach

Authors: Erion Luga, Aksel Seitllari, Kemal Pervanqe

Abstract:

This study investigates the relation between physical and mechanical properties of concrete paving stones using neuro-fuzzy approach. For this purpose 200 samples of concrete paving stones were selected randomly from different sources. The first phase included the determination of physical properties of the samples such as water absorption capacity, porosity and unit weight. After that the indirect tensile strength test and compressive strength test of the samples were performed. İn the second phase, adaptive neuro-fuzzy approach was employed to simulate nonlinear mapping between the above mentioned physical properties and mechanical properties of paving stones. The neuro-fuzzy models uses Sugeno type fuzzy inference system. The models parameters were adapted using hybrid learning algorithm and input space was fuzzyfied by considering grid partitioning. It is concluded based on the observed data and the estimated data through ANFIS models that neuro-fuzzy system exhibits a satisfactory performance.

Keywords: paving stones, physical properties, mechanical properties, ANFIS

Procedia PDF Downloads 346
1313 Cultivating Responsible AI: For Cultural Heritage Preservation in India

Authors: Varsha Rainson

Abstract:

Artificial intelligence (AI) has great potential and can be used as a powerful tool of application in various domains and sectors. But with the application of AI, there comes a wide spectrum of concerns around bias, accountability, transparency, and privacy. Hence, there is a need for responsible AI, which can uphold ethical and accountable practices to ensure that things are transparent and fair. The paper is a combination of AI and cultural heritage preservation, with a greater focus on India because of the rich cultural legacy that it holds. India’s cultural heritage in itself contributes to its identity and the economy. In this paper, along with discussing the impact culture holds on the Indian economy, we will discuss the threats that the cultural heritage is exposed to due to pollution, climate change and urbanization. Furthermore, the paper reviews some of the exciting applications of AI in cultural heritage preservation, such as 3-D scanning, photogrammetry, and other techniques which have led to the reconstruction of cultural artifacts and sites. The paper eventually moves into the potential risks and challenges that AI poses in cultural heritage preservation. These include ethical, legal, and social issues which are to be addressed by organizations and government authorities. Overall, the paper strongly argues the need for responsible AI and the important role it can play in preserving India’s cultural heritage while holding importance to value and diversity.

Keywords: responsible AI, cultural heritage, artificial intelligence, biases, transparency

Procedia PDF Downloads 195
1312 The Role of Urban Design in Creating Cohesive and People’s Public Spaces

Authors: Hazem Abuorf

Abstract:

From the perspective of viewing urban design as the architecture of public spaces, the latter has many advantages; for example, in achieving attractive and vibrant public spaces, ensuring safety and amenity, supporting a strong sense of place and local character. Besides all advantages, such spaces nevertheless trigger numerous dilemmas, how to design urban spaces preserving the quality of life in the long term while equally achieving cohesion between new urban developments and the already existing urban structure without causing a split in history through the cause of functional and aesthetic degradation. Analysis of this article seeks to propose a methodology deemed essential for assessing and stimulating design criteria of the public spaces when rehabilitating urban sites. The method’s utility is shown by analyzing rehabilitation projects in Gaza Strip, whose design of the public spaces has mainly focused on the physical aspect ignoring the place’s local identity, users’ needs, and history. The proposed methodology serves as a guide for municipal authorities and technical teams to deal with interventions that would rework the role of urban design towards making sense of place.

Keywords: urban design, public realm, rehabilitation projects, quality of life

Procedia PDF Downloads 166
1311 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 269
1310 Sentiment Analysis of Ensemble-Based Classifiers for E-Mail Data

Authors: Muthukumarasamy Govindarajan

Abstract:

Detection of unwanted, unsolicited mails called spam from email is an interesting area of research. It is necessary to evaluate the performance of any new spam classifier using standard data sets. Recently, ensemble-based classifiers have gained popularity in this domain. In this research work, an efficient email filtering approach based on ensemble methods is addressed for developing an accurate and sensitive spam classifier. The proposed approach employs Naive Bayes (NB), Support Vector Machine (SVM) and Genetic Algorithm (GA) as base classifiers along with different ensemble methods. The experimental results show that the ensemble classifier was performing with accuracy greater than individual classifiers, and also hybrid model results are found to be better than the combined models for the e-mail dataset. The proposed ensemble-based classifiers turn out to be good in terms of classification accuracy, which is considered to be an important criterion for building a robust spam classifier.

Keywords: accuracy, arcing, bagging, genetic algorithm, Naive Bayes, sentiment mining, support vector machine

Procedia PDF Downloads 148
1309 Modeling User Context Using CEAR Diagram

Authors: Ravindra Dastikop, G. S. Thyagaraju, U. P. Kulkarni

Abstract:

Even though the number of context aware applications is increasing day by day along with the users, till today there is no generic programming paradigm for context aware applications. This situation could be remedied by design and developing the appropriate context modeling and programming paradigm for context aware applications. In this paper, we are proposing the static context model and metrics for validating the expressiveness and understandability of the model. The proposed context modeling is a way of describing a situation of user using context entities , attributes and relationships .The model which is an extended and hybrid version of ER model, ontology model and Graphical model is specifically meant for expressing and understanding the user situation in context aware environment. The model is useful for understanding context aware problems, preparing documentation and designing programs and databases. The model makes use of context entity attributes relationship (CEAR) diagram for representation of association between the context entities and attributes. We have identified a new set of graphical notations for improving the expressiveness and understandability of context from the end user perspective .

Keywords: user context, context entity, context entity attributes, situation, sensors, devices, relationships, actors, expressiveness, understandability

Procedia PDF Downloads 348
1308 Study of Human Position in Architecture with Contextual Approach

Authors: E. Zarei, M. Bazaei, A. seifi, A. Keshavarzi

Abstract:

Contextuallism has been always the main component of urban science. It not only has great direct and indirect impact on behaviors, events and interactions, but also is one of the basic factors of an urban values and identity. Nowadays there might be some deficiencies in the cities. In the theories of environment designing, humanistic orientations with the focus on culture and cultural variables would enable us to transfer information. To communicate with the context in which human lives, he needs some common memories, understandable symbols and daily activities in that context. The configuration of a place can impact on human’s behaviors. The goal of this research is to review 7 projects in different parts of the world with various usages and some factors such as ‘sense of place’, ‘sense of belonging’ and ‘social and cultural relations’ will be discussed in these projects. The method used for research in this project is descriptive- analytic. Library information and Internet are the main sources of gathering information and the method of reasoning used in this project is inductive. The consequence of this research will be some data in the form of tables that has been extracted from mentioned projects.

Keywords: contextuallism with humanistic approach, sense of place, sense of belonging, social and cultural relations

Procedia PDF Downloads 399
1307 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 401
1306 Argument Representation in Non-Spatial Motion Bahasa Melayu Based Conceptual Structure Theory

Authors: Nurul Jamilah Binti Rosly

Abstract:

The typology of motion must be understood as a change from one location to another. But from a conceptual point of view, motion can also occur in non-spatial contexts associated with human and social factors. Therefore, from the conceptual point of view, the concept of non-spatial motion involves the movement of time, ownership, identity, state, and existence. Accordingly, this study will focus on the lexical as shared, accept, be, store, and exist as the study material. The data in this study were extracted from the Database of Languages and Literature Corpus Database, Malaysia, which was analyzed using semantics and syntax concepts using Conceptual Structure Theory - Ray Jackendoff (2002). Semantic representations are represented in the form of conceptual structures in argument functions that include functions [events], [situations], [objects], [paths] and [places]. The findings show that the mapping of these arguments comprises three main stages, namely mapping the argument structure, mapping the tree, and mapping the role of thematic items. Accordingly, this study will show the representation of non- spatial Malay language areas.

Keywords: arguments, concepts, constituencies, events, situations, thematics

Procedia PDF Downloads 134
1305 Design and Analysis of a Laminated Composite Automotive Drive Shaft

Authors: Hossein Kh. Bisheh, Nan Wu

Abstract:

Advanced composite materials have a great importance in engineering structures due to their high specific modulus and strength and low weight. These materials can be used in design and fabrication of automotive drive shafts to reduce the weight of the structure. Hence, an optimum design of a composite drive shaft satisfying the design criteria, can be an appropriate substitution of metallic drive shafts. The aim of this study is to design and analyze a composite automotive drive shaft with high specific strength and low weight satisfying the design criteria. Tsai-Wu criterion is chosen as the failure criterion. Various designs with different lay-ups and materials are investigated based on the design requirements and finally, an optimum design satisfying the design criteria is chosen based on the weight and cost considerations. The results of this study indicate that if the weight is the main concern, a shaft made of Carbon/Epoxy can be a good option, and if the cost is a more important parameter, a hybrid shaft made of aluminum and Carbon/Epoxy can be considered.

Keywords: Bending natural frequency, Composite drive shaft, Peak torque, Torsional buckling

Procedia PDF Downloads 237
1304 Study of Electrical Properties of An-Fl Based Organic Semiconducting Thin Film

Authors: A.G. S. Aldajani, N. Smida, M. G. Althobaiti, B. Zaidi

Abstract:

In order to exploit the good electrical properties of anthracene and the excellent properties of fluorescein, new hybrid material has been synthesized (An-Fl). Current-voltage measurements were done on a new single-layer ITO/An-FL/Al device of typically 100 nm thickness. Atypical diode behavior is observed with a turn-on voltage of 4.4 V, a dynamic resistance of 74.07 KΩ and a rectification ratio of 2.02 due to unbalanced transport. Results show also that the current-voltage characteristics present three different regimes of the power-law (J~Vᵐ) for which the conduction mechanism is well described with space-charge-limited current conduction mechanism (SCLC) with a charge carrier mobility of 2.38.10⁻⁵cm2V⁻¹S⁻¹. Moreover, the electrical transport properties of this device have been carried out using a dependent frequency study in the range (50 Hz–1.4 MHz) for different applied biases (from 0 to 6 V). At lower frequency, the σdc values increase with bias voltage rising, supporting that the mobile ion can hop successfully to its nearest vacant site. From σac and impedance measurements, the equivalent electrical circuit is evidenced, where the conductivity process is coherent with an exponential trap distribution caused by structural defects and/or chemical impurities.

Keywords: semiconducting polymer, conductivity, SCLC, impedance spectroscopy

Procedia PDF Downloads 184
1303 Young Carers’ Dilemma: Family Responsibility, Bonding and Commitment to Supporting Their Mentally Ill Parent in Taiwan

Authors: Esabella Yuan

Abstract:

This study explored the recollections of young carers who lived with and cared for their mentally ill parent and how they managed life difficulties in Taiwan. 19 former young carers took part in the study, conducted from July to October 2021. The findings provided the unique view that all the participants acknowledged being taught by the mainstream culture to honour family value and prioritize the needs of parents over their own ones, they stepped in to care for the ill parent out of love and out of necessity through there having no-one to turn to, they were willing to assume long-term caring responsibilities, strikingly, a much more common experience was that the participants hided parental illness and young carer identity in the community through the fear of social discrimination attached to mental illness. As a result, these former young carers stayed in hidden circumstances and coped alone with caring challenges. The findings suggest that there needs multi-disciplinary services working together to recognize the needs of young carers and provide appropriate intervention to young carers based on a family-focus approach and ensure to serve the best interests of young carers and their families. It is to be hope that young carers can grow up safely and healthily within the community.

Keywords: young carers, family well-being, mental health, parental mental illness

Procedia PDF Downloads 94
1302 Machine Learning Methods for Flood Hazard Mapping

Authors: Stefano Zappacosta, Cristiano Bove, Maria Carmela Marinelli, Paola di Lauro, Katarina Spasenovic, Lorenzo Ostano, Giuseppe Aiello, Marco Pietrosanto

Abstract:

This paper proposes a novel neural network approach for assessing flood hazard mapping. The core of the model is a machine learning component fed by frequency ratios, namely statistical correlations between flood event occurrences and a selected number of topographic properties. The proposed hybrid model can be used to classify four different increasing levels of hazard. The classification capability was compared with the flood hazard mapping River Basin Plans (PAI) designed by the Italian Institute for Environmental Research and Defence, ISPRA (Istituto Superiore per la Protezione e la Ricerca Ambientale). The study area of Piemonte, an Italian region, has been considered without loss of generality. The frequency ratios may be used as a standalone block to model the flood hazard mapping. Nevertheless, the mixture with a neural network improves the classification power of several percentage points, and may be proposed as a basic tool to model the flood hazard map in a wider scope.

Keywords: flood modeling, hazard map, neural networks, hydrogeological risk, flood risk assessment

Procedia PDF Downloads 185
1301 The Evolution of Online Hate: How Decades of Tactical and Technological Innovation Created a Hate Epidemic

Authors: Kashvi Jain, Adam Burston

Abstract:

Right-wing social movements are a dominant force in American politics, as evidenced by the January 6th Insurrection, the prevalence of extremist conspiracy theories, and a nationwide surge in hate crime. Despite an abundance of scholarship on contemporary right-wing extremism, there is little scholarship that explains their rise. This paper examines how the white power movement developed through tactical innovation and strategic use of increasingly powerful digital technologies. Using qualitative content analysis of archived digital bulletin boards and websites, we examine right-wing extremists’ digital communication during three consequential time periods of tactical and technological innovation: pre-internet (1980s), web 1.0 (1990s), and web 2.0 (2000s). Our analysis suggests that right-wing activists innovatively exploited the features and affordances of digital technologies and their knowledge of free speech rights to spread supremacist collective identity and ideology. Beyond our empirical contribution, we offer policy advice that school administrators can employ to limit hate.

Keywords: leaderless resistance, technological affordances, anti-defamation league, white power movement, tactical

Procedia PDF Downloads 72
1300 Multichannel Scheme under Fairness Environment for Cognitive Radio Networks

Authors: Hans Marquez Ramos, Cesar Hernandez, Ingrid Páez

Abstract:

This paper develops a multiple channel assignment model, which allows to take advantage in most efficient way, spectrum opportunities in cognitive radio networks. Developed scheme allows make several available and frequency adjacent channel assignments, which require a bigger wide band, under an equality environment. The hybrid assignment model it is made by to algorithms, one who makes the ranking and select available frequency channels and the other one in charge of establishing an equality criteria, in order to not restrict spectrum opportunities for all other secondary users who wish to make transmissions. Measurements made were done for average bandwidth, average delay, as well fairness computation for several channel assignment. Reached results were evaluated with experimental spectrum occupational data from GSM frequency band captured. Developed model, shows evidence of improvement in spectrum opportunity use and a wider average transmit bandwidth for each secondary user, maintaining equality criteria in channel assignment.

Keywords: bandwidth, fairness, multichannel, secondary users

Procedia PDF Downloads 508
1299 Distinguishing Borrowings from Code Mixes: An Analysis of English Lexical Items Used in the Print Media in Sri Lanka

Authors: Chamindi Dilkushi Senaratne

Abstract:

Borrowing is the morphological, syntactic and (usually) phonological integration of lexical items from one language into the structure of another language. Borrowings show complete linguistic integration and due to the frequency of use become fossilized in the recipient language differentiating them from switches and mixes. Code mixes are different to borrowings. Code mixing takes place when speakers use lexical items in casual conversation to serve a variety of functions. This study presents an analysis of lexical items used in English newspapers in Sri Lanka in 2017 which reveal characteristics of borrowing or code mixes. Both phenomena arise due to language contact. The study will also use data from social media websites that comment on newspaper articles available on the web. The study reiterates that borrowings are distinguishable from code mixes and that they are two different phenomena that occur in language contact situations. The study also shows how existing morphological processes are used to create new vocabulary in language use. The study sheds light into how existing morphological processes are used by the bilingual to be creative, innovative and convey a bilingual identity.

Keywords: borrowing, code mixing, morphological processes

Procedia PDF Downloads 224
1298 Validity and Reliability of the Iranian Version of the Self-Expansion Questionnaire

Authors: Mehravar Javid, James Sexton, Farzaneh Amani, Kainaz Patravala

Abstract:

Self-expansion is a procedure through which people expand the dimensions of their self-concept by incorporating novel content into their sense and experience of identity. Greater self-expansion predicts positive consequences for individuals and romantic relationships. The self-expansion questionnaire (SEQ) originally developed by Lewandowski & Aron (2002) assumes that self-expansion is constituted of key components from the self-expansion model. This study aimed to confirm the factor structure of SEQ and adapt the questions of the scale to the Iranian culture. The sample included 190 participants who responded to 14 items and were selected by simple random sampling. Using Amos-21 and SPSS-21, descriptive statistics, Pearson correlation and Confirmatory Factor Analysis (CFA) were calculated. Cronbach’s alpha coefficient for total SEQ items was 0.92. Results of CFA supported the factor structure SEQ [RMSEA=0.08, GFI=0.88 and CFI=0.92] that showed the model has a good fit and also all the items of SEQ, have a high correlation and have a direct and significant relationship. So, the SEQ demonstrated acceptable psychometric properties in Tehran University students. Looking forward, it would be interesting and exciting to see the implications of the scale as applied to romantic relationships.

Keywords: validity, reliability, confirmatory factor analysis, self-expansion questionnaire

Procedia PDF Downloads 86
1297 The Lived Experience of People with a Mental Illness of Their Engagement in Therapeutic Recreation

Authors: Caroline Picton, Lorna Moxham, Christopher Patterson, Dana Perlman, Ellie Taylor, Renee Brighton

Abstract:

The purpose of this study was to extrapolate the meaning for people living with a mental illness of their participation in a therapeutic recreation experience. The study’s participants engaged in a five-day adventure camp, known as Recovery Camp, alongside undergraduate health care students. An interpretive phenomenological approach was used as an exploratory method to interview 25 participants (n=25). Van Kaam’s structured analytical framework guided the analysis of the transcribed narratives. The findings provide insight into using therapeutic recreation to enhance personal mental health recovery. Recovery Camp was viewed by participants as having a transformational effect on forming positive social connectedness and improving their self-identity. Participants perceived the Recovery Camp experience as one that gave them a sense of purpose and increased their motivation to undertake further activities. The insights gained of the benefits of therapeutic recreation for people living with a mental illness can be used to promote purposeful community engagement.

Keywords: interpretive phenomenology, lived experience, mental illness, personal mental health recovery

Procedia PDF Downloads 503
1296 Machine Learning Approach for Automating Electronic Component Error Classification and Detection

Authors: Monica Racha, Siva Chandrasekaran, Alex Stojcevski

Abstract:

The engineering programs focus on promoting students' personal and professional development by ensuring that students acquire technical and professional competencies during four-year studies. The traditional engineering laboratory provides an opportunity for students to "practice by doing," and laboratory facilities aid them in obtaining insight and understanding of their discipline. Due to rapid technological advancements and the current COVID-19 outbreak, the traditional labs were transforming into virtual learning environments. Aim: To better understand the limitations of the physical laboratory, this research study aims to use a Machine Learning (ML) algorithm that interfaces with the Augmented Reality HoloLens and predicts the image behavior to classify and detect the electronic components. The automated electronic components error classification and detection automatically detect and classify the position of all components on a breadboard by using the ML algorithm. This research will assist first-year undergraduate engineering students in conducting laboratory practices without any supervision. With the help of HoloLens, and ML algorithm, students will reduce component placement error on a breadboard and increase the efficiency of simple laboratory practices virtually. Method: The images of breadboards, resistors, capacitors, transistors, and other electrical components will be collected using HoloLens 2 and stored in a database. The collected image dataset will then be used for training a machine learning model. The raw images will be cleaned, processed, and labeled to facilitate further analysis of components error classification and detection. For instance, when students conduct laboratory experiments, the HoloLens captures images of students placing different components on a breadboard. The images are forwarded to the server for detection in the background. A hybrid Convolutional Neural Networks (CNNs) and Support Vector Machines (SVMs) algorithm will be used to train the dataset for object recognition and classification. The convolution layer extracts image features, which are then classified using Support Vector Machine (SVM). By adequately labeling the training data and classifying, the model will predict, categorize, and assess students in placing components correctly. As a result, the data acquired through HoloLens includes images of students assembling electronic components. It constantly checks to see if students appropriately position components in the breadboard and connect the components to function. When students misplace any components, the HoloLens predicts the error before the user places the components in the incorrect proportion and fosters students to correct their mistakes. This hybrid Convolutional Neural Networks (CNNs) and Support Vector Machines (SVMs) algorithm automating electronic component error classification and detection approach eliminates component connection problems and minimizes the risk of component damage. Conclusion: These augmented reality smart glasses powered by machine learning provide a wide range of benefits to supervisors, professionals, and students. It helps customize the learning experience, which is particularly beneficial in large classes with limited time. It determines the accuracy with which machine learning algorithms can forecast whether students are making the correct decisions and completing their laboratory tasks.

Keywords: augmented reality, machine learning, object recognition, virtual laboratories

Procedia PDF Downloads 142
1295 Origins of Chicago Common Brick: Examining a Masonry Shell Encasing a New Ando Museum

Authors: Daniel Joseph Whittaker

Abstract:

This paper examines the broad array of historic sites from which Chicago common brick has emerged, and the methods this brick has been utilized within and around a new hybrid structure recently completed-and periodically opened to the public, as a private art, architecture, design, and social activism gallery space. Various technical aspects regarding the structural and aesthetic reuse methods of salvaged brick within the interior and exterior of this new Tadao Ando-designed building in Lincoln Park, Chicago, are explored. This paper expands specifically upon the multiple possible origins of Chicago common brick, as well as the extant brick currently composing the surrounding alley which is integral to demarcating the southern site boundary of the old apartment building now gallery. Themes encompassing Chicago’s archeological and architectural history, local resource extraction, and labor practices permeate this paper’s investigation into urban, social and architectural history and building construction technology advancements through time.

Keywords: masonry construction, history brickmaking, private museums, Chicago Illinois, Tadao Ando

Procedia PDF Downloads 176
1294 Influence of Magnetic Bio-Stimulation Effects on Pre-Sown Hybrid Sunflower Seeds Germination, Growth, and on the Percentage of Antioxidant Activities

Authors: Nighat Zia-ud-Den, Shazia Anwer Bukhari

Abstract:

In the present study, sunflower seeds were exposed to magnetic bio-stimulation at different milli Tesla, and their effects were studied. The present study addressed to establish the effectiveness of magnetic bio-stimulation on seed germination, growth, and other dynamics of crop growth. The changes in physiological characters, i.e. the growth parameters of seedlings (biomass, root and shoot length, fresh and dry weight of root shoot leaf and fruit, leaf area, the height of plants, number of leaves, and number of fruits per plant) and antioxidant activities were measured. The parameters related to germination and growth were measured under controlled conditions while they changed significantly compared with that of the control. These changes suggested that magnetic seed stimulator enhanced the inner energy of seeds, which contributed to the acceleration of the growth and development of seedlings. Moreover, pretreatment with a magnetic field was found to be a positive impact on sunflower seeds germination, growth, and other biochemical parameters.

Keywords: sunflower seeds, physical priming method, biochemical parameters, antioxidant activities

Procedia PDF Downloads 170
1293 An Overview on Aluminum Matrix Composites: Liquid State Processing

Authors: S. P. Jordan, G. Christian, S. P. Jeffs

Abstract:

Modern composite materials are increasingly being chosen in replacement of heavier metallic material systems within many engineering fields including aerospace and automotive industries. The increasing push towards satisfying environmental targets are fuelling new material technologies and manufacturing processes. This paper will introduce materials and manufacturing processes using metal matrix composites along with manufacturing processes optimized at Alvant Ltd., based in Basingstoke in the UK which offers modern, cost effective, selectively reinforced composites for light-weighting applications within engineering. An overview and introduction into modern optimized manufacturing methods capable of producing viable replacements for heavier metallic and lower temperature capable polymer composites are offered. A review of the capabilities and future applications of this viable material is discussed to highlight the potential involved in further optimization of old manufacturing techniques, to fully realize the potential to lightweight material using cost-effective methods.

Keywords: aluminium matrix composites, light-weighting, hybrid squeeze casting, strategically placed reinforcements

Procedia PDF Downloads 102
1292 The Transport of Radical Species to Single and Double Strand Breaks in the Liver’s DNA Molecule by a Hybrid Method of Type Monte Carlo - Diffusion Equation

Authors: H. Oudira, A. Saifi

Abstract:

The therapeutic utility of certain Auger emitters such as iodine-125 depends on their position within the cell nucleus . Or diagnostically, and to maintain as low as possible cell damage, it is preferable to have radionuclide localized outside the cell or at least the core. One solution to this problem is to consider markers capable of conveying anticancer drugs to the tumor site regardless of their location within the human body. The objective of this study is to simulate the impact of a complex such as bleomycin on single and double strand breaks in the DNA molecule. Indeed, this simulation consists of the following transactions: - Construction of BLM -Fe- DNA complex. - Simulation of the electron’s transport from the metastable state excitation of Fe 57 by the Monte Carlo method. - Treatment of chemical reactions in the considered environment by the diffusion equation. For physical, physico-chemical and finally chemical steps, the geometry of the complex is considered as a sphere of 50 nm centered on the binding site , and the mathematical method used is called step by step based on Monte Carlo codes.

Keywords: concentration, yield, radical species, bleomycin, excitation, DNA

Procedia PDF Downloads 461
1291 Modern Saigon Drag Queen Show: Voice of the Trans Vietnamese for Gender Equality

Authors: Ly Quyet Tien

Abstract:

Starting in the 1990s and growing in tandem with the LGBTQI movement in Vietnam, Modern Saigon Lottery Show is one of the most popular Vietnamese drag queen shows in Ho Chi Minh City, Vietnam. Transgender by nature, underprivileged by status, avoided by the family, and despised by society for decades, these queer artists came out of the closet and decided to change their own destiny by organizing lottery music shows. Unprofessionally in the start, they gradually appeared professionally on stage in big cities and won the heart of the larger public. Their success affirms themself, promotes their gender right, and assures their life in a proud way: honest, independent, and sustainable. This paper aims to give the readers a full portrait of Modern Saigon’s activities through musical bingo. It examines the background into which the drag queen show was born and developed: its styles, themes as well as own particularity. It also studies its identity, diversity in the entertainment industry, and its revolutionary role in the promotion of the welfare of Vietnamese transgender citizens and the local popular queer culture in Vietnam and Asia.

Keywords: transgender, lottery show, equality, culture

Procedia PDF Downloads 103
1290 EU Citizenship, Brexit, and Democracy

Authors: Noemi Bessa Vilela

Abstract:

The citizenship of the European Union nowadays established under article 20/1 of the Treaty on the Functioning of the European Union has been a hallmark of the EU’s political integration since the adoption of the Maastricht Treaty. Initially received with some doubt regarding what it would mean to be a European citizen, and what would happen to individual national citizenships, the Union’s citizenship appears to have been relegated at present times to a secondary position in relation to other, more pressing, economic and market policies. Notwithstanding the veritable myriad of specific rights and freedoms attributed to citizens of the Union, it is not hard to understand that, given the importance of citizenship as a true cohesion policy at its core, somewhere along the way the Union has failed in its mission of giving its citizens a feeling of European identity, along with the values it so bravely wants to defend and promote. In fact, notwithstanding the ever-so-permanent presence of the blue and yellow flag next to national flags, and the elections to European Parliament, most citizens have no idea of the relevance of EU law as an integral part of their legal heritage. In fact, it is safe to state, while the majority of traveling nationals are aware of i.e. their right to freely move in between Member-States, most overlook the fact that this is a result of their status as EU citizens. We have now arrived at a crossroad between accepting the law as it is, or to create new possibilities. The question raised is whether the citizens of UK may, or may not, and shall or shall not, keep the EU citizenship.

Keywords: Brexit, democracy, EU citizenship, EU law, TFUE

Procedia PDF Downloads 134
1289 Optimal Solutions for Real-Time Scheduling of Reconfigurable Embedded Systems Based on Neural Networks with Minimization of Power Consumption

Authors: Ghofrane Rehaiem, Hamza Gharsellaoui, Samir Benahmed

Abstract:

In this study, Artificial Neural Networks (ANNs) were used for modeling the parameters that allow the real-time scheduling of embedded systems under resources constraints designed for real-time applications running. The objective of this work is to implement a neural networks based approach for real-time scheduling of embedded systems in order to handle real-time constraints in execution scenarios. In our proposed approach, many techniques have been proposed for both the planning of tasks and reducing energy consumption. In fact, a combination of Dynamic Voltage Scaling (DVS) and time feedback can be used to scale the frequency dynamically adjusting the operating voltage. Indeed, we present in this paper a hybrid contribution that handles the real-time scheduling of embedded systems, low power consumption depending on the combination of DVS and Neural Feedback Scheduling (NFS) with the energy Priority Earlier Deadline First (PEDF) algorithm. Experimental results illustrate the efficiency of our original proposed approach.

Keywords: optimization, neural networks, real-time scheduling, low-power consumption

Procedia PDF Downloads 374